Employment Benefits + Bonuses Lead cross-functional post-incident process reviews to identify and implement continuous improvement initiatives. Partner with Legal, 2LoD, Major Incident Management, ThreatManagement, Vulnerability Management, Attack Surface Reduction, Software Engineering, Security Architecture, Platform Support both locally and globally. You will have experience … in: Leading the response to complex incidents in a large-scale environments. Years of relevant experience in cyber security operations, incident management or risk management within an enterprise environment. Self-motivated interest in the latest cyber security threats and vulnerabilities and is able to integrate threat intelligence more »
Greater London, England, United Kingdom Hybrid / WFH Options
Franklin Fitch
looking for an enthusiastic and innovative IT Security Engineer. Security Engineer main responsibilities will include, but are not necessarily limited to, the following: Vulnerability Management o Take lead on the daily vulnerability management activities, including but not limited to application vulnerability and infrastructure vulnerability assessments. o Manage prioritisation … of vulnerabilities through a risk-based approach, to meet patch management policies, regulatory compliance, and audit findings. o Management and configuration of vulnerability management tools (Microsoft Azure and Qualys) o Support the InfoSec function in proactively identifying and leveraging threat intelligence sources to inform strategic vulnerability … mitigation measures. ThreatManagement o Take lead on the daily threatmanagement activities o Maintain and update incident response playbooks and automation o Monitor security dashboards and reports for alerts and threats o 2nd line support to IT Service Desk for cyber related incidents/events more »
Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
Security Manager to join their fast-paced Operations team on a permanent basis. The Lead IT Security Manager is responsible for is the effective management of the Security Operations pillar within the IT Security, Compliance & Identity function. This includes Security technology and Security Operations Centre management. Key focus areas … for this role, the ideal candidate will have experience in each of the below; Threat & Vulnerability Management Security Operations Centre - 24/7 Outsourced Web & Content Filtering - ProofPoint, Zscaler, etc. Endpoint Security Infrastructure Security Accountabilities * Lead the Security Operations pillar, determining and delivering requirements, methods, and tools to … provide value and reduce risk across proactive monitoring, incident response, threatmanagement and vulnerability management (among other activity) . * Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). * Manage the application and compliance of security operations procedures, reviewing more »
that own the day to day safeguarding of customer information and physical assets of the company • Leading our Security Operations Centre (SOC), and effective management to operationalise the service effectively Must have at least 5 years’ experience working in cyber security operations. • Must have practical experience of working in … email security, network security tools, SIEM and SOAR etc, and be able to optimise such tools. • Must have a have experience in Vulnerability/Threatmanagement including threat intelligence and threat hunting. • Must have good written and oral communication skills, including incident reporting and stakeholder management. more »
Birmingham, West Midlands, West Midlands (County), United Kingdom
Proftech Talent
Manager We are recruiting for a Lead IT Security Manager on a permanent basis. The Lead IT Security Manager is responsible for the effective management of the Security Operations pillar within the IT Security, Compliance & Identity function. This includes Security technology and Security Operations Centre management. This role is … Ability provide leadership for live security incidents and helping conduct robust investigations in order to identify corrective actions and see them through to completion. Threat Intelligence . Ability to provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of … threat landscape. Vulnerability Assessment. Ability to identify and classify security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. Risk Management . Ability to identify IT security operations risks and the delivery of audit remediation activities. Emerging technology monitoring. Ability to identify and assess new more »
approach to building, deploying, and operating our Cyber capabilities to fortify our defenses, employing innovative and cutting-edge cyber technologies. Our duties span cyber threatmanagement, real-time attack detection and prevention, and swift remediation, integrated with advanced artificial intelligence and machine learning. Additionally, we leverage Cyber DevOps … automations to facilitate rapid deployment and threat mitigation, ensuring the resilience of our Operational Technology (OT), IT, and digital infrastructure in the face of emerging challenges. We are responsible for defining and setting the Cyber framework and Security compliance policies across the company, including the development of robust Business … continuity plans, disaster recovery, and critical management plans to ensure the resilience of our operations in the face of cyber threats and other emergencies. Key Competencies Technical Significant experience in Cyber Security engineering and delivery with a broad understanding of OT and IT services Subject matter expertise in Cyber more »
Greater Cheshire West and Chester Area, United Kingdom Hybrid / WFH Options
psd group
Job Title: Cyber Security Vulnerability and Threat Engineer Location: Cheshire (Hybrid - 2 days per week on-site) Benefits: (Full list of benefits available on application) psd group are delighted to bring this newly created job opportunity to market, partnered with a truly industry-leading organisation as they embark on … a journey to improve their current Cloud Infrastructure/Cyber Security. We are looking for an experienced Cyber Security Threat and Vulnerability Engineer, to take ownership of identifying signs of compromise in cyber security services, IT systems, and related infrastructure. This will be a hands-on approach to vulnerability … management reduction across all IT Systems and you will work with the SOC to assist in the coordination and management of cyber incident response activities. The ideal candidate will have come from a Cloud Infrastructure background, have moved into Cyber Security, and will hold a current/relevant more »
Job Overview: Join a dynamic and high-performing team as a Senior Analyst in Vulnerability Management & Security Testing. This role offers the unique opportunity to enhance a best-in-class Threat Defence capability and make significant contributions to our security operations. Ideal candidates will bring a strong background … in threatmanagement, vulnerability assessment, and security testing, aiming to drive innovation and excellence in our security practices. Key Responsibilities: Conduct thorough vulnerability assessments across various platforms, including networks, systems, applications, and devices. Analyze risks associated with vulnerabilities, provide detailed reporting, and recommend actionable remediation strategies. Work collaboratively … IT, IoT, and OT environments. Coordinate and oversee remediation efforts to ensure timely and effective resolution of security vulnerabilities. Requirements: Extensive experience in vulnerability management and remediation, including hands-on experience with vulnerability scanning tools. Good knowledge of Exabeam, Tenable.io and Tenable.sc would be considered a positive Proficient in more »
you will Provide Security Input for projects in a Digital Transformation Programme as well as establish and maintain cyber security policies and procedures. Own threatmanagement and response. Manage and mentor the cyber security team. Manage Security tooling risks and processes. Own vulnerability management through the whole … infrastructure to identify vulnerabilities and implement necessary improvements. Act as the escalation point on monitoring of corporate environment to identify security issues or incidents (Threat Hunting) Manage and mentor the security analyst, (monitoring, Investigation, root cause analysis of Security alerts from multiple information sources. Including, but not limited to … end users. Perform root cause analysis of security incidents and participate in post-incident reviews to provide practical recommendations for improving the organisation's threat detection and incident response capabilities and overall security posture Perform malware analysis and digital forensics where appropriate Drive internal phishing campaigns (KnowBe4 platform) and more »
Birmingham, England, United Kingdom Hybrid / WFH Options
Crimson
business objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, IT Security Management experience the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response, threatmanagement, and vulnerability management, among other areas. the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. with IT Service Frameworks more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, Strong IT Security Management experience Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threatmanagement, and vulnerability management, among other areas. Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. Familiarity more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threatmanagement, and vulnerability management, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity more »
continuous monitoring of the Firm’s information security systems, technologies, processes, and procedures, analysing the findings and communicating exceptions, concerns and remedial steps to Management as necessary. Promptly reporting any and all exceptions to policies, procedures, and operational standards to the Director, Information Security and/Chief Information Officer … as necessary. Executing the Firm’s information security threatmanagement process, ensuring all aspects of an event are documented and remediated; Monitoring and analysing security relevant logs, events, and alerts including, but not limited to, logs from systems, applications, SIEM, AV, Firewalls, and IPS; document relevant incidents and … and act strategically as well as tactically, utilizing developing interpersonal and written and verbal communication skills to effectively support the Firm’s global risk management functions. Sound analytical and operational judgment, the use of tact in daily and stressful situations, and sound analytical rigor applied to supporting and remediating more »
work with autonomy and enjoy flexible working (x2 days office per month). As a Lead Cyber Security Engineer, you will take ownership of threatmanagement and response, establishing and maintaining robust cyber security policies, playbooks and procedure to ensure compliance with regulatory requirements, industry standards in an … You'll perform root cause analysis of security incidents and participate in post-incident reviews to provide practical recommendations for improving the organisation's threat detection and incident response capabilities and overall security posture. Office & WFH Policy: You'll have flexibility to work from home, meeting up with colleagues … Azure environment You have strong analysis and problem solving skills with meticulous attention to detail You have excellent communication and collaboration skills including stakeholder management and are happy to mentor one other Salary & Benefits: As a Lead Cyber Security Engineer, you can expect to earn competitive salary (up to more »
friendly and supportive environment where you can work with autonomy and enjoy flexible working. As a Cyber Security Manager, you will take ownership of threatmanagement and response, establishing and maintaining robust cyber security policies, playbooks and procedure to ensure compliance with regulatory requirements, industry standards in an … You'll perform root cause analysis of security incidents and participate in post-incident reviews to provide practical recommendations for improving the organisation's threat detection and incident response capabilities and overall security posture. Office & WFH Policy: You'll have flexibility to work from home, meeting up with colleagues … Azure environment You have strong analysis and problem solving skills with meticulous attention to detail You have excellent communication and collaboration skills including stakeholder management Salary & Benefits: As a Cyber Security Manager, you can expect to earn competitive salary (up to £85k) plus benefits. Pension (up to 10% contribution more »
Understanding of Hyper V & Citrix * Networking knowledge - Routers, Switches, WAPs, Firewalls, DNS, DHCP. * Windows & Mac OS's * Hardware builds and updates * Endpoint threatmanagement products * Excellent written & verbal communication skills Skills that will make you stand out: * Azure AD * MSP experience * ConnectWise * CompTIA A+ & Network+ * Microsoft certifications If more »
on two new positions. My clients UK SOC is going through a state of transformation and they need someone to help scope and develop threatmanagement as a function. You will be working on nation state threat actors and need to be eligible for or currently hold … candidate should possess a minimum of 2 years of experience in a SOC environment. This role necessitates the ability to Identify, analyze, and mitigate threat intelligence from various sources, underscoring the importance of an understanding of OSINT. Additionally, the Lead role involves additional responsibilities, including direct management of more »
on two new positions. My clients UK SOC is going through a state of transformation and they need someone to help scope and develop threatmanagement as a function. You will be working on nation state threat actors and need to be eligible for or currently hold … candidate should possess a minimum of 2 years of experience in a SOC environment. This role necessitates the ability to Identify, analyze, and mitigate threat intelligence from various sources, underscoring the importance of an understanding of OSINT. Additionally, the Lead role involves additional responsibilities, including direct management of more »
exceptional support to the company as well as resolving any incidents with key users? Responsibilities: Establish and maintain cyber security policies and procedures. Own threatmanagement and response. Manage and mentor the cyber security team. Manage Security tooling risks and processes. Requirements: Experience in a similar Cyber/ more »
Security Consultant - Identity & Access Management Services SOC consulting experience with OT experience With ThreatManagement/hunting/intel/security operations more »
computers and any other IT equipment, liaising with ICT Lead and off-site technical support where necessary including responsibility for: filtering, monitoring and firewall management Server administration Web administration Installation of new software Installation of new workstations and peripherals on curriculum and administration systems including email and internet access … resources and rooms Co-ordinating repair fault finding and maintenance of all systems Security policies Backup strategy Virus protection, audio/visual strategy and threatmanagement and GDPR Ensure that the relevant Health and Safety procedures are carried out in relation to ICT Maintain and develop security in more »
Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer Identity Access Management (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP). Role responsibilities: Accountable for publishing and maintaining design artifacts throughout the … such as UML, BPMN, ArchiMate, Essentials Project, and Lucidchart) is a must-have. Background architecture design, with an appreciation for security risk assessment and threatmanagement, is a must-have Experience with technical architectural development, policy, asset management and modeling is a must-have. Experience and/ more »
Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer Identity Access Management (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP). Role responsibilities: Accountable for publishing and maintaining design artifacts throughout the … such as UML, BPMN, ArchiMate, Essentials Project, and Lucidchart) is a must-have. Background architecture design, with an appreciation for security risk assessment and threatmanagement, is a must-have Experience with technical architectural development, policy, asset management and modeling is a must-have. Experience and/ more »