Permanent Threat Detection Jobs in the UK

1 to 25 of 47 Permanent Threat Detection Jobs in the UK

Site Reliability Engineering Manager

Nottingham, Nottinghamshire, East Midlands, United Kingdom
Experian Ltd
a Site Reliability Engineering Manager, you will lead a global team of talented SREs in the development, deployment, and continuous improvement of our Cyber Threat Detection Pipeline. Your leadership will ensure the delivery of a scalable, efficient, and highly reliable Threat Detection Engineering platform. Key Responsibilities … Security , Exabeam Advanced Analytics (UEBA), Security Data Lakes (e.g., Data Bricks or Snowflake), and Cribl for log ingestion. Drive the adoption and implementation of Detection as Code principles. Leveraging CI/CD pipelines to automate the deployment and management of detection rules and platform configurations, ensuring fast, reliable … great deal of SRE technical and managerial skills in a large enterprise environment, such as: A great background in theSRE field supporting a Cyber Threat Detection function, with demonstrable experience in a leadership or managerial role overseeing a team. Scripting and Automation Proficiency: Demonstrated expertise in scripting and more »
Employment Type: Permanent
Posted:

Cyber Threat Intelligence Specialist / Senior Specialist

Wigan, Greater Manchester, North West, United Kingdom
Hybrid / WFH Options
Police Digital Services
Join Police Digital Service in a NMC Cyber Threat Intelligence (CTI) role (Hybrid/Lancashire) Police Digital Service are looking to hire CTI roles at the following levels: Cyber Threat Intelligence Specialist - Mid-Tier Threat Intelligence Role; Recommended for those with experience in cyber threat intelligence … or associated fields. Veterans with an intelligence background and an interest in cyber are encouraged to apply Senior Cyber Threat Intelligence Specialist - Senior Threat Intelligence Role; Recommended for those with significant cyber threat intelligence experience As a member of the Threat Intelligence team, you'll be … involved with: Developing awareness for the policing community of the cyber risks to critical services by continually assessing the threat landscape and informing stakeholders. Reporting cyber risks to service, executive, and operational stakeholders for mitigation decisions. Limiting the impact of known cyber risks by engaging forces in pre-incident more »
Employment Type: Permanent, Work From Home
Posted:

Security Operations Specialist

Wrexham, Wales, United Kingdom
Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
a key part in the Cyber/Information Security function. You will drive and enhance their current operational processes and contribute across Security Assurance, Threat Detection, Risk Management, CPSM & Threat Intelligence. Skills required: Control Frameworks & Industry Standards (ISO27001, 27002, GDPR, NIST) Security Operations Performance Tracking Data Security … Malware Detection, Threat & Incident response For the right person this is a huge opportunity - considering the sustained growth that they're going through, this role has a dotted line to management or C suite positions. This is a 2 stage process - initial 30 minute chat and 60 minute more »
Posted:

Cyber Security Consultant

London Area, United Kingdom
Sekuro
we are seeking expressions of interest for passionate cybersecurity professionals to join our dynamic team. Initially we will be seeking experience with Managed Extended Detection and Response (MXDR) services. At Sekuro we leverage cutting-edge technologies and strategic partnerships to provide top-tier security solutions to our global clientele. … Responsibilities: Design and Implementation: Architect and deploy advanced MXDR solutions using CrowdStrike and AWS to protect client environments. Monitoring and Response: Conduct continuous monitoring, threat hunting, and incident response activities to identify and mitigate security threats. Integration: Integrate MXDR solutions with clients’ existing security infrastructure and workflows. Automation: Develop … and implement automation scripts and tools to enhance threat detection and response capabilities. Client Support: Provide expert-level support and guidance to clients, including conducting security assessments and providing recommendations. Collaboration: Work closely with other cybersecurity experts, analysts, and engineers within Sekuro to continuously improve our MXDR offerings. more »
Posted:

Senior Cyber Threat Intelligence Specialist

Skelmersdale, Lancashire, North West, United Kingdom
Hybrid / WFH Options
Police Digital Services
Join Police Digital Service in a NMC Senior Cyber Threat Intelligence Specialist role (Hybrid/Lancashire) £55,000-£60,000 Police Digital Service are looking to hire a Senior Cyber Threat Intelligence (CTI) Specialist. This role is recommended for those with significant cyber threat intelligence experience As … a member of the Threat Intelligence team, you'll be involved with: Developing awareness for the policing community of the cyber risks to critical services by continually assessing the threat landscape and informing stakeholders. Reporting cyber risks to service, executive, and operational stakeholders for mitigation decisions. Limiting the … impact of known cyber risks by engaging forces in pre-incident planning and preparatory activities. Constraining attack surfaces through proactive threat intelligence working directly alongside the threat hunting and malware service. About Police Digital Service We exist to harness the power of digital, data and technology to enable more »
Employment Type: Permanent, Work From Home
Posted:

Lead Security Analyst

South West London, London, United Kingdom
Hybrid / WFH Options
Espire Infolabs Limited
the Job Leading the Response: Acting swiftly and decisively during security incidents to mitigate risks. Incident Lifecycle Management: Overseeing incidents from the moment of detection, through the containment and eradication stages, to the final resolution. Post-Incident Analysis: Conducting detailed investigations post-incident to understand the root cause and … to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating potential threats and vulnerabilities to ensure that the organization is prepared to defend against them. Strategic Defense Implementation: Putting in place robust … unified security strategy. This role demands a proactive mindset, deep technical expertise, and strong leadership skills to navigate the complex and ever-evolving cyber threat landscape. It's about being always prepared, constantly learning, and effectively communicating to maintain and enhance the organization's security posture. Tasks & Responsibilities Evaluate more »
Employment Type: Permanent, Work From Home
Posted:

Cyber Security Specialist

United Kingdom
Dragonfly People
Key Responsibilities : Endpoint Protection Deployment and Management: Install, configure, and maintain endpoint protection solutions such as antivirus software, anti-malware tools, host-based intrusion detection/prevention systems (HIDS/HIPS), and endpoint detection and response (EDR) platforms. Ensure that endpoint protection software is up-to-date with … the latest definitions, patches, and security updates to defend against emerging threats. Threat Detection and Prevention: Monitor endpoint activities and network traffic for signs of malicious behavior, suspicious activities, or known attack patterns. Implement proactive measures to detect and prevent malware, ransomware, phishing attempts, and other types of … sensitive data on endpoints. Incident Response and Remediation: Respond to security alerts and incidents detected on endpoints by investigating the root cause, containing the threat, and initiating remediation actions. Isolate infected endpoints from the network, quarantine malicious files, and remove malware infections to prevent further spread across the organization. more »
Posted:

Security Operations Center Analyst

United Kingdom
Cloud Decisions
and Compliance to improve the functionality of SIEM solutions provided to customers Taking ownership of security incidents and breaches through to resolution Proactive monitoring, threat hunting and threat intelligence Drive the use of SIEM automation to enable seamless threat detection and remediation What you need... Demonstrable more »
Posted:

Senior Security Engineer

United Kingdom
identifi Global Resources
integration opportunities (where feasible). -You will be undertaking internal pen testing and creation of external penetration testing scopes. -You will be enhancing security detection and incident response efforts/playbooks. -You will be monitoring, remediating, and reporting on security events. -You will be Security incident Manager (SIM). … with PCI DSS, ISO/IEC 27001, SOC & HIPAA & IRAP controls. -You have an in-depth knowledge of security principles, technologies, and best practices, threat detection and mitigation strategies. -Strong understanding of network protocols & practices, firewalls, intrusion detection/prevention systems and WAFs. -Mature understanding/experience more »
Posted:

Senior Cloud Security Engineer

United Kingdom
Locke and McCloud
and cloud-native applications. Implement and manage IAM policies, ensuring least privilege principles are maintained. Evaluate and deploy security tools and technologies to enhance threat detection and response capabilities. Provide guidance and mentorship to junior security engineers, fostering a culture of continuous learning and improvement. Stay current with … security engineering. Strong expertise in securing cloud environments such as AWS, Azure, or GCP. Proficiency in security technologies and tools such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability management. Experience with IaC tools like Terraform, CloudFormation, or ARM templates. Deep understanding of IAM, encryption, network security more »
Posted:

Senior Cloud Security Engineer

London Area, United Kingdom
Locke and McCloud
and cloud-native applications. Implement and manage IAM policies, ensuring least privilege principles are maintained. Evaluate and deploy security tools and technologies to enhance threat detection and response capabilities. Provide guidance and mentorship to junior security engineers, fostering a culture of continuous learning and improvement. Stay current with … security engineering. Strong expertise in securing cloud environments such as AWS, Azure, or GCP. Proficiency in security technologies and tools such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability management. Experience with IaC tools like Terraform, CloudFormation, or ARM templates. Deep understanding of IAM, encryption, network security more »
Posted:

Security Analyst

Hampshire, England, United Kingdom
Shaw Daniels Solutions
the first line of defence for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threat detection, incident assessment and vulnerability management the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. … work collaboratively with our customer base across the business and project teams as assigned. Key Behaviours Tenacity Ethical Curious Integrity Tasks/Responsibilities Operational Threat Monitoring: Continuously monitor security events and alerts within the organization’s network and systems. Identify suspicious activities, anomalies, and potential security incidents. Incident Triage … Skills & Experience Skills Technical Skills: Basic understanding of networking and security principles. Familiarity with security tools and technologies (e.g., Sentinel, Defender suite, firewalls, intrusion detection systems). Proficiency in log analysis and query languages (e.g., KQL, shell scripting, Snort rules). Analytical Skills: Ability to analyse and interpret security more »
Posted:

Senior Security Manager

Manchester, North West, United Kingdom
Hybrid / WFH Options
Raytheon
correct vetting procedures and the security management of visitors and contractors to meet HMG, UKSV and IPSA requirements. Review and manage security risk and threat assessments including regular practical exercises to assure effectiveness of measures to meet FSC and IPSA requirements, proactively managing threat detection and vulnerability more »
Employment Type: Permanent, Work From Home
Posted:

Information Security Manager

London, England, United Kingdom
Hybrid / WFH Options
Nexus Jobs
into Head of IT (CIO | CISO) Need an individual with a strong hands on network and security background Cisco networking Cisco firewalls (Firepower/Threat Detection) Palo Alto firewalls SIEM experience ( Logarithm desirable) Web proxy (Forcepoint desirable) Governance skills Policy writing/reviewing Reporting KPI monitoring Certifications like more »
Posted:

Security Operations Manager

London, United Kingdom
BDO
audit requirements. Contribute to the development of a Cybersecurity Operations Resource and Capacity planner managed through BDO's Azure DevOps environment. Oversee incident response, threat detection, and mitigation efforts You'll be someone with: A good understanding of monitoring frameworks eg MITRE ATT&CK and SIEM technologies eg more »
Posted:

Security Engineer (SIEM)

Hemel Hempstead, Hertfordshire, United Kingdom
Hybrid / WFH Options
The People Network
on Defence and National Security. Crafting and delivering seamless onboarding experiences for our Managed SOC clients. Providing expert engineering support to analysts for efficient threat detection and response. Developing and maintaining robust detection rules to stay ahead of evolving threats. Actively participating in the design and optimization more »
Employment Type: Permanent
Salary: £60000 - £70000/annum
Posted:

Senior Cyber Security Engineer

Birmingham, England, United Kingdom
Hybrid / WFH Options
Digital Waffle
and on-premises environments. Conduct regular security assessments, vulnerability testing, and risk analysis to identify and mitigate security risks. Lead the implementation of advanced threat detection and response strategies. Collaborate with IT and development teams to integrate security best practices into system designs and deployment processes. Monitor and more »
Posted:

Information Security Analyst

Birmingham, England, United Kingdom
Locke and McCloud
at the heart of everything they do. Key Responsibilities: Conduct security risk assessments, provide recommendations, and implement controls. Possess a thorough understanding of advanced threat detection, continuous vulnerability assessment, and strategies for response and mitigation in information/cyber security operations. Contribute to the implementation IT security roadmap … regarding information security matters. Assist in the scope and execution of regular penetration testing at network perimeter, internal, and application levels. Monitor the external threat landscape and recommend appropriate actions for emerging threats. Provide guidance and support for cyber incident response during tests and actual breach/security incidents. … data protection. Experience working within Information Security or IT Security, Data Protection. Self-motivated, proactive, and able to take responsibility. Strong understanding of advanced threat detections, continuous vulnerability assessment, response and mitigation strategies used in Cyber Security operations. Ability to define the technology security requirements in conjunction with technical more »
Posted:

Security Engineer

London Area, United Kingdom
Cognitive Group | Part of the Focus Cloud Group
Monitor and respond to security incidents and alerts within the Azure environment. Microsoft Defender: Configure and manage Microsoft Defender for Endpoint. Develop and implement threat detection and response strategies. Analyze and respond to security threats and incidents. Required Skills and Qualifications: In-depth knowledge of MDM solutions such … of Microsoft Azure security features and best practices. Experience with Microsoft Defender for Endpoint or similar security tools. Familiarity with network security, encryption, and threat detection. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills. Preferred Qualifications: Relevant certifications such as CISSP, CISM, CEH, or Microsoft Certified more »
Posted:

Senior Software Engineer - SIEM

Birmingham, England, United Kingdom
BT Group
designing, developing, and maintaining our security information and event management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threat detection, incident response, and overall security posture. What you’ll be doing • Data Ingestion and Enrichment: o Configure Elasticsearch pipelines for data ingestion … from various sources, primarily from Kafka o Enhance data enrichment by integrating threat intelligence feeds and contextual information. • SIEM Solution Development: o Collaborate with security analysts and architects to design and implement SIEM solutions using Elasticsearch. o Optimize SIEM rules, alerts, and dashboards for efficient threat detection. • Query more »
Posted:

Cyber Security Engineer

Warrington, England, United Kingdom
Hybrid / WFH Options
Hamilton Barnes 🌳
team and customer. Collaborate with teams to design and implement Sentinel for specific client needs. Configure and optimise Sentinel for advanced security monitoring and threat detection. Conduct regular assessments and audits to ensure Sentinel effectiveness. Troubleshoot and resolve technical issues related to Sentinel deployments. Your Profile: Strong understanding of more »
Posted:

Senior Cyber Security Engineer

Preston, Lancashire, United Kingdom
Hybrid / WFH Options
BAE Systems
KQL combined with the ability to create custom KQL scripts that are used to conduct sophisticated security data analysis and uplift incident response and threat detection capabilities within a SIEM Highly motivated with the ability to work autonomously to complete a range of tasks to time and quality more »
Employment Type: Permanent
Salary: £60000/annum Depending on skills and experience
Posted:

IT Systems Engineer

Hinckley, England, United Kingdom
Hybrid / WFH Options
DP World
resource utilization Implement and manage multi-factor authentication solutions for enhanced security across various systems and applications. Manage and monitor Endpoint security Platforms including detection and respond to advanced threats. Implement and maintain web and reverse proxy solutions, ensuring secure and reliable access to internal and external resources. Implement … Implementing security measures and protocols to safeguard the organization's IT infrastructure from potential threats and cyberattacks. This may include setting up firewalls, intrusion detection systems, and access controls. Investigating and resolving technical issues related to hardware, software, and network components. Troubleshooting may involve diagnosing problems, working with vendors … attitude, self starter, adaptable who welcomes challenge and problem solving Solid experience in managing and maintaining Windows Server environments, knowledge of Endpoint protection for threat detection and response. Exposure and experience in implementing various IT infrastructure in a fast paced challenging environment Proficiency in backup and replication technologies more »
Posted:

Azure Cloud Platform Engineer

Manchester Area, United Kingdom
Hybrid / WFH Options
Chapman Tate Associates
of Azure resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identity management, and threat detection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell more »
Posted:

MS Cloud Platform Engineer

Stockport, England, United Kingdom
Hybrid / WFH Options
Chapman Tate Associates
of Azure resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identity management, and threat detection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell more »
Posted:
Threat Detection
10th Percentile
£37,500
25th Percentile
£41,250
Median
£55,000
75th Percentile
£72,426
90th Percentile
£85,000