Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Sopra Steria Limited
can be based in either Gosport or Glasgow with some remote working? If yes to all of this then read on! As a Managing Security Engineer, you will be leading the design, documentation and installation of securitymonitoring tools/platforms to provide data to the Sopra … Steria Security Operational Centre (SOC) for analysis. Y... APCT1_UKTJ more »
arisen at an award-winning Microsoft Partner for a SOC Analyst. The business is a fast-growing, industry-leading managed service and managed service security provider, delivering in to mid and large enterprise clients. This is a fantastic opportunity for a SOC Analyst to continue their development at an … focus on developing their staff by providing support for training and earning certifications. You will also gain exposure to cutting-edge technologies, working across security operations and cyberspace. This is a predominantly remote role; you must however be based in the UK to be considered. This role will also … on role, that gives you the opportunity to work in a customer-facing capacity as a first point of contact between the customer and security operations centre. As SOC Analyst you will have the opportunity to develop consultancy skills, whilst offering insight into the best technical solutions to secure more »
Cyber Incident Response A global bank is seeking a Cyber Security Analyst to join their Cyber Security team in London, with the team working across infrastructure, business and application risk, penetration testing, and vulnerability management. The cyber security practice is a mature function and this team member … position has lots of capabilities for progression, access to different tools, and excellent opportunity to develop skills. You will be: Analysing, developing and refining securitymonitoring controls, practices and use-cases to detect anomalies and incidents across the applications and infrastructure estate. Able to monitor activity upon specified … systems and devices. Proficient in identifying and reporting suspicious or harmful activity. part of the Incident Response investigations into internal and external threats or security incidents. Able to identify and escalate any security breaches and assess their impact. Utilise IR, Forensics tools, and packet inspection tools as needed. more »
countries deliver on five core areas: Organization Strategy, Assessment and Succession, Talent Acquisition, Leadership Development, and Total Rewards. We are expanding our Cyber Security Operations team in the UK and looking for a Senior Security Analyst to join the Global Team. You will play a crucial role in … ensuring effective securitymonitoring and incident response. This role will also be required to assist in the development, implementation, and maintenance of the IT Security program in the company. We use the lastest tech and tools, not outdated IT systems. You will interact with colleagues across the … teams work in a flexible and agile manner to ensure there is a seamless operation across the globe. You will be passionate about cyber security and thrive on continued professional development and increasing personal knowledge as the potential threat to cyber security becomes more complex. You must be more »
Harlow, London, United Kingdom Hybrid / WFH Options
Raytheon
Job Title: Security Operations Centre, (SOC) Engineer Location: Harlow or Glenrothes (hybrid working with up to 2 days a week on site) The Department and Team Raytheon UKs Digital Technologies (DT) department are responsible for supporting and enabling the wider business in the delivery of its core services supporting … Raytheon UK to successfully enable collaboration, operational activities, and business delivery. The Cyber Security team operate within the DT function - providing subject matter expertise support, governance and assurance, as well as technical security services to the function, and wider UK business. Ultimately working to ensure the ongoing security … specialists and information assurance staff to help protect the organisation and colleagues from cyber-attack. The SOC Engineer will be responsible for building the security architecture and systems within the SOC, as well as maintaining and improving the securitymonitoring and analysis tools. As a SIEM subject more »
Cyber Security Analyst Job Title: Cybersecurity Analyst Location: Manchester, Onsite Department: Information Security Reports To: Security Manager/Chief Information Security Officer (CISO) Job Summary: Are you passionate about safeguarding digital landscapes and combatting cyber threats? Join our dynamic team as a Cybersecurity Analyst, where you … ll play a pivotal role in defending our organisation against evolving cyber threats. You'll leverage cutting-edge security technologies and methodologies to detect, analyse, and respond to security incidents, ensuring the integrity and confidentiality of our data. Key Responsibilities: Threat Hunting & Detection: Continuously monitor and analyse security … systems. Conduct proactive threat hunting to identify and mitigate potential vulnerabilities before they are exploited. Incident Response & Forensics: Lead the investigation and remediation of security incidents, including malware outbreaks, phishing attacks, and network intrusions. Perform detailed forensic analysis to determine the root cause and impact of security incidents. more »
provide advice to customers within Sureserve Group on the efficient and safe use of computer systems. To be fully abreast of all Sureserve Group Security policies and processs and to fully endorse and enforce these in the live environment. Furthermore, be able to explain to customers the need to … System and other system software. Utilise existing technologies to obtain and manipulate software/hardware information and to remotely administer systems. Assist in the monitoring of Sureserve Group infrastructure, raising support calls and escalating when appropriate. Responsible for monitoring the forward schedule of change to keep up to … their wide responsible companies in respect to ICT. Will take part in the Problem Management process under the Problem Management process. Will carry out securitymonitoring and auditing for: Systems At the discretion of ICT Management Infrastructure At the discretion of the Infrastructure System Manager Software At the more »
Winchester, Hampshire, South East, United Kingdom Hybrid / WFH Options
Premier Foods
who they love or what they believe in. Our culture is one where everyone is welcome. Job description: We are looking for an SAP Security & Authorisation Analyst to join our vibrant and friendly team. You will be instrumental in ensuring the security and integrity of SAP systems within … the organization. You will be responsible for leading the design, implementation, and maintenance of security policies and roles within the SAP landscape. To excel in this role, you'll need to be able to take a pragmatic approach to delivery whilst maintaining rigour of security. This role requires an … individual who is highly adaptable to changing technology use as well as being comfortable working autonomously. Your remit is to analyse security risks, identify vulnerabilities, and implement measures to mitigate them effectively as well as providing support and guidance to end-users and other IT teams on SAP securitymore »
Cyber Security Software Engineer - Zurich, Switzerland (Tech stack: Architecture, Implementation, Azure Tenant Configuration, Defender Products (Defender for Endpoint, Defender for Identity, Defender for Office 365, Defender for Cloud), Sentinel Configuration and Automation, Infrastructure as a Service (Firewall, VPN, WAF, Load Balancer, etc.), Logic App Automation in Microsoft Azure Environment … AWS, Incident Analysis using Microsoft Security Tools, Customer and Internal Employee Training Support, Security Reference Architecture Design, CSA, ISO 27001/2, ISO 27017, ISO 27018, or NIST Cyber Security Framework Knowledge and Practical Experience, SIEM (Splunk, MS Sentinel), Log Management, Vulnerability Management, Incident Response, SecurityMonitoring, Penetration Testing, Linux Security, Threat Intelligence Analysis, Cloud Security Architecture, Network Security Protocols and Technologies, Secure DevOps Practices, Cryptography and Key Management, Secure Software Development Lifecycle (SDLC), Identity and Access Management (IAM) Solutions, Data Loss Prevention (DLP) Technologies, Incident Response Plan Development and Execution. more »
We are looking for a Security Consultant with extensive experience in providing end-to-end security assurance for business projects. The ideal candidate will have a strong background in threat assessments, architectural design reviews, third-party risk assessments, RFP security requirements, network security, IDAM projects, ransomware … remediation, pen test scoping, and HLD/LLD reviews. Responsibilities: Perform threat modelling to identify potential security vulnerabilities and risks. Assess high and low-level architectural designs to identify security risks and provide recommendations for mitigation. Provide security requirements for RFPs and score RFPs based on security criteria. Conduct assessments of third-party security posture to ensure compliance with security standards. Create scopes for penetration testing, organize pen tests, review results, and oversee remediation efforts. Collaborate with project teams to agree on specific security controls and gather evidence of implementation. Identify and articulate more »
of value to our 16.3 million Members and engage our 18,000 colleagues around new ways of working. We are looking for a (Senior) Security Consultant (dependant on skills and experience) to work in our Security Consultancy team. This role sits within our Security & Resilience function where … on how this works. You can also find out more about our approach to hybrid working here. What you'll be doing As a Security Consultant you will be accountable for ensuring that services and change initiatives in the business areas you are aligned to are delivered in a … a matrix manner with our business, change and delivery teams, supporting everything from small technology changes to major transformation programmes, driving implementation of our Security and Resilience strategies and policies in a positive and pragmatic manner which enables our colleagues to deliver their business objectives. To do this, you more »
Location: Mansfield -2 days per week in office rest remote Pay: available on application Ensuring compliance with industry-standard security practices and regulations, while continuously evaluating and enhancing the organisation's security posture. Playing a pivotal role in minimising risks & protecting assets. Here’s a taste of what … the role will involve: Collaborating with senior management to develop and refine the organisation’s information security strategy, aligning it with business objectives and regulatory requirements. Developing, implementing, and maintaining information & data security policies, standards, guidelines, and procedures to ensure compliance with relevant regulations (e.g. GDPR, PCI DSS … industry standards such as Cyber Essentials+, ISO 27001 & NIST guidelines. Managing the relationship(s) with 3 rd party suppliers responsible for implementing and managing securitymonitoring tools and technologies, ensuring we detect and respond to security threats in a timely manner. Developing and deliver a securitymore »
Job Title: Security Operations Manager Client: Elite FinTech Firm Salary: Up to £250k + Bonus + Package Location: London Sells: Cutting-edge tech, ownership of multiple greenfield projects, no red tape, a friendly/collaborative environment, beautiful offices, personal projects on Fridays! An Elite FinTech Firm is looking for … highly talented Security Operations Manager with solid exposure to both people/strategy management and hands on technical ability to join an elite group of individuals. This team have an unlimited tech budget, promote a great culture and are made up of fantastic like-minded individuals. Role: Leading a … team responsible for the entire SecOps space Automating anything and everything and creating a DevSecOps approach Leading the Threat Hunting, SecurityMonitoring and I&R strategy Being involved in hiring strategy within the team So much more!! Skills: Experience in Incident & Response, Threat Hunting and SecurityMonitoringmore »
Job Title: Security Operations Manager Client: Elite FinTech Firm Salary: Up to £250k + Bonus + Package Location: London Sells: Cutting-edge tech, ownership of multiple greenfield projects, no red tape, a friendly/collaborative environment, beautiful offices, personal projects on Fridays! An Elite FinTech Firm is looking for … highly talented Security Operations Manager with solid exposure to both people/strategy management and hands on technical ability to join an elite group of individuals. This team have an unlimited tech budget, promote a great culture and are made up of fantastic like-minded individuals. Role: Leading a … team responsible for the entire SecOps space Automating anything and everything and creating a DevSecOps approach Leading the Threat Hunting, SecurityMonitoring and I&R strategy Being involved in hiring strategy within the team So much more!! Skills: Experience in Incident & Response, Threat Hunting and SecurityMonitoringmore »
consultancy representing a leading client in the financial sector. This role will focus on assisting in the strategic design, implementation, and ongoing optimisation of SecurityMonitoring Project initiatives. This is a hybrid working, 6-month contract position Inside IR35. Responsibilities: Lead technical and strategic discussions on SSPM/… CSPM and advise on complex deployments. Investigate strategic XDR solution Enhance security controls for 3rd Party SaaS Develop telemetry solutions for full observability of malicious traffic. Technical Skills & Competencies: 3-4 years of industry experience. Strong experience with Azure and AWS cloud platforms. Expertise in translating high-level and … into infrastructure build requirements. Proficiency in designing and building secure, scalable backend services. Knowledge and experience in SSPM/CSPM, API integration, SaaS applications security, security frameworks like NIST and CIS, SIEM tools, incident/problem/change management processes. Desirable Qualifications: Bachelor's degree in Information Technology more »
Role: Full-time, Perm About Us Our client is a leading Critical National Infrastructure (CNI) organisation in the energy sector, dedicated to ensuring the security and reliability of our nation's energy supply. We are looking for a dynamic and skilled CSOC Analyst to join our Cyber Security Operations Centre (CSOC) team. Key Responsibilities: Monitor, detect, and respond to cyber security incidents in real-time and from various sources, such as network, endpoint, cloud, and threat intelligence. Conduct in-depth analysis of security events and alerts to identify potential threats. Identify and prioritize the cyber … security incidents and escalate them appropriately. Contribute to the development and improvement of the SOPs and Playbooks for CSOC. Contribute to the development and implementation of the CSOC processes, technologies, and capabilities. Report and communicate the cyber security status, trends, and issues to the CSOC team leader. Enrich more »
deep understanding of Microsoft Azure with Bicep to apply for this role. These are some of the things you will be doing: Production support, monitoring and root cause analysis Management of Azure resources for cost optimisation and architectural purposes Setting security baselines, system hardening and securitymonitoringmore »
deep understanding of Microsoft Azure with Bicep to apply for this role. These are some of the things you will be doing: Production support, monitoring and root cause analysis Management of Azure resources for cost optimisation and architectural purposes Setting security baselines, system hardening and securitymonitoringmore »
improve business critical software platforms Find solutions to technical problems affecting users System administration, such as provisioning and managing cloud-based infrastructure, deploying changes, securitymonitoring, system maintenance, and managing internal and external network connectivity Maintenance and configuration of tools and products used in the software delivery lifecycle … and monitoring, and configuration of the supported environments. Use tools to automate system administration tasks, such as deploying new releases or applying security patches Configuring and deploying Azure DevOps CI/CD tools Use CI/CD to automate building, testing and deployment of software Work closely with … and Amazon Web Services (AWS) Key skills & Experience required: A degree or higher-level qualification in Computing science or a related subject Experience in security and data protection eg NCSC best practices and GDPR Experience in up to date programming principles such as SOLID, DRY and YAGNI Experience in more »
improve business critical software platforms Find solutions to technical problems affecting users System administration, such as provisioning and managing cloud-based infrastructure, deploying changes, securitymonitoring, system maintenance, and managing internal and external network connectivity Maintenance and configuration of tools and products used in the software delivery lifecycle … and monitoring, and configuration of the supported environments. Use tools to automate system administration tasks, such as deploying new releases or applying security patches Configuring and deploying Azure DevOps CI/CD tools Use CI/CD to automate building, testing and deployment of software Work closely with … and Amazon Web Services (AWS) Key skills & Experience required: A degree or higher-level qualification in Computing science or a related subject Experience in security and data protection eg NCSC best practices and GDPR Experience in up to date programming principles such as SOLID, DRY and YAGNI Experience in more »
optimal performance of Office 365 services. Manage Firewall administration, LAN and WAN, and oversee the company's backup and Disaster Recovery systems. Conduct regular securitymonitoring to identify and address potential intrusions, threats, or virus outbreaks. Cultivate and maintain relationships with IT vendors/providers and hosted software more »
to make an impact? Begin your journey of a flourishing and meaningful career, share your resume with us today! The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber … threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations. The CBP SOC is … responsible for the overall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations. Leidos is seeking an experienced Cyber Detection Engineer to join our team. As a member of the highly technical Operations Enhancement team supporting U.S. Customs and more »
over 500 MW of renewable generation, from wind turbines to electric vehicles, across its customer territories. Role We are looking for an experienced Information Security Manager to join our exceptional team of professionals. Reporting to the Chief Operating Officer, you will have a track record of leading security … SMEs, preferably in the technology space. This role is critical for safeguarding the SGS’s sensitive data, ensuring regulatory compliance, and maintaining a resilient security posture in the dynamic energy sector. Responsibilities 1. Security Strategy and Planning: Collaborate with stakeholders to define the SGS’s security strategy. … Create and execute security roadmaps, considering business objectives and risk appetite. Stay informed about emerging threats and technologies. 2. Incident Response and Security Operations: Develop incident response plans and coordinate security incident handling. Oversee securitymonitoring, vulnerability assessments, and penetration testing. Manage security incidents more »
I am currently working with a leading Higher Education Institution on the search for an experienced Cyber Security Analyst (Incident Response) on a 12-month contract working fully remote. EXPERIENCE IN THE PUBLIC SECTOR IS RECOMMENDED As a Cyber Security Analyst specialising in Incident Response, you will play … a crucial role in investigating and mitigating a recent security breach within our university network. You will work closely with our internal cyber security team to identify the root cause of the breach, contain its impact, and implement measures to prevent similar incidents in the future. This is … an exciting opportunity to apply your expertise in cyber security to protect our university's digital infrastructure and ensure the confidentiality, integrity, and availability of our information assets. Key Responsibilities: Incident Triage: Quickly assess the severity and scope of the security breach, prioritise response efforts, and mobilise resources more »
Glasgow, Lanarkshire, United Kingdom Hybrid / WFH Options
Confidential
can be based in either Gosport or Glasgow with some remote working? If yes to all of this then read on! As a Managing Security Engineer, you will be leading the design, documentation and installation of securitymonitoring tools/platforms to provide data to the Sopra … Steria Security Operational Centre (SOC) for analysis. Y... more »