scanning, risk identification, resolution, and reporting. * Demonstrated expertise in formal document creation, including report and procedure development. Essential Skills: * Microsoft O365 platform expertise. * Advanced ThreatIntelligence analysis and best practices implementation. * Proficient in managing Security Incident Response processes. * Knowledgeable about Disaster Recovery and Business Continuity principles. * Experienced in more »
Staffordshire University, College Road, Stoke-On-Trent, England
Staffordshire University
The role of the Cyber Security Analyst Apprentice will perform the following: • Security event monitoring and management • Initiate incident response • Review and act on threatintelligence • Undertake vulnerability management and liaise with Digital Services teams to remediate • Undertake security reviews and security control verification • Raise user awareness in more »
SC clearance with UK-eyes only caveat. Enterprise Security Architectures (SABSA, MODAF). Desirable: DV Clearance. Knowledge of Quantum Cryptography & Quantum Key management. Current threatintelligence awareness. Knowledge of NATO security policy, risk management and Accreditation. Understanding of the role of advisory boards within the UK Government or more »
Technical domains and cyber transformation Framework assessments and roadmapping Cyber regulations, governance and compliance Incident Response, Disaster Recovery and Business Continuity Training and Exercising ThreatIntelligence Project Management S-RM Consultants are organised and dynamic project managers and team leaders. You will: Lead complex projects independently Manage client more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Logiq Consulting
the company Security Operations Centre (SOC). Mature play books, processes and procedures, and further integrate monitoring capabilities to enhance our SOC function. Utilise threatintelligence feeds to identify and respond to emerging threats and vulnerabilities in company IT systems. Collaborate with other team members to ensure that … with recent NCSC guidance would be helpful. Experience in the Microsoft Sentinel and 365 Defender, being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Qualifications: Computer Security Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Role Rewards Hybrid … for a growing and dynamic company. Logiq Consulting provides Cyber Security and Information Assurance expertise. We specialise in providing leading edge consultancy to high threat facing clients and delivering security services and products throughout the Public and Private Sector. Fast growing, we have exceeded all financial and growth expectations more »
Leeds, Horsforth, West Yorkshire, United Kingdom Hybrid / WFH Options
Headway Recruitment
security standards, including Cyber Essentials, ISO 27001, 27002, Data Protection Act, and GDPR. In-depth knowledge of the Microsoft O365 environment and security solutions, threatintelligence analysis, Security Incident Response processes, disaster recovery, and business continuity principles. Familiarity with security testing principles, vulnerability scanning, risk identification, resolution, and more »
operations. 7. Develop and maintain project documentation, including requirements specifications, project plans, and progress reports. 8. Provide subject matter expertise on cybersecurity best practices, threatintelligence, and industry standards. 9. Proactively identify and address potential risks and issues that may impact the success of the GSOC project. 10. more »
Swindon, England, United Kingdom Hybrid / WFH Options
WHSmith
cyber risks and safeguard critical information. What you will be doing Overseeing day-to-day security operations, including monitoring, incident response, vulnerability management, and threatintelligence, to maintain a strong security posture and promptly address any security incidents or vulnerabilities Establishing and maintaining cyber security policies, standards, and more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
sophisticated analyses on alarms and events received by our customers. customers alternative actions or self-fix problems, based on contract and type of incident. threat hunting, threat modelling, and threat intel activities to proactively detect threats. Degree in IT, information security or related field or equivalent experience more »
Employment Type: Temporary
Salary: £25000 - £40000/annum Pro Rata until October
Doncaster – Hybrid x2 days p/w Are you a SOC Analyst with more than two years of experience delivering front-line threat hunting support? Do you want to work for an organisation that are leaders in the delivery of Microsoft Sentinel SOC services in a fast-paced environment … and respond to security incidents Remediate serious attacks escalated from Tier 1 SOC Analysts Assess the scope of attacks and the affected systems Use threatintelligence to pinpoint scale of the attack, the type of attack and systems affected Conduct incident response activities Use IOC’s to research more »
Greater London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
are set around, monitoring, compliance, security engagement, and detection/response. Role: · Assist in the design, implementation, and maintenance of security measures. . Develop threatintelligence capabilities . Provide a strong level consultancy when it comes to engineering security solutions. · Provide input for architecture plans with consideration of more »
analysts. Responsibilities Adherence to the Information Security Standards by control owners Training and Awareness Programme Phishing Tests of staff, reporting and training Actionable ThreatIntelligence including Domain Monitoring, social media and Deep and Dark Web monitoring Data Loss Prevention/Detection - monitoring staff's use of email and more »
cyber-attacks/security incidents. This includes the investigation and root cause analysis of potential security incidents. - Proactively investigate potential security breaches by utilising threatintelligence and internal and external security systems and provide subject matter expertise for technical responses to confirmed cyber security incidents. - Create and maintain more »
Technical domains and cyber transformation Framework assessments and roadmapping Cyber regulations, governance and compliance Incident Response, Disaster Recovery and Business Continuity Training and Exercising ThreatIntelligence Project Management Support the management of projects, including: Managing client engagement, communication and project planning activities Supporting technical and governance focussed implementation more »
Coordinate operational activities' forecasting engaging with Office of CSO finance lead. Maintaining & Improving * Own/Update landing pages (intranet); work with comms teams, risk, intelligence & resilience, security operations, and supply chain. * Develop and maintain supply chain details and processes or lists for security incident response and departmental functions. * Develop … and maintain the monthly reporting schedule: KPIs; KRIs; Resilience; Threatintelligence as required. * Assist with drafting of statements of work, job descriptions or commercial proposals (incl Business Cases). Running & Change Management * Oversee staff onboarding and offboarding knowledge transfer. * Oversee engagements with other teams when presenting business cases more »
NCSC CTAS and CPA Assurance Schemes. Knowledge of working in secure environments (List X facilities) and accredited labs (ISO17025). Research and Development experience. ThreatIntelligence experience. To discuss this or wider Consulting roles with our recruitment team, all you need to do is apply, create a profile more »
a global cybersecurity leader that secures human progress with Secureworks® Taegis™, a SaaS-based, open XDR platform built on 20+ years of real-world threatintelligence and research, improving customers’ ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions. We enjoy competitive more »
Bristol, England, United Kingdom Hybrid / WFH Options
Computershare
practically defend the enterprise in accordance with established policies, procedures, guidelines and practices. Prepare and document standard operating procedures and protocols. Work with the ThreatIntelligence and Cyber Assurance teams to monitor and research industry information sources for zero-day threats and vulnerabilities that impact Computershare. Establish and … application, and architecture teams. Essential Experience: Relevant experience within any of the following: Identity Access Management SIEM Data Loss Prevention IDS/IPS Email Threat Prevention Endpoint Detection and Reponse Identity Protection Privileged Password Management Cloud Security Rewards designed for you Flexible work to help you find the best more »
IE: NIST CSF and ISO27001:2022. Key Activities AWS/CI/CD Assessing and triaging open vulnerabilities, whilst prioritising remediation efforts based on threatintelligence, risk and business contex. CISSP Security first approach This is one of the best opportunities on the market with quick starts available more »
alerts to detect any abnormal or suspicious activities, conducting regular security assessments and risk evaluations. Remain updated on emerging cybersecurity threats and vulnerabilities, utilizing threatintelligence to enhance security measures. Prepare and deliver routine security reports to management and stakeholders, summarizing the organization's security posture, incidents encountered more »