all of us." - Julie Sweet, Accenture CEO In our team you will learn: How businesses can improve their ability to recover from a sophisticated cyberattack How industries and sectors differ in their approach to cyber resilience How to manage diverse clients, projects and internal teams How to interact with More ❯
all of us." - Julie Sweet, Accenture CEO In our team you will learn: How businesses can improve their ability to recover from a sophisticated cyberattack How industries and sectors differ in their approach to cyber resilience How to manage diverse clients, projects and internal teams How to interact with More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
RSM
The purpose of this role is to deliver our offensive security services including digital footprint reconnaissance, social engineering, vulnerability assessments, penetration testing, threat modelling, cyber-attack simulation exercises, and more to high profile clients across all industries. You'll benefit from ongoing coaching, career mentoring, and be supported by our More ❯
glasgow, central scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
scenario testing. What They're Looking For Extensive experience in cybersecurity incident response and operational leadership within a Security Operations environment. Strong knowledge of cyberattack vectors, threat actors, and risk mitigation strategies. Proficiency in cybersecurity metrics, risk management, and incident response best practices. Excellent communication and stakeholder management skills. More ❯
Portsmouth, Hampshire, South East, United Kingdom Hybrid / WFH Options
University of Portsmouth
the development, delivery, and enforcement of comprehensive cyber security operations. Provide leadership and direction for cyber security operations, ensuring the University remains resilient to cyberattack and maintains a robust and rigorous security posture. Cyber Security runs through every aspect of the University, and it is essential that all IT More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Eden Scott
leadership, offering insight into incidents, risks, and ongoing threat landscapes. 💡 Your background: Proven experience leading incident response operations and cybersecurity investigations. Deep understanding of cyberattack vectors, threat actors, and red team/blue team methodologies. Strong analytical skills with a data-driven approach to incident management and risk assessment. More ❯
RCA) for security incidents and the tracking of actions to prevent incident recurrence and strengthen relevant controls. Plan, execute and learn lessons from regular cyber-attack simulation exercises to test the company’s IT and organisation resilience to improve cyber defences and attack preparedness. Manage and maintain the suite of More ❯
processing systems, identifying potential weaknesses and recommending suitable protection measures. Participating in red teaming and simulation exercises (technical & non-technical), to better understand our cyber-attack and defence posture, rehearse responses, and evaluate readiness. Assisting with the creation and delivery of security awareness collateral, promoting an effective security culture. Providing More ❯
Salford, Manchester, United Kingdom Hybrid / WFH Options
BBC Group and Public Services
the BBC in the current threat landscape and to deal with any incidents as and when they occur. A keen understanding of the latest cyber-attack patterns would be beneficial as well as an inquisitive mindset and desire to learn. Whilst the SOC does provide 24x7 cover, the majority of More ❯
The role defines appropriate policies and standards, oversees information security strategy and improvement initiatives, and ensures the university remains a resilient organisation, resistant to cyber-attack and hostile activity. We value, empower, and support every member of staff to get the best out of your unique talents, so you'll More ❯
activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY SKILLS Technical cyber security knowledge and practical experience of cloud computing technologies e.g. AWS, GCP and Azure. Detailed understanding More ❯
activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY SKILLS Technical cyber security knowledge and practical experience of cloud computing technologies e.g. AWS, GCP and Azure. Detailed understanding More ❯
activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY SKILLS Technical cyber security knowledge and practical experience of cloud computing technologies e.g. AWS, GCP and Azure. Detailed understanding More ❯
activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY SKILLS Technical cyber security knowledge and practical experience of cloud computing technologies e.g. AWS, GCP and Azure. Detailed understanding More ❯
understand & manager their cyber risk, secure their business and improve their security operations. We are the people they trust to defend, or recover, from cyberattack through technical services, assurance and support. Responsibilities might include support to: The investigation of security breaches and incidents Information security governance and management Development More ❯
understand & manager their cyber risk, secure their business and improve their security operations. We are the people they trust to defend, or recover, from cyberattack through technical services, assurance and support. Responsibilities might include support to: The investigation of security breaches and incidents Information security governance and management Development More ❯
with all local and corporate regulatory controls to deliver control systems which are Cyber secure to prevent Process Safety catastrophic events due to a Cyber-attack whilst ensuring production is optimized by efficient utilization of Control systems. Manage the day-to-day engineering, maintenance and troubleshooting requirements related to BPCS More ❯
incident response plans to handle security threats. Conduct risk assessments and implement remediation plans without disrupting operations. Perform threat modeling (STRIDE, PASTA, DREAD) and cyberattack simulations to strengthen defenses. Analyze attack patterns using the MITRE ATT&CK framework and develop countermeasures. Compliance & Governance Work with service owners to review and More ❯
Sandbach, Cheshire, United Kingdom Hybrid / WFH Options
MI5
Job description Flexible Working: This role is primarily office-based, with most of the work undertaken in the office and a small proportion of time working outside of the office. We offer flexible working hours, including options for compressed and More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
MI5
Job description Flexible Working: This role is primarily office-based, with most of the work undertaken in the office and a small proportion of time working outside of the office. We offer flexible working hours, including options for compressed and More ❯
Cheltenham, Gloucestershire, United Kingdom Hybrid / WFH Options
MI5
Job description Flexible working: We recognise the importance of a healthy work-life balance and offer full-time, part-time, and compressed hours. While hybrid working can be more restricted, due to the nature of the work, around 20% home More ❯
understand & manager their cyber risk, secure their business and improve their security operations. We are the people they trust to defend, or recover, from cyberattack through technical services, assurance and support. Responsibilities might include support to: The investigation of security breaches and incidents Information security governance and management Development More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Jet2.com Limited
Here at and Jet2holidays , we're seeking an experienced Cloud Security Specialist to safeguard cloud-hosted critical business processes and sensitive data from cyber-attack disruption. You'll lead on identifying and resolving security issues across cloud infrastructure and be a subject matter expert (SME) for cloud security. As our More ❯
Press Tab to Move to Skip to Content Link Select how often (in days) to receive an alert: Posting Date: 10 May 2025 Function: Cyber Security Unit: Business Location: Cheltenham, Cheltenham, United Kingdom Salary: Competitive + DV Bonus Job Title More ❯
Cheltenham, Gloucestershire, United Kingdom Hybrid / WFH Options
MI5
Job description Flexible working: We recognise the importance of a healthy work-life balance and offer full-time, part-time, and compressed hours. While hybrid working can be more restricted, due to the nature of the work, around 40% home More ❯