all of us." - Julie Sweet, Accenture CEO In our team you will learn: How businesses can improve their ability to recover from a sophisticated cyberattack How industries and sectors differ in their approach to cyber resilience How to manage diverse clients, projects and internal teams How to interact with More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
RSM
The purpose of this role is to deliver our offensive security services including digital footprint reconnaissance, social engineering, vulnerability assessments, penetration testing, threat modelling, cyber-attack simulation exercises, and more to high profile clients across all industries. You'll benefit from ongoing coaching, career mentoring, and be supported by our More ❯
insights into data, assets and infrastructure. Under its Securitas Summa program, Fenix24 ensures organizations are prepared to effectively resist and rapidly recover from a cyberattack, offering a combination of managed data and infrastructure protection, real-time threat intelligence, and ongoing hardening and breach resistance. About This Position The Lieutenant is More ❯
awareness and incident response readiness. *YOU ARE GOOD AT* * Strong verbal and written communication skills for stakeholder engagement and incident reporting. * Deep knowledge of cyber-attack techniques, including phishing, malware, ransomware, lateral movement, and data exfiltration. * Strong hands-on experience with SIEM, EDR, IDS/IPS, and forensic analysis tools. More ❯
awareness and incident response readiness. *YOU ARE GOOD AT* * Strong verbal and written communication skills for stakeholder engagement and incident reporting. * Deep knowledge of cyber-attack techniques, including phishing, malware, ransomware, lateral movement, and data exfiltration. * Strong hands-on experience with SIEM, EDR, IDS/IPS, and forensic analysis tools. More ❯
Security Monitoring applications such as SIEM (Splunk), EDR (FireEye HX, CrowdStrike Falcon, McAfee mVision EDR), WAF, IPS. Demonstrated knowledge of common intrusion methods and cyber-attack tactics, techniques, and procedures (TTPs). Have at least one certification involving incident response, ethical hacking, cyber security (GCIH, E CEH, E CIH), or More ❯
ruling and tuning Enterprise level SIEM tools. Extensive operations experience (minimum of 3+ years). Extensive knowledge of Security including types and methods of cyber-attack and underlying network protocols. Extensive experience escalating incidents to, and in driving incident resolution with, technology vendors and stakeholders. Demonstrable experience in supporting large More ❯
and experience analysing and interpreting security logs, event data, and alerts to identify potential threats Knowledge and experience of network protocols, traffic analysis, and cyber-attack methodologies Knowledge and experience of threat intelligence, risk management, vulnerability management, and penetration testing Please note sponsorship is not available for this position, and More ❯
glasgow, central scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
scenario testing. What They're Looking For Extensive experience in cybersecurity incident response and operational leadership within a Security Operations environment. Strong knowledge of cyberattack vectors, threat actors, and risk mitigation strategies. Proficiency in cybersecurity metrics, risk management, and incident response best practices. Excellent communication and stakeholder management skills. More ❯
Portsmouth, Hampshire, South East, United Kingdom Hybrid / WFH Options
University of Portsmouth
the development, delivery, and enforcement of comprehensive cyber security operations. Provide leadership and direction for cyber security operations, ensuring the University remains resilient to cyberattack and maintains a robust and rigorous security posture. Cyber Security runs through every aspect of the University, and it is essential that all IT More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Eden Scott
leadership, offering insight into incidents, risks, and ongoing threat landscapes. 💡 Your background: Proven experience leading incident response operations and cybersecurity investigations. Deep understanding of cyberattack vectors, threat actors, and red team/blue team methodologies. Strong analytical skills with a data-driven approach to incident management and risk assessment. More ❯
RCA) for security incidents and the tracking of actions to prevent incident recurrence and strengthen relevant controls. Plan, execute and learn lessons from regular cyber-attack simulation exercises to test the company’s IT and organisation resilience to improve cyber defences and attack preparedness. Manage and maintain the suite of More ❯
processing systems, identifying potential weaknesses and recommending suitable protection measures. Participating in red teaming and simulation exercises (technical & non-technical), to better understand our cyber-attack and defence posture, rehearse responses, and evaluate readiness. Assisting with the creation and delivery of security awareness collateral, promoting an effective security culture. Providing More ❯
against advanced persistent threats and state-level actors. We have more junior roles for exceptional individuals with a proven personal interest and engagement in cyberattack and defence, and outstanding academic and career performance even if experience is limited. Our goal is to build an entirely new level of assurance More ❯
Salford, Manchester, United Kingdom Hybrid / WFH Options
ENGINEERINGUK
the BBC in the current threat landscape and to deal with any incidents as and when they occur. A keen understanding of the latest cyber-attack patterns would be beneficial as well as an inquisitive mindset and desire to learn. Whilst the SOC does provide 24x7 cover, the majority of More ❯
Salford, Manchester, United Kingdom Hybrid / WFH Options
BBC Group and Public Services
the BBC in the current threat landscape and to deal with any incidents as and when they occur. A keen understanding of the latest cyber-attack patterns would be beneficial as well as an inquisitive mindset and desire to learn. Whilst the SOC does provide 24x7 cover, the majority of More ❯
the development, delivery, and enforcement of comprehensive cyber security operations. Provide leadership and direction for cyber security operations, ensuring the University remains resilient to cyberattack and maintains a robust and rigorous security posture. Cyber Security runs through every aspect of the University, and it is essential that all IT More ❯
The role defines appropriate policies and standards, oversees information security strategy and improvement initiatives, and ensures the university remains a resilient organisation, resistant to cyber-attack and hostile activity. We value, empower, and support every member of staff to get the best out of your unique talents, so you'll More ❯
activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY SKILLS Technical cyber security knowledge and practical experience of cloud computing technologies e.g. AWS, GCP and Azure. Detailed understanding More ❯
activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY SKILLS Technical cyber security knowledge and practical experience of cloud computing technologies e.g. AWS, GCP and Azure. Detailed understanding More ❯
activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY SKILLS Technical cyber security knowledge and practical experience of cloud computing technologies e.g. AWS, GCP and Azure. Detailed understanding More ❯
activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY SKILLS Technical cyber security knowledge and practical experience of cloud computing technologies e.g. AWS, GCP and Azure. Detailed understanding More ❯
understand & manager their cyber risk, secure their business and improve their security operations. We are the people they trust to defend, or recover, from cyberattack through technical services, assurance and support. Responsibilities might include support to: The investigation of security breaches and incidents Information security governance and management Development More ❯
understand & manager their cyber risk, secure their business and improve their security operations. We are the people they trust to defend, or recover, from cyberattack through technical services, assurance and support. Responsibilities might include support to: The investigation of security breaches and incidents Information security governance and management Development More ❯
with all local and corporate regulatory controls to deliver control systems which are Cyber secure to prevent Process Safety catastrophic events due to a Cyber-attack whilst ensuring production is optimized by efficient utilization of Control systems. Manage the day-to-day engineering, maintenance and troubleshooting requirements related to BPCS More ❯