high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best … making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements … and guidance to existing SOC team on areas of improvement and include experience of working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
designing, implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. ThreatIntelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. Security Automation & Scripting - Familiarity with scripting languages (such More ❯
Seeking a Senior Cyber Security Specialist for a permanent role in Bristol. The role will be responsible for critical activities across a broad range of domains. The Senior Cyber Security Specialist will operate across Cyber Operations and GRC, ensuring UK-specific compliance and security resilience. Role: Security Incidents: Oversee incident management and response, including root cause analysis … impact assessment, and post-incident reviews. Threat Management: Develop and refine threatintelligence, threat hunting capabilities, and prevention/detection measures. Security Technologies: Configure, maintain, and optimise security platforms (SIEM/XDR, EDR, vulnerability management, Secure Email Gateway, Application Allowlisting etc.) Security Controls: Implement and maintain security controls, continuously improving detection, prevention, and remediation. Vendor Risk … Audit: Conduct vendor risk assessments, support internal and external audits (e.g. Cyber Essentials, ISO27001), and manage remediation actions. Cyber Security Program: Support the execution of the UK Cyber Security Program, contributing to the implementation of key security initiatives and enhancements aligned with UK business and regulatory requirements. Governance, Risk, and Compliance: Support compliance efforts related to UK More ❯
our clients' organisations, applying sector knowledge and technology solutions to deliver the best possible outcomes and get it right first time. Why Join KPMG as a Manager within our Cyber Security function? Cyber security is one of the areas which KPMG has identified for tremendous investment and growth. Our clients face a challenging cyberthreat and … it? Technical background, willingness to learn, and experience within a Security Operations Centre (SOC). Understanding of SOC tools and technologies, such as SIEM, IDS/IPS, EDR and threatintelligence platforms. Proven experience of assessing maturity, managing SOC services and delivering improvements within a SOC environment. Experience bringing a technology perspective to a broad range of client More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Jisc
Salary: From £40,000 per annum negotiable depending on experience + fantastic benefits! Jisc grade: TCY3 (internal use only) Hours: 35 hours per week Contract: Permanent Reports into: Senior Threatintelligence engineer Location: Hybrid - A blend of working from home and your nominated hub office, we have hubs in London, Bristol, Manchester and Oxford. Specific patterns for working … the UK's research and education landscape? At Jisc, we operate Janet - the UK's ultra-fast, secure network dedicated to research and education. We're looking for a Threatintelligence engineer to help us protect this critical national asset. You'll be at the heart of our security operations, developing and maintaining the infrastructure that powers our … cutting-edge cybersecurity services. Your focus will be on enhancing and managing our: SIEM (Security Information and Event Management) systems SOAR (Security Orchestration, Automation, and Response) platforms ThreatIntelligence tools and integrations You'll work closely with our threatintelligence teams to design and implement smart, automated solutions that keep our defences sharp and responsive. Why More ❯
Description We're seeking a skilled and innovative Security Engineer to join our Cyber Detection and Response team on a 6 month fixed term contract to drive the development and implementation of security log sources and SOC use cases. Reporting into the Detection and Response Manager, you'll lead the onboarding and management of log sources, designing and implementing … observability use cases Developing, deploying and optimizing log management pipelines using Cribl Building and maintaining comprehensive documentation, including use case requirements, workflows, and best practices Working closely with the threatintelligence, incident response, and operations teams to design solutions that support security and operational resilience Troubleshooting and resolving complex data pipeline and log processing issues Staying up to … security operations, and cloud environments (e.g., AWS, Azure, GCP) Strong problem-solving skills with the ability to translate technical solutions into business value Knowledge of incident response workflows and threatintelligence integration is desirable Internal candidates are encouraged to apply for this role as a secondment opportunity through the internal careers site. As a precondition of employment for More ❯