bradford, yorkshire and the humber, united kingdom
HMRC
support. As such, the need to protect and preserve the ability of HMRC to function and serve the public against threats posed by possible cyber-attacks is critical. CyberThreat Operations (CTO) is part of the Cyber Security Delivery (CSD) function in HMRC Security. CTO covers … a diverse range of responsibilities across the span of anti-phishing, brand abuse management, cyberthreatintelligence, data science, and threat hunting. We are seeking an G7 CyberThreatIntelligence Lead, who will report to the G6 Head of CTO. The successful candidate … will manage three SO CyberThreatIntelligence Managers and one SO Threat Hunting Manager. Job descriptionAs the CyberThreatIntelligence Lead, on a day-to-day basis you will be overseeing and directing the work of CyberThreatIntelligence and More ❯
support. As such, the need to protect and preserve the ability of HMRC to function and serve the public against threats posed by possible cyber-attacks is critical. CyberThreat Operations (CTO) is part of the Cyber Security Delivery (CSD) function in HMRC Security. CTO covers … a diverse range of responsibilities across the span of anti-phishing, brand abuse management, cyberthreatintelligence, data science, and threat hunting. We are seeking an G7 CyberThreatIntelligence Lead, who will report to the G6 Head of CTO. The successful candidate … will manage three SO CyberThreatIntelligence Managers and one SO Threat Hunting Manager. Job description As the CyberThreatIntelligence Lead, on a day-to-day basis you will be overseeing and directing the work of CyberThreatIntelligenceMore ❯
Manchester Area, United Kingdom Hybrid / WFH Options
NCC Group
world safer and more secure. Take a look at our website here to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business… https://www.nccgroup.com/uk/The Opportunity You will be acting as a team leader within the … Strategic ThreatIntelligence team, reporting to the Strategic ThreatIntelligence Manager. As a senior member in this team, you will have some limited line management responsibilities but will be expected to be heavily involved in the training and mentoring of other Threatintelligence team … members, as well as supporting the overall growth of the Strategic ThreatIntelligence team. You will be expected to have strong consultancy skills and experience in delivering large/complex pieces of client facing work where you will need to be able to manage multiple internal and external More ❯
Location(s): UK, Europe & Africa : UK : Leeds BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital … advantage in the most demanding environments. CyberThreatIntelligence and Vulnerability Lead Job Title: CyberThreatIntelligence and Vulnerability Lead Requisition ID: 121483 Location: Leeds (this is a 100% office based role due to the nature of the project) Grade: GG10 - GG11 Referral Bonus … The customer is committed to development of this improved SOC to be a benchmark of best practice and excellence in reflection of the significant threat that the protected systems are subject to. This role requires a minimum of DV clearance. This role reports to the Service Delivery Manager. The More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom
Vanquis Bank Limited
Job Title: CyberIntelligence Specialist Contract Type: Permanent, Fulltime Location: Bradford, Petersfield, Chatham or London Working Pattern: Hybridtypically 1 to 3 days a week in the office. Part-time or flexible arrangements are considered to support work-life balance. A fear of losing your current working flexibility shouldn … Finance: Snoop Premium available to all colleagues Medical: Opportunity to opt in for Private Medical Insurance Bonus: Discretionary annual bonus The Role: As our CyberIntelligence Specialist, you will proactively identify, analyse, respond, and mitigate cyber threats that pose risks to Vanquis Banking Groups cybersecurity posture. This … involves monitoring security events, conducting incident response activities, enhancing our threat detection capabilities, and ensuring compliance with policy, standards, and regulation. Your contributions will directly impact our ability to protect sensitive data, maintain business continuity, and mitigate cybersecurity risks. As a CyberIntelligence Specialist, you will: Actively More ❯
must be British-born. Are you ready to lead in one of the most critical roles in the cybersecurity industry? We are seeking a CyberThreatIntelligence and Vulnerability Lead to play a pivotal role in the operation and improvement of a Security Operations Centre (SOC) dedicated … organisation. This position offers an opportunity to make a tangible impact in protecting the systems that power the nation. About the Role As the CyberThreatIntelligence and Vulnerability Lead, you will: Take accountability for detecting, triaging, and reporting potential cyber threats and key vulnerabilities daily. … Oversee the delivery and quality of all threatintelligence and vulnerability products, ensuring deadlines are met with excellence. Develop and continuously review tailored Priority Intelligence Requirements (PIRs) and collection plans to align intelligence products with client needs. Provide in-depth analysis, context, and predictive insights to More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
NCC Group
world safer and more secure. Take a look at our website here to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business… https://www.nccgroup.com/uk/The Opportunity You will be acting as a team member within the … Operational ThreatIntelligence team, reporting to the Operational ThreatIntelligence Manager, and supported by the Operational TI Team Leads. This role involves analysis of cyber threats, the development of actionable intelligence, and collaboration with various teams. Your support to the wider organisation will be … critical in the development of NCC Group’s ThreatIntelligence capabilities and the broader service we offer. Key Accountabilities ThreatIntelligence collection and analysis : Make use of OSINT and other intelligence sources to collect and then conduct in-depth analysis of cyber threats, including More ❯
Location(s): UK, Europe & Africa : UK : Leeds BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital … advantage in the most demanding environments. CyberThreatIntelligence and Vulnerability Lead Job Title: CyberThreatIntelligence and Vulnerability Lead Requisition ID: 121483 Location: Leeds (this is a 100% office based role due to the nature of the project) Grade: GG10 - GG11 Referral Bonus … The customer is committed to development of this improved SOC to be a benchmark of best practice and excellence in reflection of the significant threat that the protected systems are subject to. This role requires a minimum of DV clearance. This role reports to the Service Delivery Manager. The More ❯
Location(s): UK, Europe & Africa : UK : Leeds BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital … The customer is committed to development of this improved SOC to be a benchmark of best practice and excellence in reflection of the significant threat that the protected systems are subject to. The SOC will be staffed by a blend of customer and BAE Systems staff, based in multiple … the incoming shift Monitor, triage, analyse and investigate alerts, log data and network traffic using the Protective Monitoring platform and Internet resources to identify cyber-attacks/security incidents. Categorise all suspected incidents in line with the Security Incident policy Recognise potential, successful and unsuccessful intrusion attempts and compromises More ❯
Cyber Security Specialist | Logrhythm > Sheffield > £50,000 - £65,000 + Up to 20% Bonus > 10% Pension + Life Assurance + Excellent Benefits > Hybrid - 3 days onsite ** The business will support the application for security clearance. Due to the nature of work, the individual has to be a UK national … About the Business Security is one of the fastest-growing parts of this global organisation. They protect their networks from more than 6,500 cyber-attacks each day, investing significantly in research each year and employ more than 3,000 people in the cyber security business alone, making … them the largest private cyber security employer in the UK. About this Role This role exists to provide specialist technical support on complex network security and cybersecurity deployments for large and sometimes complex UK contracts. The role will include supporting and administrating various SIEM and XDR platforms including creating More ❯
Employment Type: Permanent
Salary: £50000 - £65000/annum Up to 20% bonus, 10% pension
Immingham, Lincolnshire, North East, United Kingdom Hybrid / WFH Options
Rullion Limited
Cyber Risk Management Lead Location: Immingham or London Contract Type: Permanent Salary: £70,000 - £75,000 About the Role An established power generation company is seeking a Cyber Risk Management Lead to enhance and oversee its cyber risk management framework across Operational Technology (OT) and Information Technology … role can be based in Immingham or London , with travel to other sites as required ( 3 days in the office ). Key Responsibilities Lead cyber risk assessment activities across IT and OT environments, correlating outputs into strategic risk tracking. Manage the cyber security risk toolkit , including threat modelling, attack trees, and scenario-based exercises. Develop and implement cyber security policies, processes, and staff training aligned with Secure by Design principles. Oversee first-line security operations , including outsourced 24/7 SOC management . Define and manage cyberthreatintelligence requirements . Provide More ❯
innovation and excellence. To be successful as a Vulnerability Management Governance Lead , you should have experience with: Ability to lead colleagues in an operational cyber-security team Ability to manage projects and deliver effective outputs on time Keen knowledge of risk and controls frameworks in a global financial institution … skills This role will be based in our Knutsford campus. Purpose of the role To keep our customers, clients, and colleagues safe by identifying cyber-vulnerabilities across the Bank, using a risk-based approach to prioritise them, and to drive effective remediation activity. Accountabilities Allocation of the correct risk … rating and remediation prioritisation to a vulnerability based on industry standards for assessment, available threatintelligence concerning exploitation, the reachability of the host (or asset) and the value of the service(s) running on the impacted host. Development of vulnerability management operating model, policies and procedures to ensure More ❯
What do you want to search? Keyword Apprenticeship Type Location Cyber Security Apprentice Apply From: 27/03/2025 Learning Provider Delivered by ANGLO AMERICAN TECHNICAL & SUSTAINABILITY SERVICES LTD Employer ANGLO AMERICAN SERVICES (UK) LTD. Vacancy Description You will undertake your apprenticeship as part of a team that … protects Anglo American's Operational Technology and data from cyber threats. Here is a summary of what you will do: Develop a sound knowledge of cyber security tools. Learn how to identify and protect against cyber threats. Work alongside cyber security professionals from around the world … to develop your practical skills, alongside your studies to gain a Level 4 qualification. Provide support, advice and guidance on cyber security. An exciting, comprehensive apprenticeship which focuses on developing sound knowledge of cyber security tools, network intrusions, threatintelligence and how to identify and protect More ❯
network traffic using SIEM tools. Analyse and categorise security incidents in line with internal policies. Conduct in-depth incident investigations, reporting, and remediation. Utilise threatintelligence to detect and respond to potential threats. Support incident response activities for national-scale cyber events. Help improve SOC workflows, including … automation and threat detection use cases. Coach junior analysts and contribute to continuous improvement across the team. Essential Skills & Experience: Hands-on experience with Microsoft Sentinel (critical to this role). Experience in security operations, including SIEM tools (e.g., Sentinel, Splunk). Solid understanding of cloud environments (Azure and …/or AWS). Knowledge of network protocols, threat actors, and attack vectors. Ability to analyse complex data and deliver actionable insights. Familiarity with scripting (Python or similar) and security automation (SOAR). Understanding of threatintelligence and its operational use. Desirable Skills: Experience in software engineering More ❯
A global leader in defence and security solutions is seeking a Senior SOC Analyst to take charge of security operations, incident management, and threat detection strategies. This is an excellent opportunity for an experienced SOC analyst to step into a leadership role and help protect critical systems from evolving … cyber threats. As a Senior SOC Analyst, you will be responsible for identifying, investigating, and mitigating security incidents in a high-stakes environment. You will work with a team of experts, leveraging advanced security technologies to safeguard national security interests. Key Responsibilities: Lead and mentor a team of SOC … security environment. Oversee real-time security monitoring and incident response activities. Investigate, triage, and manage security incidents using SIEM, EDR, and NDR tools. Coordinate threatintelligence integration to enhance detection capabilities. Develop and refine SOC processes to improve efficiency and resilience. Requirements: 5+ years in Security Operations, with More ❯
Portsmouth, yorkshire and the humber, United Kingdom
Franklin Fitch
Join Our Team as a SOC Analyst Are you ready to take the lead in safeguarding critical networks and mentoring the next generation of cyber defenders? We’re on the hunt for a SOC Analyst to join our high-performing SOC team. As a key player in our cyber … you’ll lead from the front—managing teams, guiding investigations, and helping shape the future of our security strategy. If you’re passionate about cyber security and thrive in a fast-paced, threat-driven environment, we want to hear from you. 🔐 What You’ll Be Doing Monitor & Detect … to security alerts from SIEM, IDS/IPS, EDR, and other tools. Incident Response: Investigate threats and escalate incidents, ensuring rapid containment and resolution. Threat Hunting: Proactively search for hidden threats and conduct forensic investigations. Lead & Mentor: Manage SOC analysts and support their technical and professional growth. Tool Optimisation More ❯
Thing, Own It, and Aim For Greatness. About the Role To support our growth, we are looking for SOC Analysts to join our growing cyber security function. This role will be supporting our 24/7 operational capabilities (On-call rota, not shift based). As a member of … to security alerts raised by Users. Enhancing and creating analytic triggers to enhance alert efficacy. Continuous development of incident handling and readiness processes. Proactive threat hunting based on threat intelligence. Documentation of incidents and investigations. Requirements About your Skills We're open-minded when it comes to hiring … engagements. Experience in endpoint based investigations. Experience in cloud based investigations. Experience with Incident Command and conducting Tabletop Exercises Interest in Automation. Interest in ThreatIntelligence and Analytic Tuning. A high level understanding of mobile, network and operating system security controls. Any experience of programming in Python, Go More ❯
to a severe skills shortage in the market, the UK government is supporting individuals to get fully funded training to start a career in cyber security . We will provide entry level training and employability support for individuals who are keen to start a career in this industry. All … to 17:30, Monday to Fridays. The course starts on 4th Dec, 18th Dec 2023. You will learn: L2 TLM Accredited Certificate in Cyber Security and Digital Forensics - Learn the core principles of cybersecurity, networking, online threats and deploying security tools to defend an online system. L2 in Cyber … for 4 weeks. Access to own laptop/pc and internet connection. You should live in or around Manchester, UK. The role: As a Cyber Security Trainee, your day to day duties will involve working alongside experienced professionals in the field to mitigate risks and protect the information assets More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom
Communicate Technology
Security Services Provider, we operate our own Security Operations Centre (SOC) in Leeds city centre. Our mission is to protect our clients from evolving cyber threats while maintaining strong relationships built on trust and value. As we continue to grow, we are seeking a skilled SOC Team Lead to … with recruitment and onboarding of new SOC team members Act as the primary technical escalation point for complex security incidents and investigations Support advanced threat hunting, incident response, and forensic analysis Ensure the SOC follows best practices and industry standards Client Engagement & Technical Account Management Oversee security tool deployments … a SOC environment, with at least 1 year in a leadership role Strong technical knowledge of security tools, including SIEM, SOAR, EDR, Firewalls, and ThreatIntelligence platforms Hands-on experience with security incident handling, threat hunting, and forensic analysis Excellent understanding of attack tactics, techniques, and procedures More ❯
WILL PROVIDE FULL TRAINING AT NO COST. Overview We have a pool of companies who are looking to employ someone for the role of Cyber Security Trainee. The candidate does NOT need to have any prior experience since all the necessary training will be provided. The Training All training … be ready to be employed. This opportunity has come open due to a severe skills shortage we are currently facing. The Role As a Cyber Security Trainee, your day to day duties will involve working alongside experienced professionals in the field to mitigate risks and protect the information assets … of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team meetings and training sessions, where More ❯
WILL PROVIDE FULL TRAINING AT NO COST. Overview We have a pool of companies who are looking to employ someone for the role of Cyber Security Trainee. The candidate does NOT need to have any prior experience since all the necessary training will be provided. The Training All training … be ready to be employed. This opportunity has come open due to a severe skills shortage we are currently facing. The Role As a Cyber Security Trainee, your day-to-day duties will involve working alongside experienced professionals in the field to mitigate risks and protect the information assets … of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response, as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team meetings and training sessions, where More ❯
Identify and raise awareness of security risks Develop and enhance security policies, processes, procedures, and technical controls to strengthen security capabilities and resilience to cyber threats Take a proactive role in identifying security risks, mitigations, and opportunities to strengthen resilience to cyber-attacks and security incidents Participate in … and enhancement The Requirements Hands-on experience of security and/or infrastructure within an enterprise environment Exposure to enterprise information security standards including Cyber Essentials, ISO 27001, 27002 etc. Data Protection Act and the General Data Protection Regulation Microsoft O365 Security solutions; Networking; Security operations; Vulnerability Management Security … principles, including experience of vulnerability scanning, identifying, resolving, and reporting risks Experience of formal document creation, such as the creation of reports or procedures ThreatIntelligence analysis and best practice Security Incident Response processes, procedures, and best practices Disaster Recovery and Business Continuity principles Event and log analysis More ❯
of experience in cybersecurity, with at least 3 years in a leadership role within a SOC or similar environment. - Proven experience in incident response, threatintelligence, and security operations. - Demonstrated success in building, leading, and managing high-performing teams. - Skills: - Strong leadership and management skills, with the ability More ❯
happiest eye-care professionals. As an IT Security Operations Engineer, you will play a crucial role in safeguarding our IT systems and infrastructure against cyber threats. You will also receive: Exciting calendar of events, fostering a vibrant work culture. Employee health plan to prioritise your well-being. Access to … best practices. SKILLS, KNOWLEDGE & EXPERIENCE Proven experience in a SOC or security operations role, with hands-on experience in security monitoring, incident response, and threat detection. Strong understanding of network security principles, protocols, and technologies (firewalls, IDS/IPS, SIEM, etc.). Experience with security tools such as SIEM …/SOAR platforms, endpoint detection and response (EDR) solutions, vulnerability management, detection and response/remediation (VMDR) solutions and threatintelligence platforms. Knowledge of security standards and frameworks (e.g., NIST, CIS Controls, ISO 27001) and regulatory requirements (e.g., GDPR, HIPAA). Proficiency in scripting and automation (e.g., Python More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Radar Healthcare
software development practices (DevSecOps, secure coding standards, OWASP top 10) into everyday processes. Oversee the security posture of cloud environments, ensuring secure configurations, proactive threat monitoring, and resilience planning. Establish and maintain a robust risk management framework, proactively identifying, assessing, and mitigating cybersecurity risks in alignment with business goals. … Define standards for operational security including vulnerability management, incident detection and response, threatintelligence, and third-party/vendor security management. Act as the key internal and external security spokesperson, confidently communicating security strategy, risks, and controls to the Board, customers, regulators, and other stakeholders. Serve as the More ❯