Location(s): UK, Europe & Africa : UK : Leeds BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. CyberThreatIntelligence and Vulnerability Lead Job Title: CyberThreatIntelligence and Vulnerability Lead Requisition ID: 121483 Location: Leeds (this is a 100% office based role due to the nature of the project) Grade: GG10 - GG11 Referral Bonus: £5,000 Role Description BAE Systems have been contracted to undertake the day to day operation of (and incremental … environments that must be protected. The customer is committed to development of this improved SOC to be a benchmark of best practice and excellence in reflection of the significant threat that the protected systems are subject to. This role requires a minimum of DV clearance. This role reports to the Service Delivery Manager. The Role You will be: Accountable More ❯
security incidents swiftly and effectively. Security Monitoring Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and … refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development Create and deliver security training to staff across the organisation. Bid Support Assist in completing security questionnaires and contributing to bid processes. What We re Looking For: An experienced Information Security Consultant with a … strong background in IT security operations. Expertise in Microsoft O365 Security Solutions including threatintelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerability scanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. More ❯
security incidents swiftly and effectively. Security Monitoring – Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts – Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness – Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management – Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery – Test and … refine disaster recovery plans to enhance business resilience. Compliance & Policy Development – Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development – Create and deliver security training to staff across the organisation. Bid Support – Assist in completing security questionnaires and contributing to bid processes. What We’re Looking For: An experienced Information Security Consultant with a … strong background in IT security operations. Expertise in Microsoft O365 Security Solutions – including threatintelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerability scanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. More ❯
security incidents swiftly and effectively. Security Monitoring Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and … refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development Create and deliver security training to staff across the organisation. Bid Support Assist in completing security questionnaires and contributing to bid processes. What Were Looking For: An experienced Information Security Consultant with a strong … background in IT security operations. Expertise in Microsoft O365 Security Solutions including threatintelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerability scanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role More ❯
first security operations function. This is a high-impact, hands-on leadership role with end-to-end responsibility for managing the Security Operations Centre (SOC), incident detection and response, threatintelligence, and cloud-native security engineering-with a strong focus on Google Cloud Platform (GCP). Operating in a highly regulated, Real Time financial services environment, this role … requires deep technical knowledge, operational maturity, and experience applying security best practices across a fast-moving cloud infrastructure. What You'll Do SOC Leadership & Threat Detection Lead and mentor a team of SOC analysts and engineers, ensuring high-quality coverage across all GCP workloads. Establish and maintain 24/7 detection and response capabilities, fine-tuning alerting rules and … monitoring strategies. Deploy and maintain detection rules using Chronicle SIEM, YARA, Sigma, and GCP-native logging tools. Define and maintain runbooks, incident playbooks, and escalation procedures. Incident Response & ThreatIntelligence Own the full life cycle of security incidents from detection to remediation and post-incident review. Perform advanced threat hunting and root cause analysis across cloud workloads More ❯
first security operations function. This is a high-impact, hands-on leadership role with end-to-end responsibility for managing the Security Operations Centre (SOC), incident detection and response, threatintelligence, and cloud-native security engineering-with a strong focus on Google Cloud Platform (GCP). Operating in a highly regulated, Real Time financial services environment, this role … requires deep technical knowledge, operational maturity, and experience applying security best practices across a fast-moving cloud infrastructure. What You'll Do SOC Leadership & Threat Detection Lead and mentor a team of SOC analysts and engineers, ensuring high-quality coverage across all GCP workloads. Establish and maintain 24/7 detection and response capabilities, fine-tuning alerting rules and … monitoring strategies. Deploy and maintain detection rules using Chronicle SIEM, YARA, Sigma, and GCP-native logging tools. Define and maintain runbooks, incident playbooks, and escalation procedures. Incident Response & ThreatIntelligence Own the full life cycle of security incidents from detection to remediation and post-incident review. Perform advanced threat hunting and root cause analysis across cloud workloads More ❯
first security operations function. This is a high-impact, hands-on leadership role with end-to-end responsibility for managing the Security Operations Centre (SOC), incident detection and response, threatintelligence, and cloud-native security engineering-with a strong focus on Google Cloud Platform (GCP). Operating in a highly regulated, Real Time financial services environment, this role … requires deep technical knowledge, operational maturity, and experience applying security best practices across a fast-moving cloud infrastructure. What You'll Do SOC Leadership & Threat Detection Lead and mentor a team of SOC analysts and engineers, ensuring high-quality coverage across all GCP workloads. Establish and maintain 24/7 detection and response capabilities, fine-tuning alerting rules and … monitoring strategies. Deploy and maintain detection rules using Chronicle SIEM, YARA, Sigma, and GCP-native logging tools. Define and maintain runbooks, incident playbooks, and escalation procedures. Incident Response & ThreatIntelligence Own the full life cycle of security incidents from detection to remediation and post-incident review. Perform advanced threat hunting and root cause analysis across cloud workloads More ❯
Doncaster, South Yorkshire, UK Hybrid / WFH Options
Barclay Simpson
first security operations function. This is a high-impact, hands-on leadership role with end-to-end responsibility for managing the Security Operations Centre (SOC), incident detection and response, threatintelligence, and cloud-native security engineering-with a strong focus on Google Cloud Platform (GCP). Operating in a highly regulated, Real Time financial services environment, this role … requires deep technical knowledge, operational maturity, and experience applying security best practices across a fast-moving cloud infrastructure. What You'll Do SOC Leadership & Threat Detection Lead and mentor a team of SOC analysts and engineers, ensuring high-quality coverage across all GCP workloads. Establish and maintain 24/7 detection and response capabilities, fine-tuning alerting rules and … monitoring strategies. Deploy and maintain detection rules using Chronicle SIEM, YARA, Sigma, and GCP-native logging tools. Define and maintain runbooks, incident playbooks, and escalation procedures. Incident Response & ThreatIntelligence Own the full life cycle of security incidents from detection to remediation and post-incident review. Perform advanced threat hunting and root cause analysis across cloud workloads More ❯
first security operations function. This is a high-impact, hands-on leadership role with end-to-end responsibility for managing the Security Operations Centre (SOC), incident detection and response, threatintelligence, and cloud-native security engineering-with a strong focus on Google Cloud Platform (GCP). Operating in a highly regulated, Real Time financial services environment, this role … requires deep technical knowledge, operational maturity, and experience applying security best practices across a fast-moving cloud infrastructure. What You'll Do SOC Leadership & Threat Detection Lead and mentor a team of SOC analysts and engineers, ensuring high-quality coverage across all GCP workloads. Establish and maintain 24/7 detection and response capabilities, fine-tuning alerting rules and … monitoring strategies. Deploy and maintain detection rules using Chronicle SIEM, YARA, Sigma, and GCP-native logging tools. Define and maintain runbooks, incident playbooks, and escalation procedures. Incident Response & ThreatIntelligence Own the full life cycle of security incidents from detection to remediation and post-incident review. Perform advanced threat hunting and root cause analysis across cloud workloads More ❯
Wakefield, West Yorkshire, UK Hybrid / WFH Options
Barclay Simpson
first security operations function. This is a high-impact, hands-on leadership role with end-to-end responsibility for managing the Security Operations Centre (SOC), incident detection and response, threatintelligence, and cloud-native security engineering-with a strong focus on Google Cloud Platform (GCP). Operating in a highly regulated, Real Time financial services environment, this role … requires deep technical knowledge, operational maturity, and experience applying security best practices across a fast-moving cloud infrastructure. What You'll Do SOC Leadership & Threat Detection Lead and mentor a team of SOC analysts and engineers, ensuring high-quality coverage across all GCP workloads. Establish and maintain 24/7 detection and response capabilities, fine-tuning alerting rules and … monitoring strategies. Deploy and maintain detection rules using Chronicle SIEM, YARA, Sigma, and GCP-native logging tools. Define and maintain runbooks, incident playbooks, and escalation procedures. Incident Response & ThreatIntelligence Own the full life cycle of security incidents from detection to remediation and post-incident review. Perform advanced threat hunting and root cause analysis across cloud workloads More ❯
Job Title: Cyber Security Programme Director (Financial Services) Location: Sheffield (x3 on site per week) Salary/Rate: £550-590 Per Day Start Date: 30/06/25 Job Type: 5 month initial contract - Inside IR35 Company Introduction We have an exciting opportunity now available with one of our sector-leading consultancy clients! They are currently looking for … a Cyber Security Programme Director to join their team for a five-month contract. This is a high-profile role requiring senior-level expertise in leading complex cyber programmes and ensuring regulatory compliance across financial environments. Job Responsibilities/Objectives You will be responsible for overseeing the design, governance, and execution of cybersecurity programmes that protect sensitive financial … data, ensure regulatory compliance (e.g., FCA, PRA, DORA), and enhance the organisation's cyber resilience. This is a high-impact leadership role requiring strong stakeholder engagement, risk management, and delivery assurance across a portfolio of cyber initiatives, including threatintelligence, incident response, secure cloud transformation, and third-party risk management. Lead the end-to-end delivery More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Hays Technology
Your new company Hays Technology are recruiting a Head of Cyber Security & Infrastructure to join an exciting and growing public sector organisation based nationally. You will be reporting to the Director of Technology. Your new role In your role, you will be overseeing the Cyber Security estate, adhering to the Cyber Assessment Framework, and continuously improving the … internal security posture, identifying and assessing any cyber security risks, in accordance with laws and regulations. You will be responsible for leveraging and optimising a number of tools including, MS Defender, Sentinel, Azure and the external SOC partner to enhance cyber resilience, conduct threat analysis, and proactive risk assessments to design effective controls. You will be leading … the Cyber Security operations function, by providing strategic direction and coordinating day-to-day delivery of threatintelligence, threat detection, incident response, vulnerability management, and ethical hacking capabilities. You will be leading a team of Infrastructure Engineers, ensuring strong data controls are in place, whilst working closely with key stakeholders to establishing responsibilities and ensure an More ❯
Employment Type: Permanent
Salary: £70000 - £80000/annum Up to £80,000+ Benefits
Location(s): UK, Europe & Africa: UK: Gloucester BAE Systems Digital Intelligence is home to 4,500 digital, cyber, and intelligence experts. We work across 10 countries to collect, connect, and analyze complex data, enabling governments, armed forces, and businesses to achieve digital advantages in demanding environments. Job Title: Threat Hunter Requisition ID: 121789 Location: Leeds - hybrid … members and share knowledge proactively. Contribute to the SOC Knowledge Repository by creating and updating documentation independently. Build relationships externally with other SOCs and cybersecurity researchers to identify analytics, threatintelligence, and tradecraft that benefit the Blue Team. Communicate funding and prioritization suggestions and lead implementation when needed. Develop complex, anomaly-based KQL analytics and playbooks for detection … vulnerabilities, produce proof-of-concept exploits, and emulate adversary TTPs for training and detection evaluation. Review red team and pentest findings to improve detection rules. Provide forensic support and threat emulation to improve alert triage and accuracy. Identify gaps in SOC processes, data collection, and analysis, demonstrating the need for improvements through scenarios and red teaming. Perform complex threatMore ❯
What do you want to search? Keyword Apprenticeship Type Location Cyber Security Apprentice Apply From: 27/03/2025 Learning Provider Delivered by ANGLO AMERICAN TECHNICAL & SUSTAINABILITY SERVICES LTD Employer ANGLO AMERICAN SERVICES (UK) LTD. Vacancy Description You will undertake your apprenticeship as part of a team that protects Anglo American's Operational Technology and data from cyber threats. Here is a summary of what you will do: Develop a sound knowledge of cyber security tools. Learn how to identify and protect against cyber threats. Work alongside cyber security professionals from around the world to develop your practical skills, alongside your studies to gain a Level 4 qualification. Provide support, advice and guidance on … cyber security. An exciting, comprehensive apprenticeship which focuses on developing sound knowledge of cyber security tools, network intrusions, threatintelligence and how to identify and protect against cyber threats that face the mining industry. Key Details Vacancy Title Cyber Security Apprentice Employer Description Anglo American is a leading global mining company and our products More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Hays Technology
new company Hays Technology are recruiting a Cloud Security Engineer to join an exciting and growing public sector organisation based nationally. You will be reporting to the Head of Cyber Security & Infrastructure. Your new role In your role, you will be supporting the Head of Cyber Security overseeing and strengthening the Cyber Security estate, ensuring all incidents … and Service requests are accurately prioritised and managed, whilst supporting the implementation and delivery of the Cyber Security Sub Strategy. You will be understanding, adhering, and implementing changes to ensure compliance requirements are met in relation to ISO27001, Cyber Assessment Framework, Cyber Essentials. You will be identifying and delivering opportunities for continual improvement of the security operations … MS Defender, Autopilot and Intune Success in leveraging traditional best practices such as ITIL Experience of identity and access management, and end user device management Experience of delivering against cyber security roadmaps Experience building threatintelligence and horizon scanning tools Strong communication skills This post requires a basic DBS to be passed What you'll get in More ❯
Employment Type: Permanent
Salary: £48000 - £51500/annum Up to £51,500+ Excellent Benefits
of the following security awareness then this would be a major advantage: Develop and enhance security policies, processes, procedures and technical controls to strengthen security capabilities and resilience to cyber threats Take a proactive role in identifying security risks, mitigations and opportunities to strengthen resilience to cyber-attacks and security incidents Participate in the design and implementation of … and issues of non-compliance Employ previous experience and industry best practices to monitor, enhance and report on security posture, including dashboard reports and management information Gather and use cyberthreatintelligence to provide greater insight into cyber threats, to enable a faster, more targeted response and to identify new risks, along with proactive, best practice More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
role Demonstrate strong technical knowledge of forensic investigations and incident response Ideally have consulting expertise Posses expertise in mitigating threats, implementing proactive measures, and dealing with a range of cyber incidents such as but not limited to DDoS Attacks with an understanding of threatintelligence Open-source tooling experience is a massive plus Right to work within More ❯