security previews, and frontline support. You'll work at the sharp end of cyber defence, directly contributing to investigations involving nation-state threat actors (including IR, CH, and NK based campaigns) while refining your craft across enterprise-scale log ingestion and customised Sentinel integration engineering that will … wide log onboarding into Microsoft Sentinel – deploying standard and custom connectors, Function Apps, and parsers to build tailored SIEM solutions that drive real-world threat detection and response. Log ingestion at scale across numerous hybrid and multi-cloud environments Enhance custom Function Apps and ingestion pipelines Parse, normalise, and … optimise log telemetry to ensure precision and cost control Partner with IR teams on real attacks – tuning rules against live threat actor activity Sync closely with Microsoft teams to build cutting-edge detection capabilities Contribute to internal knowledge base and help shape engineering standards What's needed? Experience building More ❯
newport, midlands, United Kingdom Hybrid / WFH Options
Cloud Decisions
security previews, and frontline support. You'll work at the sharp end of cyber defence, directly contributing to investigations involving nation-state threat actors (including IR, CH, and NK based campaigns) while refining your craft across enterprise-scale log ingestion and customised Sentinel integration engineering that will … wide log onboarding into Microsoft Sentinel – deploying standard and custom connectors, Function Apps, and parsers to build tailored SIEM solutions that drive real-world threat detection and response. Log ingestion at scale across numerous hybrid and multi-cloud environments Enhance custom Function Apps and ingestion pipelines Parse, normalise, and … optimise log telemetry to ensure precision and cost control Partner with IR teams on real attacks – tuning rules against live threat actor activity Sync closely with Microsoft teams to build cutting-edge detection capabilities Contribute to internal knowledge base and help shape engineering standards What's needed? Experience building More ❯
as a part of the broader KLA AI Security program. The ideal candidate will be able to demonstrate a breadth of knowledge across cybersecurity, threat intelligence, and artificial intelligence. Responsibilities: Conduct in-depth technical assessments of AI systems to identify security risks. Develop threat models for AI systems … for identified risks, and coordinate with business partners to deploy countermeasures to reduce risk to systems and applications. Partner with the cyberthreat intelligence team to research and remain current on threats and vulnerabilities to proactively find opportunities to amend our AI security strategy. Leverage research, industry More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯
Element has an opportunity for a Senior Cyber Engineer to become part of our growing Cyber Engineering Services. A successful candidate for the Cyber Engineer role will possess a solid foundation as a security engineer, responsible for ensuring the security of complex global environments … expertise in application, cloud, and infrastructure domains. In this hybrid role you will design and implement highly secure technical solutions to protect against cyberthreats and potential cyber-attacks. The role will be focused on detection engineering within the strategic Element security tooling. Core Responsibilities Assist … in the design and implementation of technical solutions and security toolsets to address security vulnerabilities, mitigate cyberthreats, and automate tasks. Contribute to the planning, implementation, and management of the security operations tooling roadmap. Collaborate on the engineering, implementation, management, monitoring, and upgrades of cyber security More ❯
Element has an opportunity for a Senior Cyber Engineer to become part of our growing Cyber Engineering Services. A successful candidate for the Cyber Engineer role will possess a solid foundation as a security engineer, responsible for ensuring the security of complex global environments … expertise in application, cloud, and infrastructure domains. In this hybrid role you will design and implement highly secure technical solutions to protect against cyberthreats and potential cyber-attacks. The role will be focused on detection engineering within the strategic Element security tooling. Core Responsibilities Assist … in the design and implementation of technical solutions and security toolsets to address security vulnerabilities, mitigate cyberthreats, and automate tasks. Contribute to the planning, implementation, and management of the security operations tooling roadmap. Collaborate on the engineering, implementation, management, monitoring, and upgrades of cyber security More ❯
UK and Europe. As part of the Enterprise Security & Fraud (ES&F) organization, you will be at the forefront of protecting clients from cyberthreats while building and evolving critical identity and access management services. Key Responsibilities Design, develop, and enhance modern cloud-native cybersecurity services, spanning database More ❯
UK and Europe. As part of the Enterprise Security & Fraud (ES&F) organization, you will be at the forefront of protecting clients from cyberthreats while building and evolving critical identity and access management services. Key Responsibilities Design, develop, and enhance modern cloud-native cybersecurity services, spanning database More ❯
Will be required to travel to client sites occasionally/SC CLEARED OR CLEARABLE* Our client is a Digital Transformation and Cyber Security Consultancy and are currently looking for a Cyber Security Consultant to join their dynamic team! They offer innovative digital and cyber … private sectors. You'll be working on interesting large-scale Government and private sector projects. ROLE OBJECTIVE We are seeking a highly skilled Cyber Security Consultant with a strong background in penetration testing and network security. This role is ideal for a cybersecurity professional with experience in identifying … Proficiency in scripting languages (e.g., Python, Bash, PowerShell) to automate tasks and streamline processes. Hands-on experience of vulnerability assessments, Incident response, penetration testing, threat hunting and compromise assessment. Experience collaborating with Sales teams as a pre-sale's cyber security consultant. Experience working in Energy or More ❯
Will be required to travel to client sites occasionally/SC CLEARED OR CLEARABLE* Our client is a Digital Transformation and Cyber Security Consultancy and are currently looking for a Cyber Security Consultant to join their dynamic team! They offer innovative digital and cyber … private sectors. You'll be working on interesting large-scale Government and private sector projects. ROLE OBJECTIVE We are seeking a highly skilled Cyber Security Consultant with a strong background in penetration testing and network security. This role is ideal for a cybersecurity professional with experience in identifying … Proficiency in scripting languages (e.g., Python, Bash, PowerShell) to automate tasks and streamline processes. Hands-on experience of vulnerability assessments, Incident response, penetration testing, threat hunting and compromise assessment. Experience collaborating with Sales teams as a pre-sale's cyber security consultant. Experience working in Energy or More ❯
basis. BMC is looking for a Product Manager to join our amazing team! The BMC AMI Cloud Vault product provides mainframe cyberthreat protection that enables customers to create highly secure, off-platform backup copies of mainframe data—and quickly recover it in case of an attack. … This complex and mission-critical product plays a pivotal role in safeguarding data, providing peace of mind, and ensuring resilience against cyber threats. In this role, you will lead the transformation of this cutting-edge product originally developed by Model9, a startup acquired by BMC, into a solution More ❯
basis. BMC is looking for a Product Manager to join our amazing team! The BMC AMI Cloud Vault product provides mainframe cyberthreat protection that enables customers to create highly secure, off-platform backup copies of mainframe data—and quickly recover it in case of an attack. … This complex and mission-critical product plays a pivotal role in safeguarding data, providing peace of mind, and ensuring resilience against cyber threats. In this role, you will lead the transformation of this cutting-edge product originally developed by Model9, a startup acquired by BMC, into a solution More ❯
and strengthen security operations at scale. A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation … for enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security analysts, engineers … contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security More ❯
newport, midlands, United Kingdom Hybrid / WFH Options
Context Recruitment
and strengthen security operations at scale. A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation … for enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security analysts, engineers … contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security More ❯
Kingdom + Travel to Clients on Request The Client Success Team is composed of Client Success Managers (CSMs) who are well versed in cyber security, and whose purpose is to assist customers in getting the most value out of BlueVoyant platform and solutions. BlueVoyant’s renowned cybersecurity SaaS … offerings, benefits, SOPs and deliverables without hesitation Advanced understanding of assigned BV Specific Product sets Qualifications: 5+ years of client services, IT and cyber security background Extensive experience managing large, complex accounts with multiple LOB’s and stakeholders Able to operate independently with minimal support from leadership Able … and top national firms Security +, Network +, CISSP, and other relevant certifications preferred About BlueVoyant At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics, and technology, coupled with deep expertise, works as More ❯
Kingdom + Travel to Clients on Request The Client Success Team is composed of Client Success Managers (CSMs) who are well versed in cyber security, and whose purpose is to assist customers in getting the most value out of BlueVoyant platform and solutions. BlueVoyant’s renowned cybersecurity SaaS … offerings, benefits, SOPs and deliverables without hesitation Advanced understanding of assigned BV Specific Product sets Qualifications: 5+ years of client services, IT and cyber security background Extensive experience managing large, complex accounts with multiple LOB’s and stakeholders Able to operate independently with minimal support from leadership Able … and top national firms Security +, Network +, CISSP, and other relevant certifications preferred About BlueVoyant At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics, and technology, coupled with deep expertise, works as More ❯
Great opportunity to join a ground breaking start up their cutting edge technology empowers organisations worldwide to uncover, investigate and respond to cyberthreats with unparalleled precision and speed. They are on a journey to redefine the future of Digital Forensics and Incident Response. The product Automates Cyber … Looking For: Proven track record of success in enterprise sales, with a minimum of 5 years of experience in enterprise software sales, ideally cyber security. Experience using Command of the Message and MEDDICC is required. Exceptional communication, demonstration, and interpersonal skills, with the ability to engage and influence … a results-oriented mindset and the ability to thrive in a fast-paced, dynamic environment. Solid understanding of enterprise software solutions, technology trends, cyber security and industry best practices. Proficiency in CRM software (e.g. HubSpot) and other sales productivity tools. Willingness to travel as needed to meet with More ❯
newport, midlands, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
Great opportunity to join a ground breaking start up their cutting edge technology empowers organisations worldwide to uncover, investigate and respond to cyberthreats with unparalleled precision and speed. They are on a journey to redefine the future of Digital Forensics and Incident Response. The product Automates Cyber … Looking For: Proven track record of success in enterprise sales, with a minimum of 5 years of experience in enterprise software sales, ideally cyber security. Experience using Command of the Message and MEDDICC is required. Exceptional communication, demonstration, and interpersonal skills, with the ability to engage and influence … a results-oriented mindset and the ability to thrive in a fast-paced, dynamic environment. Solid understanding of enterprise software solutions, technology trends, cyber security and industry best practices. Proficiency in CRM software (e.g. HubSpot) and other sales productivity tools. Willingness to travel as needed to meet with More ❯
in Brecon, South Wales Salary: up to £50,000 Our client is a dynamic and rapidly growing company specialising in delivering high-quality, cyber security training solutions to public sector, government, and mid/large corporate clients. They are passionate about empowering individuals and organisations with the knowledge … and skills to combat evolving cyber threats. With a recent investment into the business, our client is now set for their next phase of growth. As a Bid Manager, you will be responsible for the full-bid management lifecycle, from identifying opportunities to securing contracts, with a particular … our proposals, incorporating lessons learned and best practices. Essential Skills and Experience: Proven track record of success in bid management, preferably within the cyber security industry or a related field. Strong understanding of public sector procurement processes, regulations, and frameworks. Strong project management skills, with the ability to More ❯