Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
software delivery lifecycle. A key part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure Security: Architect and secure Azure … and optimize Azure DevOps pipelines with security embedded at every stage. Cloud Security Implementation: Leverage Azure Security Centre, Microsoft Defender for Cloud, and Microsoft Sentinel for advanced security monitoring. Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability … cyber threats. Incident Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured action plans for proactive risk mitigation. More ❯
team also works closely with our majority shareholders, and partners, such as retailers, ground handlers, as well as suppliers, to ensure a joined-up approach to information and cyber security. We are seeking a highly skilled and motivated IT Cyber Security Engineer, with a passion for protecting digital assets against cyberthreats, to join … which is essential for effectively securing our infrastructure, systems, and networks. Expertise in information security, risk management and compliance is essential, as is a commitment to defending against cyberthreats and integrating security across all layers of our IT environment to protect organisational data and technology. This role focuses on detecting, investigating, and responding to cybersecurity threats and … logs from various systems (including SIEM) and network devices to identify potential threats and vulnerabilities. Knowledge, skills & experience required: Essential * Bachelor's degree in computer science, Information Technology, Cyber Security, or a related field. * 5+ years of experience in cybersecurity, with a strong understanding of network protocols and security tools. * A well-organised and structured approach to work More ❯
Loughton, Essex, England, United Kingdom Hybrid / WFH Options
Profile 29
software delivery lifecycle. A key part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure Security: Architect and secure Azure … and optimize Azure DevOps pipelines with security embedded at every stage. Cloud Security Implementation: Leverage Azure Security Centre, Microsoft Defender for Cloud, and Microsoft Sentinel for advanced security monitoring. Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability … cyber threats. Incident Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured action plans for proactive risk mitigation. More ❯
Our client, the UK's trusted Ministry of Defence partner, is seeking an experienced SOC Threat Detection Analyst to join the cyber security operations centre (SOC) within Information Management (IM). The successful candidate will support Senior SOC analysts in addressing the challenges of countering cyberthreats, driving a proactive ethos in a dynamic environment … and providing robust threat detection and analysis within the 24x7 SOC. Key Responsibilities: To support the SOC Manager in assisting Information Management UK in meeting the challenges and demands of countering cyberthreats, the role involves supporting the operational functions of the UK SOC. This includes working with other UK SOC members, the UK InfoSec Team, and … alerting, and investigation activities using a variety of security platforms, including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture, Anti-Malicious Code, and Threat Detection technologies across the UK Network Perimeter. The SOC Analyst reports to the SOC Manager and conducts a range of analyses, assisting the incident response team with investigations that More ❯
Employment Type: Contract
Rate: £45.00 - £85.00/hour In IR35 (PAYE & Umbrella) available
UMB Job Title: SOC Analyst Overview of department: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive ethos … in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. Responsibilities: To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members … and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. The SOC Analyst reports to the SOC Manager. The SOC Analyst conducts a range More ❯
World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit 10x SOC Threat Detection Analyst subcontractors on an initial 12 month contract. This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line. This role would suit someone from a Cyber Security Analyst, SOC Analyst or … Threat Detection Analyst background. Hourly Rate: £45 per hour. Overtime rate of time and a quarter. Contract Duration: 6 Months Shift pattern: 28 day Cycle Sat to Tue - Earlies (Apply online only) Wed to Sun - Off Mon to Fri - Lates (Apply online only) Sat to Tue Off Wed to Sun - Nights (Apply online only) (The type of shift rotates … days worked per 28 days, 3.5 days worked per week, 3.5 x 8 = 28 hours per week Initially may not be expected to do nights until team grows. SOC Threat Detection Analyst Job Description: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting More ❯
SOC Threat Detection Analysts required 24 hour shift coverage on site in Stevenage. Candidates will need to be cleared to SC UK Eyes Only prior to starting this role AND be prepared to undergo DV clearance. Skillset/experience required: * A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network …/S, LDAP/S. * Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. * Hands on experience with IDS/IPS technologies and threat hunting activities. * Strong analytical experience and mind-set. * Experience within Defensive Cyber-attack methodologies and frameworks. * Understanding of Malware capabilities, attack vectors, propagation and impact. * Good communication … liaising with the business and suppliers. Overview of department: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive More ❯
Our client, the UK's trusted Ministry of Defence partner, is seeking an experienced SOC Threat Detection Analyst - (Mid-level) to join the cyber security operations centre (SOC) within Information Management (IM). The successful candidate will support Senior SOC analysts in addressing the challenges of countering cyberthreats, driving a proactive ethos in a … dynamic environment, and providing robust threat detection and analysis within the 24x7 SOC. Key Responsibilities: To support the SOC Manager in assisting Information Management UK in meeting the challenges and demands of countering cyberthreats, the role involves supporting the operational functions of the UK SOC. This includes working with other UK SOC members, the UK InfoSec … alerting, and investigation activities using a variety of security platforms, including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture, Anti-Malicious Code, and Threat Detection technologies across the UK Network Perimeter. The SOC Analyst reports to the SOC Manager and conducts a range of analyses, assisting the incident response team with investigations that More ❯
Employment Type: Contract
Rate: £45.00 - £85.00/hour In IR35 (PAYE & Umbrella) available
next week! Please call or email for a slot An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive … ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. The Role: So, what will you be doing as a SOC Analyst To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational … and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. Effective Tier 1 to 2 alert triage of security events Monitoring of CyberMore ❯
next week! Please call or email for a slot An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive … ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. The Role: So, what will you be doing as a SOC Analyst To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational … and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. Effective Tier 1 to 2 alert triage of security events Monitoring of CyberMore ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
AVEVA Denmark
and optimising security policies, standards, and control-sets to enable effective adaption and adoption across organisational departments and teams. Risk Management and Assurance. Extensive experience of understanding of using threat, security control performance and business operations to independently assess residual security risk position to the end customer based on business processes and practices including product development lifecycle and supply … AVEVA's digital assets and keeping the company's data and IP secure. We're also playing a critical role in AVEVA's move to the cloud. As cyberthreats grow and more and more data moves into the cloud, the importance of our role is only going to grow. If you're a collaborative problem solver that More ❯
team in their Ipswich offices. You will be member of the IT Operations team, supporting the delivery of vital projects and the production and presentation of networking and cyber related materials. Please be advised this position is initially a 12-month contract. Key Responsibilities: Work with stakeholders to understand their security requirements and enhance the overall risk management. … experience with Data backups/recovery and cloud solutions. An understanding of Cyberthreats and tracking of Cyber risk. Knowledge of external cyberthreat frameworks such as Mitre/NIST. More ❯
Berkhamsted, Hertfordshire, United Kingdom Hybrid / WFH Options
Digital Preservation Coalition
Vacancy for Cyber Security Engineer at the British Film Institute 21 August 2024 Location: National Archive, Berkhamsted/Hybrid. This role requires 3 days per week in Berkhamsted, with occasional travel to other BFI sites. Type: Full-Time We are seeking a Cyber Security Engineer to join the BFI's Data & Digital Preservation team. The successful … candidate will perform proactive and reactive cybersecurity tasks to prevent, detect, and remediate cyberthreats within the BFI National Archive's operational environment. They will also implement best practices for vulnerability detection and management across the Archive's network, hardware, software, and operational procedures to mitigate cyber risks. Key responsibilities include: Research, recommend, and implement effective More ❯