such as CrowdStrike Falcon, RoboShadow, Microsoft Defender, ThreatLocker Evaluate and onboard new security technologies; liaise with vendors Lead technical onboarding of cyber tools for both internal and client deployments IncidentResponse & Threat Management: Develop and own incidentresponse playbooks Act as the lead escalation point for live security incidents Analyse alerts, threat intelligence, and forensic data … of: CrowdStrike Falcon - policy config, triage, alerting RoboShadow or similar - vulnerability workflows Microsoft Defender, Conditional Access, MFA, Secure Score Familiarity with frameworks: Cyber Essentials Plus, ISO 27001, PCI DSS Incidentresponse experience with real-world investigations Understanding of identity security, patch management, and user awareness training Excellent written and verbal communication - able to simplify complex concepts for clients More ❯
such as CrowdStrike Falcon, RoboShadow, Microsoft Defender, ThreatLocker Evaluate and onboard new security technologies; liaise with vendors Lead technical onboarding of cyber tools for both internal and client deployments IncidentResponse & Threat Management: Develop and own incidentresponse playbooks Act as the lead escalation point for live security incidents Analyse alerts, threat intelligence, and forensic data … of: CrowdStrike Falcon - policy config, triage, alerting RoboShadow or similar - vulnerability workflows Microsoft Defender, Conditional Access, MFA, Secure Score Familiarity with frameworks: Cyber Essentials Plus, ISO 27001, PCI DSS Incidentresponse experience with real-world investigations Understanding of identity security, patch management, and user awareness training Excellent written and verbal communication - able to simplify complex concepts for clients More ❯
Cheadle, Staffordshire, United Kingdom Hybrid / WFH Options
Pets at Home
to hear from you. This is more than just a security role, it's a chance to: Contribute to the design and implementation of security controls, tools, monitoring, and incidentresponse processes. Work with modern cloud technologies, especially Microsoft Azure, to secure scalable microservices and infrastructure. Help shape and implement security best practices, threat detection, and incidentresponse strategies. What you'll be doing Designing and implementing security controls & tooling across our hybrid-based infrastructure, with a focus on Microsoft Azure. Monitoring and responding to threats using tools like SIEM and XDR, ensuring rapid detection and resolution of security incidents. Collaborating in an Agile environment with multiple teams to embed security best practices throughout the … business. Conducting regular vulnerability assessments, supporting patch management, and improving our overall security posture. Creating and maintaining clear, concise documentation for security processes, configurations, and incidentresponse procedures. Participating in the Information Security on-call rota. What you'll bring: 2+ years of hands-on cybersecurity experience, with a focus on cloud environments such as Microsoft Azure. A More ❯
in hypothesis-driven hunting, adversary TTP analysis, and cross-functional collaboration. They have 3-5+ years of hands-on experience in Threat Hunting, Red Team, Blue Team, or IncidentResponse roles, with a deep understanding of the MITRE ATT&CK framework and a proven ability to detect and investigate advanced threats beyond signature-based solutions. Adept at … passionate about staying ahead of evolving threats. What we are looking for in you Minimum Requirements Minimum 3-5 + years of experience within a Threat Hunter, Red Team, IncidentResponse, or Blue Team role. Solid understanding of the MITRE ATT&CK framework, TTP analysis, and adversary emulation. Deep familiarity with hypothesis-driven threat hunting frameworks and methodologies. More ❯
seasoned SOC professional looking to make a tangible impact. Apply now to join a team focused on protecting enterprise assets against evolving cyber threats. Key Responsibilities: Lead investigations and response efforts for high-severity security incidents. Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite. Develop and fine-tune analytic rules, workbooks, and automation playbooks in Sentinel. … Perform deep-dive analysis of malware, phishing, and lateral movement techniques. Collaborate with engineering teams to optimise Microsoft security tool integrations. Maintain and enhance incidentresponse procedures and documentation. Skills/Must have: Over 5 years of experience in cybersecurity, including a minimum of 2 years in a Level 3 SOC or equivalent role. Expert-level proficiency with … Identity, and Office 365. Strong knowledge of the MITRE ATT&CK framework, threat intelligence, and adversary TTPs. Solid understanding of Windows, Linux, and core network security principles. Skilled in incidentresponse, digital forensics, and proactive threat hunting. Experience working with SOAR platforms and building automated workflows. Benefits: View to Extension Salary: Up to £575 Per Day More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Embarcaderomediagroup
sit at the heart of our engineering operations, bringing together SRE principles and modern platform engineering practices. This includes combining principles of SRE - such as service-level reliability, observability, incidentresponse - with platform engineering practices like GitOps, Infrastructure as Code, DevSecOps automation, and self-service enablement, to help development teams ship faster, safer, and more cost-efficiently. What … you'll be doing: Designing and operating highly reliable, scalable, and secure Azure-based platforms Applying SRE principles like SLOs, observability, and incident management to drive service reliability Building Infrastructure as Code using Terraform (v1.7+) and GitOps workflows Enabling teams through platform tools, reusable Terraform modules, and self-service infrastructure Enhancing CI/CD pipelines (Azure DevOps, YAML-based … services (SQL, Cosmos DB, ADF, Functions, Logic Apps, etc.) Improving monitoring and alerting with Datadog, Grafana, ELK, and proactive failure detection Participating in the on-call rota and leading incidentresponse workflows and blameless postmortems Coaching engineers, upskilling teams, and contributing to a culture of continuous improvement Driving cost awareness through FinOps practices and automated budget controls What More ❯
Stockport, Lancashire, United Kingdom Hybrid / WFH Options
zyncgroup.io
to the setup and ongoing enhancement of the Security Operations Center (SOC). Investigating security incidents and implementing effective countermeasures. Utilizing SOC tools such as SIEM, vulnerability scanners, and incidentresponse solutions. Performing threat hunting by analyzing and assessing security events on central platforms. Documenting incidents thoroughly in ticketing and SIEM systems, and generating detailed reports. Monitoring systems … of offensive security concepts. Experience with programming languages such as Python and SQL. Minimum C1 level in German with good knowledge of English. Desirable skills: Experience working with Sophos. Incidentresponse experience. Experience with malware analysis. Company benefits: Attractive salary. Strong progression plans. Excellent training opportunities and personal development. Opportunity to attain certifications. Work alongside an inclusive team More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
Proactively work with business units and global functions in InfoSec to support internal and external audits and ensure their success, Support other InfoSec teams and local IT teams during incident management and incidentresponse activities, Liaise with Data Protection Officers for the implementation of data protection processes and controls, and during any data privacy issue, Contribute to More ❯
implement remediation plans, drive remediation efforts and identify improvements in the vulnerability management program. Monitor and track the status of identified vulnerabilities and ensure timely resolution. Security Monitoring and IncidentResponse Leverage Microsoft Defender EDR/XDR and other security tools to monitor, analyse, and respond to security threats. Investigate suspicious activity and determine if incidents have occurred. … Contain and mitigate security incidents to prevent further impact. Develop, implement, and optimise security automation processes to improve detection, response, and mitigation efforts Security Compliance & Governance Ensure security configurations align with compliance frameworks such as ISO 27001, Cyber Essentials Plus, and regulatory requirements Skills and experience Essential 3yrs+ with current IT Security Analyst experience. Proven experience with M365 security More ❯
strategy across the business, aligned to wider Group objectives Lead and manage the internal team, and manage relationships with 3rd party vendors including the SOC providers Build and embed incidentresponse plans, playbooks, and operational standards for the function Drive maturity across SIEM, SOAR and security tooling, ensuring alignment with the latest threat landscape Provide cyber security leadership … across new and existing technology programmes Lead response to major incidents, and provide guidance to executive leadership Define KPIs, SLAs and manage the security operations budget Stay current on global cyber threats, compliance requirements (including PCI-DSS), and evolving tech trends Key Responsibilities of the Senior Security Operations Manager: Extensive experience in cyber security leadership roles (10–15 years More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
VIQU Limited
strategy across the business, aligned to wider Group objectives Lead and manage the internal team, and manage relationships with 3rd party vendors including the SOC providers Build and embed incidentresponse plans, playbooks, and operational standards for the function Drive maturity across SIEM, SOAR and security tooling, ensuring alignment with the latest threat landscape Provide cyber security leadership … across new and existing technology programmes Lead response to major incidents, and provide guidance to executive leadership Define KPIs, SLAs and manage the security operations budget Stay current on global cyber threats, compliance requirements (including PCI-DSS), and evolving tech trends Key Responsibilities of the Senior Security Operations Manager: Extensive experience in cyber security leadership roles (10–15 years More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Gordons
our Information Security team and exposure to our wider IT teams. You will build knowledge in the following areas: Risk Management, Policy and Compliance, Security Certifications,Supplier Due Diligence, IncidentResponse and Awareness, and Security Awareness, as well as working on ongoing projects. WHAT IS THE SCOPE OF THE ROLE? The following list is not exhaustive but gives More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Tussell Limited
our Information Security team and exposure to our wider IT teams. You will build knowledge in the following areas: Risk Management, Policy and Compliance, Security Certifications, Supplier Due Diligence, IncidentResponse and Awareness, and Security Awareness, as well as working on ongoing projects. What is the scope of the role? The following list is not exhaustive but gives More ❯
Stockport, Greater Manchester, North West, United Kingdom
Nexperia
staff or contractors on-site, including a dedicated Factory Systems Support team (CIM), Operational Technology Engineers, Data Engineers, and Web Developer Monitoring and reporting on system performance, availability, and incidentresponse metrics Providing leadership in incident management and root cause analysis for system-related issues, while also ensuring effective change control procedures for all changes introduced to More ❯
staff or contractors on-site, including a dedicated Factory Systems Support team (CIM), Operational Technology Engineers, Data Engineers, and Web Developer Monitoring and reporting on system performance, availability, and incidentresponse metrics Providing leadership in incident management and root cause analysis for system-related issues, while also ensuring effective change control procedures for all changes introduced to More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Softcat plc
an enthusiastic, passionate,and collaborative team? Join our Risk & Assurance Team As Softcat's business continues to grow and evolve, so have the risks and the regulatory landscape. In response, Softcat Plc has recognised the need to further strengthen its Risk Management and Internal Controls and has created a second line Risk and Assurance function to strengthen the overall … current, comprehensive, and aligned with industry standards and audit expectations. Reviewing effectiveness of first line functions in testing and validation of key IT controls (e.g., access management, change control, incidentresponse, vulnerability management), ensuring effectiveness and consistency. Leading in the review and enhancement of IT and infosec risk and control frameworks (e.g., ISO 27001, ITIL, ISO2 2301, NIST More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
N Brown Group
do as a Cyber Security Engineer at N Brown? To identify opportunities to improve efficiency in processes through automation Onboarding and integrating AWS native tools to enable detection and response to incidents, vulnerabilities, misconfigurations, etc in our AWS environments. Developing self-service tools for N Brown's engineering teams To work with other operational departments to ensure that our … performing optimally. Implementation of new security tooling To maintain security platforms and ensure they are operating effectively. Support the wider Security team improve their efficiency through automation, and support incidentresponse efforts when required. What skills and experience will you have as Cyber Security Engineer? Knowledge of monitoring cloud environments using cloud native tooling. Experience in software delivery … within PCI DSS, or other compliance frameworks. Software and Technology Coding languages (Python, Teraform) Build pipeline tools (Gitlab, Jenkins) IaaS (AWS, Azure, GCP) & SIEM (ideally Splunk) Endpoint Detection and Response (EDR) tools such as MS Defender APT. Network and Host Intrusion Detection/Prevention tools Web Application Firewalls (ideally Akamai) Vulnerability scanning tools (ideally Rapid7) What’s in it More ❯
Principles & Technologies. Experience of Security Related Technical Investigations Hands-On Technical Experience of Conducting Vulnerability Scanning & Evaluating Results Commercial Awareness & (Ideally) Experience of PCI DSS (Current Version) Experience with IncidentResponse Procedures & Investigations Strong Verbal & Written Communication Skills High Attention to Detail Strong Team Player Searches: SOC Analyst/Vulnerability Management/VM Analyst/Information Security Analyst More ❯
webhooks and Docker). Act as DB SME for the trust organization, interact with internal Roku teams to advise them on security best practices, DB architectures, and assist in incidentresponse and other security investigations. Developing (or extending OSS) security automation tooling. This can range from detection tooling to security process automation, or a fuzzing infrastructure to find More ❯
backed by thorough testing (unit, integration, performance) Engage in CI/CD practices to ensure seamless deployment and operation of services Contribute to operational excellence through monitoring, alerting, and incidentresponse Participate in a 24/7 on-call rotation for mission-critical services used by millions of users Foster a culture of engineering excellence through code reviews More ❯
and introduction of new products and services. Collaborate with Care Systems Support and Service Desk for seamless end-to-end service. Act as a conduit and escalation point for incident and security management. Manage the Configuration Management Database (CMDB) and ensure application/infrastructure interdependencies are understood. Perform daily tasks to keep applications running effectively. Manage obsolescence and maintain … relevant registers. Ensure security and compliance of technology products with Enterprise Policy. Lead incidentresponse, communicate with stakeholders, and conduct root cause analysis. Identify and implement service automation options. Conduct regular business continuity tests. Drive continuous improvement at product and service levels. Ensure thorough testing and quality standards for product changes and updates. Manage release processes and develop … adaptability to technology trends. Proficiency in systems administration, troubleshooting, and IT infrastructure support. Experience in change management and maintaining a change log. Familiarity with monitoring tools, security protocols, and incident response. Strong communication skills and ability to work with cross-functional teams. Knowledge of continuous improvement methods. Results-oriented with a focus on adding value. Clear decision-making approach More ❯
necessary patches or configuration changes. - Develop and maintain a comprehensive vulnerability management program, including vulnerability tracking, risk assessment, and remediation planning. Stakeholder Collaboration: - Act as a stakeholder for the response team, providing expert guidance on security-related alerts, incidents, and potential improvements. - Collaborate with cross-functional teams, including network engineers, system administrators, and application developers, to implement security network … solutions and improve overall network security posture. - Participate in network security incidentresponse activities by providing technical expertise and assisting in investigations when necessary. More ❯
of security measures to protect company data and systems. Conduct vulnerability assessments to identify security weaknesses. Help in the development and enforcement of security policies and procedures. Participate in incidentresponse activities and investigations. Collaborate with IT and other departments to ensure security best practices are followed. Stay updated on the latest cyber security trends, threats, and technologies. More ❯
SK15, Stalybridge, Borough of Tameside, Greater Manchester, United Kingdom
Hyde Group Holdings
of security measures to protect company data and systems. Conduct vulnerability assessments to identify security weaknesses. Help in the development and enforcement of security policies and procedures. Participate in incidentresponse activities and investigations. Collaborate with IT and other departments to ensure security best practices are followed. Stay updated on the latest cyber security trends, threats, and technologies. More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Adria Solutions
automation and RPA strategies aligned with value streams and business goals Collaborate with cross-functional teams, including change, engineering, and business leaders Ensure strong platform security, monitoring, compliance, and incidentresponse Key Skills & Experience: Proven expertise in Azure architecture, including AKS, Cosmos DB, SQL Database, and Storage Experience with IaC tools (e.g. Terraform, ARM templates) Strong knowledge of More ❯