keep our own thinking in tune with the world in which we operate. Office: London (hybrid - 2 days in the office per week) Duration: 12 month FTC The Information Security Team is a central support unit responsible for providing a complete security service to the Walkers. The Security Engineer will report to Information Security Operations Manager … and work with the Information Security Operations team for implementing and maintaining our security controls and tools. Work collaboratively with other departments to improve our security posture. They will be specifically responsible for completing the implementation of a number of strategic based security solutions for new security tooling or existing. The engineer will also participate … in security related service management processes (incident, change and problem management) and will participate in the planning, design, enforcement and review of security controls which protect the integrity of Walkers IT. “The ideal candidate will have worked within a Legal, Financial Services organisation or a similarly regulated company.” There will be an element of change, implementation or scheduled More ❯
Role Responsibilities Key responsibilities for this role may include: Incident Detection & Response: Lead the triage, investigation, and classification of security events using SIEM and other tooling Take ownership of end-to-end handling of medium to high-severity incidents, coordinating containment and remediation efforts Maintain detailed incident records, including timelines, impact assessments, root cause analysis, and mitigation steps Act … indicators of compromise and attribution patterns Lead threat intelligence sharing within the organisation and with external partners Mentor Tier 1 staff in interpreting threat data and logs during investigations SecurityMonitoring and Detection Engineering: Conduct continuous securitymonitoring of network traffic, endpoints, and critical systems Proactively tune and improve SIEM rules, alerts, and correlation logic to … sources into SIEM and help define parsing, enrichment, and correlation logic Lead investigations into recurring false positives or noisy alerts and propose sustainable resolutions Support deployment and configuration of security tooling Compliance, Reporting and Documentation: Lead security audits and assessments, providing evidence of SOC activities and controls Maintain accurate records of all events handled, including triage notes and More ❯
London, England, United Kingdom Hybrid / WFH Options
Thomas Miller
Join to apply for the Cyber Security Analyst role at Thomas Miller Join to apply for the Cyber Security Analyst role at Thomas Miller Direct message the job poster from Thomas Miller Working Arrangements: Monday to Friday 9.30am-5.30pm Hybrid work pattern Overall Objective of Role: The Cyber Security Operations Team is a critical component of the … Thomas Miller security infrastructure, responsible for monitoring, detecting, and responding to security threats in real time. The team partner with a 3rd party to ensure constant vigilance over the security landscape. The Cyber Security Analyst detects, analyses, investigates and responds to alerts and threats within the environment. Specific Responsibilities: Monitor security alerts, events, and … potential threats using SOC tools. Respond to and investigate cyber security incidents, including malware outbreaks, phishing attempts and data breaches. Perform incident response, including triaging, investigation, and resolution of security incidents. Analyse network traffic, logs, and alerts to detect malicious activity. Conduct root-cause analysis on security breaches and vulnerabilities. Prepare and maintain detailed incident reports and More ❯
Role Responsibilities Key responsibilities for this role may include: Incident Detection & Response Lead the triage, investigation, and classification of security events using SIEM and other tooling. Take ownership of end-to-end handling of medium to high-severity incidents, coordinating containment and remediation efforts. Maintain detailed incident records, including timelines, impact assessments, root cause analysis, and mitigation steps. Act … indicators of compromise and attribution patterns. Lead threat intelligence sharing within the organization and with external partners. Mentor Tier 1 staff in interpreting threat data and logs during investigations. SecurityMonitoring and Detection Engineering Conduct continuous securitymonitoring of network traffic, endpoints, and critical systems. Proactively tune and improve SIEM rules, alerts, and correlation logic to … sources into SIEM and help define parsing, enrichment, and correlation logic. Lead investigations into recurring false positives or noisy alerts and propose sustainable resolutions. Support deployment and configuration of security tools. Compliance, Reporting, and Documentation Lead security audits and assessments, providing evidence of SOC activities and controls. Maintain accurate records of all events handled, including triage notes and More ❯
model across the firm and throughout all levels of the client organization, generating results that allow our clients to thrive. What You'll Do Position Overview As a Cyber Security Incident Response Manager at BCG, you will be a key member of our Cyber Security Incident Response Team (CSIRT), responsible for identifying, analyzing, and mitigating cyber threats. This … role requires a proactive approach to threat hunting, cyber threat intelligence, and incident response, ensuring the protection of BCG’s global network. You will work closely with the Security Operations Center (SOC), Security Information and Event Management (SIEM), and Managed Security Service Provider (MSSP) to enhance detection and response capabilities. Your expertise will contribute to strengthening our … security posture and minimizing business risks associated with cyber threats. What Will You Do? Act as a Tier 3 Incident Responder, supporting complex investigations into cyber security incidents. Conduct proactive threat hunting to detect and neutralize emerging threats. Monitor and analyze logs via SIEM, EDR, and network traffic analysis tools for potential attack indicators. Investigate security incidents More ❯
Incident Response Lead Analyst - Cyber Security Join to apply for the Incident Response Lead Analyst - Cyber Security role at Boston Consulting Group (BCG) Incident Response Lead Analyst - Cyber Security 1 day ago Be among the first 25 applicants Join to apply for the Incident Response Lead Analyst - Cyber Security role at Boston Consulting Group (BCG) Get … model across the firm and throughout all levels of the client organization, generating results that allow our clients to thrive. What You'll Do Position Overview As a Cyber Security Incident Response Manager at BCG, you will be a key member of our Cyber Security Incident Response Team (CSIRT), responsible for identifying, analyzing, and mitigating cyber threats. This … role requires a proactive approach to threat hunting, cyber threat intelligence, and incident response, ensuring the protection of BCG’s global network. You will work closely with the Security Operations Center (SOC), Security Information and Event Management (SIEM), and Managed Security Service Provider (MSSP) to enhance detection and response capabilities. Your expertise will contribute to strengthening our More ❯
provide professional management services to the firm, including the central operations of finance, information technology, marketing, risk, legal, operations and human resources. What You'll Do As a Cyber Security Incident Response Manager at BCG, you will be a key member of our Cyber Security Incident Response Team (CSIRT), responsible for identifying, analyzing, and mitigating cyber threats. This … role requires a proactive approach to threat hunting, cyber threat intelligence, and incident response, ensuring the protection of BCG's global network. You will work closely with the Security Operations Center (SOC), Security Information and Event Management (SIEM), and Managed Security Service Provider (MSSP) to enhance detection and response capabilities. Your expertise will contribute to strengthening our … security posture and minimizing business risks associated with cyber threats. Act as a Tier 3 Incident Responder, supporting complex investigations into cyber security incidents. Conduct proactive threat hunting to detect and neutralize emerging threats. Monitor and analyze logs via SIEM, EDR, and network traffic analysis tools for potential attack indicators. Investigate security incidents, including malware infections, phishing More ❯
The team you'll be working with: P3 Senior SOC Analyst (L3) We are currently recruiting a Senior SOC Analyst L3 Managed Detection and Responseto join our growing Security Operations Centre business. ThisrolewillbebasedonsiteinBirmingham,youwillneedtobewillingtoworkinshiftpatters,probably4dayson,4daysoff,asthisisa24/7securityoperationscentre. About Us NTT DATA is one of the world's largest Global Security services providers with over 7500 Security SMEs and Integration partner to many of the worlds most recognised Security Technology providers. We strive to hire exceptional, innovative, and passionate individuals who want to grow with us. In a constantly changing world, we work together with our people, clients and communities to enable them to fulfil their potential to do great things. We believe that by … be doing; The primary function of the SeniorSOC Analyst L3 is to manage any incidents escalated by the SOC Analyst (L1 & L2) and undertake the detailed investigation of the Security Event. The Senior SOC Analyst shall be able to look at all the evidence available and support the client on the appropraite action to contain and remediate any securityMore ❯
The team you'll be working with: P3 Senior SOC Analyst (L3) We are currently recruiting a Senior SOC Analyst L3 Managed Detection and Responseto join our growing Security Operations Centre business. ThisrolewillbebasedonsiteinBirmingham,youwillneedtobewillingtoworkinshiftpatters,probably4dayson,4daysoff,asthisisa24/7securityoperationscentre. About Us NTT DATA is one of the world’s largest Global Security services providers with over 7500 Security SMEs and Integration partner to many of the worlds most recognised Security Technology providers. We strive to hire exceptional, innovative, and passionate individuals who want to grow with us. In a constantly changing world, we work together with our people, clients and communities to enable them to fulfil their potential to do great things. We believe that by … be doing; The primary function of the SeniorSOC Analyst L3 is to manage any incidents escalated by the SOC Analyst (L1 & L2) and undertake the detailed investigation of the Security Event. The Senior SOC Analyst shall be able to look at all the evidence available and support the client on the appropraite action to contain and remediate any securityMore ❯
inclusive jobs board. Description Please note that this role is London based, working Mon-Fri 9am to 6pm with 3 days in the office and 2 from home. Director, Security Operations Center About Alvarez & Marsal Alvarez & Marsal (A&M) is a global consulting firm with over 10,000 entrepreneurial, action and results-oriented professionals in over 40 countries. We … M's core values of Integrity, Quality, Objectivity, Fun, Personal Reward, and Inclusive Diversity-are why our people love working at A&M. The Team Alvarez and Marsal Global Security Office is committed to delivering the highest standards of security and compliance. We are seeking a highly skilled and motivated Director to lead A&M's Security … based in either our London or Tampa office. How you will contribute The Director of SOC will play a critical role in, overseeing the 24/7/365 monitoring, detection, and response to cybersecurity threats and incidents, ensuring operational excellence, threat intelligence integration, and alignment with the organization's security objectives. The ideal candidate is a proven More ❯
Permanent Job Description Cyber Security Analyst In this role as a Cyber Security Analyst, you'll be instrumental in safeguarding digital assets, ensuring data confidentiality, and maintaining system integrity. You'll work within a team to monitor, analyze, and respond to security incidents while implementing critical security measures to defend against cyber threats. 3 days a …/7 Virtual GP access for you and your household Onsite perks including free parking, tea and coffee stations, and a subsidized café with free breakfast toast Responsibilities SecurityMonitoring & Incident Response: Use SIEM tools like Exabeam, LogRhythm, Splunk, or Arcsight to monitor security events, detect threats, and analyze data to address incidents swiftly. Vulnerability Management Tools … Conduct regular vulnerability assessments, prioritize and remediate issues, and stay updated on emerging threats. Policy & Compliance Support: Help develop and enforce security policies and procedures to maintain compliance. Security Awareness Training: Assist with employee training on security practices and run phishing tests to build a security-conscious workplace culture. Ideal Experience Degree in computer science, information More ❯
individual diversity brings to the collective. Bring your individual orientation, cultural heritage and distinctive thinking and experience - we want to hear from you! We are looking for an experienced Security Engineer to join the Vix team. This role is on-site in Manchester, working within the greater Vix Security team. The role will see you ensuring Vix technical … teams meet relevant security standards, pass security audits, and protect company and customer data. You'll be a first point of contact for responding to security incidents. We regret that this position is only available for UK citizens/Residents with indefinite leave to remain in the UK, with current full time work rights for the United … Kingdom, currently residing in the UK. The position is located in Manchester. Requirements What you'll be doing: Assess and evaluate the effectiveness of existing security controls Design and implement security solutions to mitigate identified risks Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerability management etc More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
month contract in a Work from Office (WFO) role. This role will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code … IaC) using Terraform. Their ideal candidate will have a strong background in cloud security best practices, automation, and a proactive approach to integrating security across their software delivery lifecycle. A key part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. … Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure Security: Architect and secure Azure-based infrastructure using Terraform, ensuring adherence to security best practices by developing, maintaining, and optimizing Terraform code. DevOps Pipeline Development and Maintenance: Design, develop, and optimize Azure DevOps pipelines More ❯
Social network you want to login/join with: Division Description: The Cyber Security operation's function is responsible for the day-to-day provision of enterprise cyber security services to support the business. These services include all aspects of Cyber Risk Management, implementation and maintenance of technical security controls, vulnerability and patch management and operate effective … it to confidently go about its day-to-day activity. Position Description: The purpose of this role is to design new, mature existing and support the operation of cyber security controls and processes within Insight Investment in line with cyber security risks and the cyber security policies and standards. This includes Identity & Access Management (IAM), PAM securitymonitoring, cloud security, scheduled security checks, securitymonitoring working with the MSSP (SIEM and other), security incident management, pen-testing. vulnerability management and KRI/KPI reporting. Role Responsibilities • Developing a familiarity with new tools and best practices for security operations • Defining, implementing and maintaining operational security processes • Reviewing and maturing More ❯
individual diversity brings to the collective. Bring your individual orientation, cultural heritage and distinctive thinking and experience - we want to hear from you! We are looking for an experienced Security Engineer to join the Vix team. This role is on-site in Manchester, working within the greater Vix Security team. The role will see you ensuring Vix technical … teams meet relevant security standards, pass security audits, and protect company and customer data. You'll be a first point of contact for responding to security incidents. We regret that this position is only available for UK citizens/Residents with indefinite leave to remain in the UK, with current full time work rights for the United … Kingdom, currently residing in the UK. The position is located in Manchester. Requirements What you'll be doing: Assess and evaluate the effectiveness of existing security controls. Design and implement security solutions to mitigate identified risks. Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerability management etc. More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
RealVNC
the success of the business, committed to delivering high quality results, collaboration and innovation to help accelerate company growth. Position: We are seeking a highly skilled and motivated Cyber Security Engineer to join our Cyber Security team. This role is crucial in maintaining the security of our systems, networks, and data. The successful candidate will implement security measures, monitor for vulnerabilities, respond to incidents, and ensure compliance with RealVNC policies and industry standards and regulations. Key responsibilities include; SecurityMonitoring and Incident Response: Serve as a point of contact between the internal security team and our external SOC provider, to continuously monitor systems for security breaches and anomalies. Ensure that alerts, escalations … queries, analytics rules, threat hunting scripts, and automation logic. Work with internal teams to mitigate threats and implement recommendations – for example MFA enforcement, Conditional Access policies, and identity protection. Security Architecture and Implementation: Evaluate and recommend security solutions to enhance internal security posture. Utilising third-party security tools to scan the environments for vulnerabilities, mitigate findings More ❯
you'll be working with: SOC Analyst (L2) We are currently recruiting for a Senior Associate level Managed Detection and Response SOC Analyst Level 2 to join our growing Security Operations Centre business. This role will be based on-site in Birmingham. We need candidates who are able to work in a job that involves 24/7 operations … likely in shift patterns of 4 days on, 4 days off. About Us NTT DATA is one of the world's largest Global Security services providers with over 7,500 Security SMEs and an integration partner to many of the world's most recognized Security Technology providers. We strive to hire exceptional, innovative, and passionate individuals who … doing: What you will be doing; The primary function of the SOC Analyst (L2) is to analyze incidents escalated by the SOC Analyst (L1) and undertake detailed investigations of Security Events. The Security Analyst (L2) will determine whether a security event qualifies as an incident and coordinate with the customer's IT and Security teams for More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
As a Cyber Defence Analyst, you will join the Cyber Fusion Center, performing in-depth analysis, assessment, and response to security threats by following documented policies to meet Service Level Goals. The team provides global 24x7 security operations and monitoring for cybersecurity events affecting Experian. You will be a part of the first line of defence in … Experian's broader incident response and incident management departments, responsible for receiving and prioritizing cybersecurity alerts, including being the dedicated contact for potential security incidents reported by users (e.g., Experian employees). Depending on the results of assessment, this team is then responsible for investigating, containing, eradicating, and recovering from events falling in its scope or escalating higher-risk … events to dedicated incident response and management teams in the CFC. This role is critical in ensuring the handling of potential threats and plays a part in improving security operations. This is a home based role reporting to the Director of Security Operations for SecOps & Threat Detection. Please note that in this role, you will have an 8x5 More ❯
Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role We are … looking for a Cloud Security Engineer to join our growing team. This role involves designing, implementing, and managing security solutions across AWS, Azure, and Google Cloud . The ideal candidate will have a deep understanding of cloud security architectures, automation, and compliance frameworks . Key Responsibilities Cloud Security Architecture & Implementation Design and implement cloud security architectures across AWS, Azure, or Google Cloud. Develop and enforce cloud security controls , including IAM policies, encryption, and network security. Threat Monitoring & Incident Response Monitor cloud environments for security threats, vulnerabilities, and misconfigurations . Lead incident response efforts related to cloud security breaches and misconfigurations. Implement SIEM and securitymonitoring tools for real More ❯
Cloud Security Architect – Financial Services Location: UK-Remote Certification: Google Cloud Professional Architect (Mandatory) and Google Cloud Professional Security Architect. Key Responsibilities Architect secure cloud environments for financial services clients leveraging GCP security services and best practices. Design and implement Zero Trust Architecture, identity and access management strategies, and secure networking models. Advise on data protection, encryption … strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security assessments and threat modeling for cloud-native applications and hybrid environments. Collaborate with enterprise architects, risk officers, and compliance teams to ensure governance and audit readiness. Lead security architecture workshops and technical discussions with CISO-level stakeholders. Develop reusable blueprints and reference architectures for regulated financial … environments. Required Qualifications Bachelor's or Master’s degree in Computer Science, Information Security, or a related technical field, or equivalent practical experience. 10+ years of experience in cybersecurity, with at least 3 years focused on cloud security architecture. 5+ years of experience in cloud security engineering, with a strong focus on Google Cloud Platform (GCP). More ❯
Cloud Security Architect – Financial Services Location: UK-Remote Certification: Google Cloud Professional Architect (Mandatory) and Google Cloud Professional Security Architect. Key Responsibilities Architect secure cloud environments for financial services clients leveraging GCP security services and best practices. Design and implement Zero Trust Architecture, identity and access management strategies, and secure networking models. Advise on data protection, encryption … strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security assessments and threat modeling for cloud-native applications and hybrid environments. Collaborate with enterprise architects, risk officers, and compliance teams to ensure governance and audit readiness. Lead security architecture workshops and technical discussions with CISO-level stakeholders. Develop reusable blueprints and reference architectures for regulated financial … environments. Required Qualifications Bachelor's or Master’s degree in Computer Science, Information Security, or a related technical field, or equivalent practical experience. 10+ years of experience in cybersecurity, with at least 3 years focused on cloud security architecture. 5+ years of experience in cloud security engineering, with a strong focus on Google Cloud Platform (GCP). More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
MAF Australia
a lifeline. Are you a skilled cybersecurity professional with a passion for aviation or mission-driven charity work? In this role, you'll be responsible for implementing and managing security infrastructure, responding to threats, and ensuring compliance across systems. You'll work with various cyber security solutions while driving security best practices and incident response. If you … Based Role - Ashford, (Kent) UK or Cairns, Australia. UK - £43,800 per annum (dependent on experience) Australia - $85,000 AUD per annum (dependent on experience) Responsibilities As a MAF Security Operations Specialist you will play a critical role in protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint … vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security principles. Your expertise in network security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response, governance, and securityMore ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
UNAVAILABLE
a lifeline. Are you a skilled cybersecurity professional with a passion for aviation or mission-driven charity work? In this role, you'll be responsible for implementing and managing security infrastructure, responding to threats, and ensuring compliance across systems. You'll work with various cyber security solutions while driving security best practices and incident response. If you … right to work in the UK or Australia. Acceptance of and adherence to MAF's purpose, vision and values is an essential condition of employment. Responsibilities As a MAF Security Operations Specialist you will play a critical role in protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint … vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security principles. Your expertise in network security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response, governance, and securityMore ❯
Get AI-powered advice on this job and more exclusive features. Direct message the job poster from iXceed Solutions Talent Acquisition | Account Management | Client Partner Cloud Security Architect – Financial Services Certification: Google Cloud Professional Architect (Mandatory) and Google Cloud Professional Security Architect. Key Responsibilities Architect secure cloud environments for financial services clients leveraging GCP security services and … implement Zero Trust Architecture, identity and access management strategies, and secure networking models. Advise on data protection, encryption strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security assessments and threat modeling for cloud-native applications and hybrid environments. Collaborate with enterprise architects, risk officers, and compliance teams to ensure governance and audit readiness. Lead security … and technical discussions with CISO-level stakeholders. Develop reusable blueprints and reference architectures for regulated financial environments. Required Qualifications Bachelor's or Master’s degree in Computer Science, Information Security, or a related technical field, or equivalent practical experience. 10+ years of experience in cybersecurity, with at least 3 years focused on cloud security architecture. 5+ years of More ❯
and cross-cultural immersion. Our side-by-side financial and legal services are similarly ripe for interdisciplinary learning and growth. The Maples Group looks to add a Leeds based Security Engineer to our team and invites eager and qualified candidates to apply. We are committed to diversity, inclusion, and equality of opportunity as we attract, retain, and develop world … to each interaction and to all aspects of their work. About the Role This role is responsible for deploying, maintaining, supporting and improving the tools and processes for Information Security at Maples. Primary responsibilities include: Implementing and maintaining network, intrusion detection and prevention systems as well as other security tools in a hybrid environment (both on-prem and … threats in cybersecurity to guide and advise the organization regarding the protection of systems Monitor and translate threat intelligence feeds into actionable detection and response actions Monitor and analyze security logs for attacker tactics, techniques and procedures (TTPs), filtering through suspicious activities to determine their root cause and perform remediation activities as appropriate Creating, testing and validating Maples securityMore ❯