Security Monitoring Jobs in Liverpool

4 of 4 Security Monitoring Jobs in Liverpool

Head of Cyber Security (Hiring Immediately)

Liverpool, UK
Nigel Frank
I'm looking for a Head of Cyber Security to join a dynamic PE-backed business, and lead enterprise efforts across IT Security, Cyber Security and Information Security. Reporting directly into their CIO, you will lead a team of 4 and will drive the overall security strategy of the business forward - ensuring that security controls, policies and technologies effectively protect the organisation's assets, infrastructure and data. They are using the MS Security Stack including Defender, Sentinel and Entra ID, and are very ahead-of-the-curve in their respective sector. The ideal … loves being technically in the detail. This role will involve collaborating with the Senior Leadership Team, and providing expert guidance on threat mitigation and security best practices, and ultimately driving the organisation's security programme forward. Whilst they are based in London, they are open to considering candidates More ❯
Employment Type: Full-time
Posted:

SOC Engineer

liverpool, north west england, united kingdom
Hayward Hawk
We're seeking a motivated and detail-oriented SOC Engineer to join our client's cybersecurity this role, youll play a key part in monitoring and analyzing security events, responding to incidents, and contributing to threat detection and intelligence efforts. Youll help safeguard the organizations assets by leveraging … various security tools and techniques, while also supporting the continuous improvement of our detection and response capabilities. Key Responsibilities: Monitor and analyze security alerts in real-time using SIEM and other detection tools Investigate incidents to determine cause, impact, and escalation path Assist in the containment, eradication, and … recovery from security breaches Conduct forensic analysis and maintain incident response reports and documentation Maintain and update incident response playbooks and workflows Research potential threats, vulnerabilities, and anomalous activity Correlate internal alerts with external threat intelligence feeds Identify emerging risks and recommend preventive or mitigating actions Operate and fine More ❯
Posted: