content, technology and infrastructure, including strategic stakes in ITV, Univision, Plume, Lionsgate and the Formula E racing series. Our scale enables us to transfer knowledge and expertise across our operations and investments, creating a d ynamic family of brands united in the pursuit of innovation and excellence. And we’re prioritising diversity, equity and inclusion in our workplace and … Strategic Problem solver and Motivator Demonstrable experience of managing 3rd Party Managed Services Providers The Director Managed, Detection and Response is responsible for working with the VP Group Operational Security and Director Threat and Vulnerability Management for developing the strategy and vision for Managed, Detection and Response, and the execution of the responsibilities within the Proactive Analysis and Cyber … Incident Management and Response functions. The Security Tooling team is a pivotal support function that manages the end to end operations of Group Security’s tooling and works with the Security Architecture team to ensure the tooling is inline with the overall Security Strategy. Key Accountabilities This role is accountable for the key securityMore ❯
Reading, England, United Kingdom Hybrid / WFH Options
Axiom Software Solutions Limited
Hybrid- 1-2 days/week) Job Type: Contract Inside IR35 Client: Wipro Job Overview: As an OT Senior Cyber Security Analyst, you will be responsible for maintaining SecOps (SecurityOperations) solutions, controls and processes across the organisation. You will be mentoring and assisting with leading the SOC team to ensure appropriate prioritisation and remediation of OT … alerts and incidents. This role requires a deep understanding of SecOps concepts, technologies and best practices across IT and OT environments, as well as the ability to collaborate effectively with cross-functional teams. The ideal candidate will possess strong communication and incident management skills and will be committed to ensuring the highest level of security, compliance, and user experience. … and Thames Water Digital teams. Supporting out-of-hours incident investigations via an On-Call rota, covering 24*7*365 alongside our 3rd party MSSP. Monitor, analyse and optimise SecOps tool performance (e.g. SIEM, PAM), identify potential issues, and recommend and implement proactive solutions. Develop and maintain SecOps documentation, policies, and procedures. Collaborate with stakeholders to understand business requirements and More ❯
Windsor, England, United Kingdom Hybrid / WFH Options
Women in Tech UK
Join Centrica's IT Security Team as Global SecurityOperations Centre Analyst! Are you ready to drive the UK's energy transformation? Centrica is seeking a dedicated and skilled Global SecurityOperations Centre (GSOC) Analyst to join our IT Security team. In this critical role, you will be responsible for maintaining and enhancing the … security posture of our organisation. You will monitor, detect, and respond to security incidents, and develop measures to protect our systems and data. Location: Hybrid working with occasional travel to office Key Responsibilities: Incident Detection and Response: Monitor alerts, investigate incidents, and follow response processes. Detection Engineering: Develop detection rules and maintain playbooks. Automation and Scripting: Automate tasks … and PowerShell. Threat Hunting: Identify and mitigate potential threats. Collaboration: Work with other cyber defence teams and communicate findings. Continuous Improvement: Suggest and document process improvements. Monitoring: Provide continuous security console monitoring. Technical Analysis: Analyse incident telemetry and investigation pathways. Intelligence Integration: Support investigations with relevant intelligence. Incident Documentation: Record actions and secure data. Reporting: Generate and present technical More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the Cyber Defense group and the SecurityOperations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs, articles, and reports and remain current on related laws, regulations, and industry standards to keep up to date on the latest security risks, threats, and technology trends and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
highest level of security and compliance, protecting the critical infrastructure that delivers essential water services to 15 million customers. In this role, you will be responsible for maintaining SecOps solutions, controls, and processes across the organisation, while mentoring and leading the SOC team to ensure effective management of OT alerts and incidents. This position requires a deep understanding of … SecOps concepts, technologies, and best practices, specifically across IT and OT environments. You will be tasked with ensuring robust incident management, proactive threat detection, and continuous improvement of our security posture. Strong communication and collaboration skills are essential as you will work closely with cross-functional teams to mitigate risks and protect Thames Water's essential services. What you … in mentoring and managing a team to deliver operational excellence. Desirable Technical Skills & Qualifications: • Degree in Cyber Security, Computer Science, Information Technology, Engineering, or a related field. • Microsoft SecOps certification(s) such as Microsoft SecurityOperations Analyst (SC-200, AZ-900). • Any industry-recognised cyber security certifications, such as CCSP or OT-specific certifications like More ❯
About the Opportunity Job Type: Permanent Application Deadline: 31 August 2025 Title Cyber Security Operational Incident Manager - Technical Consultant Department Cyber Defence Operations - GCIS Location Kingswood, Surrey, Gurgaon, Bangalore Reports To Senior Manager - CDO Level 5 We share a commitment to making things better for clients and each other. We continually explore new technology and different ways of … working to put our clients first. So bring your boldest ideas to our Cyber Defense Operations team and feel like you're making progress. About your team Technology function across FIL is responsible for all global aspects of Technology, Digital, Cybersecurity, and Innovation. Fidelity is a value-driven, customer-obsessed organization and in Technology we are fortunate to play … direct role in helping our clients with one of the most important aspects of their lives - their financial well-being. Within the Technology function is our Global Cyber & Information Security (GCIS) that operates enterprise security services and controls. These are designed to mitigate Cyber and Information Security risks ensuring that Fidelity's business operates securely. The Technical More ❯
Abingdon, England, United Kingdom Hybrid / WFH Options
e2e-assure
e2e-assure Abingdon-On-Thames, England, United Kingdom e2e-assure are recruiting Cyber Security Analysts to work in our SecurityOperations Centre (SOC). The Cyber Security Analyst role is a great way to start your Cyber Security career or to take it to the next level. You will work as part of a team … in our SOC, monitoring and protecting customers’ systems using the latest technology. You will have the opportunity to learn from experienced cyber security professionals and develop your career and skills. The key to success in this role is to be able to learn quickly. Cyber threats are changing and developing all the time and we need to be able … rotating shift pattern, including unsociable hours. Key Responsibilities: Work closely with our customers to help them stay safe online and provide support and guidance when attacks happen. Deal with security alerts, investigating and analysing them and collaborating with colleagues and customers until they are closed. Threat hunting, threat detection and assessing potential issues and incidents. Creating alerts and rules More ❯
Reading, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Security Consultant (SecurityOperations/SOC), reading col-narrow-left Client: Location: reading, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 4 Posted: 31.05.2025 Expiry Date: 15.07.2025 col-wide Job Description: Security Consultant (SecurityOperations) Location: Hybrid; with … excellent benefits package. Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover … from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design More ❯
Slough, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Security Consultant (SecurityOperations/SOC), slough col-narrow-left Client: Location: slough, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 4 Posted: 31.05.2025 Expiry Date: 15.07.2025 col-wide Job Description: Security Consultant (SecurityOperations) Location: Hybrid; with … excellent benefits package. Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover … from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design More ❯
High Wycombe, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Security Consultant (SecurityOperations/SOC), high wycombe col-narrow-left Client: Location: high wycombe, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 7 Posted: 06.06.2025 Expiry Date: 21.07.2025 col-wide Job Description: Security Consultant (SecurityOperations) Location … excellent benefits package. Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover … from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design More ❯
Oxford, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Security Consultant (SecurityOperations/SOC), oxford district col-narrow-left Client: Location: oxford district, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 7 Posted: 06.06.2025 Expiry Date: 21.07.2025 col-wide Job Description: Security Consultant (SecurityOperations) Location … excellent benefits package. Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover … from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design More ❯
Milton Keynes, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Security Consultant (SecurityOperations/SOC), milton keynes col-narrow-left Client: Location: Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 4 Posted: 31.05.2025 Expiry Date: 15.07.2025 col-wide Job Description: Security Consultant (SecurityOperations) Location: Hybrid; with occasional travel … excellent benefits package. Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover … from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design More ❯
Cyber SecurityOperations Analyst Because your new ideas are our way new ways of working. Evolve, your way. Our technology team is actively shaping the next wave of advancements. Engaged with innovative initiatives, your expertise will propel our business into the future. Collaborating with a creative team of tech enthusiasts, you'll contribute your unique skills to fuel … buy 5 more. Because Primark is all about tailoring to you, we offer Tax Saver Tickets, fitness centre, and a subsidised cafeteria. What You'll Do as a Cyber SecurityOperations Analyst We want you to feel challenged and inspired. Here, you'll develop your skills across a range of responsibilities: Build and maintain expert knowledge and understanding … of our security technologies, building the delivery of process and system improvements, proactively seeking continuous improvement supported with plans, ensuring best practices are incorporated Executing the approval process for security-related tickets in Primarks service desk system for the Primark environment Contribute to the execution of SecurityOperations Centre (SOC) capabilities, ensuring efficient and effective operation More ❯
slough, south east england, united kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Chief Information Security Officer (CISO) 📍 Location: London (Hybrid Working Model) 💼 Salary: Competitive + Bonus + Equity Options 🕒 Type: Full-time, Permanent About the Role Chief Information Security Officer (CISO) to join a fast-scaling, high-impact organisation in the heart of London. This is a strategic, foundational hire —you will be responsible for designing and building out a … GRC) function from the ground up. As the company continues to grow, the need for a comprehensive and mature cybersecurity posture has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership … Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST, SOC 2, etc.), and internal governance controls. Security Strategy: Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. SecurityOperations: Oversee day-to-day cybersecurity operations, including threat detection, incident More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Liberty Global
We’re looking for a Senior Incident Response Manager to join our cyber-security team in Reading, UK or Schiphol, NL In this fantastic opportunity, you will work at the forefront of cyber defence operations, delivering Group Security’s and Liberty Global’s wider mission through helping to reduce; the impact of cyber incidents affecting Liberty Global … Subject Matter support to wider cyber related projects and support the continuous service improvement of cyber incident response and management and providing oversight of all incidents and working with Security Architecture on trends. The role focuses on stakeholder engagement and coordination and whilst we seek candidates with a strong Cyber Incident Management background, we are also looking for someone … who has strong cyber security and risk management experience. As a member of our pro-active, pragmatic, and energetic team, you are in the unique position to interact with people and teams globally, across all levels of Liberty Global, Operating Companies and Joint Ventures, and influence decisions that have a direct impact on operational stability and effectiveness of SecurityMore ❯
for the hire is Germany but we are open to The Netherlands and the UK as well. BlueVoyant is seeking a talented Sales Engineer with experience selling managed IT security services to medium and large businesses. In this role you will be working alongside Regional Sales Directors and Channel Account Executives as well as supporting our partners selling BlueVoyant … services. Your understanding of cyber securityoperations environments, security Information and event management (SIEM), endpoint detection and response (EDR), and broad IT risk management products and services, coupled with your communication skills and eagerness to teach partners’ technical sellers will lead to your success with us. This position will work daily with Regional Sales Managers and Channel … Account Executives. BlueVoyant provides our clients with both consultative (fixed price/deliverable) and ongoing (managed) security services, so the ability to communicate and present well is important. Role Responsibilities: Actively participate in the sales process and work closely with the direct and channel sales teams Discover and understand customer requirements and align our solutions to those requirements Present More ❯
Social network you want to login/join with: MUST HAVE PREVIOUS BANKING EXPERIENCE TO BE CONSIDERED Job purpose The Information Security Officer works within the Information Security Office of the Bank to ensure all information and cyber risks are identified, analysed, mitigated, and monitored, ensuring the smooth operation of the Bank. The ISO contributes to the Information …/Cyber Security Strategy and Roadmap, enabling defence-in-depth and defence-in-breadth to safeguard banking operations. The ISO collaborates closely with Security Engineering, SecurityOperations, and Business Resilience Teams across the bank. The ISO addresses external attacks, mitigates zero-day vulnerabilities, and identifies security flaws. It ensures that Executive Management's risk targets … are met and contributes to the continual improvement of the Bank's Cyber Assurance Framework. Key Responsibilities Collaborate with Security Engineering and Operations Teams to integrate security measures into business processes. Advise business units on security issues and initiatives. Oversee project activities to evaluate information security risks for new projects, products, and systems. Supervise resolution More ❯
Social network you want to login/join with: Americold – Helping our customers Feed the World Here at Americold Barcelona we are now recruiting for a Senior IT Security Engineer. The Senior IT Security Engineer will design, configure, optimize existing, and deploy new security systems/solutions aligned with global business risk/objectives. This role is … focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative, and cost-effective information security solutions and services and … partnering with compliance. Essential Functions: Partners with various teams, Infrastructure, End User Computing and the PMO to optimize existing security services and deploy new tools in support of the security roadmap. Must be capable of interacting effectively with various internal teams, peers, and management staff. Support the information security manager with creating information security metrics for More ❯
Contract type Permanent Contract Job summary We are seeking a proactive Information Security Specialist skilled in securityoperations, threat intelligence, and risk management. This role is crucial for maintaining robust security protocols, identifying vulnerabilities, and ensuring compliance with security standards. The ideal candidate will have a strong background in IT infrastructure security, preferably within … and incident response. Having CISSP or other relevant certifications (e.g., Network+, Security+, MCSP, CAN) would be beneficial to have to perform this role. Day-to-Day of the Role: SecurityOperations and Infrastructure Assist in identifying, analysing, and following up on security vulnerabilities in IT systems. Help maintain accurate IT asset inventory across various security platforms … e.g., CMDB, AV, SIEM). Participate in regular security reviews, vulnerability assessments, and help ensure compliance with established security standards. Monitor user access and permissions, identifying and reporting potential unauthorized access. Implement and maintain Active Directory and File Share security controls. Participate in regular AD security assessments and remediation efforts. Threat Intelligence and Incident Response Monitor More ❯
slough, south east england, united kingdom Hybrid / WFH Options
FIND | Creating Futures
Job Title: Cyber Security Trainer Location: Remote (Will be some travel to London HQ) Job Type: Full-Time Permanent About the Role FIND have been Instructed to find an experienced Cyber Security Trainer, to join our clients growing Technology Training team. In this role, you’ll play a key part in developing and delivering high-impact cyber security training to junior Cyber engineers, and professionals from other tech disciplines. This is an exciting opportunity to shape the next generation of cyber security talent through immersive, hands-on bootcamps and professional development sessions. Key Responsibilities Deliver comprehensive 8-12-week cyber security bootcamp-style training to junior engineers and consultants. Provide 1:1 coaching and group … tailor course content and delivery methods. Some weeks will require travel into the London HQ for in-person sessions or team collaboration Required Skills & Experience Proven experience delivering cyber security training or coaching (Trainer/Instructor/Lecturer/Teacher/Coach/Mentor) Strong background in cyber security engineering, consulting, or operations Ability to teach and More ❯
Social network you want to login/join with: Head of Information Security, EMEA, slough col-narrow-left Client: Location: slough, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 2 Posted: 04.06.2025 Expiry Date: 19.07.2025 col-wide Job Description: Key Responsibilities: In this role, you will be responsible for overseeing and leading … a team of security personnel across multiple domains including SecurityOperations, Global Security Administration, Physical Security, Data Security Analytics, PKI/Certificate Management, and Network Security Engineering. Your role will encompass a wide range of strategic, managerial, and technical responsibilities, including but not limited to: Technical Leadership and Strategy: Provide strategic security guidance and direction for the engineering of multiple high-performing teams across diverse domains. Drive the vision and direction of security solutions through active participation in the information security market through involvement with vendors, conferences, connecting with peers for all the firms’ various key technologies. Lead, supervise and inspire local team multiple key areas, Global SecurityMore ❯
cybersecurity space within the region. You will be responsible for the entire sales cycle, from pipeline generation and proposal leadership to closing deals, focusing on our comprehensive suite of security solutions. Key Responsibilities: Lead and orchestrate the creation of compelling, high-quality, security-focused proposals and responses to Requests for Proposals (RFPs). Leverage deep technical understanding across … diverse cybersecurity domains including SecurityOperations Centers (SOC), Endpoint Detection and Response (EDR), Governance, Risk & Compliance (GRC), network security (including firewalls), cloud security, Operational Technology (OT) security, and data security (encryption, DLP, key management). Revenue Generation & Customer Relationship Management: Develop and execute strategic sales plans to achieve revenue targets and expand our customer … sales phases, acting as a trusted advisor. Utilize expert solution selling methodologies to understand customer challenges, requirements, and business objectives. Cross-functional Collaboration: Partner closely with internal presales, sales operations, product management, and service delivery teams. Ensure seamless communication and collaboration to provide a unified and positive customer experience. Gather market intelligence and customer feedback regarding security challenges More ❯
Contract | 6 Months | Inside IR35 | Hybrid (2 days a week) Security Engineer - SOC & Automation (Financial Services) We're looking for a Security Engineer to strengthen SOC capabilities at a financial services client. The focus is on SIEM/SOAR tooling, automation, and improving threat detection and response. Responsibilities: Maintain and optimise SOC tools (SIEM, SOAR, EDR). Automate … Integrate threat intel, onboard log sources, and fine-tune alerts. Collaborate with SOC teams to enhance detection and incident response workflows. Support regulatory compliance (FCA, PRA, DORA) through improved security operations. Requirements: 4+ years in cybersecurity, with 2+ in SOC or security engineering. Strong experience with SIEM/SOAR (e.g., Splunk, Sentinel). Proficient in scripting (Python, PowerShell More ❯
Tier 1 SOC Analyst • Ideal opportunity for a cyber security enthusiast with at least 1 year of experience in a Tier 1 SOC role, looking to grow within a collaborative and fast-paced environment. • Full-time, permanent role with a UK-based IT services company offering a competitive salary and excellent benefits. • Immediate start available – candidates with short notice … availability are highly encouraged to apply. • To apply, please email oliver.light@searchability.com Who are the client? Our client is a well-established managed services provider with a growing cyber security division. With a strong reputation for delivering robust security services to clients across the UK, they offer an inclusive, team-oriented culture with a focus on continuous learning … and career development. What will you be doing? As a Tier 1 Cyber Security SOC Support Analyst, you’ll play a critical front-line role in monitoring cyber threats and responding to security incidents. You’ll triage alerts, provide initial incident response using predefined playbooks, and escalate high-priority threats to the senior escalation team. You’ll also More ❯
Slough, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Security and Information Security Architect, slough col-narrow-left Client: Location: slough, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 4 Posted: 16.06.2025 Expiry Date: 31.07.2025 col-wide Job Description: THE ROLE NextEnergy Group develops, builds, and operates large-scale solar Photovoltaic … PV) assets and battery storage projects across Europe. As our Security & Information Security Architect, you will set the security vision and implement secure-by-design principles for every layer of the organization — from field-level Operational Technology networks and real-time trading engines right through to corporate business systems. A critical dimension of the role will be … tight collaboration with: Data Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed service deliverables, and secure software supply chain requirements This is a strategic yet More ❯