Job Description Job title: Information Security Analyst Department: Information Services Location: Delta Park, Fareham GLS: T03 Working hours: Monday - Friday 0830 - 1630 A brighter future awaits you CooperVision is one of the world's leading manufacturers of soft contact lenses with a presence in over 100 countries. Being part of CooperVision means helping improve the way people see each … about their daily lives. We're all about bright futures - for our people and those who wear our contact lenses. Job summary - What to expect: Join our Global Information Security Team as an Information Security Analyst, where you'll play a key role in protecting our enterprise systems and data. You'll support daily security operations, investigate … incidents, and implement technical controls to maintain a strong security posture. Working closely with senior analysts, engineers, and cross-functional teams, you'll help manage risk, evaluate vendor and third-party security, and contribute to policy development and compliance. This role also involves coordinating penetration testing, vulnerability scanning, and advising on secure configurations for a range of tools More ❯
Role Responsibilities Key responsibilities for this role may include: Incident Detection & Response: Lead the triage, investigation, and classification of security events using SIEM and other tooling Take ownership of end-to-end handling of medium to high-severity incidents, coordinating containment and remediation efforts Maintain detailed incident records, including timelines, impact assessments, root cause analysis, and mitigation steps Act … indicators of compromise and attribution patterns Lead threat intelligence sharing within the organisation and with external partners Mentor Tier 1 staff in interpreting threat data and logs during investigations Security Monitoring and Detection Engineering: Conduct continuous security monitoring of network traffic, endpoints, and critical systems Proactively tune and improve SIEM rules, alerts, and correlation logic to reduce false … sources into SIEM and help define parsing, enrichment, and correlation logic Lead investigations into recurring false positives or noisy alerts and propose sustainable resolutions Support deployment and configuration of security tooling Compliance, Reporting and Documentation: Lead security audits and assessments, providing evidence of SOC activities and controls Maintain accurate records of all events handled, including triage notes and More ❯
UK HQ, 40 High Street, Street, Somerset, United Kingdom Req PURPOSE To work with multidisciplinary teams across Clarks Technology and business areas to identify, design, and build security controls to protect Clarks' applications, networks, and data from security risks. To develop and embed best-practice security processes and knowledge into technical teams aligned to Zero Trust principles … industry standards and frameworks (e.g. NIST, PCI DSS). To identify opportunities for automation and optimization and drive maximum value from existing technologies and services to strengthen Clarks' overall security posture. DIMENSIONS Financial : No direct financial responsibilities, though the role may be required to assist ITLT and other Clarks Technology managers in strategic planning linked to budgeting linked to … security and related technologies Reports : No direct line reports currently Impact the job has on the business: The company's exposure to security risks has never been greater - with an ever-changing threat landscape, continually evolving privacy regulations, the growth in Software-as-a-Service (SaaS) and AI, and the centrality of data to meet our business objectives More ❯
At Tombola, we take security seriously - but we also like to have a bit of fun while we're at it! As our Cloud Security Engineer, you'll be building on our existing operational security, with a special focus on protecting our cloud infrastructure. You'll be hands-on, designing, implementing, and managing top-notch security … play a key part in developing our vulnerability management program, working closely with our operational support, infrastructure, and development teams. Plus, you'll be right in the thick of security event monitoring, threat intelligence, and incident management - keeping us one step ahead! What you'll be doing: Delivering SOC Capabilities: You'll be a key team member in delivering … ongoing Security Operations Centre (SOC) capabilities for the business. Driving Automation: You'll push for security automation wherever possible and play a big part in evolving our security tooling and services. Policy & Standards: You'll champion the adoption and adherence to our InfoSec policy, standards, and guidelines. Threat Intelligence: You'll monitor and apply current and emerging More ❯
Ready to be our next Cloud Security Engineer ? We're on the lookout for a tech whiz to join our brilliant team in Sunderland and help us keep things super secure for our players and our business. If you're passionate about cloud security and love a challenge, you're in the right place! Cloud Security Engineer … At tombola, we take security seriously - but we also like to have a bit of fun while we're at it! As our Cloud Security Engineer , you'll be building on our existing operational security, with a special focus on protecting our cloud infrastructure. You'll be hands-on, designing, implementing, and managing top-notch security … play a key part in developing our vulnerability management program, working closely with our operational support, infrastructure, and development teams. Plus, you'll be right in the thick of security event monitoring, threat intelligence, and incident management - keeping us one step ahead! What you'll be doing: Delivering SOC Capabilities: You'll be a key team member in delivering More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
Information Security Analyst - Audit, Compliance & Cybersecurity United Kingdom - Southampton At NICE, we don't limit our challenges. We challenge our limits. Always. We're ambitious. We're game changers. And we play to win. We set the highest standards and execute beyond them. And if you're like us, we can offer you the ultimate career opportunity that will … if you're like us, we can offer you the ultimate career opportunity that will light a fire within you. So, what's the role all about? The Information Security Analyst is primarily responsible for ensuring compliance with information security frameworks such as Cyber Essentials, Cyber Essentials Plus, ISO 27001, ISO 27701, ISO 42001, GDPR, and DORA. This … reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security Monitoring: Use tools such as Rapid7 InsightIDR or other SIEM solutions to assist with security monitoring and incident detection. Incident Response Support: Participate in incident response efforts, documenting More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Focus on SAP
Full time Start: ASAP Location: Reading – Hybrid Languages: English We are seeking an experienced and highly capable SOC Tier 3 Analyst to serve as a senior member of our Security Operations Center (SOC). You will lead advanced incident response efforts, conduct proactive threat hunting, perform digital forensics, and collaborate cross-functionally to safeguard our digital assets and infrastructure. … Threat Hunting & Analysis Proactively identify emerging threats through behavioral analytics and threat intelligence. Analyze log data, network activity, and endpoints to uncover hidden anomalies or malicious behavior. Partner with security engineering teams to build detection capabilities based on evolving threats. 🔬 Digital Forensics & Investigation Conduct detailed forensic investigations to determine incident scope, root cause, and impact. Collect and preserve digital … and support threat blocking strategies. 🤝 Collaboration & Knowledge Sharing Mentor junior SOC analysts and share knowledge across incident response workflows. Engage with stakeholders across IT, DevOps, and legal to enhance security posture. Contribute to post-incident reviews and continuous process improvement. 📚 Security Research & Intelligence Stay ahead of industry developments, vulnerabilities, and attacker methodologies. Create detection rules and playbooks to More ❯
The Technical IT Security Manager will oversee the organisation’s security and data infrastructure, with a focus on technical aspects to ensure robust protection of information systems. This position involves managing security operations, implementing security measures, and leveraging Microsoft Azure’s security features to safeguard the organization’s data and infrastructure. Key Responsibilities: Security Operations Management: Be the Technical Expert to support and advance the objectives of IT Security and the wider group In conjunction with the leadership team, develop and implement security policies, procedures, and protocols Actively engaged in continuous monitoring and protection of networks, systems, and applications Technical Security Implementation: Design, implement and support new and existing security solutions. (Privileged Access Management, Vulnerability Management, Threat Intelligence, etc) Expert in Microsoft Azure’s security tools and services. (Entra, Privileged Identity Management, conditional access, Microsoft defender, Sentinel, etc) Perform security input and guidance on tools being adopted within the organisation. Oversee and assess the outputs of the vulnerability management platforms to effectively identify and mitigate vulnerabilities Ensure More ❯
where you come in. Join our team and help us continue to make Cirrus Logic an exceptional place to grow your career! We are seeking a highly motivated, seasoned security professional to join Information Security as a Senior Attack Surface Management/Vulnerability Management Information Security Analyst. You will be responsible for managing the scanning architecture, as … well as the program to identify, analyze, prioritize, and mitigate security vulnerabilities in our digital assets to enhance cybersecurity and protect sensitive data. This role supports business strategy in a dynamic environment. Responsibilities: Vulnerability Assessment: Conduct regular vulnerability assessments to identify security weaknesses in our systems, applications, and network infrastructure. Risk Analysis: Analyze and prioritize vulnerabilities based on … Mitigation Strategies: Develop and implement effective mitigation strategies to address identified vulnerabilities and reduce attack surfaces. Incident Response: Collaborate with the incident response team to investigate and respond to security incidents, ensuring swift resolution and minimizing damage. Security Tools: Manage and maintain security tools and technologies used for vulnerability management, including scanning tools. Security Policies: Develop More ❯
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Creditsafe
Join our dynamic team as a Security Operations Manager, where you'll lead and enhance our security strategies to protect critical assets and ensure operational resilience. WHO ARE WE? Privately owned and independently minded, Creditsafe operates with the singular vision of powering business decisions. We do this by delivering valuable intelligence on customers, suppliers and potential buyers to … our industry-leading solutions, power decisions for companies by turning their data into actionable insights that help them become stronger, grow faster and thrive. THE TEAM Creditsafe’s Information Security and Compliance team are motivated by protecting company reputation, safeguarding existing revenue, and supporting the generation of future revenue. We realise that security can often be misunderstood so … our approach is enabling new and existing customers to interact with our products and services, and we pride ourselves on balancing a positive security culture with a robust control environment. Our responsibilities include setting security policies, educating users on good security practices, managing security risks, and auditing our security posture. We interact with various teams More ❯
Newport, Wales, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Information Security Manager, newport, wales col-narrow-left Client: Creditsafe Location: newport, wales, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 2 Posted: 31.05.2025 Expiry Date: 15.07.2025 col-wide Job Description: Join our dynamic team as a Security Operations Manager, where you … ll lead and enhance our security strategies to protect critical assets and ensure operational resilience. WHO ARE WE? Privately owned and independently minded, Creditsafe operates with the singular vision of powering business decisions. We do this by delivering valuable intelligence on customers, suppliers and potential buyers to corporates, public sector organisations and SMEs globally. Our journey began in … our industry-leading solutions, power decisions for companies by turning their data into actionable insights that help them become stronger, grow faster and thrive. THE TEAM Creditsafe’s Information Security and Compliance team are motivated by protecting company reputation, safeguarding existing revenue, and supporting the generation of future revenue. We realise that security can often be misunderstood so More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
As a Senior Cyber Security Engineer , you will play a key role in supporting the design, implementation, and maintenance of Cyber Security Engineering solutions, controls, and processes across Thames Water's IT and OT environments. You will be responsible for supporting cyber security platform administration, enhancing our securityposture, and ensuring that new capabilities are … deployed in alignment with business objectives. This includes collaborating with stakeholders, supporting compliance efforts, and helping to drive proactive cyber risk reduction. This role requires a deep understanding of security engineering concepts, infrastructure technologies, and best practices. The ideal candidate will have strong communication skills, a solid grasp of IT and OT systems, and a passion for continuous improvement … in cybersecurity operations. What you'll be doing as a Senior Cyber Security Engineer Support the creation of secure asset builds and system hardening capabilities across end-user computing and server environments. Collaborate with business stakeholders to align cybersecurity engineering strategies and controls with organisational goals. Develop and maintain cybersecurity engineering documentation, policies, and procedures. Implement and manage securityMore ❯
Southampton, England, United Kingdom Hybrid / WFH Options
NICE
Social network you want to login/join with: Information Security Engineer, Southampton col-narrow-left Client: NICE Location: Southampton, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Reference: c761c147b075 Job Views: 3 Posted: 29.06.2025 Expiry Date: 13.08.2025 col-wide Job Description: At NiCE, we don’t limit our challenges. We challenge our … the ultimate career opportunity that will light a fire within you. So, what’s the role all about? The ideal candidate will be responsible for designing, implementing, and maintaining security measures to protect our organization's computer systems, networks, and SaaS products. This role requires a hands-on approach to identifying vulnerabilities, implementing solutions, and staying abreast of the … latest security trends and technologies. The Senior Information Security Engineer will collaborate closely with cross-functional teams to ensure the confidentiality, integrity, and availability of our systems and data. How will you make an impact? Security Tooling: Deploy, maintain, integrate, and perform initial configuration of security tools. Vulnerability Management: Coordinate and conduct regular security assessments More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
month contract in a Work from Office (WFO) role. This role will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code … IaC) using Terraform. Their ideal candidate will have a strong background in cloud security best practices, automation, and a proactive approach to integrating security across their software delivery lifecycle. A key part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. … Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure Security: Architect and secure Azure-based infrastructure using Terraform, ensuring adherence to security best practices by developing, maintaining, and optimizing Terraform code. DevOps Pipeline Development and Maintenance: Design, develop, and optimize Azure DevOps pipelines More ❯
day. We have an end-to-end portfolio of market leading services and develops integrated technology solutions to accelerate tech adoption through its two core divisions of Tech Cyber security & Cloud and Tech Intelligence of Things. The company has a diverse, highly trained and globally located talent pool of over 2000 employees and serves more than 5.5m customers every … ecosystem includes over 300 cutting edge businesses, as well as strategic agreements with all market leaders. Job Description This is a full-time role for a Level 3 Information Security Analyst to join a mature managed services Cyber team who manage the securityposture of critical infrastructure and services under an ISO27001 and Cyber Essentials + certified … managed service environment. You will be responsible for conducting diverse cyber security tasks to make sure that our clients are secure and compliant to various EU/UK security regulations. This is a technical, hands-on role, and the successful candidate will be responsible for (but not limited to) following: Conducting Cyber Threat Modelling (CTM) exercises NIS/ More ❯
Altrincham, England, United Kingdom Hybrid / WFH Options
Heywood
About You Do you thrive on shaping information security goals and setting the direction and vision of information security, specifically in a hybrid cloud environment? Does identifying potential security vulnerabilities across multiple platforms and planning remediation activities come as second nature to you? Do you have the technical security expertise to ‘shift left’ when it comes … to increasing the maturity of information security operations as part of cloud development? Do you have hands-on experience managing information, cybersecurity incidents, and data breaches? If so, then you could be just what we are looking for. Read on to find out more... The Role As Head of Information Security at Heywood, your role will be to … develop, shape and update the Company’s information security capability, ensuring our hybrid cloud environment remains secure against an ever-changing threat landscape. Key responsibilities include: Information security strategy Continue to develop the Information Security Strategy, ensuring alignment to the Company’s IT strategy and business goals and create the required metric reporting to track progress to More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Head of Information Security, manchester col-narrow-left Client: Heywood Location: manchester, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 3 Posted: 31.05.2025 Expiry Date: 15.07.2025 col-wide Job Description: About You Do you thrive on shaping information security goals and setting … the direction and vision of information security, specifically in a hybrid cloud environment? Does identifying potential security vulnerabilities across multiple platforms and planning remediation activities come as second nature to you? Do you have the technical security expertise to ‘shift left’ when it comes to increasing the maturity of information security operations as part of cloud … cybersecurity incidents, and data breaches? If so, then you could be just what we are looking for. Read on to find out more... The Role As Head of Information Security at Heywood, your role will be to develop, shape and update the Company’s information security capability, ensuring our hybrid cloud environment remains secure against an ever-changing More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
RealVNC
the success of the business, committed to delivering high quality results, collaboration and innovation to help accelerate company growth. Position: We are seeking a highly skilled and motivated Cyber Security Engineer to join our Cyber Security team. This role is crucial in maintaining the security of our systems, networks, and data. The successful candidate will implement security measures, monitor for vulnerabilities, respond to incidents, and ensure compliance with RealVNC policies and industry standards and regulations. Key responsibilities include; Security Monitoring and Incident Response: Serve as a point of contact between the internal security team and our external SOC provider, to continuously monitor systems for security breaches and anomalies. Ensure that alerts, escalations, and … queries, analytics rules, threat hunting scripts, and automation logic. Work with internal teams to mitigate threats and implement recommendations - for example MFA enforcement, Conditional Access policies, and identity protection. Security Architecture and Implementation: Evaluate and recommend security solutions to enhance internal security posture. Utilising third-party security tools to scan the environments for vulnerabilities, mitigate findings More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
As a Cyber Defence Analyst, you will join the Cyber Fusion Center, performing in-depth analysis, assessment, and response to security threats by following documented policies to meet Service Level Goals. The team provides global 24x7 security operations and monitoring for cybersecurity events affecting Experian. You will be a part of the first line of defence in Experian … s broader incident response and incident management departments, responsible for receiving and prioritizing cybersecurity alerts, including being the dedicated contact for potential security incidents reported by users (e.g., Experian employees). Depending on the results of assessment, this team is then responsible for investigating, containing, eradicating, and recovering from events falling in its scope or escalating higher-risk events … to dedicated incident response and management teams in the CFC. This role is critical in ensuring the handling of potential threats and plays a part in improving security operations. This is a home based role reporting to the Director of Security Operations for SecOps & Threat Detection. Please note that in this role, you will have an 8x5 Monday More ❯
company that is building a people first culture and is based in one of the best cities to live in the UK? If so, read on. The Information Security & Resilience Team at Unite Students are looking for an experienced, enthusiastic SecOps Engineer. We are supporting the business in all its objectives - from building new interfaces with customers to improving … get plenty of support and guidance, and your knowledge and experience will be invaluable to help shape the direction of our InfoSec capability. What You ll Be Doing Network Security: Design, implement, and manage secure network architectures. Monitor network traffic for suspicious activity and respond to security incidents. Conduct regular network security assessments and audits to ensure … compliance with security policies and standards. Vulnerability Analysis: Conduct regular vulnerability assessments and penetration testing to identify and mitigate security risks. Develop and implement strategies to address vulnerabilities. Track and report on the status of vulnerabilities and remediation efforts. Forensic Analysis: Perform forensic analysis of security incidents to determine the root cause and impact. Collect and preserve More ❯
Security (SOC) Engineer Manchester/Remote (On site once a month) £35K- £55K (depending on experience) + Great Benefits A SOC Engineer is required for our medical client who are based in Manchester. The successful candidate will be responsible for delivering hands-on technical expertise to support in defending the organisation's systems from attack whilst ensuring they operate … seamlessly and are secure, enabling the team to deliver effective cybersecurity. You will work within the Security Operations Centre (SOC), supporting the engineering lead in configuring, implementing, and maintaining the tools that support all SOC functions. You will assess, implement, configure, and optimise our technical security controls, tools, and data feeds to maintain and continuously improve the visibility … across our environments. You will also lead initiatives to improve the securityposture and respond to incidents, problems and change requests from a security operations perspective. Essential skills- Practical experience working within a SOC (Security Operations Centre) or in a cyber security focused role - Ideally 1- 2 years working as an engineer. Knowledge of securityMore ❯
/join with: Public or Higher education experience is beneficial An established institution is seeking a Head of Cybersecurity to oversee its cybersecurity operations and establish a robust enterprise security strategy. This role will be instrumental in developing policies, implementing security solutions, and managing risks while ensuring compliance with industry standards and best practices. This role will include … between the business and technical, overseeing with technical knowledge but not hands on, focusing on stakeholder engagement. Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk … mitigation strategies. Monitor networks and systems, ensuring proactive threat detection and response. Collaborate with internal stakeholders and external agencies to maintain a strong security posture. Provide cybersecurity training and guidance to staff and students. Lead cybersecurity projects, ensuring timely and cost-effective implementation. Stay up to date with evolving cybersecurity trends, regulations, and best practices. Degree in a relevant More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Version 1
embedded within our DNA. Invest in us and we’ll invest in you! Job Description Monitoring Network Traffic: Keeping an eye on network traffic to detect and respond to security incidents in real-time. Incident Response: Investigating security breaches and writing detailed reports on incidents. Vulnerability Management: Identifying and fixing vulnerabilities in the network and systems. Conducting Risk … Assessments: Performing periodic risk assessments and penetration tests to evaluate the security posture. Threat Research: Staying updated on the latest cyber threats and trends to anticipate potential risks. Qualifications Technical Knowledge: Familiarity with operating systems (Windows, Mac, Linux), firewalls, VPNs, proxies, and security information and event management systems (SIEMs). Analytical Skills: Ability to analyse complex data and … identify potential security threats. Problem-Solving: Strong problem-solving skills to address and mitigate security issues. Communication: Good communication skills to document incidents and explain security measures to non-technical staff. Additional Information Why Version 1? At Version 1, we believe in providing our employees with a comprehensive benefits package that prioritises their wellbeing, professional growth, and More ❯
your career, then that is what you will get, and more. Job Summary: The Vulnerability & Compliance Lead is responsible for tracking and managing the identification, assessment, and remediation of security vulnerabilities across the organization's infrastructure and endpoints and monitoring and reporting on vulnerability and other security compliance status. This role requires collaboration with various departments to ensure … that all security patches and updates are applied promptly and effectively. Additionally, the Lead ensures that the organization's securityposture remains strong and compliant with industry standards. Key Responsibilities: Knowledge: Subject Matter Expert in vulnerability remediation, offering guidance and support to ensure effective remediation processes Prioritization: determine remediation priorities based on vulnerability severity, exploitability, and potential … business impact Planning: Develop strategies to address identified vulnerabilities, including applying patches, updating configurations, and implementing software updates Coordination: Work closely with vendor support, security, application teams and others to prioritize and remediate identified vulnerabilities Monitoring and Reporting: track and report on vulnerability and compliance status Continuous Improvement: regularly review and analyze data and processes and implement agreed upon More ❯
empowering clients to own, manage and rule their data. One of our specialisations is in cybersecurity consultancy offering end-to-end SIEM services, helping clients design, deploy, and optimise security monitoring and threat detection solutions. Our team provides comprehensive support across all stages of SIEM implementation, from initial strategy and solution design to deployment and ongoing management. Our focus … is on delivering tailored solutions that enhance security postures, maintain compliance, and provide actionable threat intelligence. What we’re looking for We are seeking a client-focused SIEM Consultant with a strong foundation in SIEM technologies, cybersecurity best practices, and threat detection strategies. In this role, you will work closely with clients to understand their security needs, provide … other leading SIEM tools. You’ll participate in hands-on configuration and optimisation as needed but with a primary focus on advising clients, developing design strategies, and ensuring their security objectives are met. This position is ideal for someone with experience in SIEM or SOC environments who is comfortable in a consultative, client-facing role. Knowledge of cloud securityMore ❯