and governance framework aligned with business and regulatory requirements. Oversee technical security controls including firewalls, IDS/IPS, SIEM, IAM, endpoint protection, and cloud security (Azure, AWS). Lead threatdetection, incident response, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network security across internal and customer-facing systems. Conduct risk … disaster recovery plans related to cybersecurity. Act as the primary contact for cybersecurity vendors, regulators, auditors, and third-party assessments. About You: Proven track record in cybersecurity management, including threatdetection, incident response, and vulnerability management. Strong knowledge of security frameworks (ISO 27001, NIST, CIS Controls) and regulatory compliance requirements (GDPR, NIS2). Hands-on expertise with firewalls … than a technical role — it’s an opportunity to influence business-wide security culture, work closely with senior leadership, and make tangible improvements to resilience in a rapidly evolving threat landscape. You’ll receive a competitive salary, substantial benefits, and the scope to develop your career within a forward-thinking organisation. 💡 If this sounds like your skill set, and More ❯
and LogRhythm to join our Security Operations Center team. The ideal candidate will be responsible for monitoring, analyzing, and responding to security incidents, optimizing SIEM configurations, and contributing to threatdetection and response strategies. This role requires hands-on experience with both platforms and a deep understanding of cybersecurity principles and incident management. Key Responsibilities: Monitor and investigate … security alerts from Microsoft Sentinel and LogRhythm . Analyze logs, network traffic, and other data sources to detect threats and suspicious activities. Develop and tune detection rules, analytics, and alerting logic in both SIEM platforms. Collaborate with incident response teams to contain and remediate security incidents. Create dashboards, workbooks, and reports for stakeholders. Perform threat hunting activities and More ❯
day-to-day operation of identity and access services, including: o Access Management o Identity Governance o Role-Based Access Control (RBAC) o Privileged Access Management (PAM) o Identity ThreatDetection and Response o Access Reviews and Certifications o Identity Data Analysis and Reporting Help ensure users only have access to the systems and data they need, working More ❯
development and day-to-day operation of identity and access services, including: o Access Managemento Identity Governanceo Role-Based Access Control (RBAC)o Privileged Access Management (PAM)o Identity ThreatDetection and Responseo Access Reviews and Certificationso Identity Data Analysis and Reporting Help ensure users only have access to the systems and data they need, working with managers More ❯