Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Action For Humanity
ensuring Data Loss Prevention (DLP) and encryption. Implement Microsoft Defender Suite (Defender for Office 365, Defender for Endpoint, Defender for Cloud Apps) for advanced threat protection. Strengthen cloud security posture by managing security configurations across Microsoft Azure environments. 3. Security Automation & Incident Response Automate security workflows with Power Automate … Power Apps, and Microsoft Defender XDR. Deploy Microsoft Sentinel (SIEM) for threatdetection, log analysis, and incident response. Establish incident response playbooks and conduct forensic investigations when needed. 4. Compliance & Risk Management Ensure adherence to ISO 27001, NIST, GDPR, and CIS Benchmarks. Conduct risk assessments, vulnerability scans, and More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
and technical operations, ensuring resilient and secure environments. Cloud Security Operations : Securely manage Azure, M365 & AWS security operations, implementing comprehensive security policies and initiatives. ThreatDetection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design … and training to stakeholders, promoting security best practices and risk mitigation strategies. Security Automation & Optimization : Develop, implement, and optimize security automation processes to improve detection, response, and mitigation efforts. What we're looking for Experience : 3+ years in information security with a focus on cloud security, security architecture, and … Architecture: Proven track record in designing and implementing security architectures in complex environments. Risk Management: Ability to identify and mitigate security risks; knowledge of threat modelling and frameworks such as MITRE ATT&CK, CIS, and OWASP. Analytical Skills: Strong problem-solving abilities to translate business requirements into technical solutions. More ❯
resilience. Design, Deliver and Implement High Availability & Resilience: Develop disaster recovery solutions, resilient architectures, and governance controls, including Security Hub, Audit Manager, and proactive threat detection. Implement, Maintain & Optimise AWS Best Practices & Governance: Enforce compliance through IAM, encryption, Control Tower, Security Hub, and cost-optimisation tools like AWS Cost More ❯
Skelmersdale, Lancashire, North West, United Kingdom Hybrid / WFH Options
Police Digital Services
of Police Digital Service and provides visibility and control of information risks for policing. It supports the 24x7x365 nature of police operations, providing a threatdetection and response capability for digital services before, during and after cyber-attacks, enabling stakeholders to understand and proactively manage risk across the More ❯
preston, lancashire, north west england, united kingdom Hybrid / WFH Options
Police Digital Services
of Police Digital Service and provides visibility and control of information risks for policing. It supports the 24x7x365 nature of police operations, providing a threatdetection and response capability for digital services before, during and after cyber-attacks, enabling stakeholders to understand and proactively manage risk across the More ❯
suspicious activity, and reporting issues so they can be adequately handled. You will work alongside our security engineers and partner teams to perform daily threatdetection and incident response, using the full capability of AWS technologies and services to detect and mitigate cyber threats at a massive scale … enjoy learning about the most up-to-date new technologies and procedures to protect information systems and data. AMS Security provides 24/7 threat monitoring, investigation, and response across for customer's AWS environments. AMS enhances existing security capabilities by supporting security monitoring for all native AWS services … languages such as Python. PREFERRED QUALIFICATIONS - Knowledge of common system security vulnerabilities and remediation techniques. - Understanding of the tools, tactics, and techniques used by threat actors during security events. - Familiarity/experience with AWS services and security concepts. Posted: November 21, 2024 (Updated about 10 hours ago) Posted: December More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Maxwell Bond
cybersecurity and strong hands-on expertise with Splunk . Key Responsibilities: Monitor and respond to security incidents using Splunk and other SIEM tools Conduct threatdetection, analysis, and incident response Support the design, implementation, and maintenance of security measures across infrastructure Work with internal teams to assess vulnerabilities More ❯
acquired businesses are swiftly onboarded into Ipsum's existing IT landscape. Ensure cybersecurity compliance by aligning newly acquired systems with Ipsum's security policies, threatdetection, and endpoint protection measures. Act as the primary technical liaison between the acquisition team and IT leadership, providing expertise on infrastructure scalability More ❯
incidents, conduct forensic investigations, and implement remediation actions to contain and mitigate risks. Maintain and optimise security monitoring tools and technologies to ensure effective detection and response capabilities. Collaborate with IT and engineering teams to implement security best practices and ensure compliance with security policies and standards. Review existing … best practices. SKILLS, KNOWLEDGE & EXPERIENCE Proven experience in a SOC or security operations role, with hands-on experience in security monitoring, incident response, and threat detection. Strong understanding of network security principles, protocols, and technologies (firewalls, IDS/IPS, SIEM, etc.). Experience with security tools such as SIEM …/SOAR platforms, endpoint detection and response (EDR) solutions, vulnerability management, detection and response/remediation (VMDR) solutions and threat intelligence platforms. Knowledge of security standards and frameworks (e.g., NIST, CIS Controls, ISO 27001) and regulatory requirements (e.g., GDPR, HIPAA). Proficiency in scripting and automation (e.g. More ❯