Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
ensuring the handling of potential threats and plays a part in improving security operations. This is a home based role reporting to the Director of Security Operations for SecOps & Threat Detection. Please note that in this role, you will have an 8x5 Monday-Friday schedule, with flexibility to respond to after-hours pages for potentially major security incidents to More ❯
Derby, England, United Kingdom Hybrid / WFH Options
Cooper Parry
About the role... Are you a cybersecurity professional with a solid foundation in threatdetection and response, looking to deepen your impact in a dynamic IT environment? Do you have hands-on experience with Microsoft Sentinel and Microsoft Defender, and a passion for protecting systems and data from evolving threats? We're seeking an IT Security Analyst to … join our innovative and fast-growing team at the trailblazing Rebels of Accountancy. In this role, you'll take ownership of monitoring and responding to security incidents, fine-tuning detection rules, and enhancing our security operations using cutting-edge tools. You'll collaborate closely with the wider tech team to ensure our digital environment remains secure, resilient, and compliant. … Work closely with our Security Operations Centre to monitor and investigate security alerts generated by Microsoft Sentinel and Microsoft Defender Collaborate with our SoC to develop, refine, and optimize detection rules and custom alerts, ensuring alerting mechanisms are aligned with evolving threat landscapes while reducing false positives and enhancing actionable insights Conduct regular vulnerability assessments, interpret scan results More ❯
The team you'll be working with: P3 Senior SOC Analyst (L3) We are currently recruiting a Senior SOC Analyst L3 Managed Detection and Responseto join our growing Security Operations Centre business. ThisrolewillbebasedonsiteinBirmingham,youwillneedtobewillingtoworkinshiftpatters,probably4dayson,4daysoff,asthisisa24/7securityoperationscentre. About Us NTT DATA is one of the world's largest Global Security services providers with over 7500 Security SMEs … from security incidents. Develop and maintain incident response plans, ensuring they align with industry best practices. Escalation management in the event of a security incident Follow major incident process Threat Intelligence: Stay abreast of the latest cybersecurity threats and vulnerabilities, integrating threat intelligence into security monitoring processes. Contribute to the development of threat intelligence feeds to enhance … proactive threat detection. Proactively hunt for threats within enterprise environments using SIEM and EDR solutions. Fine-tune SIEM detection rules, correlation alerts, and log sources to reduce false positives. Analyse threat intelligence feeds, map findings to MITRE ATT&CK framework, and provide actionable security recommendations. Collaborate with SOC teams to investigate alerts, escalate incidents, and improve detectionMore ❯
The team you'll be working with: P3 Senior SOC Analyst (L3) We are currently recruiting a Senior SOC Analyst L3 Managed Detection and Responseto join our growing Security Operations Centre business. ThisrolewillbebasedonsiteinBirmingham,youwillneedtobewillingtoworkinshiftpatters,probably4dayson,4daysoff,asthisisa24/7securityoperationscentre. About Us NTT DATA is one of the world’s largest Global Security services providers with over 7500 Security SMEs … from security incidents. Develop and maintain incident response plans, ensuring they align with industry best practices. Escalation management in the event of a security incident Follow major incident process Threat Intelligence: Stay abreast of the latest cybersecurity threats and vulnerabilities, integrating threat intelligence into security monitoring processes. Contribute to the development of threat intelligence feeds to enhance … proactive threat detection. Proactively hunt for threats within enterprise environments using SIEM and EDR solutions. Fine-tune SIEM detection rules, correlation alerts, and log sources to reduce false positives. Analyse threat intelligence feeds, map findings to MITRE ATT&CK framework, and provide actionable security recommendations. Collaborate with SOC teams to investigate alerts, escalate incidents, and improve detectionMore ❯
our IT and Operational Technology (OT) environments. This is a hands-on, technically rich role where you will work with a wide range of security tools and collaborate with threat intelligence, vulnerability management, and incident response teams. You will engineer solutions to mitigate threats, automate detection and response, and ensure our systems remain secure, resilient, and compliant. Why … a dynamic and impactful role that offers technical depth, cross-functional collaboration, and the chance to shape Cadent’s cyber resilience. Technical Challenge – Work with advanced SIEM, SOAR, and threatdetection tools across IT and OT environments. Strategic Contribution – Influence the development of new controls and support the delivery of Cadent’s cyber security strategy. Cross-Team Collaboration … Partner with threat intelligence, vulnerability analysts, and incident responders to enhance our defences. Continuous Improvement – Engineer solutions for unpatchable vulnerabilities and automate detection and response processes. National Impact – Help protect the systems that keep gas flowing to millions of homes and businesses. What you'll bring: You are a technically skilled and security-focused professional with a strong More ❯
Proven experience in cyber security operations and incident management. * Strong knowledge of ISO 27001, NIST, and related frameworks. * Experience with GRC processes and tools. * Familiarity with SOC operations and threatdetection technologies. * Excellent understanding of the cyber threat landscape and mitigation strategies. * Demonstrated ability to train teams and promote security awareness. * Strong stakeholder engagement and communication skills. … consult you before submitting it to any client. Keywords: Cyber Security Lead, Incident Management, InfoSec, Cyber Assurance, ISO 27001, NIST, CISSP, CISM, GSLC, CCP, GIS, GRC, SOC, Risk Management, Threat Intelligence, Defence, Stakeholder Engagement, SC Clearance, Cyber Compliance, Security Governance, Security Awareness, West Midlands, Cyber Risk, Cyber Strategy, Adecco More ❯
The Company Join a growing and innovative professional services business, operating at the forefront of cybersecurity across both IT and industrial environments. With a strong focus on compliance, threatdetection, and operational resilience, the company empowers its clients to meet and exceed modern security standards. You’ll be part of a forward-thinking team, working alongside cybersecurity specialists … role. Your Skills & Experience Required: 3+ years of experience in IT security/cybersecurity Certifications such as CompTIA Security+, CCNA Security, or equivalent Strong understanding of cybersecurity frameworks and threat analysis Experience with SIEM, MDR/XDR, and incident triage Solid knowledge of operating systems (Windows, Linux, Cisco) Excellent communication skills - ability to collaborate across teams and with clients More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
BT Group
play a critical role in designing, developing, and maintaining our security information and event management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threatdetection, incident response, and overall security posture. This role is hybrid (3 days in office) and can be based in one of the following offices: Birmingham, Manchester, Ipswich … you'll be doing SIEM Solution Development: Collaborate with security analysts and architects to design and implement SIEM solutions using Elasticsearch. Optimize SIEM rules, alerts, and dashboards for efficient threat detection. Collaborate effectively with others to drive forward key security objectives Presentation and documentation writing (to both technical and business audiences) Query Optimization and Performance Tuning: Write efficient Elasticsearch … informed about emerging threats and security best practices. Data Ingestion and Enrichment: Configure Elasticsearch pipelines for data ingestion from various sources, primarily from Kafka Enhance data enrichment by integrating threat intelligence feeds and contextual information. Keep abreast of relevant technologies in the area Reading, attending briefings and talks. Contribute to the running of your team. Knowledge-sharing, In team More ❯
adoption. Serve as the voice of the customer within the business, ensuring their expectations are understood and consistently met. Contribute to comprehensive customer reporting, including analysis of service performance, threatdetection trends, investigation outcomes, and related metrics such as SLAs, ingestion data, and vulnerability findings. Collaborate with engineering to identify opportunities for service enhancement and implement technical upgrades. More ❯
Level 1 (BLT1) or SC-200, this could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands on experience: - ThreatDetection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct forensic investigations, and … support remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threat intelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication – Work closely and collaborate with senior analysts and clients to keep security operations running smoothly. The Ideal Profile: - Experience in an IT-focused … cybersecurity and SOC operations. Proactive and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threat intelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration drive success. Ready to elevate More ❯
or SC-200, this could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands on experience: - Virtual job fairs ThreatDetection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct forensic investigations, and … support remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threat intelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication – Work closely and collaborate with senior analysts and clients to keep security operations running smoothly. The Ideal Profile: - Experience in an IT-focused … cybersecurity and SOC operations. Proactive and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threat intelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration drive success. Ready to elevate More ❯
or data leakage. • Integrate cloud-native security tools ( AWS Macie) for data discovery and classification. Security Monitoring & SIEM: • Integrate with SIEM platforms e.g., Splunk for real-time monitoring and threat detection. • Integrate logs and telemetry from Pega CRM, telephony/contact center platforms, and cloud data services. • Define correlation rules and alerts for proactive incident detection and response. … Application Security: • Conduct secure code reviews, threat modelling, and vulnerability assessments. • Work with development and operations teams to integrate security into the SDLC and CI/CD pipelines. More ❯
Walsall, England, United Kingdom Hybrid / WFH Options
HomeServe UK
on experience in protecting systems, networks, and cloud environments. A proactive mindset with a drive to identify, own, and resolve security challenges end-to-end. Strong technical skills in threatdetection, vulnerability management, identity and access control, and incident response. Familiarity with security tools such as SIEM, EDR, firewalls, and cloud security solutions. Knowledge of security frameworks like More ❯
week ago Be among the first 25 applicants Get AI-powered advice on this job and more exclusive features. About IT Security Threat Analyst - Solihull Crimson and IMI have joined forces to build IMI's new security team and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security … team that is shaping the future of security within a successful global company, we want to hear from you! We are seeking a highly skilled and experienced IT Security Threat Analyst to join the team. In this role, you will be responsible for identifying, analysing and mitigating potential threats to our organisation's information systems. You will work closely … with the Head of IT Security for Incident and Threat Management and other teams to ensure comprehensive security measures are in place. The salary on offer for this position will be between £40,000 and £50,000 plus benefits depending on experience. Key Responsibilities Monitor and analyse security alerts and incidents to identify potential threats. Conduct thorough investigations of More ❯
Derbyshire, England, United Kingdom Hybrid / WFH Options
Hays
and regulations. You will be responsible for leveraging and optimising a number of tools including, MS Defender, Sentinel, Azure and the external SOC partner to enhance cyber resilience, conduct threat analysis, and proactive risk assessments to design effective controls. You will be leading the Cyber Security operations function, by providing strategic direction and coordinating day-to-day delivery of … threat intelligence, threatdetection, incident response, vulnerability management, and ethical hacking capabilities. You will be leading a team of Infrastructure Engineers, ensuring strong data controls are in place, whilst working closely with key stakeholders to establishing responsibilities and ensure an end-to-end approach to cyber resilience Is embedded in other functions. What you'll need to More ❯
Chesterfield, Derbyshire, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
and regulations. You will be responsible for leveraging and optimising a number of tools including, MS Defender, Sentinel, Azure and the external SOC partner to enhance cyber resilience, conduct threat analysis, and proactive risk assessments to design effective controls.You will be leading the Cyber Security operations function, by providing strategic direction and coordinating day-to-day delivery of threat intelligence, threatdetection, incident response, vulnerability management, and ethical hacking capabilities. You will be leading a team of Infrastructure Engineers, ensuring strong data controls are in place, whilst working closely with key stakeholders to establishing responsibilities and ensure an end-to-end approach to cyber resilience Is embedded in other functions. What you'll need to succeed More ❯
Derby, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
and regulations. You will be responsible for leveraging and optimising a number of tools including, MS Defender, Sentinel, Azure and the external SOC partner to enhance cyber resilience, conduct threat analysis, and proactive risk assessments to design effective controls. You will be leading the Cyber Security operations function, by providing strategic direction and coordinating day-to-day delivery of … threat intelligence, threatdetection, incident response, vulnerability management, and ethical hacking capabilities. You will be leading a team of Infrastructure Engineers, ensuring strong data controls are in place, whilst working closely with key stakeholders to establishing responsibilities and ensure an end-to-end approach to cyber resilience Is embedded in other functions. What you'll need to More ❯
Stafford, England, United Kingdom Hybrid / WFH Options
CYBER RANGES Corp
exciting opportunity to design and deliver cutting-edge cyber exercises in collaboration with global organisations. You’ll lead scenario development, simulate real-life incidents, and help organisations improve their threatdetection and response capabilities. You will work closely with clients, internal stakeholders, and the threat emulation team, and you will bring your own ideas on how to … after-action reporting to ensure continuous improvement. Make the world a more secure place. What You Bring: 3-5+ years of hands-on experience in Incident Response operations, threatdetection, and mitigation. Strong understanding of Red Team/Offensive Security methodologies (Purple Team approach). Experience in large-scale cyber capacity-building projects or technical and tabletop More ❯
IT Security Threat Analyst – Solihull Crimson and IMI have joined forces to build IMI's new security team and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security and want to be part of a dynamic team that is shaping the future of security within a successful global … company, we want to hear from you! We are seeking a highly skilled and experienced IT Security Threat Analyst to join the team. In this role, you will be responsible for identifying, analysing and mitigating potential threats to our organisations information systems. You will work closely with the Head of IT Security for Incident and Threat Management and … plus benefits depending on experience. Key Responsibilities Monitor and analyse security alerts and incidents to identify potential threats. Conduct through investigations of security breaches and incidents. Develop and implement threatdetection and response strategies. Collaborate with cross functional teams to enhance security protocols. Provide detailed reports and recommendations on threat mitigation. Participate in incident response. Critical Skills More ❯
IT Security Threat Analyst - Solihull Crimson and IMI have joined forces to build IMI's new security team and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security and want to be part of a dynamic team that is shaping the future of security within a successful global … company, we want to hear from you! We are seeking a highly skilled and experienced IT Security Threat Analyst to join the team. In this role, you will be responsible for identifying, analysing and mitigating potential threats to our organisations information systems. You will work closely with the Head of IT Security for Incident and Threat Management and … plus benefits depending on experience. Key Responsibilities * Monitor and analyse security alerts and incidents to identify potential threats. * Conduct through investigations of security breaches and incidents. * Develop and implement threatdetection and response strategies. * Collaborate with cross functional teams to enhance security protocols. * Provide detailed reports and recommendations on threat mitigation. * Participate in incident response. Critical Skills More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
IT Security Threat Analyst - Solihull Crimson and IMI have joined forces to build IMI's new security team and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security and want to be part of a dynamic team that is shaping the future of security within a successful global … company, we want to hear from you! We are seeking a highly skilled and experienced IT Security Threat Analyst to join the team. In this role, you will be responsible for identifying, analysing and mitigating potential threats to our organisations information systems. You will work closely with the Head of IT Security for Incident and Threat Management and … plus benefits depending on experience. Key Responsibilities Monitor and analyse security alerts and incidents to identify potential threats. Conduct through investigations of security breaches and incidents. Develop and implement threatdetection and response strategies. Collaborate with cross functional teams to enhance security protocols. Provide detailed reports and recommendations on threat mitigation. Participate in incident response. Critical Skills More ❯
Location: Birmingham, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 4 Posted: 10.06.2025 Expiry Date: 25.07.2025 col-wide Job Description: IT Security Threat Analyst – Solihull Crimson and IMI have joined forces to build IMI's new security team, and we are looking for talented individuals to join us on this exciting journey. … a dynamic team shaping the future of security within a successful global company, we want to hear from you! We are seeking a highly skilled and experienced IT Security Threat Analyst to join the team. In this role, you will be responsible for identifying, analyzing, and mitigating potential threats to our organization's information systems. You will work closely … with the Head of IT Security for Incident and Threat Management and other teams to ensure comprehensive security measures are in place. The salary for this position will be between £40,000 and £50,000 plus benefits, depending on experience. Key Responsibilities Monitor and analyze security alerts and incidents to identify potential threats. Conduct thorough investigations of security breaches More ❯