3 of 3 Threat Management Jobs in the North of England

Senior Manager, Cyber Security, Identity , TC UKI

Hiring Organisation
Jobleads-UK
Location
Manchester, England, United Kingdom
Cyber Practice - is part of a global cyber team of 5,000+ professionals focused on developing and delivering cutting edge security transformation programmes, cyber threat management, identity and access management, security architecture, data protection and privacy, and resilience services. We are part of a wider advisory organisation … all. Location - London, Manchester or Scotland The opportunity EY is seeking experienced team members who can review, design and deliver Cyber Identity and Access Management (IAM) services. You will take a key position in delivering EY’s cyber security and IAM capabilities. You will also take a supporting role ...

Cyber Security Lead

Hiring Organisation
Infoplus Technologies UK Ltd
Location
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Employment Type
Contract
Contract Rate
From £500 to £550 per day
practices. Proven track record in designing and implementing security controls and solutions at scale. Strong technical expertise in areas such as network security, identity management, cryptography, and automation. Experience leading technical teams and managing cross-functional projects. Willingness to travel as required Excellent communication skills, with the ability … appetite with a particular focus on AI. Technical Engineering Leadership: Oversee the engineering and integration of security controls across platforms, including identity and access management, network security, endpoint protection, and data security. Champion automation and secure-by-design principles. Platform Security: Drive the secure design and operation of critical ...

Cyber Security Operations Manager

Hiring Organisation
Acorn Insurance
Location
Liverpool, Merseyside, North West, United Kingdom
Employment Type
Permanent, Work From Home
Salary
£75,000
operational security function responsible for protecting the organisation's information assets, technology services, and users. This role oversees all security operation functions, incident response, threat detection, vulnerability management, and continuous improvement of the organisation's security posture. Working closely with Infrastructure, Cloud, Architecture, Governance, Compliance and Risk teams … relationship with any outsourced SOC solution ensuring 24/7 monitoring and response coverage. Oversee cyber defence capabilities including SIEM, SOAR, EDR/XDR, threat intelligence, and identity protection. Develop and maintain operational procedures, playbooks, and response frameworks. Direct the full incident response lifecycle: detection, triage, containment, eradication, recovery ...