and Security functions are central to this position, leading a team of specialist engineers to maintain the secure operation of services and contributing to major projects that impact identity management across the organisation. The post holder also serves as a technical authority within the team and department. What you'll need to succeed Security Operations & Incident Response Lead security … operations services, including monitoring, incident response, threatmanagement, and intrusion detection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery efforts with internal teams and vendors. Establish and manage threat intelligence processes to ensure timely remediation of vulnerabilities. Monitor and analyse … performance metrics to support security troubleshooting and continuous improvement. Identity & Access Management Provide expert technical leadership for identity and access management, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of identity services, ensuring reliability and user demand readiness. Shape and deliver a strategic roadmap for identity services, focusing on automation and More ❯
and Security functions are central to this position, leading a team of specialist engineers to maintain the secure operation of services and contributing to major projects that impact identity management across the organisation. The post holder also serves as a technical authority within the team and department. What you'll need to succeed Security Operations & Incident Response Lead security … operations services, including monitoring, incident response, threatmanagement, and intrusion detection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery efforts with internal teams and vendors. Establish and manage threat intelligence processes to ensure timely remediation of vulnerabilities. Monitor and analyse … performance metrics to support security troubleshooting and continuous improvement. Identity & Access Management Provide expert technical leadership for identity and access management, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of identity services, ensuring reliability and user demand readiness. Shape and deliver a strategic roadmap for identity services, focusing on automation and More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
R3vamp Limited
Security Operations Manager Location: Hybrid - Reading area Salary: Up to £73,000 per annum Type: Permanent | Full-Time Are you a technical security leader with deep expertise in identity management and a passion for building high-performing teams? This is a fantastic opportunity to shape and lead a modern Security Operations function at a forward-thinking public sector organisation. … You’ll manage a team of specialists covering Microsoft Entra ID (Azure AD), Microsoft 365 and broader technical security tooling, while shaping the strategic direction of identity and access management services. What You’ll Be Doing Leading a small but highly skilled team across identity, M365, and security operations Overseeing day-to-day technical delivery and long-term strategy … for identity and access services Driving improvements in security monitoring, incident response and threatmanagement Managing the relationship with an outsourced 24/7 SOC partner Influencing roadmap decisions around tooling, automation and “shift-left” initiatives Acting as the go-to expert on Microsoft Entra ID and Active Directory What You’ll Bring Proven leadership experience in Security More ❯
understanding of GDPR and experience leading a privacy team. Experience leading and developing teams of specialists. Exceptional communication skills to influence stakeholders at all levels. Familiarity with vulnerability and threatmanagement tools and processes, including SIEM, EDR, WAF, SSO, and penetration testing. Ability to deliver and prioritize multiple complex projects. Knowledge of relevant laws and compliance standards. Desirable More ❯