Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Business Consultants Group
on system performance, incidents, and resolutions. Provide regular updates to the IT Manager on system status and projects. Follow ITIL-based processes for incident management, problem management, change management, and service level management. Contribute to the development and improvement of IT policies, procedures, and standards. Keep up … . Understanding of cybersecurity best practices and tools (firewalls, antivirus, SIEM). Scripting skills (PowerShell, Bash, Python) for automation and troubleshooting. Experience with Unified ThreatManagement (UTM) Firewalls and other security technologies. Experience with Linux and Linux-based platforms/software. Proven ability to work on infrastructure projects … the ability to effectively collaborate with technical and non-technical stakeholders. Strong problem-solving skills and attention to detail. Experience with ITIL-based incident management, problem management, change management, and service level management - certification desirable. Excellent customer service and communication skills, both written and verbal. Ability More ❯
to safeguard critical business operations by design and default. You will be responsible for security automation, CI/CD pipeline enhancements , and cloud security management , ensuring compliance with industry standards. Key Responsibilities Security & DevOps Integration: Support and extend the secured CI/CD pipeline to enhance development security. Work … secure AWS cloud infrastructure for clients and internal operations. Automate AWS infrastructure builds following CIS hardening standards . Ensure top-tier security configuration, access management, and incident response on cloud platforms. Operational Support & Incident Response: Support business-critical Windows and Linux-based environments. Monitor and respond to security alerts … across Infosec, servers, firewalls, and applications. Conduct continuous monitoring of internal and third-party information security controls. Threat & Vulnerability Management: Assess SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) scans. Implement remediation and mitigation strategies in collaboration with development teams. Maintain network security protocols, firewalls More ❯
Warwick, Warwickshire, West Midlands, United Kingdom
La Fosse
Cyber Threat Intelligence Analyst We are helping a household name that impacts all of our lives to develop new cyber capabilities from the ground up. They're looking for a Cyber Threat Intelligence analyst to help out with their Threat Intell function and keep them ahead of … the curve when it comes to threatmanagement and security automation. This is a rare opportunity to join a large organisation and play a pivotal role in building new capabilities with no legacy systems in place and you'll have the chance to shape the future of their … cybersecurity operations from the very beginning. We're looking for candidates with experience in: Threatmanagement and modelling TTPs Cyber threat intelligence tools and technologies. Staying up to date with new and emerging threats Details: Location: West Midlands – 2x a month on-site Salary: Up to More ❯
Cyber Threat Intelligence Analyst We are helping a household name that impacts all of our lives to develop new cyber capabilities from the ground up. They're looking for a Cyber Threat Intelligence analyst to help out with their Threat Intell function and keep them ahead of … the curve when it comes to threatmanagement and security automation. This is a rare opportunity to join a large organisation and play a pivotal role in building new capabilities with no Legacy systems in place and you'll have the chance to shape the future of their … cybersecurity operations from the very beginning. We're looking for candidates with experience in: Threatmanagement and modelling TTPs Cyber threat intelligence tools and technologies. Staying up to date with new and emerging threats Details: Location: West Midlands - 2x a month on-site Salary: Up to More ❯
Client is looking to recruit an all-round individual with expert knowledge and hands-on experience of IT Infrastructure coupled with Security, Compliance & Risk Management You must have upwards of 10 years hands-on expertise in IT Infrastructure combined with Security and Risk – ideally from within the banking or … Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational … when required) and have a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management • Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. • Oversee the adoption of zero-trust More ❯
as a Cyber Audit AVP where you will collaborate with cross-functional teams to provide independent and reliable Cyber Security audit assurance to executive management and the Board on governance, risk management, and control effectiveness. In this role, you will contribute to audit planning and execution, risk assessment … Cyber Security. Experience in developing and executing assurance testing approaches in areas such as data security, security configuration, network security, cyber incident response, vulnerability management, cyber threatmanagement, information risk management, data leakage protection, identity & access management, cyber resilience. Knowledge of emerging technology, cyber security More ❯
nutshell The principal purpose of the role is to identify, contain, eradicate, and recover from information security incidents. Assisting the Information and Cyber Security Management team in implementing improvement initiatives that increase our maturity across our ThreatManagement capabilities. The role will require extensive Incident Response experience … including developing threat hunting capabilities, security use cases and playbooks. Day to day Development of the tools and processes to establish and improve the threat hunting program. Keeping an up-to-date understanding of the cyber threat landscape through threat intelligence and industry research. Define and … design new security use cases and alerts to identify evolving attack scenarios. Participate in industry-based Threat Intelligence sharing groups. Produce reports based on threat activity, trends and reported industry incidents. Leading security incident response processes with support from the principal analyst. Integrating and analysing threat intelligence More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Eames Consulting
focus lies on IT Security expertise within the financial services sector. The ideal candidate will possess robust skills in various Security domains, including Access Management, ThreatManagement, Incident Response and Recovery, Data Protection, Vulnerability Management, Monitoring and Logging, Physical Security, and Security Risk Management and More ❯
path, with support all the way. A diverse set of minds that work cross-functionally and broadly together. Introduction to role Identity and Access Management are among the most critical aspects of any modern cyber security program. Threat actors increasingly leverage identity-based attacks for intrusion and lateral … capability roadmaps, and execution plans across all key IAM domains-including workforce, consumer and machine identity, authentication and authorization platforms and access governance, identity threatmanagement, and IAM-related policies and standards. As a key member of our security leadership team, you will lead a team of IAM … delivery, and day-to-day operations. The ideal candidate will have a solid background in Active Directory, cloud authentication and authorization flows, privileged access management, identity federation, and a demonstrable record of building secure and scalable IAM programs in a fast-paced, innovation-driven environment. This role requires both More ❯
role is critical in protecting sensitive data, ensuring system integrity, and mitigating risks while maintaining compliance with industry regulations. Your Responsibilities: Security Strategy & Risk Management Develop and execute a comprehensive IT & OT security strategy aligned with industry standards. Identify, assess, and mitigate security risks across the supply chain and … security tools (Nozomi Guardian, Armis, Claroty, Microsoft Defender for IoT). Establish and enforce a security policy framework for supply chain technologies. Incident Response & ThreatManagement Develop and lead incident response plans to handle security threats. Conduct risk assessments and implement remediation plans without disrupting operations. Perform threat … and improve security controls. Define and track security KPIs to measure effectiveness. Collaborate with Philips' Security Office to drive continuous security improvements. Vendor & Stakeholder Management Conduct security assessments of suppliers to ensure compliance with security standards. Train employees and stakeholders on security best practices to foster a culture of More ❯
guiding investigations, and helping shape the future of our security strategy. If you’re passionate about cyber security and thrive in a fast-paced, threat-driven environment, we want to hear from you. 🔐 What You’ll Be Doing Monitor & Detect: Identify and respond to security alerts from SIEM, IDS …/IPS, EDR, and other tools. Incident Response: Investigate threats and escalate incidents, ensuring rapid containment and resolution. Threat Hunting: Proactively search for hidden threats and conduct forensic investigations. Lead & Mentor: Manage SOC analysts and support their technical and professional growth. Tool Optimisation: Oversee and fine-tune security platforms … innovation and stay ahead of emerging threats, tactics, and techniques. External Engagement: Work with partners to strengthen the defensive posture and maintain compliance. Insider ThreatManagement: Lead investigations and support sensitive case handling. 🛠 What You Bring to the Role Must-Have Experience: Strong background in cyber security, protective More ❯
Portsmouth, yorkshire and the humber, United Kingdom
Franklin Fitch
guiding investigations, and helping shape the future of our security strategy. If you’re passionate about cyber security and thrive in a fast-paced, threat-driven environment, we want to hear from you. 🔐 What You’ll Be Doing Monitor & Detect: Identify and respond to security alerts from SIEM, IDS …/IPS, EDR, and other tools. Incident Response: Investigate threats and escalate incidents, ensuring rapid containment and resolution. Threat Hunting: Proactively search for hidden threats and conduct forensic investigations. Lead & Mentor: Manage SOC analysts and support their technical and professional growth. Tool Optimisation: Oversee and fine-tune security platforms … innovation and stay ahead of emerging threats, tactics, and techniques. External Engagement: Work with partners to strengthen the defensive posture and maintain compliance. Insider ThreatManagement: Lead investigations and support sensitive case handling. 🛠 What You Bring to the Role Must-Have Experience: Strong background in cyber security, protective More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Proftech Talent
Providing expert guidance on live security incidents and helping conduct robust investigations in order to identify corrective actions and see them through to completion. Threat Intelligence . Provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. Vulnerability Assessment. Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. Risk Management . Ability to identify IT security risks and the delivery of audit remediation activities. Emerging technology monitoring. Ability gather and assess information on new and emerging technologies … Working Hours : Full time Monday - Friday Location : Birmingham/Hybrid Duration : Permanent Role of Senior IT Security Officer: Support in the management of the Security Operations, establishing and delivering methods and tools to provide value and reduce risk across proactive monitoring, incident response, threatmanagement and vulnerability More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom
TransUnion
We Are TransUnion: TransUnion is a major credit reference agency, and we offer specialist services in fraud, identity and risk management, automated decisioning and demographics. We support organisations across a variety of sectors including finance, retail, telecommunications, utilities, gaming, government and insurance. We’re looking for a Senior Information … responsible for maintaining end-to-end security through compliance with global policy, standards, regulations and industry best practices. This person works with Information Security management to implement a cloud first programme for enabling security standards across people, process and technology within the TransUnion Monevo portfolio. Day to Day You … ll Be: Guides and advises technology teams on infrastructure vulnerability and threatmanagement principles, secure coding practices, secure software development methodologies, and secure development lifecycle (SDLC) processes Works with engineering and development team to ensure in-house technologies comply with relevant security standards, regulations, and industry certifications, such More ❯
Dover, Kent, South East, United Kingdom Hybrid / WFH Options
Migrant Help
experience we are looking for in our Information Security Officer: Proficiency in security domains, tools and technologies such as DLP, SIEM, SOAR and Vulnerability Management Good working knowledge of network security, firewalls, threatmanagement, endpoint detection and response Ability to identify, assess, and mitigate security risks and More ❯
Shepherdswell, Kent, United Kingdom Hybrid / WFH Options
Migrant Help
experience we are looking for in our Information Security Officer: Proficiency in security domains, tools and technologies such as DLP, SIEM, SOAR and Vulnerability Management Good working knowledge of network security, firewalls, threatmanagement, endpoint detection and response Ability to identify, assess, and mitigate security risks and More ❯
support the organisational objectives The experience and skills you need Proficiency in security domains, tools and technologies such as DLP, SIEM, SOAR and Vulnerability Management Good working knowledge of network security, firewalls, threatmanagement, endpoint detection and response Ability to identify, assess, and mitigate security risks and More ❯
Pre-Sales or similar role within an MSP/Reseller. Experience with incident response teams and understanding of response stages. Familiar with endpoint detection, threatmanagement, and cyber security services (SSE, SASE, SIEM, MDR/EDR). Strong knowledge of global Information Security Standards (ISO27002, NIST CSF). More ❯
West Midlands, United Kingdom Hybrid / WFH Options
La Fosse
a household name that impacts all of our lives to develop new cyber capabilities from the ground up. They're looking for a Cyber Threat Manager (OT/CNI) to help out build out their Cyber Defence Function in the OT/CNI space and keep them ahead of … the curve when it comes to threat management. This is a rare opportunity to join a large organisation and play a pivotal role in building new capabilities with no legacy systems in place and you'll have the chance to shape the future of their cybersecurity operations from the … very beginning. We're looking for candidates with experience in: Cyber Defence SecOps Incident Response Digital Forensics ThreatManagement Operational Technology CNI Staying up to date with new and emerging threats Details: Location : West Midlands – Hybrid Salary : Up to £95,000 Bonus : 10% Pension : 6%/10% Healthcare More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Halian
security, and hands-on experience with leading security technologies. You will be responsible for ensuring the security and integrity of our systems, providing proactive threat detection and response, and supporting the implementation of security controls and policies across cloud, on-premise, and hybrid environments. This role also involves working … cloud environments, with expertise in Microsoft Azure security best practices. Work with Palo Alto Networks or Panorama solutions for enterprise-wide network security and threat management. Leverage Infrastructure as Code (IaC) principles using Terraform to automate security policies and infrastructure deployment. Utilize Security Information and Event Management (SIEM … monitor, detect, and respond to security incidents. Create and maintain runbooks for security incident response, including automating workflows to improve incident response times. Lead threat hunting activities across on-premises and cloud environments to proactively identify potential security threats. Assist with Cyber Essentials Plus and ISO 27001 audits and More ❯
High Wycombe, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Dreams Ltd
retail/multi-site/FMCG space. - Understanding IT Security concepts used in dispersed organisations, such as Firewalls, Web Filtering, Virus Protection, encryption and Threat Management. - Understanding the needs of secure IT environments, backup and patch processes and change control process. - Awareness of ITIL principles and best practice and More ❯
Reigate, Surrey, South East, United Kingdom Hybrid / WFH Options
Opus Business Systems Ltd/T.A.Opus Telecom
relating to the division. The role is to develop sales opportunities for new clients through selling Mobile Networks O2, VF and EE, UEM, Mobile Threat Management. In addition, you will have a strong cross sell strategy in creating referral opportunities to either partner with or hand over to the More ❯
Job Description Cyber Threat Analyst Roles and Responsibilities Tier 2 Analyst You must hold a UK passport only due to security clearance requirements. Only single nationality applicants are accepted. (2nd passport holders, OCI & ILR candidates cannot be considered). You must have been in the UK for the last … least 6 months of experience with SIEM technologies Job Overview The Tier 2 Cyber Security Analyst is a mid-level position within the Cyber Threat Analysis Centre (CTAC). Responsible for advancing initial investigations conducted by Tier 1 Analysts, providing in-depth analysis of potential threats, and supporting escalated … response. The role involves collaboration with senior and junior analysts to ensure effective SOC operations and acts as a bridge between foundational and advanced threat detection and response functions. Responsibilities Conduct escalated triage and analysis on security events identified by Tier 1 Analysts, assessing threat severity and advising More ❯