SIEM use cases: log ingestion, analytics rules, playbooks and workbooks. Deploy and manage Microsoft Defender solutions (Defender for Cloud, Defender for Servers, Defender for Containers) to harden Azure workload Vulnerability & Patch Management Operate vulnerabilitymanagement tools to discover and prioritise flaws across cloud and on-prem systems. Define and run patch management processes for virtual … machines, containers and serverless functions. Integrate vulnerability scanning (e.g. Qualys, Sonar Cloud, Tenable or Azure-native scanners) into CI/CD pipelines. Security Analysis & Incident Response Perform root-cause analysis of security incidents and vulnerabilities. Conduct threat modelling, code and infrastructure reviews. Develop and execute incident response procedures, leveraging Sentinel playbooks and Logic Apps when required. CI/CD … services (IAM, networking, Key Vault). Proven track record configuring and optimising Microsoft Sentinel (SIEM) and Microsoft Defender tools. Familiarity with Azure Policy and Azure Blueprints for compliance enforcement. Vulnerability & Patch Management Practical experience with vulnerability scanners (Qualys, Tenable, or Azure Defender Vulnerability Assessment). Knowledge of patch management frameworks (WSUS, Azure Update ManagementMore ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
Benefact Group plc
of the business, helping guide solutions that align with security and project requirements by articulating the real-world cyber security risks associated. You will also be responsible for our VulnerabilityManagement program ensuring that agreed SLAs are achieved and provide consultation when solutions are not straight forward. As the Senior Cyber Security Consultant, you will be providing mentorship … requests, you will provide subject matter expertise for internal projects and stakeholders, identifying risks and advising on the correct approach to mitigate those risks You will have responsibility for VulnerabilityManagement managing outputs from internal tooling and external vendors in order to prioritise remediation by relevant internal parties in order to ensure the identified risks are mitigated You … of the Team, fostering an inclusive, supportive and engaged learning environment, being a key contributor to a high performing and professional Security Team. Knowledge, skills and experience Strong stakeholder management skills A strong understanding of enterprise ICT and security principles A strong understanding of cloud security concepts and technologies Understanding of the CI/CD process and security integrations More ❯
user experience. The Role: What You ll Be Doing Network Security Design and maintain secure network infrastructures, monitor traffic, respond to suspicious activity, and conduct audits to ensure compliance. Vulnerability Analysis Carry out regular assessments and penetration tests, develop mitigation strategies, and report on remediation progress. Incident Response Lead incident detection, containment, and recovery efforts; conduct post-incident reviews … Security Tools Proficiency Hands-on experience with Palo Alto firewalls, IDS/IPS, and endpoint protection. Network Security Knowledge Deep understanding of VPNs, network protocols, and security architecture. Incident Management Proven ability to detect, analyse, and resolve security threats and malware. VulnerabilityManagement Experience in identifying and mitigating system vulnerabilities. Automation Skills Proficiency in security automation using … scripting tools like Python or PowerShell. Frameworks & Compliance Familiarity with ISO 27001, NIST 800-53, Cyber Essentials, and GDPR. Risk Management Strong grasp of risk assessment methodologies and security control frameworks. Communication Able to communicate technical concepts clearly to both technical and non-technical stakeholders. Project Management Experience managing security projects and working with cross-functional teams. Certifications More ❯
a leadership role within Defra's operational IT function, Group Infrastructure and Operations (GIO). The role requires demonstration of deep and wide-ranging IT leadership skills in service management and strategic direction setting of the Service Operations functions. The Head of Service Operations is responsible for the effectiveness of operational IT services and user support to ensure optimum … strategy, to remain effective whilst supporting modern service delivery approaches, including Agile and DevOps. As such the role requires the ability to function seamlessly between strategic thinking and operational management of live services. The role's level of operational responsibility is high and includes leading through major disruption at times of major incidents including cyber security ones. As a … be required to develop strong relationships with Defra group's delivery bodies and Arms Length Bodies (ALBs) in order to deliver core IT services as part of the Service Management Operating Model. Key Responsibilities Primary responsibility is to ensure service availability is maintained at required levels, and in doing so own the responsibilities of: Sets the vision, and strategy More ❯
Almondsbury, Gloucestershire, United Kingdom Hybrid / WFH Options
Frontier Resourcing
encompassing software, hardware, and services-by embedding robust security controls throughout the development lifecycle, identifying and mitigating risks, and ensuring compliance with defence-grade standards. Key Responsibilities Risk Assessments & VulnerabilityManagement Conduct comprehensive security risk assessments at each product phase (design, implementation, deployment). Identify vulnerabilities in architectures, codebases, and configurations; drive remediation with development and operations teams. …/27005, NIST 800-30/53, JSP 440/604, Def Stan 05-series). Lead the creation and maintenance of security documentation (RMADS, Security Assurance Documents, Security Management Plans). Testing & Assurance Design and execute penetration tests and automated vulnerability scans; validate fixes. Oversee third-party security assessments as required. Continuous Improvement Drive security tooling and … security technologies; evangelise best practices across teams. Qualifications & Experience Proven experience (5+ years) in product or application security within defence, government, or security-cleared environments. Deep knowledge of risk management frameworks (ISO 27001/2/5/31000, NIST 800-series) and Defence Standards (JSPs, Def Stan 05-138/139). Hands-on experience with security testing More ❯
STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics … and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerabilitymanagement, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills - Excellent organizational and analytical skills - Detail oriented with the ability to multi-task and prioritize efforts - Ability to express More ❯
Gloucester, Gloucestershire, England, United Kingdom
Opus Recruitment Solutions Ltd
embed security best practices. Define and enforce security policies, standards, and governance frameworks. Evaluate and integrate security tools (e.g., Microsoft Defender, Sentinel, Entra ID). Support incident response and vulnerabilitymanagement processes. Essential Skills Minimum 5 years’ experience as a Security Architect, with a strong focus on Azure environments. Deep understanding of cloud security frameworks (e.g., NIST, CIS … ISO 27001). Hands-on experience with the Microsoft security stack (Defender, Sentinel, Entra, Purview). Familiarity with Zero Trust architecture, identity and access management, and network security. Excellent stakeholder engagement and documentation skills. If intrested please apply with the most up to date CV More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Razorblue Group Ltd
accept, your responsibilities will encompass: Be the first line of defence: detect, analyse, and respond to real-time security incidents across razorblue and client networks Take the lead in vulnerabilitymanagement - from scanning and risk analysis to remediation coordination Run proactive security audits and phishing simulations to strengthen awareness and resilience Collaborate with infrastructure and network teams to … we would love you to apply. Full UK Driving License Entry-level security certifications (CompTIA Security+, CySA+, etc.) or working toward one Hands-on experience in security incident response, vulnerability assessments, and root cause analysis Skilled in producing incident reports, security metrics, and supporting training Comfortable with internal security audits and refining SOPs and playbooks Knowledge of key security More ❯