location to perform storytelling. You will • Work with reporting and AI tools such as PowerBI and Databricks to produce insights from a range of cyber security tools such as vulnerabilitymanagement, identity management, detection and response and other cyber security tools to drive cyber security position. • Meet with managers and stakeholders regularly to understand and deliver and More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
activities, including incident monitoring and response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards, and risk management processes. Audit Preparation: Assist internal control owners in scoping appropriate evidence and preparing for external audits. Gap Assessments: Facilitate and/or conduct internal gap assessments and audit readiness … of compliance processes. Audit Findings: Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security Monitoring: Use tools such as … and implementing recommendations to improve the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. VulnerabilityManagement: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong expertise in audit and compliance More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
83zero Ltd
and incidents in line with ITIL processes Monitor and enhance network security controls including web security gateways, NAC, endpoint security, and perimeter defense Contribute to internal reviews, security audits, vulnerability assessments, and penetration testing Support firewall rule changes, VPN access, network segmentation, and performance improvements Participate in on-call rotation for high-priority issues and assist during major incidents … secure environments with a focus on proactive security posture Knowledge of network security tools such as Cisco Secure Access, Cisco ISE, Microsoft Defender XDR, Sentinel, and SentinelOne Comfortable with vulnerabilitymanagement frameworks and tools Familiarity with network monitoring and performance management Previous experience working within an ITIL-based support framework Hands-on experience with Check Point, Cisco More ❯
and documenting technical solutions and infrastructure upgrades Leading complex escalations from the Service Desk, providing in-depth troubleshooting and resolution Planning, managing, and executing technical projects, ensuring clarity, risk management, and stakeholder updates Providing out-of-hours support on a shared rotation basis What You Bring: A logical, methodical approach to problem solving Excellent communication skills both with clients … timelines and escalating appropriately Full UK Driving Licence Technical Skills & Experience: In-depth experience with Microsoft 365, PowerShell, MDM/MAM (e.g., Intune), and RMM tools Hands-on endpoint management & deployment experience Familiarity with vulnerabilitymanagement platforms (e.g., Qualys) Security-conscious mindset, with exposure to frameworks like Cyber Essentials Broad infrastructure knowledge (servers, networks, cloud services) MSP More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
Castle Trust Group
etc Comprehensive understanding of M365 and InTune Strong understanding of Private/Public clouds, such as Hyper-V, Azure, AWS and GCP Comfortable with PowerShell scripting Knowledge & experience of vulnerabilitymanagement tooling such as Qualys Knowledge of networking, TCP/IP, LAN/WAN, VPN, Routers, Switches and Firewalls Desirable Packaging and deploying applications What is also important More ❯
Basingstoke, Hampshire, England, United Kingdom Hybrid / WFH Options
SNG (Sovereign Network Group)
SIEM and other security tools Conduct triage of security incidents and escalate as appropriate Collaborate with the SOC and internal teams to respond to and resolve security events Drive vulnerability remediation across infrastructure and cloud environments Participate in incident response activities, forensic investigations, and risk mitigation Participate in an on-call rota for out-of-hours cyber incident response … re Looking For Experience in a Cyber Security Analyst role or similar Solid understanding of cyber security principles and industry best practices Experience with SIEM tools, log analysis, and vulnerabilitymanagement Understanding of cloud, network, and endpoint security concepts Strong analytical skills and attention to detail Excellent communication and documentation skills Your Benefits We have some great benefits More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Talent Locker
or HP networking tech (CLI preferred), plus Check Point or similar firewalls Familiarity with tools such as Microsoft Defender XDR, Sentinel, iBoss, Cisco ISE or Secure Access Awareness of vulnerabilitymanagement, threat prevention, and SOC tooling Ability to investigate and troubleshoot under pressure with a methodical, root-cause approach Previous experience in an ITIL-aligned environment Why this More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Talent Locker
for someone who enjoys hands-on engineering, improving SOC effectiveness, and shaping threat detection capabilities at scale. What you'll be doing Deploying and configuring security tools including SIEM, vulnerability scanning and endpoint monitoring Developing use cases, alerts, and dashboards to support active threat detection Writing and maintaining SOC playbooks and triage workflows Performing 2nd line security monitoring, incident … have: Familiarity with MOD policy (e.g. JSP 440, JSP 604) and assurance practices Experience with CI/CD tools, Kubernetes and modern DevSecOps approaches Knowledge of Tenable/Nessus, vulnerabilitymanagement and SOC operations Exposure to working within a defence, security or mission-critical environment Looking for a role where your expertise has real-world impact in a More ❯