Lincoln, Lincolnshire, East Midlands, United Kingdom Hybrid / WFH Options
Walsh Employment
now seeking a Cyber Security Analyst to join the information security function. Reporting to the Information Security Manager , you will support critical activities related to threat monitoring, incident response, vulnerabilitymanagement and risk mitigation, while also acting as a key advocate for cyber awareness across the wider organisation Key Requirements Essential: 3+ years experience in cyber security Proficiency … in SIEM , antivirus , and vulnerabilitymanagement tools Understanding of AD , Office 365 , Windows Server , and infrastructure security Strong IT skills with experience across networks, OS, and security protocols Incident response and threat analysis expertise Familiar with Azure/Microsoft Defender and best practice frameworks ITIL Foundation certified (v3 or later) or experience in an ITIL environment Awareness of More ❯
This role ensures the protection of our assets, systems, and data from internal and external threats, whilst driving continuous improvement in security controls. About the role: Support in the management of the Security Operations, establishing and delivering methods and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management. Maintain … are dealt with, investigating security breaches where necessary. Support monitoring on external security environment, gathering information on emerging threats to HS2 and presenting them to leaders where required. Plan vulnerability assessment and penetration testing activities within HS2 IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. Contribute to risk management initiatives … and see them through to completion. Threat Intelligence. Provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. Vulnerability Assessment. Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. Risk Management. Ability to identify IT security risks and the delivery of More ❯
and Operational Technology (OT) environments. This is a hands-on, technically rich role where you will work with a wide range of security tools and collaborate with threat intelligence, vulnerabilitymanagement, and incident response teams. You will engineer solutions to mitigate threats, automate detection and response, and ensure our systems remain secure, resilient, and compliant. Why you'll … IT And OT Environments. Strategic Contribution – Influence The Development Of New Controls And Support The Delivery Of Cadent’s Cyber Security Strategy. Cross-Team Collaboration – Partner With Threat Intelligence, Vulnerability Analysts, And Incident Responders To Enhance Our Defences. Continuous Improvement – Engineer Solutions For Unpatchable Vulnerabilities And Automate Detection And Response Processes. National Impact – Help Protect The Systems That Keep More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
BT Group
following locations and follows hybrid working: Birmingham, Ipswich, Belfast What you’ll be doing Kubernetes DevOps/SysOps Engineering managing Kubernetes clusters and container orchestration, automating deployment, scaling, and management of containerized applications. Implement best practices for Kubernetes configuration and security. Work with log Collection Tools and Technologies (Beats, Elastic Agent, Logstash), syslog and other data collection protocols. DevOps … other related fields. 3-5 years of experience in CI/CD engineering experience with a different skillset. Experience in key cyber technologies such as SIEM technologies (Elastic preferred), vulnerabilitymanagement, access management and other commonly used Enterprise security controls. Ideally from both a development and operational perspective. At BT, we entertain, educate, and empower millions of More ❯
Walsall, England, United Kingdom Hybrid / WFH Options
HomeServe UK
in protecting systems, networks, and cloud environments. A proactive mindset with a drive to identify, own, and resolve security challenges end-to-end. Strong technical skills in threat detection, vulnerabilitymanagement, identity and access control, and incident response. Familiarity with security tools such as SIEM, EDR, firewalls, and cloud security solutions. Knowledge of security frameworks like NIST, ISO More ❯
Position: Cyber Security Lead Location: Nottingham (90% remote) Salary: Up to £75,000 + Bonus Key Skills: Penetration testing Vulnerabilitymanagement Threat detection Cyber defence Security best practices CISSP, CISM or similar certification About the Role Are you a cybersecurity professional looking to lead the charge against evolving digital threats? We are seeking an experienced Cyber Security Lead … implement a comprehensive cybersecurity strategy to protect our IT environment. Establish, enforce, and regularly update security policies, protocols, and standards. Manage real-time threat detection, incident response, and conduct vulnerability assessments to safeguard our infrastructure. Oversee the deployment of security solutions, working closely with internal teams to strengthen our defences. Collaborate with external security partners to ensure high-quality … will bring a strong technical background in cybersecurity as well as a strategic approach. Key qualifications include: Professional certification such as CISSP, CISM, or similar. Significant experience in cybersecurity management, ideally within a medium-to-large organisation. Extensive knowledge of security technologies, risk assessment, and vulnerability management. Hands-on experience with security monitoring tools and incident response. Familiarity More ❯
Position: Cyber Security Lead Location: Leicester (90% remote) Salary: Up to £75,000 + Bonus Key Skills: Penetration testing Vulnerabilitymanagement Threat detection Cyber defence Security best practices CISSP, CISM or similar certification About the Role Are you a cybersecurity professional looking to lead the charge against evolving digital threats? We are seeking an experienced Cyber Security Lead … implement a comprehensive cybersecurity strategy to protect our IT environment. Establish, enforce, and regularly update security policies, protocols, and standards. Manage real-time threat detection, incident response, and conduct vulnerability assessments to safeguard our infrastructure. Oversee the deployment of security solutions, working closely with internal teams to strengthen our defences. Collaborate with external security partners to ensure high-quality … will bring a strong technical background in cybersecurity as well as a strategic approach. Key qualifications include: Professional certification such as CISSP, CISM, or similar. Significant experience in cybersecurity management, ideally within a medium-to-large organisation. Extensive knowledge of security technologies, risk assessment, and vulnerability management. Hands-on experience with security monitoring tools and incident response. Familiarity More ❯
and checks to ensure security tooling is optimised Provide advice and support to business units on security best practice and control implementation Hands-on experience with security tooling (EDR, vulnerability scanning, access control) Familiarity with Security frameworks such as NIST, PCI-DSS, and GDPR Experience working with Microsoft environments (O365, Azure) Clear communicator, able to engage with both IT … role, and wants to take on broader responsibilities Has been the security point-person in an IT team, leading on patching or endpoint protection Has hands-on experience with vulnerabilitymanagement tools like Tenable, and is ready to play a bigger role in shaping how security tools are implemented and optimised across the business. This is a chance More ❯
tooling is optimised Provide advice and support to business units on security best practice and control implementation What We’re Looking For Hands-on experience with security tooling (EDR, vulnerability scanning, access control) Familiarity with Security frameworks such as NIST, PCI-DSS, and GDPR Experience working with Microsoft environments (O365, Azure) Clear communicator, able to engage with both IT … role, and wants to take on broader responsibilities Has been the security point-person in an IT team, leading on patching or endpoint protection Has hands-on experience with vulnerabilitymanagement tools like Tenable, and is ready to play a bigger role in shaping how security tools are implemented and optimised across the business. This is a chance More ❯
Lincoln, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Worcester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Chesterfield, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Wolverhampton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Telford, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Shrewsbury, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
all certification activities related to ISO 27001:2022. Ensure that any business changes, acquisitions, or transformations are accounted for within the scope of certification, through proactive risk identification and management with IT assets owners. Development and championing all Information Security Policies, Procedures and relevant standards, and produce supporting documentation and training material to ensure organizational compliance. Orchestrate continual improvement … and promote security best practices across the organization. Experience working in a global, multi-business environment is a plus. Technical/Professional Qualification requirements: Proven experience in Information Security Management and IT risk management. In-depth knowledge of ISO27001 to Lead Auditor standard. Knowledge of relevant regulations (Data Protection, DORA, NIS2). Knowledge of Three Lines of Defence Model … and its application. Knowledge of vulnerabilitymanagement and Identity and Access management. A recognised IS qualification (e.g. CISA, CISM, CISSP, ISO 27001 Lead Auditor). Our Values: • We care about the safety of everyone. • We respect each other and the wider communities we work in. • We're passionate about giving back to society, leaving the world a better More ❯
Coventry, Warwickshire, United Kingdom Hybrid / WFH Options
Cadent Gas
and Operational Technology (OT) environments. This is a hands-on, technically rich role where you will work with a wide range of security tools and collaborate with threat intelligence, vulnerabilitymanagement, and incident response teams. You will engineer solutions to mitigate threats, automate detection and response, and ensure our systems remain secure, resilient, and compliant. Why you'll … IT and OT environments. Strategic Contribution - Influence the development of new controls and support the delivery of Cadent's cyber security strategy. Cross-Team Collaboration - Partner with threat intelligence, vulnerability analysts, and incident responders to enhance our defences. Continuous Improvement - Engineer solutions for unpatchable vulnerabilities and automate detection and response processes. National Impact - Help protect the systems that keep More ❯
Coventry, England, United Kingdom Hybrid / WFH Options
Cadent Gas
and Operational Technology (OT) environments. This is a hands-on, technically rich role where you will work with a wide range of security tools and collaborate with threat intelligence, vulnerabilitymanagement, and incident response teams. You will engineer solutions to mitigate threats, automate detection and response, and ensure our systems remain secure, resilient, and compliant. Why you'll … IT and OT environments. Strategic Contribution – Influence the development of new controls and support the delivery of Cadent’s cyber security strategy. Cross-Team Collaboration – Partner with threat intelligence, vulnerability analysts, and incident responders to enhance our defences. Continuous Improvement – Engineer solutions for unpatchable vulnerabilities and automate detection and response processes. National Impact – Help protect the systems that keep More ❯
our organisation's data and IT infrastructure. This role focusses on the operational aspects of data protection - from technical risk assessments and secure system configuration reviews to incident response, vulnerability remediation tracking, and regulatory compliance audits. You will work closely with engineering, DevOps, and IT teams to embed privacy and information security controls into our technology stack. This is … a full-time position. Occasional after-hours work may be required to support incident response, high-priority vulnerability fixes, or audit activities. Develop and implement data protection governance: Design, implement, and enforce data protection and information security policies and procedures aligned with business objectives and regulatory requirements Support the development of strategies to mitigate and monitor data protection risks … a strategy to mitigate, manage, and monitor data protection risks and incidents Work collaboratively with other departments to ensure the alignment of security efforts with wider business objectives Risk management: Identify, assess, and document data protection risks across systems and processes Support administration of data protection systems and risk reporting. Provide advice and guidance to teams on how to More ❯
spend most of your time: • Supporting the implementation of the clients' cybersecurity strategies, policies, and procedures tailored to the specific needs of our organisation. • Conducting regular security assessments and vulnerability scans, to identify potential weaknesses and recommend appropriate remediation measures. • Monitoring and analysing security logs, events, and alerts to detect and respond to potential security incidents in a timely … promote a culture of security throughout the organisation. • Assist with compliance with relevant security frameworks, regulations, and standards, such as Cyber Essentials, CAF/Gov Assure and NCSC. • Support vulnerabilitymanagement report and process • Assist with any other tasks/projects which need prioritising • Documenting of alerts and creation of playbooks Professional Skills Required: Proficiency with Microsoft Security … Technologies, such as Sentinel, Entra and Defender Proven experience designing, implementing, and maintaining security controls. Experience with security assessment tools, vulnerability scanning, and penetration testing methodologies. Understanding of current cybersecurity threats, attack vectors, and mitigation strategies. Ability to analyse and interpret security logs, events, and alerts to detect and respond to security incidents effectively. Familiarity with security frameworks and More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
safeguarding Industrial Control Systems and SCADA networks from evolving cyber threats. Key Responsibilities: Monitor and assess OT cybersecurity systems, ensuring effective threat detection and response. Conduct threat analysis and vulnerability assessments to support incident response activities. Develop and implement incident response plans tailored to OT environments. Support vulnerabilitymanagement initiatives and penetration testing exercises. Contribute to policy … Effective communicator with proven ability to influence and collaborate across functions. Comfortable working autonomously and leading small projects. Background in cyber investigations or law enforcement protocols. Familiarity with project management principles. Ability to deliver awareness campaigns and contribute to continuous improvement. This is a unique opportunity to make a tangible impact on the UK’s energy resilience. If you More ❯
the financial markets in which we operate. Already an industry-leader in many respects, we want to continue setting standards and evolving to respond to strategic changes.Global Enterprise Risk Management (ERM) is a sub function of Group Risk and Compliance. Its purpose is to make sure HSBC understands and effectively controls its non-financial risk position, through end-to … comply with risk, business and regulatory priorities. It seeks to strengthen the risk culture across the organisation through the application of effective policies and frameworks that drive consistent risk management practices across our businesses and functions at global, regional and market level.The role holder is responsible for overseeing the identification, assessment, and management of cyber security risks across … pension scheme with a generous employer contribution.In this role you will: Provide independent oversight and challenge to the prioritization of cyber security risks across the HSBC UK. Advise senior management, executives, and board-level committees on key cyber risks and emerging threats. Strengthen the partnership with HSBC Cybersecurity Technology. Ensure compliance with relevant cyber security frameworks, standards, and regulations More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
BT Group
with expertise in Elasticsearch to join our dynamic team. As a SIEM engineer, you will play a critical role in designing, developing, and maintaining our security information and event management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threat detection, incident response, and overall security posture. This role is hybrid (3 days in … Logstash: Design, develop, and maintain data pipelines using Logstash, part of the Elastic Stack. Automate data ingestion, transformation, and loading tasks. Beats for Data Collection: Agent and Agent Policy Management: Proficiency in configuring and managing agents, including setting up agent policies for various operation systems. Ensure seamless data flow from endpoints to the Elastic Stack. Data Cleaning and Enrichment … Collaborate with data analysts to create meaningful search experiences. Database Architecture and Scaling with Elasticsearch: Optimize data storage and retrieval mechanisms within Elasticsearch clusters. Implement sharding, replication, and index management strategies. End-to-End Solution Delivery: Expertise in taking ownership of a requirement from start to finish, including gathering detailed requirements, designing, and implementing robust, innovative solutions. Experience Required More ❯
software, systems, services and toolsets such as E-mail Security, EDR, NAC, IT/OT Segmentation, 365 etc along with an understanding of malware prevention, emerging threats, attacks and vulnerability management. • Understanding of Information Security best practice for elements including workstations, servers, cloud, networking, architecture, common protocols and application security. • You have the ability to confidently perform security audits … both internal and external (e.g., third party and supplier assurance) and ensure recommendations are followed for continuous improvement. • You have strong Project Management skills - able to independently manage multiple projects, manage own workload, prioritise and meet tight deadlines. • Strong Incident Response Management skills including threat and vulnerability analysis. • The ability to communicate business and technical risk to … all levels of audience. • Understanding of IT Service Management principles ideally ITIL. What happens next? Ordinarily, our Resourcing Team reviews and shortlists CVs. If shortlisted, you'll speak to one of our Recruiters to discuss the role further. Our interview process usually consists of an initial teams interview followed by an in-person interview. We'll keep in touch More ❯