SIEM use cases: log ingestion, analytics rules, playbooks and workbooks. Deploy and manage Microsoft Defender solutions (Defender for Cloud, Defender for Servers, Defender for Containers) to harden Azure workload Vulnerability & Patch Management Operate vulnerabilitymanagement tools to discover and prioritise flaws across cloud and on-prem systems. Define and run patch management processes for virtual … machines, containers and serverless functions. Integrate vulnerability scanning (e.g. Qualys, Sonar Cloud, Tenable or Azure-native scanners) into CI/CD pipelines. Security Analysis & Incident Response Perform root-cause analysis of security incidents and vulnerabilities. Conduct threat modelling, code and infrastructure reviews. Develop and execute incident response procedures, leveraging Sentinel playbooks and Logic Apps when required. CI/CD … services (IAM, networking, Key Vault). Proven track record configuring and optimising Microsoft Sentinel (SIEM) and Microsoft Defender tools. Familiarity with Azure Policy and Azure Blueprints for compliance enforcement. Vulnerability & Patch Management Practical experience with vulnerability scanners (Qualys, Tenable, or Azure Defender Vulnerability Assessment). Knowledge of patch management frameworks (WSUS, Azure Update ManagementMore ❯
Bath, Somerset, United Kingdom Hybrid / WFH Options
Mayden
About The Role We are looking to appoint a highly experienced cyber and information security leadto join our growing business. Mayden has a flat management structure and a coaching culture, with team members working together and supporting one another to make things happen. This means that job titles can look a little different, but also means our roles focus … public sector. You may already be operating at CISO level in a small company, or have ambitions to reach the next level in your career. Mayden's flagship patient management system, iaptus, is used by more than 200 mental health services in the UK, Australia and Canada. Theseus, our case management system for addiction and healthy lifestyle services … Compliance: Ensure the company's security posture meets the requirements of the NHS Data Security and Protection Toolkit (DSPT), Cyber Essentials Plus, ISO27001:2022 and other relevant frameworks. Risk management: Lead the information security risk management program, including identification, assessment, mitigation, and monitoring of information security risks across all systems, applications, and operations. Policy and procedure development: Support More ❯
SOC and Vulnerability Analyst Logiq Consulting is a fantastic place to work. Our ethos is based on our core values of innovation, collaboration, and quality delivery which has created a genuine "Yes" culture. Being a fast growing SME working alongside some of most prestigious clients in the UK we can offer not only a varied and interesting workload, but … and The Role: An increase in clients across our Managed Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in … a SOC environment and/or have a strong focus on vulnerability management. Key Responsibilities: As SOC and Vulnerability Analyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality and More ❯
SOC and Vulnerability Analyst Logiq Consulting is a fantastic place to work. Our ethos is based on our core values of innovation, collaboration, and quality delivery which has created a genuine "Yes" culture. Being a fast growing SME working alongside some of most prestigious clients in the UK we can offer not only a varied and interesting workload, but … and The Role: An increase in clients across our Managed Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in … a SOC environment and/or have a strong focus on vulnerability management. Key Responsibilities: As SOC and Vulnerability Analyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality and More ❯
SOC and Vulnerability Analyst Logiq Consulting is a fantastic place to work. Our ethos is based on our core values of innovation, collaboration, and quality delivery which has created a genuine "Yes" culture. Being a fast growing SME working alongside some of most prestigious clients in the UK we can offer not only a varied and interesting workload, but … and The Role: An increase in clients across our Managed Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in … a SOC environment and/or have a strong focus on vulnerability management. Key Responsibilities: As SOC and Vulnerability Analyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality and More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Duel
applied in a timely manner. Learn and implement security monitoring and automation solutions to detect and respond to threats. Help manage security tooling, including SIEM, IDS/IPS, and vulnerability scanning solutions. Work closely with engineers to support secure coding practices and help embed security considerations early in the development process. Assist in securing infrastructure and cloud environments, ensuring … compliance-focused security work Exposure to security compliance frameworks such as ISO 27001 or SOC 2, even if not previously responsible for certification processes Experience working within security risk management, vulnerability tracking, or operational security efforts Prior experience working with engineering teams on security topics is beneficial, particularly around secure development practices Ability to clearly communicate security requirements … tools such as Secureframe, Drata, or Vanta Experience working with pen testing and bug bounties a plus Basic understanding of security tools such as SIEM, IDS/IPS, and vulnerabilitymanagement solutions Experience or knowledge of cloud security (AWS, GCP, or Azure) Awareness of security best practices in application and infrastructure security Some exposure to IAM, role-based More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Alexander Mae (Bristol) Ltd
the IT Service Desk Providing support via tickets, email and phone Assisting with pre-sales technical support Leading the response during P1 critical issues Completing BAU tasks including patch management , vulnerabilitymanagement , and backend system troubleshooting Onboarding new clients when needed Supporting non-technical colleagues with escalated issues Reporting directly to the Service Desk Manager The Person More ❯
systems, subsystems, products and external interfaces, and may include a mixture of operational cybersecurity functions and governance, risk and compliance (GRC) activities. Key responsibilities include: Perform systems security risk management activities, including identifying security threats, analysing the risk exposure and presenting treatment options to mitigate security risk. Conduct asset management including maintaining accurate inventories of all hardware and … software configuration items. Maintain change management, through evaluation of system changes for cybersecurity impact and updating any affected security authorisation artefacts. Perform vulnerabilitymanagement, including conducting automated vulnerability scans, using the provided toolset, to identify any open vulnerabilities and ensure they are appropriately documented, tracked and remediated in the given timeframes. Present cybersecurity solutions to non More ❯
cyber security leadership role within complex, high-security environments. In-depth understanding of the current security landscape and cyber security consulting principles. Strong experience managing cyber security strategy, risk management, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity management and federation, firewalls, SIEM, vulnerability scanning … and cryptography. Experience overseeing incident response, vulnerabilitymanagement, and security service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable guidance for stakeholders at all levels. Skilled in relationship management, with the confidence to challenge and influence suppliers to ensure security outcomes are realistic, achievable, and deliver value for money. This More ❯
cyber security leadership role within complex, high-security environments. In-depth understanding of the current security landscape and cyber security consulting principles. Strong experience managing cyber security strategy, risk management, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity management and federation, firewalls, SIEM, vulnerability scanning … and cryptography. Experience overseeing incident response, vulnerabilitymanagement, and security service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable guidance for stakeholders at all levels. Skilled in relationship management, with the confidence to challenge and influence suppliers to ensure security outcomes are realistic, achievable, and deliver value for money. This More ❯
swindon, wiltshire, south west england, united kingdom
Ncounter Technology Recruitment
cyber security leadership role within complex, high-security environments. In-depth understanding of the current security landscape and cyber security consulting principles. Strong experience managing cyber security strategy, risk management, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity management and federation, firewalls, SIEM, vulnerability scanning … and cryptography. Experience overseeing incident response, vulnerabilitymanagement, and security service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable guidance for stakeholders at all levels. Skilled in relationship management, with the confidence to challenge and influence suppliers to ensure security outcomes are realistic, achievable, and deliver value for money. This More ❯
Key Responsibilities Operate within a Security Operations Centre (SOC) or equivalent environment Monitor and respond to incidents using SIEM platforms Conduct system log analysis and threat detection Assist in vulnerability assessments and management Support incident resolution and reporting ?? Required Skills & Experience At least 2 years' experience in a dedicated Security Analyst role Hands-on experience with: SOC operations … SIEM tools Vulnerabilitymanagement Incident response and investigation Log and event analysis ?? Preferred Qualifications Industry certifications such as CompTIA Security+ or equivalent (desirable) Practical experience preferred over formal education ?? Security Clearance Requirements UK Nationals only Current SC clearance required DV preferred - or must be DV-eligible (as DV clearance will be needed) DV Bonus: 10% of base salary More ❯
a leadership role within Defra's operational IT function, Group Infrastructure and Operations (GIO). The role requires demonstration of deep and wide-ranging IT leadership skills in service management and strategic direction setting of the Service Operations functions. The Head of Service Operations is responsible for the effectiveness of operational IT services and user support to ensure optimum … strategy, to remain effective whilst supporting modern service delivery approaches, including Agile and DevOps. As such the role requires the ability to function seamlessly between strategic thinking and operational management of live services. The role's level of operational responsibility is high and includes leading through major disruption at times of major incidents including cyber security ones. As a … be required to develop strong relationships with Defra group's delivery bodies and Arms Length Bodies (ALBs) in order to deliver core IT services as part of the Service Management Operating Model. Key Responsibilities Primary responsibility is to ensure service availability is maintained at required levels, and in doing so own the responsibilities of: Sets the vision, and strategy More ❯
South West London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
define strategic roadmaps to embed security across business operations Solve critical cyber challenges across diverse industries and client environments What You'll Bring Strong experience in cyber strategy, risk management, governance, architecture, and regulatory compliance Familiarity with frameworks and standards such as NIST CSF, ISO27001, NCSC CAF, GDPR, and NIS2 Industry-recognised certifications (e.g. CISSP, CISM, CISA, M.Inst.ISP, or … equivalent) Practical experience in GRC, threat and vulnerabilitymanagement, or operational resilience Proven delivery across complex programmes using Agile and/or Waterfall methodologies Team leadership experience across on-site and distributed teams Skilled in client relationship management and stakeholder engagement at all levels The package: £65,000 - £80,000 Company Bonus Flex Fund Pension Medical care More ❯
successful candidate. You can expect: Design and manage scalable, secure cloud environments using Azure Bicep, ARM, or Terraform Lead the implementation of DevSecOps practices including CI/CD, secrets management, zero-trust security, and vulnerabilitymanagement Develop secure cloud-native architectures including microservices, containers, and serverless patterns Ensure compliance with industry security and privacy standards ( e.g. ISO … to succeed in this role Deep experience in Azure infrastructure (with IaC using Bicep, ARM, or Terraform) Hands-on knowledge of DevSecOps tooling and techniques (CI/CD, secrets management, threat modelling) Experience implementing security standards across cloud and hybrid environments Familiarity with container security ( e.g. Docker, Kubernetes) A strong understanding of compliance frameworks such as ISO 27001 and More ❯
STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics … and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerabilitymanagement, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills - Excellent organizational and analytical skills - Detail oriented with the ability to multi-task and prioritize efforts - Ability to express More ❯
STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics … and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerabilitymanagement, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills - Excellent organizational and analytical skills - Detail oriented with the ability to multi-task and prioritize efforts - Ability to express More ❯
Gloucester, Gloucestershire, England, United Kingdom
Opus Recruitment Solutions Ltd
embed security best practices. Define and enforce security policies, standards, and governance frameworks. Evaluate and integrate security tools (e.g., Microsoft Defender, Sentinel, Entra ID). Support incident response and vulnerabilitymanagement processes. Essential Skills Minimum 5 years’ experience as a Security Architect, with a strong focus on Azure environments. Deep understanding of cloud security frameworks (e.g., NIST, CIS … ISO 27001). Hands-on experience with the Microsoft security stack (Defender, Sentinel, Entra, Purview). Familiarity with Zero Trust architecture, identity and access management, and network security. Excellent stakeholder engagement and documentation skills. If intrested please apply with the most up to date CV More ❯
Gloucestershire, England, United Kingdom Hybrid / WFH Options
Maxwell Bond
in network and application-layer testing. Skilled with industry-standard tools (e.g. Burp Suite, Nmap, Metasploit, Cobalt Strike). Strong knowledge of OWASP Top 10, MITRE ATT&CK, and vulnerabilitymanagement principles. Excellent communication and technical reporting skills. 🎯 Offer: £60,000 salary. Predominantly remote working. Occasional client site visits in the Gloucestershire area. Opportunity to work on sensitive More ❯
with Secure by Design. Strategic Alignment. Ensuring that security architectures align with the client's overall business strategy and technology goals. Translate business needs into security requirements. Threat and Vulnerability Management. Identifying, assessing, and communicating current and emerging security threats and vulnerabilities. Security Solution Design and Evaluation. Researching, evaluating, and recommending security technologies, tools (e.g., firewalls, VPNs, IDS/… Procedure Development: Defining, implementing, and maintaining corporate security policies, standards, and procedures to ensure compliance with industry regulations, legal requirements (e.g., GDPR, HIPAA), and best practices. Incident Response and Management: Playing a key role in developing incident response plans and coordinating efforts to detect, analyse, and respond to security incidents and breaches. Stakeholder Communication and Collaboration: Effectively communicating complex More ❯
Exeter, Devon, South West, United Kingdom Hybrid / WFH Options
Exposed Solutions
fostering a positive, motivated team environment. The Role Design, build, and maintain our cloud infrastructure, optimising for cost, security, and performance. Lead on system monitoring, security best practices, and vulnerability management. Drive development and optimisation of CI/CD pipelines and containerised environments. Develop and manage Infrastructure as Code (IaC) using Terraform. Provide Level 4 support and act as … Lambda, VPC, IAM, ECS, ECR, and CloudFront. Strong skills in Terraform, Jenkins/Bitbucket CI/CD pipelines, and Docker. Scripting and automation experience (bash, PowerShell, Python) and configuration management tools (Ansible, Puppet, or Chef). Familiarity with monitoring and logging tools such as CloudWatch, Prometheus, and Grafana. Certified AWS Solutions Architect Associate (or equivalent experience). Strong knowledge More ❯
Exeter, Devon, England, United Kingdom Hybrid / WFH Options
Exposed Solutions
fostering a positive, motivated team environment. The Role Design, build, and maintain our cloud infrastructure, optimising for cost, security, and performance. Lead on system monitoring, security best practices, and vulnerability management. Drive development and optimisation of CI/CD pipelines and containerised environments. Develop and manage Infrastructure as Code (IaC) using Terraform. Provide Level 4 support and act as … Lambda, VPC, IAM, ECS, ECR, and CloudFront. Strong skills in Terraform, Jenkins/Bitbucket CI/CD pipelines, and Docker. Scripting and automation experience (bash, PowerShell, Python) and configuration management tools (Ansible, Puppet, or Chef). Familiarity with monitoring and logging tools such as CloudWatch, Prometheus, and Grafana. Certified AWS Solutions Architect Associate (or equivalent experience). Strong knowledge More ❯