a cutting-edge environment, we want you on our team! Work location : 100% remote, within Spain. Your main tasks and accountabilities will be: Manage Microsoft Defender XDR components for threatdetection and response. Configure and maintain Microsoft Intune for endpoint and device management. Implement security hardening for critical Azure applications and access controls. Redesign Azure network security architecture … Configure and maintain security tools like Google Security Command Center and SIEM/SOAR integrations. Automate deployment of security components using Terraform or Deployment Manager. Establish logging, ing, and detection capabilities for SOC visibility. Collaborate with SOC teams and engineers for secure cloud operations. Enable cloud asset, identity, and activity log visibility for threat detection. Ensure compliance with … SOAR platforms. Hands-on scripting (e.g., PowerShell, Python) and IaC tools (e.g., Terraform, ARM). Familiarity with security frameworks like ISO 27001 and standards like GDPR. Solid understanding of threatdetection rules (e.g., YARA-L, Sigma) and incident response. Strong analytical, problem-solving, and communication skills. Ability to work independently and collaboratively. Proactive, detail-oriented, with excellent time More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
software delivery lifecycle. A key part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure Security: Architect and secure Azure … and optimize Azure DevOps pipelines with security embedded at every stage. Cloud Security Implementation: Leverage Azure Security Centre, Microsoft Defender for Cloud, and Microsoft Sentinel for advanced security monitoring. ThreatDetection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). … to prevent cyber threats. Incident Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured action plans for proactive risk mitigation. More ❯
of its cloud-first security operations function. This is a high-impact, hands-on leadership role with end-to-end responsibility for managing the Security Operations Centre (SOC), incident detection and response, threat intelligence, and cloud-native security engineering-with a strong focus on Google Cloud Platform (GCP). Operating in a highly regulated, Real Time financial services … environment, this role requires deep technical knowledge, operational maturity, and experience applying security best practices across a fast-moving cloud infrastructure. What You'll Do SOC Leadership & ThreatDetection Lead and mentor a team of SOC analysts and engineers, ensuring high-quality coverage across all GCP workloads. Establish and maintain 24/7 detection and response capabilities … fine-tuning alerting rules and monitoring strategies. Deploy and maintain detection rules using Chronicle SIEM, YARA, Sigma, and GCP-native logging tools. Define and maintain runbooks, incident playbooks, and escalation procedures. Incident Response & Threat Intelligence Own the full life cycle of security incidents from detection to remediation and post-incident review. Perform advanced threat hunting and More ❯
London, England, United Kingdom Hybrid / WFH Options
Barclay Simpson
of its cloud-first security operations function. This is a high-impact, hands-on leadership role with end-to-end responsibility for managing the Security Operations Centre (SOC), incident detection and response, threat intelligence, and cloud-native security engineering-with a strong focus on Google Cloud Platform (GCP). Operating in a highly regulated, Real Time financial services … environment, this role requires deep technical knowledge, operational maturity, and experience applying security best practices across a fast-moving cloud infrastructure. What You'll Do SOC Leadership & ThreatDetection Lead and mentor a team of SOC analysts and engineers, ensuring high-quality coverage across all GCP workloads. Establish and maintain 24/7 detection and response capabilities … fine-tuning alerting rules and monitoring strategies. Deploy and maintain detection rules using Chronicle SIEM, YARA, Sigma, and GCP-native logging tools. Define and maintain runbooks, incident playbooks, and escalation procedures. Incident Response & Threat Intelligence Own the full life cycle of security incidents from detection to remediation and post-incident review. Perform advanced threat hunting and More ❯
technology, now and for generations to come. About Us Our UK&I Advisory Practice is a leader in cyber security transformation, partnering with organizations to tackle the evolving digital threat landscape. We combine technical expertise with strategic business insight to deliver end-to-end cyber solutions that enable innovation and secure digital growth. Role Overview As a Lead Cyber … threats and technology trends into actionable strategies. Guide clients through compliance with DORA, NIS2, and UK regulatory frameworks. Design comprehensive cyber security architectures that integrate cloud, identity, data, and threat protection. Build actionable implementation roadmaps considering business objectives and constraints. Evaluate and integrate partner technologies (e.g., Microsoft, AWS, GCP) for optimal client outcomes. Deliver reusable frameworks and methodologies across … management, and investment planning. Create business cases that communicate ROI and business enablement. Conduct maturity assessments using frameworks such as NIST CSF, ISO 27001, and industry-specific standards. Facilitate threat and risk workshops tailored to client environments. Showcase innovation through demos of emerging technologies like XDR, SASE, and SOAR. Practice Development Mentor consultants and support career development in advisory More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Experian Ltd
ensuring the handling of potential threats and plays a part in improving security operations. This is a home based role reporting to the Director of Security Operations for SecOps & Threat Detection. Please note that in this role, you will have an 8x5 Monday-Friday schedule, with flexibility to respond to after-hours pages for potentially major security incidents to More ❯
City of London, London, United Kingdom Hybrid / WFH Options
NOTHREAT
technical expertise, strategic vision, and hands-on experience in building secure, AI-driven systems. As Director of Cybersecurity, you will oversee all aspects of our security architecture, operations, and threat intelligence functions—ensuring Nothreat’s platforms and clients remain resilient in an evolving threat landscape. You will also be expected to drive cross-functional collaboration across product, engineering … teams, and lead the execution of complex, high-impact security initiatives. Key Responsibilities Define and drive Nothreat’s cybersecurity strategy across product, infrastructure, and operations. Lead security architecture reviews, threat modeling, and secure development practices across engineering teams. Oversee the implementation and operation of security controls, incident response plans, and risk management frameworks. Work closely with the AI engineering …/ML systems, securing data pipelines, models, and associated infrastructure. Strong technical background in areas such as application security, cloud security (AWS/Azure), identity and access management, and threat detection. Proficiency with SIEM, SOAR, EDR, vulnerability management, and DevSecOps practices. Deep understanding of modern attack vectors, threat intelligence, and incident response processes. Experience with security frameworks and More ❯
technical expertise, strategic vision, and hands-on experience in building secure, AI-driven systems. As Director of Cybersecurity, you will oversee all aspects of our security architecture, operations, and threat intelligence functions—ensuring Nothreat’s platforms and clients remain resilient in an evolving threat landscape. You will also be expected to drive cross-functional collaboration across product, engineering … teams, and lead the execution of complex, high-impact security initiatives. Key Responsibilities Define and drive Nothreat’s cybersecurity strategy across product, infrastructure, and operations. Lead security architecture reviews, threat modeling, and secure development practices across engineering teams. Oversee the implementation and operation of security controls, incident response plans, and risk management frameworks. Work closely with the AI engineering …/ML systems, securing data pipelines, models, and associated infrastructure. Strong technical background in areas such as application security, cloud security (AWS/Azure), identity and access management, and threat detection. Proficiency with SIEM, SOAR, EDR, vulnerability management, and DevSecOps practices. Deep understanding of modern attack vectors, threat intelligence, and incident response processes. Experience with security frameworks and More ❯
South East London, England, United Kingdom Hybrid / WFH Options
NOTHREAT
technical expertise, strategic vision, and hands-on experience in building secure, AI-driven systems. As Director of Cybersecurity, you will oversee all aspects of our security architecture, operations, and threat intelligence functions—ensuring Nothreat’s platforms and clients remain resilient in an evolving threat landscape. You will also be expected to drive cross-functional collaboration across product, engineering … teams, and lead the execution of complex, high-impact security initiatives. Key Responsibilities Define and drive Nothreat’s cybersecurity strategy across product, infrastructure, and operations. Lead security architecture reviews, threat modeling, and secure development practices across engineering teams. Oversee the implementation and operation of security controls, incident response plans, and risk management frameworks. Work closely with the AI engineering …/ML systems, securing data pipelines, models, and associated infrastructure. Strong technical background in areas such as application security, cloud security (AWS/Azure), identity and access management, and threat detection. Proficiency with SIEM, SOAR, EDR, vulnerability management, and DevSecOps practices. Deep understanding of modern attack vectors, threat intelligence, and incident response processes. Experience with security frameworks and More ❯
Washington, Washington DC, United States Hybrid / WFH Options
RightDirection Technology Solutions
mandates (12 FAM, 5 FAH-6). Security Monitoring and Incident Response: Integrate cloud telemetry into enterprise SIEM platforms (e.g., Splunk, Sentinel) and implement monitoring dashboards for real-time threatdetection and compliance. Support incident response efforts by providing visibility into cloud assets, security events, and forensics. Governance and Advisory Support: Develop and maintain cloud security policies, control … Zero Trust architecture. Preferred Qualifications: Experience supporting Department of State, DHS, or other federal civilian cybersecurity programs. Familiarity with ServiceNow, CyberArk, ArchAngel, and iApp platforms. Strong background in cloud threat modeling, SOC integration, and secure workload design. Experience implementing Security as a Service (SECaaS) models for enterprise environments. All qualified applicants will receive consideration for employment without regard to More ❯
SharePoint, Teams, and OneDrive, ensuring Data Loss Prevention (DLP) and encryption. Implement Microsoft Defender Suite (Defender for Office 365, Defender for Endpoint, Defender for Cloud Apps) for advanced threat protection. Strengthen cloud security posture by managing security configurations across Microsoft Azure environments. 3. Security Automation & Incident Response Automate security workflows with Power Automate, Power Apps, and Microsoft Defender XDR. … Deploy Microsoft Sentinel (SIEM) for threatdetection, log analysis, and incident response. Establish incident response playbooks and conduct forensic investigations when needed. 4. Compliance & Risk Management Ensure adherence to ISO 27001, NIST, GDPR, and CIS Benchmarks. Conduct risk assessments, vulnerability scans, and security audits. Define data protection, backup, and retention policies aligned with Microsoft 365 compliance tools. 5. More ❯
Warwick, Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
MYO Talent
Cyber Threat Hunter/Threat Intelligence Analyst/Cyber Threat Analyst/ThreatDetection Analyst/Security Operations Center (SOC) Analyst/SOC Analyst/Cybersecurity Analyst/Threat Hunting/AWS/Azure/Microsoft 365 Warwickshire Permanent role - £40,000 60,000. One of our leading clients is looking to recruit a … Cyber Threat Hunter/Analyst. Location Warwickshire/Remote (2 days per month in office) Salary £40,000 60,000 Experience: Working in Security Operation Centres, incident response or threat hunting and associated technologies used by these roles and functions. Experience with cloud security tools and platforms (e.g., AWS, Azure, Microsoft 365) Strong documentation skills in order to … provide high quality documentation for internal customers and technical teams. A good knowledge of Active Directory and Entra, knowledge of Endpoint Operating System fundamentals. Demonstrable expertise in threat hunting practices and methodologies with experience in Threat Intelligence platforms and sources. Strong understanding and experience with Windows and its related logging/telemetry. Strong and demonstrable practical experience responding More ❯
the Cadworks Building, Glasgow. The Cyber Security Engineering Lead acts as the technical authority across all domains of cloud and endpoint security, taking full ownership of hardening, automation, and threat mitigation. The role is not managerial in the traditional sense it exists to drive technical capability, mentor through engineering leadership, and deliver resilient, scalable defences. This role is hands … of conditional access, Defender for Cloud, Purview DLP, Azure Firewall, and related services. Integrate security into DevOps pipelines, CI/CD, infrastructure-as-code, and container work flows. Automate threatdetection and response using Microsoft Sentinel SOAR, custom playbooks, and telemetry pipelines. Platform Security Oversight Own and optimise endpoint security through Intune, ensuring device compliance and integration with … SWG services. Enforce network segmentation, micro-perimeter security, and policy-based routing for hybrid network models. Oversee DNS, web access, and remote gateway protection at the edge. Security Operations & Threat Defence Act as the technical escalation point for complex threat investigations and incident response. Lead red-teaming simulations, vulnerability assessments, and threat hunting activities. Support proactive telemetry More ❯
of the role include: Advocating for infrastructure/application Security and providing support for security projects. Competence in reviewing new technologies, methodologies and integration opportunities. Support in enhancing security detection and incident response efforts/playbooks. Monitoring, remediating, and reporting on security events. Supporting team and activities required for maintaining Smart Communications standards and certification requirements. What we're … Must have skills and experience : At least 3 years of hands-on, proven industry experience in a similar role. Good understanding of security principles, technologies, and best practices, including threatdetection and mitigation strategies. Good level of knowledge of cloud security: AWS and Azure. Experience ensuring data confidentiality, integrity, and availability throughout its lifecycle, including during transmission, storage … understanding of application security principals, best practices, OWASP/related standards. Knowledge of security frameworks & controls, hardening standards & security best practices. An understanding of network protocols & practices, firewalls, intrusion detection/prevention systems and WAFs. We look for the following SMART values in everyone we hire at Smart Communications: S peak Openly - We are positive, creative, helpful, kind and More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
Develop and implement a comprehensive security architecture strategy tailored to the unique risks and operational needs of the semiconductor design, manufacturing and high-tech partner ecosystem. Define reference architectures, threat models, and security design patterns across hybrid, cloud-native, and on-premise environments. Mentor a technically excellent team, with a solid focus on domain-specific expertise (cloud, semiconductors, AI … with industry standards (NIST, MITRE ATT&CK) and semiconductor-specific regulatory requirements including export control and SoX compliance. Drive innovation by utilising AI and machine learning technologies to enhance threatdetection, incident response, and overall cyber defense posture. Partner with senior leadership to communicate security architecture roadmaps, risk mitigation strategies, and compliance postures. Champion a culture of continuous More ❯
GDPR, and other standards. Manage risk proactively : identify and mitigate vulnerabilities across cloud environments and applications. Embed secure development : working with Engineering to integrate DevSecOps best practices. Enhance threatdetection and incident response : improving our ability to react quickly and effectively. Assess and secure third-party vendors : ensuring strong security across our ecosystem of vendors and partners. Amazing More ❯
San Antonio, Texas, United States Hybrid / WFH Options
BridgePhase, LLC
and operational excellence for Federal Government organizations. We are dedicated to supporting the Air Force's technological edge by delivering innovative software engineering services that directly support cyber operations, threat defense, and mission assurance. Our goal is to be a trusted mission partner in enabling cyber readiness and resilience across the Air Force and U.S. Cyber Command. We're … and implementation to ongoing monitoring and incident response. Ideal candidates bring deep expertise in cybersecurity principles, hands-on experience with cloud and container security, and the ability to lead threatdetection and mitigation strategies in real-time. If you're driven by mission impact and thrive in fast-paced, agile environments, we want to hear from you. We … standards. Perform vulnerability assessments, risk analysis, and compliance audits across mission systems. Integrate and maintain security tools such as container scanners, static and dynamic analysis, SIEM, EDR, and intrusion detection systems. Enforce security best practices and compliance with frameworks such as NIST SP 800-53, RMF, DISA STIGs, and the DoD Enterprise DevSecOps Reference Design. Collaborate with DevSecOps and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST, SOC … governance controls. Security Strategy: Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threatdetection, incident response, vulnerability management, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST, SOC … governance controls. Security Strategy: Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threatdetection, incident response, vulnerability management, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance More ❯
South East London, England, United Kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST, SOC … governance controls. Security Strategy: Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threatdetection, incident response, vulnerability management, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance More ❯
Mettawa, Illinois, United States Hybrid / WFH Options
AbbVie
in our Allergan Aesthetics portfolio. For more information about AbbVie, please visit us at . on X , Facebook , Instagram , YouTube , LinkedIn and Tik Tok . Job Description The Senior Detection Engineer role will be responsible for the execution of the newly created, Business Application Security Monitoring (BASM) service. This is a technical role focused on extending AbbVies ThreatDetection and Monitoring (TDM) services to include business web applications.This role will serve as a technical subject matter expert on attacker tactics and techniques targeting web applications. This role will also coach junior team members, engage in advanced data analysis, work closely with the Incident Response teams (customer) and application owners. This position can be located anywhere in … the U.S. This role involves creating threatdetection content by collaborating with application owners to gain a better understanding of the application's design and implementation details. The detection rules will be implemented using application telemetry and logs available in the SIEM. Responsibilities Onboarding new business application for security monitoring by following the application on-boarding process. More ❯
Gosport, Hampshire, South East, United Kingdom Hybrid / WFH Options
Walsh Employment
plan, life assurance, pension scheme, and a generous flexible benefits fund Key Requirements We are seeking an experienced Senior SOC Analyst who brings a strong background in security operations , threatdetection, and incident response. This is a critical role that supports the defence of national infrastructure through proactive monitoring, analysis, and improvement of cybersecurity postures. Essential Skills and … on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att&ck framework and advanced threatdetection techniques Excellent analytical and problem-solving capabilities Able to provide mentorship and leadership within a … SOC team Desirable (Nice-to-Have): Industry-recognised cybersecurity certifications such as CRT or OSCP Previous experience handling SC or DV cleared environments Demonstrated ability to fine-tune detection logic and improve SOC processes Active engagement with the cybersecurity community and awareness of emerging trends Role & Responsibilities As a Senior SOC Analyst , you will be at the forefront of More ❯
San Antonio, Texas, United States Hybrid / WFH Options
BridgePhase, LLC
Force's Unified Platform Software Factory in San Antonio. In this role, you will lead the design, development, and deployment of AI/ML models and tools that improve threatdetection, automate analysis, and support cyber defense workflows. You will collaborate closely with cyber operators, software engineers, and data scientists to build AI-driven solutions that accelerate decision … of a hybrid schedule. In this position, you can expect to: Lead the design and implementation of AI and ML models tailored to cyber operations challenges such as anomaly detection, threat classification, and predictive analytics. Develop and maintain scalable data pipelines and MLOps workflows using modern tools and frameworks (e.g., TensorFlow, PyTorch, scikit-learn). Integrate AI capabilities … for performance, accuracy, and operational efficiency in cloud and containerized environments. Provide SME guidance on AI best practices, explainability, and ethical AI considerations within mission contexts. Support automation of threatdetection, incident response, and cyber situational awareness through AI-driven tools. Document AI workflows, models, and system integration points to support knowledge sharing and continuous improvement. As the More ❯
each other accountable and always have each other's back! About the role: Intermedia's Information Security team is seeking a Senior Security Engineer with a strong passion for threatdetection, incident response, and security engineering. The ideal candidate thrives in digging through data to find anomalies, identifying root causes, uncovering malicious activity, recommending corrective actions, and working … concerns. Security Engineering & Tooling Assist with security reviews related to infrastructure and system changes. Build, enhance, and maintain internal security tooling and scripting repositories. Contribute to the development of detection content, alert tuning, and automation pipelines. Strategic & Team Contributions Drive annual security team goals and cross-functional initiatives. Author and maintain clear, actionable documentation and knowledge bases. Mentor junior … technologies and associated security controls. Demonstrated experience in at least one of the following: Penetration Testing : Offensive security and exploitation techniques. Digital Forensics : Host, network, or memory-based investigation. Threat Hunting : Detection engineering and hypothesis-driven threat investigation. Knowledge of modern security tooling (SIEM, EDR, vulnerability management, SOAR). Strong documentation and communication skills; fluent in written More ❯
on your shift, while also delivering advanced security operations services to clients across a range of industries. As a Senior SOC Analyst , you will be central to incident response, threat hunting , and real-time defence management , guiding and mentoring two junior SOC analysts. The SOC team is deeply committed to leveraging the latest in automation and artificial intelligence, including … and investigating incidents, fostering a culture of collaboration and continuous learning. Client Relationship Management: Act as a point of contact, managing ongoing communications and ensuring technical needs are met ThreatDetection & Analysis: Triage and analyse alerts across multiple SIEM platforms (e.g., Microsoft Sentinel, custom ELK stacks). Log & Threat Intelligence Analysis: Perform detailed log analysis and threat intelligence research to uncover root causes and bolster security defences. Technical Reporting: Deliver clear, client-focused reports on incidents, alerts, and threat activity. Escalation Handling: Manage critical escalations with precision and provide comprehensive, well-documented resolutions. SOC Innovation: Work with leadership to enhance operational efficiency and integrate emerging technologies. Incident Management: Lead security incident investigations and responses, offering More ❯