London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
/Day Inside IR35. C learance: DV Role Profile: Have experience with dealing with real world threats in the serious and organised crime or cyberthreat incidents Have experience in analysing malware behaviour and an ability to identify associated infrastructure Have an excellent understanding of how cyberthreat attackers build and use infrastructure to … undertake malicious activity CompTIA Cybersecurity Analyst (CySA+) or a similar certification GIAC CyberThreat Intelligence (GCTI) or a similar certification GIAC Reverse Engineering Malware (GREM) or a similar certification Certified Ethical Hacker (CEH) Offensive Security Certified Professional (OSCP) or a similar certification*HM will accept 2 of the above qualifications* Data analysis and visualisation Understanding of Cybersecurity … Concepts and Threat Intelligence Internet infrastructure/security architecture If you are interested in the above role - Click the "Apply Now" button now for immediate review Cyber Security Analyst, Security Analyst, Security, OSCP, ETHICAL HACKER, Cyber Security Analyst, Cyber Security Analyst, DV CLEARANCE, DV CLEARED, CYBER ATTACK, Cyber Security More ❯
Job summary As a Security Officer, you will rotate around the CSOC into 4 main areas: Protective Monitoring, Incident Management, Threat Intelligence and Threat Hunting. As part of Protective Monitoring, you will join the analyst pool team responsible for triaging cyber alerts ranging from identity & access alerts, networking alerts and XDR. Within Threat Hunting, you … will conduct daily hunting investigations using prewritten queries across a range of multi-tenant hunting platforms, including but not limited to M365D XDR, Microsoft Sentinel and Splunk. The Threat Intelligence team perform the collection, aggregation, analysis and contextualisation of healthcare and security information to produce actionable cyberthreat intelligence. The Incident Management team provide end-to … duties of the job The main duties you would be involved with are as follows: Work within the Cyber Security Operations Centre (CSOC) with exposure to the Threat Intelligence, Threat Hunting, Protective Monitoring or Incident Management teams. Work as part of the Protective Monitoring team to investigate detections of potential Cyber Security incidents and More ❯
Exeter, Devon, United Kingdom Hybrid / WFH Options
Pontoon
environments. Provide security expertise and direction to delivery and engineering teams. Drive secure-by-design principles and ensure compliance with internal and industry security standards. Conduct 1st-line cyber risk assessments and supply chain assurance for third-party vendors. Review supplier contracts to … ensure appropriate security clauses are embedded. Maintain clear documentation and reporting around risks, residual risk ownership, and audit readiness. Stay up to date with the evolving cyberthreat landscape and implement appropriate security controls. What We're Looking For Strong background in cyber security, with 7+ years of relevant experience. In-depth knowledge of cloud … platforms such as AWS and Microsoft Azure, as well as Microsoft Entra ID and M365. Familiarity with frameworks such as NIST CSF, Cyber Assessment Framework (CAF), and NCSC Cloud Security Principles. Proven ability to influence stakeholders and support secure delivery in large, complex environments. Excellent communication skills and ability to collaborate with globally distributed teams. A degree in More ❯
Barrow-In-Furness, Cumbria, Barrow in Furness, United Kingdom Hybrid / WFH Options
Experis
of delivering security services within organisations? Would you relish putting these skills into practice by taking on a role within us to protect us and our clients from cyberthreats? We are seeking a Vulnerability Management Lead with proven experience to join our cybersecurity team. Technical Skills Provide remediation recommendations; Monitor remediation activities; Report on the progress of More ❯
Barrow-in-furness, Cumbria, United Kingdom Hybrid / WFH Options
Experis
of delivering security services within organisations? Would you relish putting these skills into practice by taking on a role within us to protect us and our clients from cyberthreats? We are seeking a Vulnerability Management Lead with proven experience to join our cybersecurity team. Technical Skills Provide remediation recommendations; Monitor remediation activities; Report on the progress of More ❯
and Azure to join our dynamic team. The ideal candidate will design, implement, and optimize secure network architectures, leveraging Microsoft cloud technologies to protect enterprise environments against evolving cyber threats. Key Responsibilities: Network Architecture & Security: Design and implement secure network infrastructures using Azure networking components (VNETs, NSGs, Azure Firewall, VPN Gateway, etc.). Integrate M365 security features (Defender … Collaborate with SOC teams to monitor and respond to network-based threats. Utilize Microsoft Sentinel and Defender for Cloud to detect and remediate vulnerabilities. Develop playbooks and automation for threat response. Required Skills & Experience: Proven experience in networking and cybersecurity consulting. Strong knowledge of Microsoft 365 security and compliance features. Hands-on experience with Azure networking and security services. More ❯
South West London, London, England, United Kingdom
Tenth Revolution Group
and Azure to join our dynamic team. The ideal candidate will design, implement, and optimize secure network architectures, leveraging Microsoft cloud technologies to protect enterprise environments against evolving cyber threats. Key Responsibilities: Network Architecture & Security: Design and implement secure network infrastructures using Azure networking components (VNETs, NSGs, Azure Firewall, VPN Gateway, etc.). Integrate M365 security features (Defender … Collaborate with SOC teams to monitor and respond to network-based threats. Utilize Microsoft Sentinel and Defender for Cloud to detect and remediate vulnerabilities. Develop playbooks and automation for threat response. Required Skills & Experience: Proven experience in networking and cybersecurity consulting. Strong knowledge of Microsoft 365 security and compliance features. Hands-on experience with Azure networking and security services. More ❯
primarily Google Cloud Platform (GCP) and Microsoft Azure. This role is essential in ensuring that all cloud infrastructure, services, and data remain protected, compliant, and resilient against emerging cyber threats. Working within the broader technology and security teams, the Cloud Security Engineer will be responsible for policy enforcement, incident response, security tooling, and embedding security across the development … of Azure and Microsoft 365 cloud security controls and best practices. Deep understanding of cloud security architecture , the shared responsibility model, and infrastructure-as-code security principles. Experience with threat modelling, incident response, and forensic analysis in cloud environments. Familiarity with container security, Kubernetes, and hybrid or multi-cloud deployments is advantageous. Preferred certifications: Google Professional Cloud Security Engineer More ❯
security standards and align with best industry practices. Key Responsibilities Develop and maintain a security architecture framework that supports secure business and IT solutions aligned with organisational objectives and threat landscape. Define and deliver security architecture governance, ensuring IT projects meet core security principles and align with overall IT strategy. Integrate security-by-design principles into project lifecycles across … application and infrastructure teams. Provide subject matter expertise on security systems, architectures, and emerging cyber threats. Lead the development of security principles and contribute to updates of security and technology standards. Collaborate with the Technology Risk team to assess and mitigate risks, ensuring frameworks follow best practices in information security. Essential Skills & Experience Proven experience as a Security More ❯
partner across all business areas. In the OT Security Architect role, you will play a crucial role in ensuring our Operational Technology (OT) is secure and protected against cyber threats. Your expertise will help identify potential risks and vulnerabilities specific to OT environments and develop effective mitigation strategies. By providing guidance and support, you will contribute to our … in OT environments. Coordinating technical design and review activities within the Security team. Identifying and addressing key risks and issues in OT systems. Conducting risk assessments to identify cyberthreats and vulnerabilities in OT environments. Conducting supply chain assurance for suppliers and reviewing vendor contracts. Developing and implementing strategies to mitigate cyber risks in OT systems. … Staying updated with the latest cyberthreats and recommending OT security controls. Maintaining documentation and reporting on security-related activities in OT environments. Review substation architectures ensuring risk is understood Participate in shaping technical specifications to drive the implementation of security within the organisation. Facilitate Cyber Informed Engineering inspired assessments of engineering plant to drive iterative More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Experis
e.g. SIEM solution) to support a multi-vendor cloud based back office implementation. Experience with: Industry best practice for SOC service and solution design. Working with organisations with heightened threat response requirements (e.g. UK Defence & Central Government). Evaluation and selection of security tools that meet the organisations SOC requirements. High Level Design of security infrastructure and tools to … support a SOC's mission of monitoring, detecting, analysing, and responding to cyber threats. Knowledge of the following policies and process. Required: NIST NCSC SOC Guidance NCSC CAF (CNI) Desirable: MoD JSP 440 MoD JSP 503 MoD JSP More ❯