Job summary The Associate Information Security Practitioner role is part of the Moorfields Information Security Team. The team ensures that our systems and data are safe, secure, and resilient - so that we can focus on delivering high-quality, patient-centred care, and are trusted by our patients, service users and staff. The team has operational responsibility for security tooling, such as anti-virus and intrusion prevention, security assurance platforms, security testing and monitoring platforms, etc) and for our managed services (security operations centre). The team performs assurance and compliance activities most notably contributing to the annual NHS Data Security Protection Toolkit (DSPT) cycle. We put people at the heart of everything we … Digital, Data and Technology experts that deliver excellence in a busy department. Main duties of the job At this role level, you will: Contribute to operational support of information security solutions and services Engage with our third party provision of information security service Contribute Information Security expertise to projects and operational services Support assurance activities and the More ❯
West Midlands, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
ensure they focus on the right priorities Oversee SOC activities by reviewing your team's performance metrics, incident reports and other key indicators Lead incident response efforts when a security incident occurs, the SOC team has to respond as quickly as possible Lead these efforts by establishing clear incident response procedures and protocols and conveying them to the team … Analyse incident reports to understand your organization's securityposture by reviewing incident reports, SOC managers identify patterns and trends that may indicate weaknesses or vulnerabilities in their security defences Serve as the point of contact (POC) for security incidents within the company. You are the primary liaison between the SOC team, other internal stakeholders, and … external parties such as vendors, clients or regulatory bodies. Be responsible for conducting information security investigations as a result of security incidents. These are previously identified by the Level 2 security analyst who are monitoring the security consoles from various SOC entry channels (SIEM, Tickets, Email and Phone) End to end security incident management. You More ❯
Job summary The Senior Security Analyst (Ops) sits within the Protective Monitoring function of the Cyber Security Operations Centre (CSOC). The CSOC is made up of Protective Monitoring, Incident Management, Threat Operations, Engineering and Consultancy. The role is a Tier 3 analyst in the Cloud Protective Monitoring Sub team. Cyber Operations purpose is to support safe care … be cyber resilient, supporting Transformation Directorate's purpose of delivering the best care and outcomes for the NHS. The Cyber Operations sub-directorate consists of 4 operational areas: Cyber Security Operations Unit (CSOU) Cyber Delivery Unit (CDU). Cyber Improvement Programme. Chief Information Security Office Function (CISO) The post of Senior Security Analyst has been awarded a … additional monthly RRP payment equal to 20% per annum. Please be aware that RRP is none contractual and subject to review. Main duties of the job As a Senior Security Analyst Ops you will: Provide Tier 3 security analytics and incident response for service-specific security monitoring. Deputise for Security Lead (Analyst) in their absence. Act More ❯
Role/Job Title: DevSecOps Pentester Work Location: London (2 - 3days) The Role Conducts security assessments and penetration tests across CI/CD pipelines, cloud infrastructure, and application environments. Integrates automated security tools and practices within DevOps workflows to ensure continuous security validation. Identifies and exploits vulnerabilities in code, containers, APIs, and infrastructure-as-code before they … reach production. Collaborates with development, security, and operations teams to implement remediation and improve security posture. Stays current with threat landscapes, tools, and methodologies to proactively defend against evolving cyber risks in general and more specific to an airline industry, transportation sector. Your Responsibilities Integrate security practices and tools into the DevOps pipeline to ensure security is a continuous process. Perform IaC Automation and ServiceNow integrations to automate AWS Service catalogues. Contribute to security tooling, checklists, and automation efforts. Identify potential security threats and vulnerabilities during the design phase identify flaws in CI/CD, IaC, and cloud/containerized environments. Perform manual and automated security testing on web apps, APIs, pipelines. More ❯
Warwick, Warwickshire, West Midlands, United Kingdom
Adroit People Ltd
Greetings We are Hiring Network Security Specialist in Warwick/Wokingham Network Security 6 Months Contract ? Designing, Architect, Implementing and Maintaining an organization's network security infrastructure solutions like Firewalls, IDPS, Proxy, Load Balancers, VPN, WAF etc., align with the organization's strategies, policies, and standards. ? Design and manage firewall policies, network access controls, AAA mechanisms, MFA … IAM solutions, RBAC, Privilege Management etc., ? In-depth understanding of cloud network security, different network architectures (e.g., LAN, WAN, DMZ) and topologies, network protocols, routing, switching, and subnetting. ? Ensure network security measures are aligned with relevant compliance standards and regulations (e.g., GDPR, HIPAA, PCI DSS). Conduct regular security audits and assessments to identify and address compliance … gaps. ? Familiarity with industry standards and frameworks like NIST Cybersecurity Framework, ISO 27001, and CIS Critical Security Controls. ? Familiarity with the use of standard security technology solutions and processes such as user provisioning, directory, SIEM, vulnerability management, Cloud Security (OCI/Azure/AWS), Web Security, Email Security, Logging and Monitoring, General PKI and Cryptography. More ❯
Project Security Analyst (Azure) We are seeking a Project Security Analyst with expertise in Microsoft Azure to support and enhance the cloud securityposture across multiple projects. You will work closely with project managers, cloud architects, DevOps teams, and security stakeholders to ensure Azure-based solutions meet enterprise security standards and compliance requirements, dealing … with the following: Security Planning & Risk Assessment Analyze and define security requirements for Azure-based projects. Conduct threat modeling and risk assessments for cloud workloads. Support the secure configuration of Azure services (e.g., Azure AD, Key Vault, Defender for Cloud). Project Delivery Support Act as the security SME (Subject Matter Expert) in Azure-focused projects. Ensure … security milestones are integrated into project delivery timelines. Review architectural diagrams and deployment plans from a security perspective. Compliance & Governance Assist with the implementation of security policies and standards in Azure. Ensure project deliverables meet compliance frameworks (e.g., ISO 27001, NIST, CIS, GDPR). Support audits and evidence collection for Azure resources. Required Skills & Experience Strong background More ❯
Birmingham, West Midlands, England, United Kingdom
Proactive Appointments
Network & Security Specialist Inside IR35 - Hybrid We’re looking for a skilled Network & Security Specialist to join a leading organisation in Birmingham on a contract basis. You’ll play a key role in maintaining and securing the company’s hybrid infrastructure, spanning both on-premise and cloud environments. This role is ideal for a hands-on technical professional … with a strong background in network and system security, vulnerability remediation, and endpoint protection using Microsoft Intune . Key Responsibilities Support and secure network infrastructure across cloud and on-prem environments . Strengthen Windows Server and network security configurations. Lead efforts in vulnerability management and remediation , working closely with IT and security teams. Implement and maintain endpoint … hardening policies through Microsoft Intune . Monitor and respond to network security events and incidents. Contribute to the continuous improvement of securityposture, compliance, and best practices. Collaborate with internal teams to support ongoing infrastructure and security projects. Key Skills & Experience Proven experience as a Network or Security Engineer/Specialist in enterprise environments. Strong More ❯
Information Security Analyst On site in Eastleigh2/3-Month ContractStart ASAP Your new company A local government organisation, based across the South UK, are currently looking for an Information Security Analyst to come and support the Cybersecurity Manager for a short period of time, to cover for unforeseen sickness in the team. The organisation plays a huge … part in saving lives, and they truly make a real difference to the local area. Your new role Incident Detection & Response Monitor security alerts from XDR, email, and other systems. Investigate potential security incidents, perform initial triage, and escalate where necessary. Security Monitoring & Reporting Review logs and alerts for unusual activity or indicators of compromise. Maintain situational … awareness of current threats and advise on relevant mitigations. Security Awareness & Culture Monitor and manage the organisation's cybersecurity mailbox, responding to staff queries and phishing reports. Support delivery of awareness campaigns, newsletters, and training initiatives. Software Security Review Review and approve software access requests, ensuring appropriate authorisation and business justification. Third-Party Assurance Support the supplier due More ❯
Job Description- About the team Our team isaccountable for security within the mobile channel. Weprovide a suite of mobile security components,that provides an all-round securityposture in mobile appsincluding associated services (penetration testing, obfuscation, consultancy etc.). Our mission is tobuild a scalable, adaptable, and proactive approach to securing customers mobile apps, enabling mobile … meet demanding NFRs Desirable knowledge & experience Experience of JAVA development Experience with cryptography frameworks in go and JAVA Experience with SQL databases Experience and/or Interest in application security and/or mobile app security. Experience with cloud environments including DevOps functions and pipelines More ❯
I am currently assisting a client who operate in a regulated industry, financial services, who are currently embarking a programme of work focused on maturity/designing and implementing securityposture utilising SIEM tools such as Google Chronicle & implementing UEBA/SOAR (Security Orchestration, Automation, and Response/User and Entity Behaviour Analytics) built on GCP/… Google Cloud so Google SecOps/Security Operations experience is highly desirable. Key Responsibilities; - Enable and validate UEBA alerting within Chronicle SIEM, based on log sources - Deliver a minimum viable UEBA capability with tested detection logic - Provide engineering support to accelerate onboarding of log sources required for UEBA enrichment and detection fidelity - Demonstrate the ability to work with Google … log source coverage - Design and implement detection use cases aligned to MITRE ATT&CK framework - Enable SOAR integration by identifying high-fidelity detections and mapping Key Technical/IT Security Skills; - Chronicle SIEM - Google SecOps - UEBA Tooling - Windows Event Logs - BindPlane - MITRE ATT&CK - Strong SOC background - SOAR playbooks - GCP Finer Details; - Outside IR35 - Contract until End of December More ❯
I am currently assisting a client who operate in a regulated industry, financial services, who are currently embarking a programme of work focused on maturity/designing and implementing securityposture utilising SIEM tools such as Google Chronicle & implementing UEBA/SOAR (Security Orchestration, Automation, and Response/User and Entity Behaviour Analytics) built on GCP/… Google Cloud so Google SecOps/Security Operations experience is highly desirable. Key Responsibilities; - Enable and validate UEBA alerting within Chronicle SIEM, based on log sources - Deliver a minimum viable UEBA capability with tested detection logic - Provide engineering support to accelerate onboarding of log sources required for UEBA enrichment and detection fidelity - Demonstrate the ability to work with Google … log source coverage - Design and implement detection use cases aligned to MITRE ATT&CK framework - Enable SOAR integration by identifying high-fidelity detections and mapping Key Technical/IT Security Skills; - Chronicle SIEM - Google SecOps - UEBA Tooling - Windows Event Logs - BindPlane - MITRE ATT&CK - Strong SOC background - SOAR playbooks - GCP Finer Details; - Outside IR35 - Contract until End of December More ❯
I am currently assisting a client who operate in a regulated industry, financial services, who are currently embarking a programme of work focused on maturity/designing and implementing securityposture utilising SIEM tools such as Google Chronicle & implementing UEBA/SOAR (Security Orchestration, Automation, and Response/User and Entity Behaviour Analytics) built on GCP/… Google Cloud so Google SecOps/Security Operations experience is highly desirable. Key Responsibilities; - Enable and validate UEBA alerting within Chronicle SIEM, based on log sources - Deliver a minimum viable UEBA capability with tested detection logic - Provide engineering support to accelerate onboarding of log sources required for UEBA enrichment and detection fidelity - Demonstrate the ability to work with Google … log source coverage - Design and implement detection use cases aligned to MITRE ATT&CK framework - Enable SOAR integration by identifying high-fidelity detections and mapping Key Technical/IT Security Skills; - Chronicle SIEM - Google SecOps - UEBA Tooling - Windows Event Logs - BindPlane - MITRE ATT&CK - Strong SOC background - SOAR playbooks - GCP Finer Details; - Outside IR35 - Contract until End of December More ❯
I am currently assisting a client who operate in a regulated industry, financial services, who are currently embarking a programme of work focused on maturity/designing and implementing securityposture utilising SIEM tools such as Google Chronicle & implementing UEBA/SOAR (Security Orchestration, Automation, and Response/User and Entity Behaviour Analytics) built on GCP/… Google Cloud so Google SecOps/Security Operations experience is highly desirable. Key Responsibilities; - Enable and validate UEBA alerting within Chronicle SIEM, based on log sources - Deliver a minimum viable UEBA capability with tested detection logic - Provide engineering support to accelerate onboarding of log sources required for UEBA enrichment and detection fidelity - Demonstrate the ability to work with Google … log source coverage - Design and implement detection use cases aligned to MITRE ATT&CK framework - Enable SOAR integration by identifying high-fidelity detections and mapping Key Technical/IT Security Skills; - Chronicle SIEM - Google SecOps - UEBA Tooling - Windows Event Logs - BindPlane - MITRE ATT&CK - Strong SOC background - SOAR playbooks - GCP Finer Details; - Outside IR35 - Contract until End of December More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
Duration of assignment 06 Months Any other working conditions - travel/on call/shifts To be published on job boards from below onwards The Role Were looking for Security Consultant/Senior Security Consultant with expertise in penetration testing. As part of our Cyber Security team, you shall perform penetration testing which includes internet, intranet, wireless … from kickoff with clients through scoping engagements, penetration testing and reporting while adhering to the agreed scope and deadlines. Perform penetration testing which includes Network, web application, APIs Cloud Security, Thick Client application, wireless, social engineering, physical penetration testing. Execute penetration testing projects using the established methodology, tools and rules of engagements. Execute red team assessments to highlight gaps … impacting organizations security postures. Identify and exploit security vulnerabilities in a wide array of systems in a variety of situations. Perform in-depth analysis of penetration testing results and create report that describes findings, exploitation procedures, risks and recommendations. Convey complex technical security concepts to technical and non-technical audiences including executives. Perform technical quality reviews and More ❯
West Midlands (County), Birmingham, United Kingdom
Sherborne Talent Solutions
e.g., Netskope, Zscaler, Cisco Umbrella). Manage and maintain secure network architectures including firewalls, VPNs, switching, routing, and load balancing (HAProxy). Monitor, analyse, and optimise network performance and security posture. Implement security policies aligned with ISO 27001, NIST, and CIS frameworks. Produce detailed documentation for configurations, processes, and troubleshooting. Collaborate with global cloud, security, and infrastructure More ❯
and configuration of Identity Governance and Administration technologies such as SailPoint is preferred. The ideal candidate will contribute to the design, implementation, and maintenance of the identity platforms, enhancing securityposture across the environment. * Initially the focus will be on performing immediate remediation activities in Active Directory and working with our delivery partner to safely update the environment More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Stackstudio Digital Ltd
Lead client engagements from kickoff through to scoping, penetration testing, and reporting, ensuring delivery within agreed scope and deadlines. Perform comprehensive penetration testing across networks, web applications, APIs, cloud security, thick client applications, wireless, social engineering, and physical environments. Execute red team assessments to highlight gaps impacting organizational security postures. Identify and exploit security vulnerabilities in a … wide array of systems and scenarios. Conduct in-depth analysis of penetration testing results and create detailed reports with findings, exploitation procedures, risks, and actionable recommendations. Communicate complex technical security concepts to both technical and non-technical audiences, including executive stakeholders. Perform technical quality reviews and engage in direct technical conversations with clients. Utilize tools such as BurpSuite, Nessus … to deliver high-quality software solutions . Desirable: Bachelor's degree in Computer Science, Cybersecurity, or a related field (Master's preferred). 8+ years of experience in information security, with a focus on technical cyber security. Minimum of 5 years' experience in a network/cloud security environment. Certifications such as CISSP, CCSP, OSCP, SANS or equivalent. More ❯
Key Responsibilities 1. Deliver Advanced Technical Support For O365 Administration By Troubleshooting Complex Incidents And Conducting Root Cause Analysis To Implement Effective Solutions For Technical And Security Issues. 2. Collaborate With Support Teams To Resolve Escalated Tickets Within Agreed Slas, Ensuring Seamless Operations And Maintaining A Strong Security Posture. 3. Enhance Knowledge Management By Updating And Managing The … Members, And Coaching Analysts To Improve Team Performance. 4. Monitor And Improve Customer Satisfaction Metrics Through First Call Resolution Initiatives, Minimizing Case Reopens And Rejected Resolutions While Addressing Potential Security Threats. 5. Adhere To Quality Standards And Regulatory Requirements, Ensuring Compliance With Company Policies And Contributing To Continuous Service Improvement. Skill Requirements 1. In-Depth Knowledge Of O365 Administration … O365 Environments. 3. Proficiency In Conducting Root Cause Analysis And Implementing Effective Solutions. 4. Excellent Communication And Collaboration Skills To Work With Cross-Functional Teams. 5. Solid Understanding Of Security Best Practices Related To O365. More ❯