London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
/Day Inside IR35. C learance: DV Role Profile: Have experience with dealing with real world threats in the serious and organised crime or cyberthreat incidents Have experience in analysing malware behaviour and an ability to identify associated infrastructure Have an excellent understanding of how cyberthreat attackers build and use infrastructure to … undertake malicious activity CompTIA Cybersecurity Analyst (CySA+) or a similar certification GIAC CyberThreat Intelligence (GCTI) or a similar certification GIAC Reverse Engineering Malware (GREM) or a similar certification Certified Ethical Hacker (CEH) Offensive Security Certified Professional (OSCP) or a similar certification*HM will accept 2 of the above qualifications* Data analysis and visualisation Understanding of Cybersecurity … Concepts and Threat Intelligence Internet infrastructure/security architecture If you are interested in the above role - Click the "Apply Now" button now for immediate review Cyber Security Analyst, Security Analyst, Security, OSCP, ETHICAL HACKER, Cyber Security Analyst, Cyber Security Analyst, DV CLEARANCE, DV CLEARED, CYBER ATTACK, Cyber Security More ❯
Umbrella - Maximum) IR35 Status : Inside IR35 Security Clearance: DV Minimum Requirement: Have experience with dealing with real world threats in the serious and organised crime or cyberthreat incidents. Have experience in analysing malware behaviour and an ability to identify associated infrastructure. Have an excellent understanding of how cyberthreat attackers build and use … infrastructure to undertake malicious activity Essential Qualifications: CompTIA Cybersecurity Analyst (CySA+) or a similar certification GIAC CyberThreat Intelligence (GCTI) or a similar certification GIAC Reverse Engineering Malware (GREM) or a similar certification Certified Ethical Hacker (CEH) Offensive Security Certified Professional (OSCP) or a similar certification Any mix of 2 of the above qualifications* The Role: The … work will help inform more effective responses by government, law enforcement and developers alike to combat cybercrime. Researching malicious Internet infrastructure is a highly specialised field that blends cybersecurity, threat intelligence, and network analysis. A specialist in this area should possess a combination of technical skills, analytical capabilities, and practical experience. The key objective is to derive new insights More ❯
Job summary As a Security Officer, you will rotate around the CSOC into 4 main areas: Protective Monitoring, Incident Management, Threat Intelligence and Threat Hunting. As part of Protective Monitoring, you will join the analyst pool team responsible for triaging cyber alerts ranging from identity & access alerts, networking alerts and XDR. Within Threat Hunting, you … will conduct daily hunting investigations using prewritten queries across a range of multi-tenant hunting platforms, including but not limited to M365D XDR, Microsoft Sentinel and Splunk. The Threat Intelligence team perform the collection, aggregation, analysis and contextualisation of healthcare and security information to produce actionable cyberthreat intelligence. The Incident Management team provide end-to … duties of the job The main duties you would be involved with are as follows: Work within the Cyber Security Operations Centre (CSOC) with exposure to the Threat Intelligence, Threat Hunting, Protective Monitoring or Incident Management teams. Work as part of the Protective Monitoring team to investigate detections of potential Cyber Security incidents and More ❯
Exeter, Devon, United Kingdom Hybrid / WFH Options
Pontoon
environments. Provide security expertise and direction to delivery and engineering teams. Drive secure-by-design principles and ensure compliance with internal and industry security standards. Conduct 1st-line cyber risk assessments and supply chain assurance for third-party vendors. Review supplier contracts to … ensure appropriate security clauses are embedded. Maintain clear documentation and reporting around risks, residual risk ownership, and audit readiness. Stay up to date with the evolving cyberthreat landscape and implement appropriate security controls. What We're Looking For Strong background in cyber security, with 7+ years of relevant experience. In-depth knowledge of cloud … platforms such as AWS and Microsoft Azure, as well as Microsoft Entra ID and M365. Familiarity with frameworks such as NIST CSF, Cyber Assessment Framework (CAF), and NCSC Cloud Security Principles. Proven ability to influence stakeholders and support secure delivery in large, complex environments. Excellent communication skills and ability to collaborate with globally distributed teams. A degree in More ❯
Barrow-In-Furness, Cumbria, Barrow in Furness, United Kingdom Hybrid / WFH Options
Experis
of delivering security services within organisations? Would you relish putting these skills into practice by taking on a role within us to protect us and our clients from cyberthreats? We are seeking a Vulnerability Management Lead with proven experience to join our cybersecurity team. Technical Skills Provide remediation recommendations; Monitor remediation activities; Report on the progress of More ❯
Barrow-in-furness, Cumbria, United Kingdom Hybrid / WFH Options
Experis
of delivering security services within organisations? Would you relish putting these skills into practice by taking on a role within us to protect us and our clients from cyberthreats? We are seeking a Vulnerability Management Lead with proven experience to join our cybersecurity team. Technical Skills Provide remediation recommendations; Monitor remediation activities; Report on the progress of More ❯
and Azure to join our dynamic team. The ideal candidate will design, implement, and optimize secure network architectures, leveraging Microsoft cloud technologies to protect enterprise environments against evolving cyber threats. Key Responsibilities: Network Architecture & Security: Design and implement secure network infrastructures using Azure networking components (VNETs, NSGs, Azure Firewall, VPN Gateway, etc.). Integrate M365 security features (Defender … Collaborate with SOC teams to monitor and respond to network-based threats. Utilize Microsoft Sentinel and Defender for Cloud to detect and remediate vulnerabilities. Develop playbooks and automation for threat response. Required Skills & Experience: Proven experience in networking and cybersecurity consulting. Strong knowledge of Microsoft 365 security and compliance features. Hands-on experience with Azure networking and security services. More ❯
South West London, London, England, United Kingdom
Tenth Revolution Group
and Azure to join our dynamic team. The ideal candidate will design, implement, and optimize secure network architectures, leveraging Microsoft cloud technologies to protect enterprise environments against evolving cyber threats. Key Responsibilities: Network Architecture & Security: Design and implement secure network infrastructures using Azure networking components (VNETs, NSGs, Azure Firewall, VPN Gateway, etc.). Integrate M365 security features (Defender … Collaborate with SOC teams to monitor and respond to network-based threats. Utilize Microsoft Sentinel and Defender for Cloud to detect and remediate vulnerabilities. Develop playbooks and automation for threat response. Required Skills & Experience: Proven experience in networking and cybersecurity consulting. Strong knowledge of Microsoft 365 security and compliance features. Hands-on experience with Azure networking and security services. More ❯
primarily Google Cloud Platform (GCP) and Microsoft Azure. This role is essential in ensuring that all cloud infrastructure, services, and data remain protected, compliant, and resilient against emerging cyber threats. Working within the broader technology and security teams, the Cloud Security Engineer will be responsible for policy enforcement, incident response, security tooling, and embedding security across the development … of Azure and Microsoft 365 cloud security controls and best practices. Deep understanding of cloud security architecture , the shared responsibility model, and infrastructure-as-code security principles. Experience with threat modelling, incident response, and forensic analysis in cloud environments. Familiarity with container security, Kubernetes, and hybrid or multi-cloud deployments is advantageous. Preferred certifications: Google Professional Cloud Security Engineer More ❯
couple days per week in the central Edinburgh office Open on daily rate Outside IR35 Be-IT are working with a global consultancy business who are seeking a Cyber Security Risk Manager on an initial 3-month contract with potential extensions. In this role you’ll – Develop and implement a comprehensive cyber security risk management program … to identify, assess and prioritise cyberthreats and vulnerabilities. Conduct regular risk assessments and vulnerability assessments. Provide guidance to project teams to integrate risk management practices into the project life cycle. Collaborate with internal and external partners to enhance the organization's cyber resilience and incident response capabilities. You should have the following skills and experiences … Advanced certifications (CRISC, CISM, CISSP) are highly desirable. Proven experience in a cyber security risk management role, strong understanding of risk assessment methodologies. Experience with ServiceNow GRC is a plus. In-depth knowledge of cyber security principles, frameworks and best practices. Experience with risk assessment tools and methodologies. Familiarity with relevant regulations and compliance standards (ISO More ❯
IR35 Status: Inside IR35 Security Clearance: DV Minimum Requirement: Ability to work at the strategic (system of systems) level and see the global systems picture Have experience of cyber security risk mitigations, requirements and capacity building at the enterprise and national level. Have experience in the field of CNI protection from cyberthreats, ideally covering a … wide range of sectors including telecommunications, energy, essential digital services, industry, finance and banking. Current expert knowledge of cyber security risk identification, and mitigation in the international CII environment. Have experience and a broad understanding of how modern Information Systems are architected and operated in the globally distributed service marketplace. Degree and/or Masters in any of … the following areas: Cybersecurity; Information Security; Computer Science; Electrical or Systems Engineering; Critical Infrastructure Protection; Risk Management or Public Policy Desirable Risk Management training Cyber Resilience for Critical Information Infrastructures course The Role: The purpose of this project is to undertake a short research activity to develop an accurate view of the relative priority of the UK's More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Public Sector Resourcing CWS
develop an accurate view of the relative priority of the UK's international partners based on Critical Information Infrastructure (CII) dependencies. This work will help inform future international cyber security risk mitigation activities. The CII researchers will work to the senior cyber specialist and be responsible for key research activities and product deliveries including: CNI dependency … information. * Contact and engage directly with key stakeholders in the public and private sector including academia where appropriate. Essential: * Have experience in the field of CNI protection from cyberthreats, ideally covering a wide range of sectors including Chemicals, Civil Nuclear, Energy, Finance, Food, Space or Water. * Have experience of structured research and data gathering exercises. * Have experience More ❯
security standards and align with best industry practices. Key Responsibilities Develop and maintain a security architecture framework that supports secure business and IT solutions aligned with organisational objectives and threat landscape. Define and deliver security architecture governance, ensuring IT projects meet core security principles and align with overall IT strategy. Integrate security-by-design principles into project lifecycles across … application and infrastructure teams. Provide subject matter expertise on security systems, architectures, and emerging cyber threats. Lead the development of security principles and contribute to updates of security and technology standards. Collaborate with the Technology Risk team to assess and mitigate risks, ensuring frameworks follow best practices in information security. Essential Skills & Experience Proven experience as a Security More ❯
partner across all business areas. In the OT Security Architect role, you will play a crucial role in ensuring our Operational Technology (OT) is secure and protected against cyber threats. Your expertise will help identify potential risks and vulnerabilities specific to OT environments and develop effective mitigation strategies. By providing guidance and support, you will contribute to our … in OT environments. Coordinating technical design and review activities within the Security team. Identifying and addressing key risks and issues in OT systems. Conducting risk assessments to identify cyberthreats and vulnerabilities in OT environments. Conducting supply chain assurance for suppliers and reviewing vendor contracts. Developing and implementing strategies to mitigate cyber risks in OT systems. … Staying updated with the latest cyberthreats and recommending OT security controls. Maintaining documentation and reporting on security-related activities in OT environments. Review substation architectures ensuring risk is understood Participate in shaping technical specifications to drive the implementation of security within the organisation. Facilitate Cyber Informed Engineering inspired assessments of engineering plant to drive iterative More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Experis
e.g. SIEM solution) to support a multi-vendor cloud based back office implementation. Experience with: Industry best practice for SOC service and solution design. Working with organisations with heightened threat response requirements (e.g. UK Defence & Central Government). Evaluation and selection of security tools that meet the organisations SOC requirements. High Level Design of security infrastructure and tools to … support a SOC's mission of monitoring, detecting, analysing, and responding to cyber threats. Knowledge of the following policies and process. Required: NIST NCSC SOC Guidance NCSC CAF (CNI) Desirable: MoD JSP 440 MoD JSP 503 MoD JSP More ❯