patch management processes for virtual machines, containers and serverless functions. Integrate vulnerability scanning (e.g. Qualys, Sonar Cloud, Tenable or Azure-native scanners) into CI/CD pipelines. Security Analysis & IncidentResponse Perform root-cause analysis of security incidents and vulnerabilities. Conduct threat modelling, code and infrastructure reviews. Develop and execute incidentresponse procedures, leveraging Sentinel playbooks … security subject-matter expert during architecture and design reviews. Mentor and upskill engineers on secure coding and DevSecOps best practices Continuous Improvement Develop and refine security playbooks, runbooks and incidentresponse procedures. Monitor security metrics and key risk indicators and identify opportunities to improve tooling and processes. Evaluate and pilot emerging security technologies, especially within the Microsoft security More ❯
individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethical hacking, incidentresponse, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and interactive sessions, guiding … support, feedback, and mentorship Collaborate with the Teaching Assistant and wider team to support learner development Lead or support additional activities such as webinars, hands-on labs, and simulated incidentresponse exercises Contribute to the evaluation of the programme, offering feedback for continuous improvement Areas of Knowledge We are looking for people who have working experience or comfortable … e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) IncidentResponse and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR More ❯
to provide advice guidance and help manage the business' Cyber and Operational Security risks. Build close relationships and liaise with Ayvens Central Security on operational security, internal control and incidentresponse as required. To actively remain informed and educated in respect of new and evolving areas of Technology, Information and Cyber security and be a proactive champion of … central reporting as required. Support the Ayvens UK Information Security awareness program, support the delivery of awareness activities and communication across the business as appropriate. Operational Security Supervise the response to all technical alarms and periodic audits to ensure compliance with agreed controls. Oversee the investigation and management of operational security incidents and alerts to assist in the design … Provide clear guidance and awareness on operational security controls such as DLP, Phishing, EDR and SEP to ensure the business can achieve its objectives safely and securely. Oversee the response to security alerts from SG CERT and Ayvens central and co-ordinate any urgent incident response. Manage Ayvens out-of-hours security incidentresponse plans and More ❯
successful candidate will play a central role in delivering risk reduction across the business. You'll be responsible for maintaining ISO27001 compliance, overseeing risk assessment and mitigation, and supporting incident management across multi-entity operations. Key Accountabilities: Lead and manage a team of three security professionals , supporting their development and day-to-day delivery. Ensure ongoing ISO27001 accreditation and … policy, tooling, and training. Conduct risk assessments, oversee remediation plans, and guide secure-by-design approaches across projects. Provide technical leadership in areas including threat intelligence, compliance reporting, and incidentresponse . Support regulatory and internal audits, contributing clear documentation and continuous improvement. Collaborate with internal teams and external partners, including service providers and the organisation's parent … compliance frameworks. Hands-on experience with security technologies: SIEM, IAM, vulnerability assessment, endpoint protection, cloud services (AWS, SaaS, IaaS) . Strong communication skills and stakeholder management abilities. Experience in incidentresponse and enterprise risk reporting. Professional certifications such as CISSP or ISO27001 Lead Implementer/Auditor (desirable). Benefits: Hybrid working (2 days per week in-office) Generous More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Reed Technology
successful candidate will play a central role in delivering risk reduction across the business. You'll be responsible for maintaining ISO27001 compliance, overseeing risk assessment and mitigation, and supporting incident management across multi-entity operations. Key Accountabilities: Lead and manage a team of three security professionals , supporting their development and day-to-day delivery. Ensure ongoing ISO27001 accreditation and … policy, tooling, and training. Conduct risk assessments, oversee remediation plans, and guide secure-by-design approaches across projects. Provide technical leadership in areas including threat intelligence, compliance reporting, and incidentresponse . Support regulatory and internal audits, contributing clear documentation and continuous improvement. Collaborate with internal teams and external partners, including service providers and the organisation's parent … compliance frameworks. Hands-on experience with security technologies: SIEM, IAM, vulnerability assessment, endpoint protection, cloud services (AWS, SaaS, IaaS) . Strong communication skills and stakeholder management abilities. Experience in incidentresponse and enterprise risk reporting. Professional certifications such as CISSP or ISO27001 Lead Implementer/Auditor (desirable). Benefits: Hybrid working (2 days per week in-office) Generous More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
successful candidate will play a central role in delivering risk reduction across the business. You'll be responsible for maintaining ISO27001 compliance, overseeing risk assessment and mitigation, and supporting incident management across multi-entity operations. Key Accountabilities: Lead and manage a team of three security professionals , supporting their development and day-to-day delivery. Ensure ongoing ISO27001 accreditation and … policy, tooling, and training. Conduct risk assessments, oversee remediation plans, and guide secure-by-design approaches across projects. Provide technical leadership in areas including threat intelligence, compliance reporting, and incidentresponse . Support regulatory and internal audits, contributing clear documentation and continuous improvement. Collaborate with internal teams and external partners, including service providers and the organisation's parent … compliance frameworks. Hands-on experience with security technologies: SIEM, IAM, vulnerability assessment, endpoint protection, cloud services (AWS, SaaS, IaaS) . Strong communication skills and stakeholder management abilities. Experience in incidentresponse and enterprise risk reporting. Professional certifications such as CISSP or ISO27001 Lead Implementer/Auditor (desirable). Benefits: Hybrid working (2 days per week in-office) Generous More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
teams to ensure security best practices and secure-by-design principles. Identify and mitigate security risks in solution architectures. Create security documentation (e.g., RMADS, Security Assurance Documents). Support incidentresponse and remediation efforts for security breaches. Provide security guidance and training to teams across the organization. Key Skills & Experience: Strong knowledge of security frameworks (ISO 27001, NIST … modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incidentresponse and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Certifications such as CISSP More ❯
and audits. Vulnerability Analysis: Conduct assessments and penetration testing. Develop mitigation strategies and track vulnerabilities. Forensic Analysis: Analyze security incidents, collect evidence, and prepare reports to improve security posture. IncidentResponse: Lead response efforts, develop plans, and conduct post-incident reviews. Security Tools: Manage security tools like firewalls and intrusion detection systems. Evaluate new technologies. Documentation … plus), and understanding of secure development lifecycle. Proficiency with security tools, firewalls (Palo Alto preferred), IDS, endpoint security. Strong understanding of network protocols, VPNs, and security architecture. Experience in incident detection, analysis, response, forensic and malware analysis. Skills in scripting and automation (Python, PowerShell). Knowledge of frameworks like ISO 27001, NIST, Cyber Essentials. Understanding of risk management … clear security documentation and communicate technical info effectively. Solid organizational skills and ability to work in a team environment. Extensive experience in cybersecurity roles, especially in security operations and incident management. Project management experience and relevant certifications (CCSP, CEH, Security+, AWS, Azure) are highly desirable. What You ll Get in Return Discretionary annual bonus 25 days' holiday, holiday buying More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. IncidentResponse & Forensic Analysis - Ability to manage and respond to security breaches, perform digital forensics, and mitigate damage through structured incidentresponse processes. Risk Management & Compliance - Proficiency … threat sources to preempt potential cyber attacks. Security Automation & Scripting - Familiarity with scripting languages (such as Python, PowerShell, or Bash) to automate repetitive tasks, analyse security logs, and manage incident response. How it works: Learn : Complete a period of full-time Academy training when you join Sparta Global. All training is delivered remotely by our team of industry-professional More ❯
monitor traffic, respond to suspicious activity, and conduct audits to ensure compliance. Vulnerability Analysis Carry out regular assessments and penetration tests, develop mitigation strategies, and report on remediation progress. IncidentResponse Lead incident detection, containment, and recovery efforts; conduct post-incident reviews and recommend improvements. Forensic Analysis Investigate incidents, perform root cause analysis, preserve digital evidence … preferred. Security Tools Proficiency Hands-on experience with Palo Alto firewalls, IDS/IPS, and endpoint protection. Network Security Knowledge Deep understanding of VPNs, network protocols, and security architecture. Incident Management Proven ability to detect, analyse, and resolve security threats and malware. Vulnerability Management Experience in identifying and mitigating system vulnerabilities. Automation Skills Proficiency in security automation using scripting More ❯
monitor traffic, respond to suspicious activity, and conduct audits to ensure compliance. Vulnerability Analysis - Carry out regular assessments and penetration tests, develop mitigation strategies, and report on remediation progress. IncidentResponse - Lead incident detection, containment, and recovery efforts; conduct post-incident reviews and recommend improvements. Forensic Analysis - Investigate incidents, perform root cause analysis, preserve digital evidence … preferred. Security Tools Proficiency - Hands-on experience with Palo Alto firewalls, IDS/IPS, and endpoint protection. Network Security Knowledge - Deep understanding of VPNs, network protocols, and security architecture. Incident Management - Proven ability to detect, analyse, and resolve security threats and malware. Vulnerability Management - Experience in identifying and mitigating system vulnerabilities. Automation Skills - Proficiency in security automation using scripting More ❯
monitor traffic, respond to suspicious activity, and conduct audits to ensure compliance. Vulnerability Analysis – Carry out regular assessments and penetration tests, develop mitigation strategies, and report on remediation progress. IncidentResponse – Lead incident detection, containment, and recovery efforts; conduct post-incident reviews and recommend improvements. Forensic Analysis – Investigate incidents, perform root cause analysis, preserve digital evidence … preferred. Security Tools Proficiency – Hands-on experience with Palo Alto firewalls, IDS/IPS, and endpoint protection. Network Security Knowledge – Deep understanding of VPNs, network protocols, and security architecture. Incident Management – Proven ability to detect, analyse, and resolve security threats and malware. Vulnerability Management – Experience in identifying and mitigating system vulnerabilities. Automation Skills – Proficiency in security automation using scripting More ❯
Employment Type: Permanent
Salary: £60000 - £65000/annum + 10% Bonus and Excellent Benefits
objectives are met. This position is ideal for someone with experience in SIEM or SOC environments who is comfortable in a consultative, client-facing role. Knowledge of cloud security, response frameworks, and industry compliance standards will be key to success in helping clients implement robust, scalable SIEM solutions. Key Responsibilities: Client Engagement & Solution Design: Collaborate with clients to identify … real-time monitoring. Support clients in deploying SIEM in hybrid environments, including on-premises, cloud, and multi-cloud platforms, integrating cloud-native security tools for enhanced visibility. Threat Detection & Response Strategy: Design and implement threat detection rules, logic, and response workflows that align with the client's risk profile and operational needs. Guide clients in developing and improving … their incidentresponse processes, including playbook creation and alignment with security frameworks like NIST and ISO 27001. Regularly review and optimise SIEM configurations to reduce false positives, improve detection accuracy, and adapt to evolving threat landscapes. Advisory & Compliance: Advise clients on aligning SIEM deployments with security frameworks and compliance requirements, including GDPR, HIPAA, and PCI DSS. Provide guidance More ❯
lead forensic investigations, and support wider resilience initiatives. Key Responsibilities: Design, implement, and manage secure network architectures Perform vulnerability assessments , penetration testing , and remediation strategy delivery Lead and coordinate incidentresponse , forensic analysis, and post-incident reporting Use and optimise security tooling (e.g. firewalls, IDS/IPS , endpoint protection) Collaborate with developers and IT teams to embed … with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience working on security operations, threat management, and incident resolution Excellent communication skills, with ability to translate technical risk to non-technical stakeholders Relevant certifications are desirable (e.g. CEH, CCSP, Security+, AWS or Azure certifications ) Benefits: Annual bonus More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
lead forensic investigations, and support wider resilience initiatives. Key Responsibilities: Design, implement, and manage secure network architectures Perform vulnerability assessments , penetration testing , and remediation strategy delivery Lead and coordinate incidentresponse , forensic analysis, and post-incident reporting Use and optimise security tooling (e.g. firewalls, IDS/IPS , endpoint protection) Collaborate with developers and IT teams to embed … with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience working on security operations, threat management, and incident resolution Excellent communication skills, with ability to translate technical risk to non-technical stakeholders Relevant certifications are desirable (e.g. CEH, CCSP, Security+, AWS or Azure certifications ) Benefits: Annual bonus More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Stripe Olt
with Sentinel, KQL and Defender. SOC First Responders form the bulwark of our cyber defences and are responsible for the rapid triage of security alerts and for the initial response to legitimate security incidents. In addition to their primary tasks, First Responders assist with pro-active security operations, including both regularly scheduled security assessments as well as ad-hoc … security taskings Location Hybrid - Bristol or London Type Permanent, full-time Immediate Who we are looking for. The responsibilities of this role include: Initial triage and response to security alerts. Supporting customer cloud infrastructure & security posture. Monitoring and resolution of key security metrics. Identify emerging security trends. IOC creation based on emerging threats. Acting as a key part of … the cyber incidentresponse team. Completion of proactive security reports. 24/7 Shift Work - 4 on 4 off pattern. This role will require working within a close-knit team to help build Stripe OLT as a global leader in cyber security - focused specifically on defensive domains. The role requires a self-starter, an ideal team player who More ❯
to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security policies, documentation, and awareness training Support incidentresponse efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST More ❯
to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security policies, documentation, and awareness training Support incidentresponse efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST More ❯
to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security policies, documentation, and awareness training Support incidentresponse efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST More ❯
will interact regularly with both IT professionals and business users to understand their needs and deliver solutions that keep operations running efficiently. By following robust service management protocols-including incidentresponse, change control, capacity planning, problem analysis, service level management, and knowledge documentation-you will help uphold the highest standards of service delivery. Your ability to coordinate with … timely resolution to minimise disruption to manufacturing operations.* Engage with both IT and business users to address functional issues related to manufacturing systems and provide clear communication throughout the incident lifecycle.* Follow established service management processes including Incident, Change, Capacity, Problem Management, Service Level Management (SLM), and Knowledge Management to maintain high standards of delivery.* Maintain agreed Service More ❯
to integrate security best practices ensuring Secure by Design Identify and mitigate security vulnerabilities and risks in products Develop and maintain security guidelines, documentation, and training materials Participate in incidentresponse and remediation efforts for security breaches affecting products Your skillset may include: Knowledge of HMG standards (including MOD-specific JSP, Def Stan 05-138, Def Stan More ❯
to integrate security best practices ensuring Secure by Design Identify and mitigate security vulnerabilities and risks in products Develop and maintain security guidelines, documentation, and training materials Participate in incidentresponse and remediation efforts for security breaches affecting products Your skillset may include: Knowledge of HMG standards (including MOD-specific JSP, Def Stan 05-138, Def Stan More ❯