a diverse and complex digital estate. You'll shape the direction of our security operations, optimise the use of key platforms, develop our threat management approach, and drive improvements in our incident response and vulnerabilitymanagement capabilities. You'll also take the lead in developing meaningful KPIs … Operations Centre (SOC), managing a team of analysts, engineers and external partners to ensure effective monitoring, detection, and response to cyber threats. Provide line management and leadership to the SOC team, including performance management, mentoring, and professional development, while fostering a collaborative and high-performing culture aligned with … escalation paths, and workflows. Define and report on KPIs, SLAs, and performance metrics to measure operational effectiveness and support strategic decision-making. Oversee threat management, SIEM optimisation, and vulnerabilitymanagement activities, ensuring tools and workflows are continually tuned for impact. Serve as the main point of contact More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and controls … forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, and regulatory … a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. More ❯
complex organisation, trading globally within a constantly evolving IT and information security threat environment. Impact of Role Implement governance framework to enable enforcement and management of IT and cyber policies across all JD entities. Help drive good security hygiene and the use of appropriate controls into the business culture … role resides in the Information Security Function and reports to the Global Head of Governance, Risk and Compliance. Direct Reports Individual contributor with possible management of a GRC Analyst and periodic oversight of seconded resources, contingent workers and systems integrators. Key Elements of the Role The job holder will … a company-wide consistent set of policies and standards used across all entities. Implement and maintain a robust policy development lifecycle ensuring effective policy management and review in line with compliance and technological advancements and changes. Analyse incidents and events to identify omissions and opportunities for improvement in accordance More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Suits Me Limited
evidence of controls and contributing to audit readiness activities. Collaborate with the compliance and risk teams to ensure IT operations meet regulatory obligations. Support vulnerabilitymanagement efforts, including patching and system hardening. Assist in maintaining secure and efficient identity and access management practices, including integration with M365 … respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. More ❯
technologies (firewalls, IDS/IPS, SIEM, etc.). Experience with security tools such as SIEM/SOAR platforms, endpoint detection and response (EDR) solutions, vulnerabilitymanagement, detection and response/remediation (VMDR) solutions and threat intelligence platforms. Knowledge of security standards and frameworks (e.g., NIST, CIS Controls, ISO More ❯
Services , you're exactly the kind of person they want to speak with. Any hands-on background in DDoS, WAF, IDAM, EDR, MDM , or VulnerabilityManagement ? Even better. They're also super open to people who are coming from an operational security background and want to pivot into More ❯
Blackpool, Lancashire, North West, United Kingdom Hybrid / WFH Options
DWP Digital
of Active Directory/Entra ID. Strong working knowledge and practical experience in 3rd/4th line knowledge of Windows Server Security, Monitoring and Vulnerability Management. Proven ability and experience of onboarding applications to Entra ID. Strong working knowledge and practical experience of SSO (Azure) & MFA. Significant demonstrable experience … of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management and CyberArk. Extensive experience and proven track record of working in a large enterprise and multi-supplier environment. You and your role We're the folks behind secure access to all …/7 for thousands of users. We manage everything from day-to-day support to long-term projects, including our custom-built Identity Management platform and integrations with ServiceNow. You will help us in pushing forward with cloud adoption across Azure, AWS, and Oracle Cloud. We're all about More ❯
preston, lancashire, north west england, united kingdom Hybrid / WFH Options
DWP Digital
of Active Directory/Entra ID. Strong working knowledge and practical experience in 3rd/4th line knowledge of Windows Server Security, Monitoring and Vulnerability Management. Proven ability and experience of onboarding applications to Entra ID. Strong working knowledge and practical experience of SSO (Azure) & MFA. Significant demonstrable experience … of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management and CyberArk. Extensive experience and proven track record of working in a large enterprise and multi-supplier environment. You and your role We're the folks behind secure access to all …/7 for thousands of users. We manage everything from day-to-day support to long-term projects, including our custom-built Identity Management platform and integrations with ServiceNow. You will help us in pushing forward with cloud adoption across Azure, AWS, and Oracle Cloud. We're all about More ❯