Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Inspire People
team at the heart of the global economy! The Department for International Trade (DIT) and Inspire People are partnering together to bring you an exciting opportunity for a Cyber Threat and Vulnerability Manager to protect DIT and the wider UK government from cyber threats in a fast paced and exciting role, responsible for the Vulnerability Management and Threat … 580. Salary is dependent on location and technical skills as assessed at interview. Flexible, hybrid working from London, Salford, Birmingham, Cardiff, Darlington, Edinburgh or Belfast. As the Cyber Threat and Vulnerability Manager you will be helping to protect DBT and the wider UK government from cyber threats in a fast paced and exciting role. Reporting to the Head of … Cyber Security Operations, the Cyber Threat and Vulnerability Manager will manage and be responsible for the Threat and Vulnerability Management function within the SOC, by providing leadership on identification and improvement opportunities, and ensuring service owners are aware of weaknesses in their security posture and are empowered with the right information to take appropriate actions. A healthy curiosity More ❯
Triage: Identify, analyse, and prioritize security incidents, escalating them as necessary within the team. Alert Management: Respond to security alerts, perform initial investigations, and document findings. Log Analysis/Threat Hunting: Review and analyse logs from various security tools and devices to identify potential security incidents within customer environments. Collaboration: Work closely with other team members and departments to … address security issues and improve the security posture. Reporting: Create and maintain detailed incident reports, periodic customer reports and documentation for future reference. ThreatIntelligence: Stay updated with the latest security threats, vulnerabilities, and technology trends. Assist in the development and maintenance of a comprehensive ThreatIntelligence Database and apply this data to assist in the More ❯
and Extended Detection and Response (XDR) Prompt analysis and triage of alerts and security events. Support the Incident Response (IR) team to report potential or actual incidents Conduct proactive Threat Hunting across the estate and help develop the ThreatIntelligence capability Work closely with the Incident Response (IR) team and report potential or actual incidents. Support the … technical findings to a non-technical audience. Thorough understanding of the latest security principles, techniques, and trends. Exposure to cyber security, including knowledge and experience of the breadth of threat actors and depth of threat vectors available Knowledge of using digital forensic and malware analysis tools, whether that be commercial products or open source Experience Needed to Fulfil … the Role Comprehensive experience of operating within a Security Operations Centre as an L3 analyst. Experience as a threat hunter preferable Experience in operating successfully within a large complex/federated enterprise environment Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Experience of security incident management and an understanding of More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Last Mile Infrastructure Limited
Data, youll lead and develop a team of security professionals, oversee the delivery and ongoing management of our security infrastructure, and act as the go-to technical expert in threat detection, incident response, and vulnerability management. Were looking for someone with strong leadership skills, a deep knowledge of the cyber security landscape, and a real passion for safeguarding digital … Lead incident response, creating and maintaining playbooks and ensuring quick, effective action during any breaches. Stay ahead of threats by managing vulnerabilities, coordinating penetration tests, applying patches, and analysing threat intelligence. Shape our security architecture and ensure compliance with policies, regulations, and industry standards. Report on our security posture and drive a security first culture through training, awareness, and … and mentoring a team. Extensive experience with security technologies such as SIEM, firewalls, intrusion detection/prevention systems, and vulnerability scanning tools. In-depth knowledge of incident response procedures, threat hunting, and forensic investigation techniques. Strong understanding of networking protocols, operating systems, and cloud security principles. Qualifications Bachelor's degree in Computer Science, Information Security, or a related field. More ❯