4 of 4 Permanent Threat Detection Jobs in the South West

Network & Information Security Manager

Hiring Organisation
Syniti
Location
Exeter, Devon, UK
Employment Type
Full-time
trust principles, control enforcement, and secure network transport. WHAT YOU WILL DO Own and manage vulnerability management program across cloud and containerized workloads. Oversee threat detection, incident response, and forensic analysis coordination with external SOC provider. Own and manage network design, segmentation, and secure interconnectivity across AWS, Azure ...

Network & Information Security Manager

Hiring Organisation
Syniti
Location
Bournemouth, Dorset, UK
Employment Type
Full-time
trust principles, control enforcement, and secure network transport. WHAT YOU WILL DO Own and manage vulnerability management program across cloud and containerized workloads. Oversee threat detection, incident response, and forensic analysis coordination with external SOC provider. Own and manage network design, segmentation, and secure interconnectivity across AWS, Azure ...

Network & Information Security Manager

Hiring Organisation
Syniti
Location
Cheltenham, Gloucestershire, UK
Employment Type
Full-time
trust principles, control enforcement, and secure network transport. WHAT YOU WILL DO Own and manage vulnerability management program across cloud and containerized workloads. Oversee threat detection, incident response, and forensic analysis coordination with external SOC provider. Own and manage network design, segmentation, and secure interconnectivity across AWS, Azure ...

Security Monitoring Consultant

Hiring Organisation
MSP Talent Bridge Ltd
Location
Gloucestershire, England, United Kingdom
Employment Type
Full-Time
Salary
£70,000 - £100,000 per annum
current state, target state, roadmap, sprint backlog and a clear “definition of done”. Translate between exec outcomes and engineer reality: cost, risk, resilience, detection efficacy, operational overhead. Back-of-house delivery Design telemetry pipelines from end-to-end (collect process route store), including: Collection: agents/collectors, APIs … viable operate” checklists per platform Choose Your Primary Lens (One required — experience in both is advantageous) Security/SIEM Telemetry-to-use-case mapping Threat detection concepts and lifecycle awareness Event normalisation and structured security data models Observability/ITOps Distributed systems and service-level thinking Metrics, logs ...