All this whilst keeping in mind the strategic intent to ultimately provided these services to our B2B markets. Lead day-to-day operations of Proactive Analysis, Security Tooling and CERTteams including oversight and direction of complex cyber security incidents and investigations Establish and maintain partnerships across Liberty Global, retained markers, joint ventures, external vendors and partners Manage the … effectiveness of Security Operations activities Proactively identify security monitoring and process gaps and work with colleagues to expand visibility in identified areas Work with Security engineering and Security architecture teams to seek new and innovative approaches to prevent and identify cyber threats using endpoint, network and cloud security solutions and emerging security technologies Implement metrics to directly support executive … security practitioners at all career levels Ensure that all documents, workflows, and processes remain accurate and up-to-date Supervise the planning, and directing of all activities across the teams inline with the budget Lead all people management facets including recruiting, hiring, performance management, etc Effective management of 3rd Party Managed Service provider supporting Security Operations Provide input on More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Liberty Global
strong cyber security and risk management experience. As a member of our pro-active, pragmatic, and energetic team, you are in the unique position to interact with people and teams globally, across all levels of Liberty Global, Operating Companies and Joint Ventures, and influence decisions that have a direct impact on operational stability and effectiveness of Security Control of … activities. Provide the expertise in establishing the extent of a Cyber Attack, the business impacts, and lead remediation activities coordinating with Incident Response and Threat Intelligence delivery teams to handle inquiries, briefings, and status reports in a variety of formats. Technical & Management reporting to demonstrate effectiveness and value of the teams work. Create incident reports and … Management, Incident Response tooling. Strong report writing and communication skills. Understanding crisis management, business continuity and disaster recovery procedures. Ability to understand technical topics dealing with technical teams then explain and present them to management level executives. Being able to handle multiple competing priorities in a fast-paced environment to proceed high priority tasks to a resolution. More ❯
London, England, United Kingdom Hybrid / WFH Options
Liberty Global
strong cyber security and risk management experience. As a member of our pro-active, pragmatic, and energetic team, you are in the unique position to interact with people and teams globally, across all levels of Liberty Global, Operating Companies and Joint Ventures, and influence decisions that have a direct impact on operational stability and effectiveness of Security Control of … activities. Provide the expertise in establishing the extent of a Cyber Attack, the business impacts, and lead remediation activities coordinating with Incident Response and Threat Intelligence delivery teams to handle inquiries, briefings, and status reports in a variety of formats. Technical & Management reporting to demonstrate effectiveness and value of the teams work. Create incident reports and … Management, Incident Response tooling. Strong report writing and communication skills. Understanding crisis management, business continuity and disaster recovery procedures. Ability to understand technical topics dealing with technical teams then explain and present them to management level executives. Being able to handle multiple competing priorities in a fast-paced environment to proceed high priority tasks to a resolution. More ❯
will be responsible for analyzing potential weaknesses and identifying a roadmap to improve the security of information assets across CLS. The candidate will advise Business Owners, developers, and technical teams on options to mitigate risk. The candidate must have excellent verbal, written, analytical and interpersonal communication skills. Essential Functions/Major Duties and Responsibilities Strategic Provide strategic direction specific … Cloud Security Framework in respect to data classification. Enhance security programs in response to regulatory requirements, internal audit and planned strategic initiatives. Foster relationships with key functional teams such as IT, Compliance, Operations, Finance, HR, Internal Audit, and Enterprise Risk to support current and future initiatives. Maintain timely understanding of CLS information assets, where they reside and … CRISC, CCNA, GIAC, or equivalent or working towards certification is preferred. Knowledge of Risk Management life cycles based on an established framework: ISO 27001, SANS, NIST SP 800-53, CERT, ENISA. Working knowledge of the following frameworks and regulations: ISO 27001/2, SANS Top 20 Critical Security Controls, NIST CSF, and FFIEC handbook. An advanced degree would enhance the More ❯
London, England, United Kingdom Hybrid / WFH Options
CPS Group (UK) Limited
a wide range of vendors, including PLC, DCS, and SCADA platforms. Preferably hold training or certifications in standards and frameworks such as ISA/IEC 62443, CISSP, GIAC, ICS-CERT, or SANS. Excellent written and verbal communication skills, with the ability to clearly articulate technical information. Sound understanding of business operations and security practices within engineering and security consulting domains. … such as IEC 62443, NIST Cybersecurity Framework (CSF), NIST SP 800-82, ONG-C2M2, and NERC-CIP. Technical Experience with: Cisco CyberVision or Claroty Security Orchestration, Automation, and Response (SOAR) platforms OT asset inventory and change detection tools Vulnerability management solutions OT network and communications monitoring tools Familiarity with the Purdue Enterprise Reference Architecture (ISA-95) For more More ❯
solutions, procedures and practices. Solid technical knowledge and experience on security technologies (like Endpoint protection, Mobile Security, Data Protection, Cloud Security, etc.) and on cyber security capabilities (SIEM, SOC, CERT, Vulnerability Management, Threat intelligence etc.) Strong knowledge of main Information Security standards and frameworks (ISO27001, ISO22301, ISF, NIST, COBIT.) Good background in information management, with clear understanding of the challenges More ❯
Social network you want to login/join with: We’re looking for a Senior Security Specialist to join us in Reading Reporting into our Senior CERT Manager you will help continue to mature the way in which the organisation manages and handle the operational security incidents of our ever evolving business.†̄ The person will provide a passion and deep … these skills amongst the team whilst also acting as a technical escalation point. As such, the role requires a deep technical understanding of intrusion detection and analysis, incident response, vulnerability management, and infrastructure Driving forward the technical skill set of the team by developing threat hunting, adversary emulation, leading edge threat mitigation methodologies and security use cases. Understand … memory and file system analysis, and attack vectors. Knowledge of Data Protection (GDPR) and its role within a business. Technical & Management reporting to demonstrate effectiveness and value of the teams work . †̄Global Information Assurance Certifications (GIAC) e.g. Certified Incident Handler (GCIH), Certified Intrusion Analyst (GCIA), Reverse Engineering Malware (GREM) would be an advantage. What’s in it More ❯
a wide range of vendors, including PLC, DCS, and SCADA platforms. Preferably hold training or certifications in standards and frameworks such as ISA/IEC 62443, CISSP, GIAC, ICS-CERT, or SANS. Excellent written and verbal communication skills, with the ability to clearly articulate technical information. Sound understanding of business operations and security practices within engineering and security consulting domains. … such as IEC 62443, NIST Cybersecurity Framework (CSF), NIST SP 800-82, ONG-C2M2, and NERC-CIP. Technical Experience with: Cisco CyberVision or Claroty Security Orchestration, Automation, and Response (SOAR) platforms OT asset inventory and change detection tools Vulnerability management solutions OT network and communications monitoring tools Familiarity with the Purdue Enterprise Reference Architecture (ISA-95) For more More ❯
solutions, procedures and practices. Solid technical knowledge and experience on security technologies (like Endpoint protection, Mobile Security, Data Protection, Cloud Security, etc.) and on cyber security capabilities (SIEM, SOC, CERT, Vulnerability Management, Threat intelligence etc.) Strong knowledge of main Information Security standards and framework (ISO27001, ISO22301, ISF, NIST, COBIT.) Good background in information management, with clear understanding of the challenges More ❯
solutions, procedures and practices. Solid technical knowledge and experience on security technologies (like Endpoint protection, Mobile Security, Data Protection, Cloud Security, etc.) and on cyber security capabilities (SIEM, SOC, CERT, Vulnerability Management, Threat intelligence etc.) Strong knowledge of main Information Security standards and framework (ISO27001, ISO22301, ISF, NIST, COBIT.) Good background in information management, with clear understanding of the challenges More ❯
team to investigate, contain, and remediate security incidents ️ Developing and executing incident response plans, ensuring they align with organizational goals and regulatory requirements ️ Collaborating with other teams (IT, legal, and compliance) to ensure coordinated and effective incident response ️ Conducting post-incident analysis and providing reports with recommendations to improve incident response strategies … Continuously improving incident response processes, tools, and workflows to stay ahead of evolving cyber threats What We’re Looking For … Proven experience as an Incident Response Manager or in a senior incident response role ️ Strong knowledge of incident response frameworks (e.g., NIST, SANS, CERT) and best practices ️ Hands-on experience with forensic tools, SIEM systems, and malware analysis techniques ️ Excellent leadership and communication skills, with the ability to manage high-pressure situations effectively ️ Certifications More ❯
data. The ideal candidate will possess deep expertise in vulnerability management, threat intelligence, security operations centre (SOC) management, and incident response. This leader will build and mentor high-performing teams, optimise processes, and proactively mitigate security risks in ASOS's evolving environment. Day To Day Responsibilities: Develop and implement a comprehensive security operations strategy aligned with the company's … enhance and improve the Cyber Defence service. Act as escalation for the SOC manager and oversee the overall efficiency of SOC and IR teams. Provide direction to align the teams towards proactive intelligence-led response and oversee simulation and red team exercises. … About You: Significant experience in operational security, especially managing a Computer Incident ResponseTeam (CIRT), ComputerEmergencyResponseTeam (CERT), Computer Security Incident Response Centre (CSIRC) or a Security Operations Centre (SOC). Experience in industry standards and frameworks, such as ISO 27001, PCI DSS and More ❯
secure. This involves proactive planning, rapid responses to security threats and incidents, and serving as an escalation point for team members. You will collaborate with the business and IT teams to provide governance and security for existing and new services. Your responsibilities include cyber security operations such as threat monitoring, incident prevention/response, and supporting the … . Work during on-call shifts. The Ideal Candidate Learn through experimentation when tackling new problems, using both successes and failures as learning opportunities. Experience working with other technology teams to resolve cyber security incidents. Effective communication of technical information to technical audiences without expertise. Ability to communicate technical information and articulate risks to non-technical audiences and senior … OWASP frameworks. Understanding of vulnerabilities and remediation techniques. Penetration testing experience is a plus. Experience automating manual response processes is a plus. Knowledge of Threat Intelligence and CERT/CSIRT activities is preferred. Experience with SOAR platforms is preferred. Ability to develop scripts (Python, REGEX, PowerShell, Shell) quickly for incident response or proof of concept is More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Liberty Global
Identify, analyze, and prioritize vulnerabilities based on risk and potential impact and utilize threat intelligence analysis to determine the risk posed by identified vulnerabilities. Collaborate with IT and security teams to develop and implement remediation plans and work with collaborators to drive remediation efforts and identify improvements in the vulnerability management service. Monitor and track the status of identified … detailed reports and documentation of findings, including risk assessments and recommendations. Assist in the development and maintenance of security policies, procedures, and standards. Provide guidance and support to other teams on security best practices and vulnerability management and mentor and train junior analysts on vulnerability management processes and best practices. We tend to look for people with: Essential People … level. Experience in working with a wide range of teams in the context of improving security. Fluent in English (speaking/writing). Desirable: Experience of working in CERT, consulting or military environments preferred. Extensive cloud technical knowledge is a plus. Security+/CEH qualification. What’s in it for you? Competitive salary + Bonus Company pension contribution. More ❯
London, England, United Kingdom Hybrid / WFH Options
Virgin Media Business Ireland
Identify, analyze, and prioritize vulnerabilities based on risk and potential impact and utilize threat intelligence analysis to determine the risk posed by identified vulnerabilities. Collaborate with IT and security teams to develop and implement remediation plans and work with collaborators to drive remediation efforts and identify improvements in the vulnerability management service. Monitor and track the status of identified … detailed reports and documentation of findings, including risk assessments and recommendations. Assist in the development and maintenance of security policies, procedures, and standards. Provide guidance and support to other teams on security best practices and vulnerability management and mentor and train junior analysts on vulnerability management processes and best practices. We tend to look for people with: Essential People … level. Experience in working with a wide range of teams in the context of improving security. Fluent in English (speaking/writing). Desirable: Experience of working in CERT, consulting or military environments preferred. Extensive cloud technical knowledge is a plus. Security+/CEH qualification. What’s in it for you? Competitive salary + Bonus Company pension contribution. More ❯
and reporting potential unauthorized access. Implement and maintain Active Directory and File Share security controls. Participate in regular AD security assessments and remediation efforts. Threat Intelligence and Incident Response Monitor and analyze phishing campaigns and assist in managing the organizational phishing response program. Review and distribute threat intelligence alerts to relevant stakeholders, helping assess potential impacts … assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malware analysis and threat hunting. Collaborate with the CERTteam in maintaining an up-to-date threat landscape and contributing to incident response playbooks. Security Risk Management and Compliance Support the maintenance of the IT security risk … assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malware analysis and threat hunting. Collaborate with the CERTteam in maintaining an up-to-date threat landscape and contributing to incident response playbooks. Security Risk Management and Compliance Support the maintenance of the IT security risk More ❯
and reporting potential unauthorized access. Implement and maintain Active Directory and File Share security controls. Participate in regular AD security assessments and remediation efforts. Threat Intelligence and Incident Response Monitor and analyse phishing campaigns and assist in managing the organizational phishing response program. Review and distribute threat intelligence alerts to relevant stakeholders, helping assess potential impacts … assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malware analysis and threat hunting. Collaborate with the CERTteam in maintaining an up-to-date threat landscape and contributing to the incident response playbooks. Security Risk Management and Compliance Support the maintenance of the IT security More ❯
and reporting potential unauthorized access. Implement and maintain Active Directory and File Share security controls. Participate in regular AD security assessments and remediation efforts. Threat Intelligence and Incident Response Monitor and analyse phishing campaigns and assist in managing the organizational phishing response program. Review and distribute threat intelligence alerts to relevant stakeholders, helping assess potential impacts … assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malware analysis and threat hunting. Collaborate with the CERTteam in maintaining an up-to-date threat landscape and contributing to the incident response playbooks. Security Risk Management and Compliance Support the maintenance of the IT security More ❯
and reporting potential unauthorized access. Implement and maintain Active Directory and File Share security controls. Participate in regular AD security assessments and remediation efforts. Threat Intelligence and Incident Response Monitor and analyse phishing campaigns and assist in managing the organizational phishing response program. Review and distribute threat intelligence alerts to relevant stakeholders, helping assess potential impacts … assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malware analysis and threat hunting. Collaborate with the CERTteam in maintaining an up-to-date threat landscape and contributing to the incident response playbooks. Security Risk Management and Compliance Support the maintenance of the IT security More ❯
and reporting potential unauthorized access. Implement and maintain Active Directory and File Share security controls. Participate in regular AD security assessments and remediation efforts. Threat Intelligence and Incident Response Monitor and analyse phishing campaigns and assist in managing the organizational phishing response program. Review and distribute threat intelligence alerts to relevant stakeholders, helping assess potential impacts … assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malware analysis and threat hunting. Collaborate with the CERTteam in maintaining an up-to-date threat landscape and contributing to the incident response playbooks. Security Risk Management and Compliance Support the maintenance of the IT security More ❯
and reporting potential unauthorized access. Implement and maintain Active Directory and File Share security controls. Participate in regular AD security assessments and remediation efforts. Threat Intelligence and Incident Response Monitor and analyse phishing campaigns and assist in managing the organizational phishing response program. Review and distribute threat intelligence alerts to relevant stakeholders, helping assess potential impacts … assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malware analysis and threat hunting. Collaborate with the CERTteam in maintaining an up-to-date threat landscape and contributing to the incident response playbooks. Security Risk Management and Compliance Support the maintenance of the IT security More ❯
SOC tools for event collection, access to security platforms, search for suspicious events, alert management, security incident monitoring workflows. Define and implement notification and escalation processes. Ensure relations with CERT (ComputerEmergencyResponseTeam), particularly in a crisis situation to coordinate the various operational security teams. Response: Perform Incident ResponseMore ❯
Director of SOC A Global Organisation requires a Contract Director of SOC to lead the Global Incident Response function of 6 people. Day Rate: £675 - £720pd IR35 Status: Inside Duration: 6 months initially Travel: 2 days a week in Berkshire This Director … of SOC will have the previous following experience: Lead a Global SOC Function within a large federated Company before Oversee day-to-day operations of Cyber Defence teams (CERT, Security Tooling, Proactive Monitoring), managing advanced incident detection, threat hunting, and forensic investigations using platforms like Splunk, Defender, and CrowdStrike Collaborate with Security Engineering and Architecture to integrate AI/… ML (e.g., Microsoft Copilot) and emerging security tech for real-time response, smarter automation, and enhanced endpoint/cloud visibility across complex environment Build and maintain strategic relationships across Global Business Units, retained markets, joint ventures, and MSSPs to ensure scalable, consistent, and future-proofed security services delivery aligned with enterprise goals Identify and remediate monitoring gaps, lead More ❯
systems (RTOS). Register level experience of ARM based microcontrollers (e.g. STM-32). Experience of embedded debugging techniques (e.g. JTAG, ETM). Written code to specific standards (e.g. CERT C, MISRA). Applied software unit test automation and tools (e.g. LDRA, Parasoft etc). Familiarity with static analysis tools. Technical report writing. Desirable skills: C# development experience. Proficiency with … scripting languages (Python, Perl, Bash, PowerShell). Computer network security and vulnerability analysis. Conversant with IP standards. Experience in a range of CPU/MPU’s with practical experience. Requirements capture. Appreciation of cryptographic algorithms. Please Note : Applicants must be able to obtain high-level UK security clearance. Why This Role? This is your chance to work with More ❯
systems (RTOS). Register level experience of ARM based microcontrollers (e.g., STM-32). Experience in embedded debugging techniques (e.g., JTAG, ETM). Written code to specific standards (e.g., CERT C, MISRA). Applied software unit test automation and tools (e.g., LDRA, Parasoft, etc.). Familiarity with static analysis tools. Technical report writing. Proficiency with scripting languages (Python, Perl, Bash … PowerShell). Knowledge of computer network security and vulnerability analysis. Familiarity with IP standards. Experience with a range of CPU/MPUs with practical experience. Requirements capture. Understanding of cryptographic algorithms. Please Note : Applicants must be able to obtain high-level UK security clearance. Why This Role? This is your chance to work with a leading tech innovator More ❯