Gloucester, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
more You'll have a dedicated Career Manager to help you develop your career and guide you on your journey through BAE Systems Digital Intelligence Don't know a particular technology? Your learning and development is key to your future career You'll be part of our bonus scheme … for this and willing to go through the process. For more guidance on National Security Vetting please click here. Life at BAE Systems Digital Intelligence We are embracing Hybrid Working. This means you and your colleagues may be working in different locations, such as from home, another BAE Systems … experiences and backgrounds - the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. About BAE Systems Digital Intelligence We use our intelligence-led insights to help defend Governments, Nations and Societies from cyber-attacks and financial crime. Our customers depend more »
Manchester, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
BAE Systems Digital Intelligence is home to 4,800 digital, cyber and intelligence experts. We work collaboratively across 16 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Vulnerability … Researcher - Operational Cyber Location: Manchester Our world-class team of Vulnerability Researchers and Reverse Engineers tackle some of the most interesting problems with a meaningful and tangible impact on the national security of the UK. We are looking for a diverse range of talent from experienced Vulnerability Researchers with … same level. We are looking for enthusiastic and eager individuals, who are excited by the prospect of helping to build our new Manchester Operational Cyber practice from the ground up. We offer a friendly and inclusive culture with great opportunities to learn from experts and make use of a more »
Leeds, England, United Kingdom Hybrid / WFH Options
Fruition IT Resources Limited
Information Security Threat Detection Specialist 12 Month Fixed Term Contract £45,000 - £50,000 + exceptional benefits Leeds/Hybrid, once per week/month in the office Our client, a very well reputable global business, is looking to hire an enthusiastic Information Security Threat Detection Specialist to … join them as they proceed on their security transformation journey! In this position, you will play a crucial role in the Threat Detection Team and be responsible for configuring and implementing security monitoring tools to detect security incidents, supporting stakeholders across Security and the wider business. Experience Required: Experience … in Detection, ThreatIntelligence and Threat Hunting. Knowledge of monitoring tools across SIEM, Automation and ThreatIntelligence platforms. Familiarity with networking protocols and the latest cyber security trends. Experience with AWS Security tools - AWS Config Guard Duty, AWS Inspector, AWS Security Hub etc. The more »
Gloucester, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
Cyber Researcher Location: Gloucester, Manchester or London Our world class team of Cyber Researchers and Reverse Engineers tackle some of the most interesting problems with a meaningful and tangible impact on the national security of the UK. We are growing our Cyber Developer team significantly and are … from experts and make use of a carefully curated training plan with some of the best trainers and conferences available. Job Summary An operational cyber researcher is able to plan and perform research into a wide range of systems and technologies with a focus on discovering and exploiting weaknesses … in their design or implementation. The role provides technical guidance for customers as well as supporting bids and proposals. An operational cyber researcher has broad skills which generally involve, but are not limited to, the following activities: Exploratory Research Vulnerability & Technical Research Experimental Development Key Responsibilities Researchers undertaking exploratory more »
Gloucester, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
Operational Cyber Developer Location: Gloucester, Manchester or London Our world class team of Software Engineers and Reverse Engineers tackle some of the most interesting problems with a meaningful and tangible impact on the national security of the UK. We are growing our Cyber Developer team significantly and are … more You'll have a dedicated Career Manager to help you develop your career and guide you on your journey through BAE Systems Digital Intelligence Don't know a particular technology? Your learning and development is key to your future career You'll be part of our bonus scheme … for this and willing to go through the process. For more guidance on National Security Vetting please click here. Life at BAE Systems Digital Intelligence We are embracing Hybrid Working. This means you and your colleagues may be working in different locations, such as from home, another BAE Systems more »
Manchester, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
Operational Cyber Developer Location: Manchester We have an existing community of technical specialists across our Gloucester and London locations and we are now looking to grow our new Manchester hub to the same level. We are looking for enthusiastic and eager individuals, who are excited by the prospect of … helping to build our new Manchester Operational Cyber practice from the ground up. We offer a friendly and inclusive culture with great opportunities to learn from experts and make use of a carefully curated training plan with some of the best trainers and conferences available. What you'll be … for this and willing to go through the process. For more guidance on National Security Vetting please click here. Life at BAE Systems Digital Intelligence We are embracing Hybrid Working. This means you and your colleagues may be working in different locations, such as from home, another BAE Systems more »
minimum of three years of hands-on experience in security/infrastructure within an enterprise environment. Requirements: Proficiency in enterprise information security standards, including Cyber Essentials, ISO 27001, 27002, Data Protection Act, and GDPR. In-depth knowledge of the Microsoft O365 environment, threatintelligence analysis, Security Incident more »
energy transition with more than 30,000 of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create … the relationships. As the local Cyber management presence, provide guidance and support for the area. Key Tasks and Responsibilities: Review, analyze, design, and advise on security controls, configurations, and implementations for IT projects Continuously improve the integration and effectiveness of implemented technologies Maintain awareness of cybersecurity threats, events, tactics … of findings and recommendations (root cause and risk analysis as needed Assist with forensic investigations and incident response team (CIRT) activities. Assign work to Cyber SOC for remediation Escalate pertinent findings in a timely manner Leverage vendors and internal resources to interface various security tools to automate critical response more »
Managed Security Service Provider (MSSP) with a wealth of experience gained in the Defence and Commercial sectors. We help organisations of all sizes build cyber-security capabilities and maintain compliance through practical Consulting and Managed Services. Our suite of services blends together best-in-breed technologies to provide real … time 24×7 monitoring, triage, remediation, threat assessment, vulnerability management, and Professional Services to give our Clients absolute peace of mind that their critical environments are protected. Our Security Operations Centre (SOC) delivers an array of services that provide our Customers with robust end-to-end cyber security … protection, from monitoring services to threat relevant detection content, from leading threatintelligence to a Customer focus that enables us to become our Customers’ trusted partner. Role Description Talion is looking for an individual to take responsibility for the delivery of several of our Managed Security Service more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Logiq Consulting
incidents and vulnerabilities. Collaborate with other team members to further investigate incidents and propose responses and solutions. Report any new knowledge gained about existing cyber threats or vulnerabilities within their network so that future incidents can be prevented. Promote and evolve the company Security Operations Centre (SOC). Mature … play books, processes and procedures, and further integrate monitoring capabilities to enhance our SOC function. Utilise threatintelligence feeds to identify and respond to emerging threats and vulnerabilities in company IT systems. Collaborate with other team members to ensure that the company has the correct procedures in place … with recent NCSC guidance would be helpful. Experience in the Microsoft Sentinel and 365 Defender, being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Qualifications: Computer Security Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Role Rewards more »
Wrexham, Wales, United Kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
genuinely makes their customers financially better off. This is a brand new role for the business and it plays a key part in the Cyber/Information Security function. You will drive and enhance their current operational processes and contribute across Security Assurance, Threat Detection, Risk Management, CPSM … Threat Intelligence. Skills required: Control Frameworks & Industry Standards (ISO27001, 27002, GDPR, NIST) Security Operations Performance Tracking Data Security, Malware Detection, Threat & Incident response For the right person this is a huge opportunity - considering the sustained growth that they're going through, this role has a dotted line to more »
end process including the close cycles (month-end, quarter & year-end), support of all subledgers and the GL. Experience 5+ years of experience with threat and vulnerability management (TVM) program and operations 3+ years of experience working with threatintelligence feeds and IOCs Education High School Diploma … years of information security experience Additional 10 years of IT experience 7+ years in an information security role 5+ years of experience with threat and vulnerability management program and operations 3+ years of experience working with threatintelligence feeds and IOCs 3+ years of experience in a … and identify opportunities for improving overall Cybersecurity Tasks and Responsibilities Regular interaction with the Director of Cybersecurity and the Security Operations Team to review threat activity, adversary tactics, targeted vulnerabilities, and exposure risks Daily monitoring for zero-day threats, patches, mitigations, and strategies. Utilize threatintelligence to more »
have a broad remit ensuring high availability and performance, and currently have a particular focus on security system efficiency, monitoring and sustainability, looking at threatintelligence, IAM, data and application security across the Kubernetes and Linux based environments. They are very open to background, but tend to look more »
Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
yolk recruitment
Cyber Security Engineer - £50,000 - £60,000 - Cardiff/Hybrid (2/3 days work from home) Yolk is pleased to partner with a multi-national organisation now looking to scale its Cyber Sec team. Priding itself on building technology businesses across various domains they're now looking … to expand and develop a team in Cardiff as they scale over the coming years. As the Cyber Security Engineer you'll focus on "what good looks like" and best practices across various clients. You'll look at the tools being used, understand where security issues could arise, and … provide guidance and support to customers. This is what you'll be doing: Identify patterns and tactics used by threat actors through threat analysis. Review and rectify misconfigurations and outdated rules in security tools. Conduct detailed threat analysis within the M365 environment. Automate manual processes to enhance more »
Operations & Engineering tower, wielding extensive expertise in Google Chronicle alongside proficient Python programming skills. This role is crucial for advancing cybersecurity infrastructure through innovative threatintelligence, data analytics, and the development and maintenance of integrations to streamline security operations. The position embodies a philosophy of perpetual learning and … next career move. Responsibilities include, but are not limited to: Design, develop, and maintain Python-based integrations and automation solutions within Google Chronicle, enhancing threatintelligence, detection, and incident response capabilities. Lead the strategic integration of Google Chronicle within Fortrea's cybersecurity infrastructure, optimizing its utility for security … analytics and operations. Direct the data onboarding process for Google Chronicle, ensuring data quality is high, accurate, and non-duplicative to maintain integrity in threatintelligence and analysis. Foster collaboration with cross-functional teams to ensure seamless data integration and operational efficiency, maximizing Chronicles capabilities. Spearhead initiatives to more »
Job Title: Cyber Security Consultant Cyber Risk Reporting to: Principal consultant Location: Remote with travel to Customer site as required Role Requirements: Must hold or be eligible to hold government security vetting at SC level Must be currently resident in the UK Reward Package: - 25 days annual holiday … medical Cover - Life Assurance - Extensive non-taxable benefits THE ROLE This is an exciting opportunity to join our world class Consultancy arm, as a Cyber Security Risk Consultant, supporting the next phase of Cyberforts growth. Youll be joining a culture of knowledge sharing and continuous learning with expert peers … that match their requirements. Youll work in close partnership with clients to ensure the delivery of expert services by complementing their inhouse Information and Cyber Security resources combining expertise in information security, solution architecture and business advice. As a Security Consultant, you will be responsible for the identification of more »
We are working with a global organisation looking to bring an experienced CyberThreat and Vulnerability Management Lead to their team. As the Threat & Vulnerability Management Lead, you will build and oversee organization's threat and vulnerability management program. KEY RESPONSIBILITIES: Develop and maintain a comprehensive … and remediation of IT infrastructure vulnerabilities. Oversee vulnerability assessments and penetration tests, working with internal and external security teams. Analyze data to identify emerging cyber threats, assess risks, and determine mitigation strategies. Collaborate with regional IT teams for timely remediation of vulnerabilities. Translate complex threat and vulnerability data … into actionable insights. Develop and maintain policies and procedures for vulnerability and threatintelligence management. Track and report on the program's effectiveness. Work set up: 1 time per week in their London Office if you are based in London. 1-2 times a month if you are more »
We are working with a global organisation looking to bring an experienced CyberThreat and Vulnerability Management Lead to their team. As the Threat & Vulnerability Management Lead, you will build and oversee organization's threat and vulnerability management program. KEY RESPONSIBILITIES: Develop and maintain a comprehensive … and remediation of IT infrastructure vulnerabilities. Oversee vulnerability assessments and penetration tests, working with internal and external security teams. Analyze data to identify emerging cyber threats, assess risks, and determine mitigation strategies. Collaborate with regional IT teams for timely remediation of vulnerabilities. Translate complex threat and vulnerability data … into actionable insights. Develop and maintain policies and procedures for vulnerability and threatintelligence management. Track and report on the program's effectiveness. Work set up: 1 time per week in their London Office if you are based in London. 1 time a month if you are based more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating potential threats and vulnerabilities to ensure that the organization is prepared to defend against them. Strategic Defense Implementation: Putting in place robust … a unified security strategy. This role demands a proactive mindset, deep technical expertise, and strong leadership skills to navigate the complex and ever-evolving cyberthreat landscape. It's about being always prepared, constantly learning, and effectively communicating to maintain and enhance the organization's security posture. Tasks … the containment and resolution process in line with established protocols to reduce risks. Enhance security procedures to improve the organization's monitoring, detection, and threat mitigation capabilities. Support the development and deployment of systems for threat detection and response, ensuring optimal performance. Synthesize and prioritize data from logs more »
Private medical Life Assurance ComprehensiveEmployee rewards package THE ROLE This is an exciting opportunity to join our world class Consultancy arm, as a Technical Cyber Security Consultant, supporting the next phase of Cyberforts growth. Youll be joining a culture of knowledge sharing and continuous learning with expert peers in … that match their requirements. Youll work in close partnership with clients to ensure the delivery of expert services by complementing their inhouse Information and Cyber Security resources combining expertise in information security, solution architecture and business advice. Working across the business and multiple technology platforms, you will play a … and cloud security designs as well as hardware & software. Possess awareness and understanding of HMG and NCSC Security policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large and virtual teams. Our Purpose: The Cyberfort more »
Private medical Life Assurance ComprehensiveEmployee rewards package THE ROLE This is an exciting opportunity to join our world class Consultancy arm, as a Technical Cyber Security Consultant, supporting the next phase of Cyberforts growth. Youll be joining a culture of knowledge sharing and continuous learning with expert peers in … that match their requirements. Youll work in close partnership with clients to ensure the delivery of expert services by complementing their inhouse Information and Cyber Security resources combining expertise in information security, solution architecture and business advice. Working across the business and multiple technology platforms, you will play a … and cloud security designs as well as hardware & software. Possess awareness and understanding of HMG and NCSC Security policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large and virtual teams. Our Purpose: The Cyberfort more »
Job Title: Cyber Security Consultant Cyber Risk Reporting to: Principal consultant Location: Remote with travel to Customer site as required Role Requirements: Must hold or be eligible to hold government security vetting at SC level Must be currently resident in the UK Reward Package: - 25 days annual holiday … medical Cover - Life Assurance - Extensive non-taxable benefits THE ROLE This is an exciting opportunity to join our world class Consultancy arm, as a Cyber Security Risk Consultant, supporting the next phase of Cyberforts growth. Youll be joining a culture of knowledge sharing and continuous learning with expert peers … that match their requirements. Youll work in close partnership with clients to ensure the delivery of expert services by complementing their inhouse Information and Cyber Security resources combining expertise in information security, solution architecture and business advice. As a Security Consultant, you will be responsible for the identification of more »
Private medical Life Assurance ComprehensiveEmployee rewards package THE ROLE This is an exciting opportunity to join our world class Consultancy arm, as a Technical Cyber Security Consultant, supporting the next phase of Cyberforts growth. Youll be joining a culture of knowledge sharing and continuous learning with expert peers in … that match their requirements. Youll work in close partnership with clients to ensure the delivery of expert services by complementing their inhouse Information and Cyber Security resources combining expertise in information security, solution architecture and business advice. Working across the business and multiple technology platforms, you will play a … and cloud security designs as well as hardware & software. Possess awareness and understanding of HMG and NCSC Security policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large and virtual teams. Our Purpose: The Cyberfort more »
CyberThreat & Vulnerability Analyst - Reading 2 days PW, to £50k Are you ready to dive into the world of cyber security and protect critical digital landscapes? We are looking for a passionate and skilled CyberThreat & Vulnerability Analyst to join a great team and help … Love This Role: Play a pivotal role in our digital transformation journey. Collaborate with a dynamic team to enhance security measures. Engage in proactive threat hunting and vulnerability management. Key Responsibilities: Support enterprise-wide vulnerability management, ensuring effective identification, categorization, and mitigation. Develop and maintain threat assessment and … vulnerability management (TVM) documentation, policies, and procedures. Integrate advanced cyber security solutions with existing systems and infrastructure. Investigate and mitigate newly identified cyber security vulnerabilities. Coordinate with stakeholders on cyber security patching and vulnerability management. Participate in major incident response when necessary. Perform proactive threat hunting more »
Job Title: Cyber Security Consultant Cyber Risk Reporting to: Principal consultant Location: Remote with travel to Customer site as required Role Requirements: Must hold or be eligible to hold government security vetting at SC level Must be currently resident in the UK Reward Package: - 25 days annual holiday … medical Cover - Life Assurance - Extensive non-taxable benefits THE ROLE This is an exciting opportunity to join our world class Consultancy arm, as a Cyber Security Risk Consultant, supporting the next phase of Cyberforts growth. Youll be joining a culture of knowledge sharing and continuous learning with expert peers … that match their requirements. Youll work in close partnership with clients to ensure the delivery of expert services by complementing their inhouse Information and Cyber Security resources combining expertise in information security, solution architecture and business advice. As a Security Consultant, you will be responsible for the identification of more »