our Cyber Intelligence Specialist, you will proactively identify, analyse, respond, and mitigate cyber threats that pose risks to Vanquis Banking Groups cybersecurity posture. This involves monitoring security events, conducting incidentresponse activities, enhancing our threat detection capabilities, and ensuring compliance with policy, standards, and regulation. Your contributions will directly impact our ability to protect sensitive data, maintain business … Intelligence Specialist, you will: Actively participate the delivery of services provided by the Cyber Intelligence Centre including by not limited to Cyber Threat Intelligence, Security Posture Management, Cyber Security IncidentResponse, Threat Hunting, Penetration Testing & Red Team Testing, and Cyber Risk Mitigation. Incorporate threat intelligence into CIC activities. Collaborate and assist with the investigation and resolution of complex … security incidents. Support the delivery of retrospective improvements based on incident analysis, RCAs and PIRs. Engage with third-party security partners to enhance and mature services. Maintain centralised processes across all VBG product lines, promoting synergy and efficiency. Stay updated on the latest cyber threats, attack vectors, and trends in the cybersecurity landscape. Continuously enhance skills in areas such More ❯
Wales, Yorkshire, United Kingdom Hybrid / WFH Options
IQUW Group
Overview Job Description Major Incident & Problem Manager Grade: 4 Reporting to: Head of IT Service Management Location: Swansea About us IQUW is a speciality (re)insurer at Lloyd's (Syndicate 1856) underwriting a diverse range of Property, Commercial and Speciality (re)insurance products from Cargo and Marine to Political Violence, Terror and War. We combine data, intelligent automation and … help get under the skin of the most difficult insurance risks, helping build products to meet their customer's needs. The role We are seeking a proactive and experienced Incident and Problem Manager to take ownership of our Incident, Major Incident and Problem Management processes. This role is critical in reducing operational disruption, improving service reliability, and … recurrence. We currently operate a hybrid working model. This entails 3 days per week collaborating with colleagues in the office, and 2 days working from home. Key responsibilities Major Incident Management Own and manage the end-to-end Major Incident process, ensuring efficient and effective response, resolution, and communication. Act as the primary point of escalation during More ❯
York, Yorkshire, United Kingdom Hybrid / WFH Options
Anson Mccade
resilient digital world. You will act as a critical liaison between client stakeholders and internal operational teams, ensuring the delivery of world-class cyber security services. You'll drive incidentresponse coordination, lead vulnerability management efforts, and ensure service excellence through strategic oversight and hands-on technical engagement. What You'll Be Doing Serve as the key point … of contact and escalation for clients across SOC services. Coordinate incidentresponse activities, leading investigation, containment, and remediation alongside technical teams. Manage post-incident reporting and continuous service improvement initiatives. Support compliance with SLAs and ensure services meet contractual, operational, and quality standards. Lead service reviews and present performance reports to clients (weekly/monthly). Oversee … of experience in technical support for SOC or Cyber Security operations. 5+ years of vulnerability management experience, with demonstrable risk-based prioritisation skills. Proven leadership in high-pressure, crisis-response situations. Strong client relationship management and stakeholder engagement skills. In-depth understanding of incidentresponse frameworks and operational delivery. Experience managing IDS/IPS technologies and security More ❯
Doncaster, Yorkshire, United Kingdom Hybrid / WFH Options
Anson Mccade
resilient digital world. You will act as a critical liaison between client stakeholders and internal operational teams, ensuring the delivery of world-class cyber security services. You'll drive incidentresponse coordination, lead vulnerability management efforts, and ensure service excellence through strategic oversight and hands-on technical engagement. What You'll Be Doing Serve as the key point … of contact and escalation for clients across SOC services. Coordinate incidentresponse activities, leading investigation, containment, and remediation alongside technical teams. Manage post-incident reporting and continuous service improvement initiatives. Support compliance with SLAs and ensure services meet contractual, operational, and quality standards. Lead service reviews and present performance reports to clients (weekly/monthly). Oversee … of experience in technical support for SOC or Cyber Security operations. 5+ years of vulnerability management experience, with demonstrable risk-based prioritisation skills. Proven leadership in high-pressure, crisis-response situations. Strong client relationship management and stakeholder engagement skills. In-depth understanding of incidentresponse frameworks and operational delivery. Experience managing IDS/IPS technologies and security More ❯
Wakefield, Yorkshire, United Kingdom Hybrid / WFH Options
Anson Mccade
resilient digital world. You will act as a critical liaison between client stakeholders and internal operational teams, ensuring the delivery of world-class cyber security services. You'll drive incidentresponse coordination, lead vulnerability management efforts, and ensure service excellence through strategic oversight and hands-on technical engagement. What You'll Be Doing Serve as the key point … of contact and escalation for clients across SOC services. Coordinate incidentresponse activities, leading investigation, containment, and remediation alongside technical teams. Manage post-incident reporting and continuous service improvement initiatives. Support compliance with SLAs and ensure services meet contractual, operational, and quality standards. Lead service reviews and present performance reports to clients (weekly/monthly). Oversee … of experience in technical support for SOC or Cyber Security operations. 5+ years of vulnerability management experience, with demonstrable risk-based prioritisation skills. Proven leadership in high-pressure, crisis-response situations. Strong client relationship management and stakeholder engagement skills. In-depth understanding of incidentresponse frameworks and operational delivery. Experience managing IDS/IPS technologies and security More ❯
Bradford, Yorkshire, United Kingdom Hybrid / WFH Options
Anson Mccade
resilient digital world. You will act as a critical liaison between client stakeholders and internal operational teams, ensuring the delivery of world-class cyber security services. You'll drive incidentresponse coordination, lead vulnerability management efforts, and ensure service excellence through strategic oversight and hands-on technical engagement. What You'll Be Doing Serve as the key point … of contact and escalation for clients across SOC services. Coordinate incidentresponse activities, leading investigation, containment, and remediation alongside technical teams. Manage post-incident reporting and continuous service improvement initiatives. Support compliance with SLAs and ensure services meet contractual, operational, and quality standards. Lead service reviews and present performance reports to clients (weekly/monthly). Oversee … of experience in technical support for SOC or Cyber Security operations. 5+ years of vulnerability management experience, with demonstrable risk-based prioritisation skills. Proven leadership in high-pressure, crisis-response situations. Strong client relationship management and stakeholder engagement skills. In-depth understanding of incidentresponse frameworks and operational delivery. Experience managing IDS/IPS technologies and security More ❯
Technology) assets safe from internal and external threats. Accountable for ensuring the confidentiality, integrity, and availability of company information resources by implementing and maintaining security controls, performing comprehensive security incidentresponse, engaging in proactive threat assessment, mitigation planning, incident trend analysis, and security architecture review. Accountable for gap analysis and regular audits of OT environments to ensure … industry security standards. Accountable for complex and speedy troubleshooting to minimise any network security threats to the company. Provide 2nd line IT support when and where required. IT Security Incident Management Coordinate and carry out the security incident management lifecycle including preparation, detection and analysis, containment, eradication and recovery. Coordinate incident handling and contingency planning activities. Incorporate … lessons learned from ongoing incident handling activities into incidentresponse procedures, training, and testing and implement resulting changes accordingly. Manage escalations in or out of normal business hours liaising with global internal and external service providers. Security Operations Daily support and security auditing of the firewall landscape. Support and audit remote access to internal company resources. Create More ❯
Wilton, Redcar and Cleveland, North Yorkshire, United Kingdom
Imperial Recruitment Group
Technology) assets safe from internal and external threats. Accountable for ensuring the confidentiality, integrity, and availability of company information resources by implementing and maintaining security controls, performing comprehensive security incidentresponse, engaging in proactive threat assessment, mitigation planning, incident trend analysis, and security architecture review. Accountable for gap analysis and regular audits of OT environments to ensure … industry security standards. Accountable for complex and speedy troubleshooting to minimise any network security threats to the company. Provide 2nd line IT support when and where required. IT Security Incident Management Coordinate and carry out the security incident management lifecycle including preparation, detection and analysis, containment, eradication and recovery. Coordinate incident handling and contingency planning activities. Incorporate … lessons learned from ongoing incident handling activities into incidentresponse procedures, training, and testing and implement resulting changes accordingly. Manage escalations – in or out of normal business hours liaising with global internal and external service providers. Security Operations Daily support and security auditing of the firewall landscape. Support and audit remote access to internal company resources. Create More ❯
This role offers a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly monitoring of systems … Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incidentresponse processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding of Disaster Recovery (DR) and Business Continuity principles. Excellent communication skills, with … impact in a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security IncidentResponse, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
This role offers a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly monitoring of systems … Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incidentresponse processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding of Disaster Recovery (DR) and Business Continuity principles. Excellent communication skills, with … impact in a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security IncidentResponse, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
This role offers a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly monitoring of systems … Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incidentresponse processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding of Disaster Recovery (DR) and Business Continuity principles. Excellent communication skills, with … impact in a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security IncidentResponse, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
tests, identifying risks and driving remediation efforts. Monitor infrastructure for security incidents or unauthorised activity, responding swiftly to mitigate potential threats. Investigate security breaches and incidents, and develop robust incidentresponse plans to ensure timely and effective resolution. Collaborate with cross-functional teams to design, implement, and manage security controls and configurations across a range of platforms and … . Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong capability in risk assessment, vulnerability management, and data informed decision -making. Solid understanding of incidentresponse procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols More ❯
performing advanced investigations and, when required, first-line triage to maintain queue health and SLA compliance. You are responsible for high-quality service delivery through detailed analysis, evidence-led response actions, and operational leadership. In addition to handling escalated alerts, you provide line management, oversee ticket quality, contribute to training and onboarding, and drive continual improvement. You work core … business hours with participation in the on-call rota, ensuring consistent service support for customers and operational continuity across teams. Key Responsibilities • Incident Investigation and Response - You take ownership of escalated incidents, performing detailed investigations and, when necessary, stepping into first-line triage to guarantee prompt alert handling and escalation. • Team Leadership - You provide day-to-day leadership … SOC Analysts, conducting performance reviews, appraisals, one-to-one meetings, and development planning. • Quality Assurance - You own QA for the team’s outputs, ensuring consistency, accuracy, and completeness of incident handling and documentation across the team. • Training and Onboarding - You lead knowledge-transfer sessions, support structured onboarding of new team members, and coordinate internal training to drive skill development More ❯
Hull, North Humberside, England, United Kingdom Hybrid / WFH Options
Heron Foods
the first point of contact for all cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incidentresponse, containment, and recovery activities. Oversee vulnerability management: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including … You We’re looking for someone who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerability management, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT More ❯
North Ferriby, North Humberside, North East, United Kingdom Hybrid / WFH Options
Heron Foods
the first point of contact for all cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incidentresponse, containment, and recovery activities. Oversee vulnerability management: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including … You We're looking for someone who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerability management, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT More ❯
capacity. Maintain and regularly review all relevant processes and documentation. Essential Skills and Experience: 5+ years in threat intelligence, vulnerability management, or cyber threat research. Strong background in technical incidentresponse and cyber threat analysis. Deep understanding of threats targeting government and CNI environments. Proficient in open-source intelligence (OSINT) gathering and analysis. High-level knowledge of Windows More ❯
controls. You'll support the delivery of their Cyber Security Sub Strategy in line with the Cyber Assessment Framework, and contribute to the design and operation of threat intelligence, incidentresponse, vulnerability management, and ethical hacking capabilities. You'll work closely with internal stakeholders and external partners to ensure compliance with ISO27001, Cyber Essentials+, and other regulatory frameworks. More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom
Anson Mccade
At least 5 years' experience in threat intelligence, vulnerability management, or technical cyber threat research. Strong understanding of Windows and Linux OS, networking fundamentals, and cloud platforms. Experience in incidentresponse and managing technical security operations. Excellent communication skills with an ability to explain complex threats to both technical and non-technical stakeholders. A relevant degree or equivalent More ❯
years of experience in Threat Intelligence, Vulnerability Management, or cyber research. Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. Experience in technical incidentresponse and cloud-based security operations. Proficiency in open-source intelligence (OSINT) and deep technical analysis. Knowledge of Windows/Linux internals, networking, and cloud platforms (e.g. Azure More ❯
years of experience in Threat Intelligence, Vulnerability Management, or cyber research. Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. Experience in technical incidentresponse and cloud-based security operations. Proficiency in open-source intelligence (OSINT) and deep technical analysis. Knowledge of Windows/Linux internals, networking, and cloud platforms (e.g. Azure More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯