Leeds, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
Location(s): UK, Europe & Africa : UK : Leeds BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in … most demanding environments. Role description BAE Systems have been contracted to undertake the day to day operation of (and incremental improvement of) a dedicated Security Operations Centre (SOC) to support the defence of a major UK CNI organisation. The networks protected are predominantly hosted in Azure and AWS cloud … part of a 24/7 operation with four shift teams working in a standard rotation. They are responsible for utilising the SOC's Security Incident and Event Management (SIEM) toolsets to detect and investigate potential Security and Service Incidents occurring within the monitored networks. These roles require more »
arisen at an award-winning Microsoft Partner for a SOC Analyst. The business is a fast-growing, industry-leading managed service and managed service security provider, delivering in to mid and large enterprise clients. This is a fantastic opportunity for a SOC Analyst to continue their development … focus on developing their staff by providing support for training and earning certifications. You will also gain exposure to cutting-edge technologies, working across security operations and cyberspace. This is a predominantly remote role; you must however be based in the UK to be considered. This role will also … on role, that gives you the opportunity to work in a customer-facing capacity as a first point of contact between the customer and security operations centre. As SOC Analyst you will have the opportunity to develop consultancy skills, whilst offering insight into the best technical solutions more »
Southampton, England, United Kingdom Hybrid / WFH Options
Spectrum IT Recruitment
at managing a team and not afraid to get their hands dirty. You will be responsible for a team of 4 consisting of a SecurityAnalyst, an Infrastructure Manager, and 2 Systems Technologists (3rd line support), along with other IT functions within the business. You will play … Pay (Up to 52 Weeks) Main duties and responsibilities: Manage the maintenance and support of the existing technical IT systems and Infrastructure. Responsibility for Cybersecurity and compliance of the UK systems. Ensure within expected timelines the maximum availability of systems. Manage, and support the System Technologist team. more »
entities, as well as providing intelligence and investigative support to combat doping, online abuse, misconduct, fraudulent behaviour, and broader corruption threats. The Intelligence Analyst, Risk & Investigations, will be responsible for contributing to all aspects of Sportradar’s intelligence and investigation activity. The role demands a dedicated, forward-thinking … YOUR PROFILE: Relevant operational experience in research, due diligence, intelligence or investigations from areas such as law enforcement, journalism, corporate intelligence, financial fraud or cybersecurity Ability to quickly understand and use platforms and systems Ability to interpret and use data sources with a good aptitude for analysis … of HUMINT tradecraft is desirable Flexibility in adapting to changing priorities and able to work to tight deadlines Strict personal standards of confidentiality and security Motivated self-starter with an inquisitive mind Broad understanding of global sport Awareness of international issues associated with sport-related corruption Knowledge of effective more »
Coventry, England, United Kingdom Hybrid / WFH Options
Lorien
Senior Analyst – Information & CyberSecurity - IAM Coventry: Hybrid working pattern The Client: A leading building society is looking for an Information Security & IAM Consultant! Salary – Up to £62,000 + Up to 20% Discretionary Bonus + Additional Corporate Benefits Package Role: A dynamic A Senior … IAM Analyst- IAM drives through security good practices as we expand our use of cloud technologies and take on digital transformation initiatives. The role will influence security practices, moulding the future of the building society for years to come. The consultant will act as a guardian … of our technological transformation, ensuring robust security measures in line with regulatory frameworks such as GDPR, FCA, and PRA. Essential skills: Familiarity with PCI-DSS, UK Financial Services regulatory requirements and ISO27001/2 or NIST Cybersecurity experience with IAM/PAM tools such as SailPoint more »
IT SecurityAnalyst Bromborough, Leeds or Caythorpe (Hybrid) £40,000 Gleeson Recruitment are working on a great opportunity alongside an incredible, longstanding organisation who are seeking a highly motivated and skilled Security Operations Center (SOC) Engineer. You will play a critical role in managing security … aligned with NIST guidelines and governance requirements. Essential Requirements: • 5 years of experience in a technical SOC or cybersecurity role, • 5 years experience of CyberSecurity investigations and incident response environments • Good knowledge of Anti Malware, Anti Phishing, EndPoint Detection and Response systems. • Good all round knowledge of … different threat scenarios, investigations, incident response processes and remdiation techniques. • Good knowledge of cybersecurity systems and tooling • Reasonable knowledge of Security Information and Event Management systems • Reasonable knowledge of Firewall systems (Fortigate essential) • Foundational knowledge of Security Orchestration, Automation and Response (SOAR) systems • Good knowledge more »
SecurityAnalyst Hybrid – Doncaster £25,000 - £35,000 Forward Role is partnered with an award-winning CyberSecurity Company, their Security Operations Centre provides around the clock protective monitoring solutions to a client base that spans multiple industry verticals. Utilising industry-leading detection technology … of experienced SOC members work to provide assurance detection and incident response capabilities to organisations of all sizes. They are now looking for a SecurityAnalyst to join their CREST certified Security Operations Centre based in Doncaster. This role is shift based and will require the … successful candidate to operate in line with a shift roster that spans 24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI more »
is searching for a Senior Incident Response Analyst to join their team! Skills: Able to serve as the primary escalation point, conduct security analysis on critical alerts, and utilize expertise to map the attack chain across complex environments, encompassing cloud, identity, email, network, and endpoint. In-depth … understanding of the cyber threat landscape, particularly in the aviation sector. Demonstrated ability to translate threat knowledge into proactive threat detection. Proficient in analyzing and researching new or trending attacks, threat actors, malware samples, and tactics, techniques, and procedures (TTPs) Excellent English language skills in reading, writing, and speaking … with the capability to articulate security insights effectively, both in creating and interpreting security metrics, and in presenting them clearly to all levels of hierarchy, including senior leadership. Experience: Minimum of 5 years of experience in endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse more »
your extraordinary potential at Fortrea? Job description: As a Senior Analyst, Cybersecurity Risk Management you will help build, maintain, and manage Fortreas cyber risk management program. You will play a pivotal role in enhancing the cyber risk management framework and mitigation of cyber risks across … responsibilities of this role: Responsibilities include, but are not limited to: Establish a cybersecurity risk management program designed to identify, report, and respond to cybersecurity risks in accordance with industry standards and frameworks, (NIST Cybersecurity Framework, NIST 800-37, ISO/IEC 27001) and regulations (SOX, GDPR … prioritize cybersecurity risks, and potential impacts on the organizations assets and systems. Develop and implement risk mitigation strategies and controls to reduce the organizations cyber risk. Develop and maintain metrics, risk register, reporting and action plan. Present regular reports on the organizations cybersecurity risk posture to stakeholders. Manage the more »
Supervisor to manage helpdesk tickets efficiently and meet service level agreements. Manage staff account creation and retirement, ensuring accurate record-keeping and adherence to security protocols. Procure and maintain accurate records of campus technology assets, including device builds and deployment. Coordinate with Technology Operations Managers and Technology Development Managers … a focus on prioritization and business needs. Proficiency in Microsoft Cloud Technologies, Microsoft client operating systems, Mac operating systems, and Active Directory. Knowledge of cybersecurity best practices, network infrastructures, and printer management. Strong communication skills, both verbal and written, with a commitment to accessibility and collaboration. A … redirected to our website to complete an application form. Candidates with the relevant experience or job titles of; Helpdesk Administrator, Helpdesk Manager, Technology Operations, CyberSecurity Officer, Technology Support Coordinator, Support Analyst, Technical Support Specialist, Technical Customer Service, 1st Line Support, 2nd Line Support, ICT Systems more »
Newbury, Berkshire, South East, United Kingdom Hybrid / WFH Options
Netteam tX Ltd
to ensure seamless communication Install, configure, and troubleshoot voice equipment, manage communication protocols and ensure system reliability and performance Manage user provisioning, call routing, security and system updates Maintaining system and responding to technical issues Training end users on telephone systems Analysing existing VOIP networks and systems Developing architecture … Cloud Technologies, Microsoft 365, Active Directory, Group Policy, SharePoint, Remote Desktops, DHCP, DNS etc. Remote diagnostics along with analysis and monitoring Assist in resolving security incidents, ensuring compliance with established processes About you: You will possess a range of infrastructure skills, have demonstrable experience working with voice, data and … and Meraki firewalls Have a versatile approach to new technologies and be able to demonstrate learning capabilities Wi-Fi solution experience & knowledge Awareness of CyberSecurity requirements within Network infrastructure IT related degree or equivalent is highly desirable Personal Attributes: Friendly, professional, and passionate about tech Possesses good more »
Cyber Threat & Vulnerability Analyst - Reading 2 days PW, to £50k Are you ready to dive into the world of cybersecurity and protect critical digital landscapes? We are looking for a passionate and skilled Cyber Threat & Vulnerability Analyst to join a great … and data. Why You'll Love This Role: Play a pivotal role in our digital transformation journey. Collaborate with a dynamic team to enhance security measures. Engage in proactive threat hunting and vulnerability management. Key Responsibilities: Support enterprise-wide vulnerability management, ensuring effective identification, categorization, and mitigation. Develop and … maintain threat assessment and vulnerability management (TVM) documentation, policies, and procedures. Integrate advanced cybersecurity solutions with existing systems and infrastructure. Investigate and mitigate newly identified cybersecurity vulnerabilities. Coordinate with stakeholders on cybersecurity patching and vulnerability management. Participate in major incident response more »
Delivery Consultant role working for an industry-leading cybersecurity company based in London, providing the opportunity to work remotely. Already well-established within the cyber-security sector, they have experienced rapid sales in 2023, which has opened up several career opportunities for cybersecurity professionals. This role is working … the Operations Team you will cover 3 main areas within the business and your time will be split between: Manage client relationships Working on Security Roadmaps for Clients Post-sales technical support & troubleshooting of issues IT administration and sysadmin SOC focussed projects What this offers: A highly varied and … exciting role where you will learn many areas in the security and support domains A clear-cut career path in a fast growing company where opportunities are in abundance A close-knit, supportive team Fully remote work Applications: If you would like to apply for this unique opportunity, we more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
We are hiring for Lead SecurityAnalyst for London, UK location with remote working flexibility. Job Title: Lead SecurityAnalyst Job Type: Permanent Location: London, UK(Remote) Job details: Purpose of the Job Leading the Response: Acting swiftly and decisively during security incidents … post-incident to understand the root cause and to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating potential threats and vulnerabilities to ensure that the organization is prepared to defend against … them. Strategic Defense Implementation: Putting in place robust security measures to protect the organization's information assets. Cross-Team Coordination: Collaborating with various teams and entities to ensure a unified security strategy. This role demands a proactive mindset, deep technical expertise, and strong leadership skills to navigate the more »
Job Title: BI Analyst/FP&A Analyst Job Location: Crawley, West Sussex, UK About this … opportunity and L3Harris UK From 12 UK sites, our team of over 1,400 people deliver unique capabilities across air, land, sea, space and cyber for military, security and commercial customers, worldwide. L3Harris in Crawley specialise in technology and systems to enable quality pilot training from distance learning … unlocking its profitable growth potential in a fast paced and high growth commercial aviation recovery market. In the role of Financial Business Intelligence Analyst, you will report to the Head of Business Intelligence, CAS (Commercial Aviation Solutions). Being a part of the Business Intelligence team, you will more »
in roles where no two days are the same? Do you enjoy analytics and have a great attention to detail? As a Pricing Analyst, you'll be vital to our Commercial Team by managing, maintaining and developing the commercial pricing and models across all of the products within … the Commercial and Procurement Manager, you'll play a pivotal part in maximising revenue, market propositioning and future product launches. As a Pricing Analyst, you will be responsible for: Creating pricing for standard vendor products and services to deliver standard pricingacross these areas Creating andmodellingnew pricing propositions.Working closelywith … a specialist in secure technology solutions, all successful candidates will be subject to preemployment checks, so we can ensure compliance with our ISO27001 (Information Security) and Cyber Essentials Plus certifications.?We are committed to using any personal information you may give us in a secure and proper manner more »
Overview: This position supports Information Security and Cyber Threat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security gaps or … deficiencies. Develops process improvements and technical solutions that address the identified gaps or deficiencies. Facilitates the defense of the organization's information security and technological architecture through ongoing reporting and escalation of emerging threats. Maintains expert knowledge and educates others on security threats, industry trends, and other relevant … intelligence. Assists management with special projects and oversees less experienced associates in the work group. Responsibilities: Security Review - Monitors and evaluates security incidents, system alerts, audit events, and other activity for potential threats against the Bank's networks and systems. Detects anomalies, malware infections, and intrusion attempts. Identifies more »
Overview: This position supports Information Security and Cyber Threat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security gaps or … deficiencies. Develops process improvements and technical solutions that address the identified gaps or deficiencies. Facilitates the defense of the organization's information security and technological architecture through ongoing reporting and escalation of emerging threats. Maintains expert knowledge and educates others on security threats, industry trends, and other relevant … intelligence. Assists management with special projects and oversees less experienced associates in the work group. Responsibilities: Security Review - Monitors and evaluates security incidents, system alerts, audit events, and other activity for potential threats against the Bank's networks and systems. Detects anomalies, malware infections, and intrusion attempts. Identifies more »
Overview: This position supports Information Security and Cyber Threat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security gaps or … deficiencies. Develops process improvements and technical solutions that address the identified gaps or deficiencies. Facilitates the defense of the organization's information security and technological architecture through ongoing reporting and escalation of emerging threats. Maintains expert knowledge and educates others on security threats, industry trends, and other relevant … intelligence. Assists management with special projects and oversees less experienced associates in the work group. Responsibilities: Security Review - Monitors and evaluates security incidents, system alerts, audit events, and other activity for potential threats against the Bank's networks and systems. Detects anomalies, malware infections, and intrusion attempts. Identifies more »
Overview: This position supports Information Security and Cyber Threat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security gaps or … deficiencies. Develops process improvements and technical solutions that address the identified gaps or deficiencies. Facilitates the defense of the organization's information security and technological architecture through ongoing reporting and escalation of emerging threats. Maintains expert knowledge and educates others on security threats, industry trends, and other relevant … intelligence. Assists management with special projects and oversees less experienced associates in the work group. Responsibilities: Security Review - Monitors and evaluates security incidents, system alerts, audit events, and other activity for potential threats against the Bank's networks and systems. Detects anomalies, malware infections, and intrusion attempts. Identifies more »
Overview: This position supports Information Security and Cyber Threat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security gaps or … deficiencies. Develops process improvements and technical solutions that address the identified gaps or deficiencies. Facilitates the defense of the organization's information security and technological architecture through ongoing reporting and escalation of emerging threats. Maintains expert knowledge and educates others on security threats, industry trends, and other relevant … intelligence. Assists management with special projects and oversees less experienced associates in the work group. Responsibilities: Security Review - Monitors and evaluates security incidents, system alerts, audit events, and other activity for potential threats against the Bank's networks and systems. Detects anomalies, malware infections, and intrusion attempts. Identifies more »
Overview: This position supports Information Security and Cyber Threat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security gaps or … deficiencies. Develops process improvements and technical solutions that address the identified gaps or deficiencies. Facilitates the defense of the organization's information security and technological architecture through ongoing reporting and escalation of emerging threats. Maintains expert knowledge and educates others on security threats, industry trends, and other relevant … intelligence. Assists management with special projects and oversees less experienced associates in the work group. Responsibilities: Security Review - Monitors and evaluates security incidents, system alerts, audit events, and other activity for potential threats against the Bank's networks and systems. Detects anomalies, malware infections, and intrusion attempts. Identifies more »
Overview: This position supports Information Security and Cyber Threat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security gaps or … deficiencies. Develops process improvements and technical solutions that address the identified gaps or deficiencies. Facilitates the defense of the organization's information security and technological architecture through ongoing reporting and escalation of emerging threats. Maintains expert knowledge and educates others on security threats, industry trends, and other relevant … intelligence. Assists management with special projects and oversees less experienced associates in the work group. Responsibilities: Security Review - Monitors and evaluates security incidents, system alerts, audit events, and other activity for potential threats against the Bank's networks and systems. Detects anomalies, malware infections, and intrusion attempts. Identifies more »
Overview: This position supports Information Security and Cyber Threat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security gaps or … deficiencies. Develops process improvements and technical solutions that address the identified gaps or deficiencies. Facilitates the defense of the organization's information security and technological architecture through ongoing reporting and escalation of emerging threats. Maintains expert knowledge and educates others on security threats, industry trends, and other relevant … intelligence. Assists management with special projects and oversees less experienced associates in the work group. Responsibilities: Security Review - Monitors and evaluates security incidents, system alerts, audit events, and other activity for potential threats against the Bank's networks and systems. Detects anomalies, malware infections, and intrusion attempts. Identifies more »
Overview: This position supports Information Security and Cyber Threat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security gaps or … deficiencies. Develops process improvements and technical solutions that address the identified gaps or deficiencies. Facilitates the defense of the organization's information security and technological architecture through ongoing reporting and escalation of emerging threats. Maintains expert knowledge and educates others on security threats, industry trends, and other relevant … intelligence. Assists management with special projects and oversees less experienced associates in the work group. Responsibilities: Security Review - Monitors and evaluates security incidents, system alerts, audit events, and other activity for potential threats against the Bank's networks and systems. Detects anomalies, malware infections, and intrusion attempts. Identifies more »