essential; additional European languages are a strong advantage. ● Bachelor’s degree in Business, Marketing, or a related field (MBA preferred). ● Experience with cybersecurity solutions such as endpoint protection, threatintelligence, IAM, or SaaS security platforms. More ❯
essential; additional European languages are a strong advantage. ● Bachelor’s degree in Business, Marketing, or a related field (MBA preferred). ● Experience with cybersecurity solutions such as endpoint protection, threatintelligence, IAM, or SaaS security platforms. More ❯
Head of IT Security Incident and Threat Management – Solihull Crimson and IMI have joined forces to build IMI's new security team, and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security and want to be part of a dynamic team that is shaping the future of security … within a successful global company, we want to hear from you! We are seeking a highly skilled and experienced Head of IT Security Incident and Threat Management to join our team. In this role, you will be responsible for leading the strategic efforts to safeguard the company’s digital assets against potential threats and incidents. This role requires a … seasoned professional with a deep understanding of cybersecurity, incident response an threat management within a FTSE 100 environment. The salary on offer for this position is between £90,000 and £110,000 per annum plus benefits. Please note this role requires you to be on site for the first 3 months full time, there is a hybrid arrangement thereafter. More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Crimson
Head of IT Security Incident and Threat Management - Solihull Crimson and IMI have joined forces to build IMI's new security team, and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security and want to be part of a dynamic team that is shaping the future of security … within a successful global company, we want to hear from you! We are seeking a highly skilled and experienced Head of IT Security Incident and Threat Management to join our team. In this role, you will be responsible for leading the strategic efforts to safeguard the company's digital assets against potential threats and incidents. This role requires a … seasoned professional with a deep understanding of cybersecurity, incident response an threat management within a FTSE 100 environment. The salary on offer for this position is between £90,000 and £110,000 per annum plus benefits. Please note this role is based on site for the first 3 months followed by a hybrid working arrangement. Key Responsibilities Develop and More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Divvy Cloud Corp
hubs support product innovation, security research, and 24/7 Managed Detection and Response services. The team operates in a hybrid working model, collaborating closely with global product and threat research teams to deliver world-class detection, response, and cloud security solutions. About the Role As a Field CISO, your primary responsibility will be to scale and grow business … proven experience in Cyber Security and 4+ years in a similar senior cybersecurity leadership, architecture, or advisory role, responsible for revenue growth. Strong understanding of security operations, vulnerability management, threat detection, cloud security, and compliance frameworks. Knowledge of Rapid7's Platform and its components, including Managed Detection and Response (MDR), Exposure Management (Surface Command, Exposure Command, Exposure Command ADVANCED … Attack Surface Management, Next-Gen SIEM, Cloud Security, Vulnerability Management, and Threat Intelligence. Strong understanding of the Microsoft Security Stack and how to drive business value alongside this through partnering. Deep knowledge of the UK & Ireland security landscape, including regulations, industry trends, and customer challenges including compliance regulations relevant to the UK & Ireland landscape (e.g. GDPR, NIS2, ISO More ❯
our technical wizards and senior leaders. Team Up: Collaborate closely with our Incident Response (IR) pros (who live in CrowdStrike and Microsoft Defender ) to connect the dots between vulnerabilities, threat intel, and live-fire incidents. Stay One Step Ahead: Keep your finger on the pulse of the latest vulnerabilities, exploits, and fixes, translating that knowledge into actionable advice for … your mastery of its workflow automation, remediation tracking, reporting, and prioritization magic. Advanced proficiency with vulnerability management tools, specifically Tenable.sc and Tenable.io . Hands-on experience with EDR and threat intel platforms, especially CrowdStrike and Microsoft Defender . An analytical mind that sees patterns in complex security data and a relentless drive to find the "why" and "how." You More ❯
Customer Communications - You provide timely incident updates and lead bridging calls with customers during high-priority incidents, ensuring that communications are clear, evidence-led, and aligned to customer expectations. • Threat Hunting Oversight - You lead and coordinate proactive threat hunting across customer environments, using hypothesis-based approaches to identify undetected threats and validate detection coverage. Essential Duties • Advanced Investigation … all available tooling. o Reconstruct attack chains and identify root causes using MITRE ATT&CK. o Recommend and coordinate response actions to mitigate impact during active incidents. • IOC and Threat Analysis o Investigate indicators of compromise using commercial and open-source threat intelligence. o Validate alerts and determine their relevance to customer environments, providing context on adversary behaviour … and recommending follow-up actions when threats are confirmed. • Threat Hunting o Lead and participate in threat hunts using hypothesis-driven approaches mapped to TTPs and MITRE ATT&CK. o Leverage telemetry and queries in tooling to identify suspicious indicators not surfaced through existing detection logic. o Document hunting activities, findings, and detection coverage gaps to support tuning More ❯
SOC Specialist | London based 2-3x a week | £85,000 + Benefits Role Brief Join a global Security Operations Center team providing 24/7 threat detection and incident response. As a SOC Specialist, you’ll act as a frontline defender—monitoring alerts, leading investigations, and conducting proactive threat hunts. You'll work with a range of … documentation of technical findings Desired Skills Basic scripting (e.g., Python, Bash, PowerShell) Experience creating SIEM rules or detection logic Exposure to cloud environments and related attack vectors Knowledge of threat hunting methods and MITRE ATT&CK Interest or experience in cross-functional collaboration (e.g., Threat Intel, Red Teams More ❯
SOC Specialist | London based 2-3x a week | £85,000 + Benefits Role Brief Join a global Security Operations Center team providing 24/7 threat detection and incident response. As a SOC Specialist, you’ll act as a frontline defender—monitoring alerts, leading investigations, and conducting proactive threat hunts. You'll work with a range of … documentation of technical findings Desired Skills Basic scripting (e.g., Python, Bash, PowerShell) Experience creating SIEM rules or detection logic Exposure to cloud environments and related attack vectors Knowledge of threat hunting methods and MITRE ATT&CK Interest or experience in cross-functional collaboration (e.g., Threat Intel, Red Teams More ❯