Cheshire, England, United Kingdom Hybrid / WFH Options
Morgan Law
IT Security Manager, wider IT team, and third-party partners to ensure security best practices are maintained across their cloud and on-premise environments. Key Responsibilities Conduct threat and vulnerability assessments and recommend remediation steps Support the investigation of security incidents and policy violations Assist with risk assessments and security audits Implement and maintain security standards, and guidelines Work More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
knowledge of cybersecurity who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and More ❯
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
tools such as Wiz, Prisma Cloud, Ermetic, and CrowdStrike for continuous security posture monitoring. Implement RBAC, MFA, and Zero Trust principles to strengthen identity and access control mechanisms. Conduct vulnerability assessments and remediation using tools like Nessus, Tenable, Qualys, and Trivy. Ensure compliance with industry frameworks and regulations (ISO 27001, NIST 800-53, PCI DSS, HIPAA, FedRAMP, CJIS). More ❯
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Tate Milton Keynes
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
Employment Type: Full-Time
Salary: £50,000 - £60,000 per annum, Negotiable, Inc benefits, OTE
Cyber Security Engineer to join their Service and Support team. The role involves designing and securing OT networks across various critical industries, conducting advanced threat analysis, penetration testing, and vulnerability assessments. The engineer will develop and implement cybersecurity solutions, lead risk mitigation efforts, mentor junior team members, and support project management and business development activities. The position requires travel More ❯
Configure and maintain routers, switches, wireless systems, and firewalls. Deploy scalable, high-performance network solutions with minimal downtime. Conduct regular network maintenance, updates, and upgrades. Perform security audits and vulnerability assessments. Respond to and mitigate network security incidents. Automate network tasks and processes using scripting tools. Maintain comprehensive network documentation and diagrams. Collaborate with IT teams and third-party More ❯
Configure and maintain routers, switches, wireless systems, and firewalls. Deploy scalable, high-performance network solutions with minimal downtime. Conduct regular network maintenance, updates, and upgrades. Perform security audits and vulnerability assessments. Respond to and mitigate network security incidents. Automate network tasks and processes using scripting tools. Maintain comprehensive network documentation and diagrams. Collaborate with IT teams and third-party More ❯
behaviour or policy violations Investigate and manage security incidents, carrying out root cause analysis and reporting Deploy, configure, and maintain key security platforms used by the analyst team Conduct vulnerability assessments and coordinate remediation activities Support patch management and compliance reporting Perform regular reviews and health checks on security controls Create and enhance measures to demonstrate the effectiveness of More ❯
behaviour or policy violations * Investigate and manage security incidents, carrying out root cause analysis and reporting * Deploy, configure, and maintain key security platforms used by the analyst team * Conduct vulnerability assessments and coordinate remediation activities * Support patch management and compliance reporting * Perform regular reviews and health checks on security controls * Create and enhance measures to demonstrate the effectiveness of More ❯
Cloud platform, providing stability and policies and procedures. Support the development and delivery of a comprehensive ISP for the entire organization. Perform periodic and on-demand system audits and vulnerability assessments of systems, internal applications and Cloud services to identify security vulnerabilities. Monitor compliance with the organization's information security policies and procedures among employees, contractors and third parties. More ❯
Lead efforts in developing, enforcing, and reviewing information security policies and procedures Monitor network traffic for unusual activity using SIEM tools and respond to security alerts and incidents Conduct vulnerability assessments and coordinate remediation efforts across relevant platforms Help deploy network hardware and software with a security-first approach Stay current on emerging threats, vulnerabilities, and industry trends; recommend More ❯
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
london (city of london), south east england, united kingdom
RiverSafe
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
re Looking For: Technically minded security engineer. Experience with SentinelONE. Experience working with a third party to a managed SOC provision. Proficiency with Mimecast, antivirus, MS Sentinel. Experience with vulnerabilityassessment tools such as Tenable or Qualys. Excellent analytical skills for identifying and addressing security threats. Driver's License with consistent access to a vehicle. What's in More ❯
re Looking For: Technically minded security engineer. Experience with SentinelONE. Experience working with a third party to a managed SOC provision. Proficiency with Mimecast, antivirus, MS Sentinel. Experience with vulnerabilityassessment tools such as Tenable or Qualys. Excellent analytical skills for identifying and addressing security threats. Driver's License with consistent access to a vehicle. What's in More ❯
build long-term resilience across OT and IT environments. Key Responsibilities • Partner with industrial clients to assess cyber risks across control systems, automation and operational networks. • Support risk and vulnerability assessments within OT and ICS environments. • Develop and implement cyber security frameworks, controls and governance aligned with recognised standards and sector regulations. • Deliver assurance and oversight programmes to improve More ❯
sites and the Stone office. Key Responsibilities of the Senior ICS OT Cyber Security Engineer: Design and secure OT/ICS networks and cross-domain communications. Conduct threat modelling, vulnerability assessments, and red team exercises. Implement cybersecurity solutions, audit systems, and ensure compliance with relevant frameworks. Mentor junior team members and support project delivery. Maintain strong client and stakeholder More ❯