Birmingham, Chelmsley Wood, West Midlands (County), United Kingdom
SSR General & Management
Head of IT Security Incident and Threat Management Package to £117k DOE + 15% Bonus + Benefits Based Birmingham This is an exciting opportunity to take a strategic leadership role at the forefront of cybersecurity. As Head of IT Security Incident and Threat Management, you will shape and lead the organization’s global response to cyber threats … ensuring they stay one step ahead of emerging risks. You will have the scope to define and deliver a world-class threat intelligence and incidentresponse strategy, working with innovative cutting-edge tools, partners, and experts. The successful candidate will lead and develop a talented in-house team, while managing the external Security Operations Centre (SOC) to ensure … proactive defence and rapid response to incidents. Key Responsibilities Develop and execute incidentresponse and threat management strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed More ❯
opportunity to grow and learn with the organisation. As part of our Blue Team, you’ll use the latest intelligence and tooling to analyse information systems to ensure effective incident detection and response. Job Description If you are looking to make your mark on a rapidly growing SecOps team with some very exciting clients, look no further. We are … with an inquisitive nature, keen attention to detail, and a strong background in cybersecurity topics such as threat hunting, attacker tactics and techniques, monitoring and alerting, threat intelligence, and incident readiness and response. Key responsibilities of the role are summarised below: Detection engineering - Develop, maintain, and enhance security detection content primarily for the Splunk SIEM, to enable the detection … in detection coverage, log ingestion and alerting based on business risks and threats Review and improve existing SecOps standards and capabilities e.g. by highlighting requirements for additional logging, identifying incident or threat trends and detection and business-as-usual optimisation opportunities Perform security monitoring, reviewing and triaging triggered alerts, and suggesting improvements (on a rota basis 9AM to More ❯
Job Title: SOC IncidentResponse & Threat Hunting Manager Location: Warrington, UK (Travel may be required) Flexible Working: "Work Your Way" available from day one Im working with a gold-standard IT Managed Service Provider renowned for delivering secure, enterprise-grade solutions across cloud, infrastructure, and cyber domains. Theyre expanding their Security Operations Centre and hiring a hands-on … SOC IncidentResponse & Threat Hunting Manager to lead Tier 3 analysts and drive proactive defence strategies. This is a strategic and technical leadership role, ideal for someone with deep DFIR expertise, strong mentoring capabilities, and a passion for threat hunting and CTI development. Key Responsibilities: Lead and coordinate high-severity incidentresponse engagements Provide technical oversight More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Crimson
Head of IT Security Incident and Threat Management - Solihull Crimson and IMI have joined forces to build IMI's new security team, and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security and want to be part of a dynamic team that is shaping the future of security … within a successful global company, we want to hear from you! We are seeking a highly skilled and experienced Head of IT Security Incident and Threat Management to join our team. In this role, you will be responsible for leading the strategic efforts to safeguard the company's digital assets against potential threats and incidents. This role requires a … seasoned professional with a deep understanding of cybersecurity, incidentresponse an threat management within a FTSE 100 environment. The salary on offer for this position is between £90,000 and £110,000 per annum plus benefits. Please note this role is based on site for the first 3 months followed by a hybrid working arrangement. Key Responsibilities Develop More ❯
Senior Incident Responder – SOC Analyst (L3) Birmingham or Glasgow | Up to £71,000 + Bonus + Benefits | Hybrid | SC Clearance Required or Eligible Our client – a global technology and services firm – is expanding its Managed Security Operations Centre and seeking a Senior Incident Responder (L3 SOC Analyst) to take the lead on complex security incidents, investigations, and threat … the sharp end of cybersecurity operations, working on major incidents across enterprise environments, guiding L1/L2 analysts, and collaborating with client stakeholders to deliver best-in-class detection, response, and remediation. The Role You’ll take ownership of escalated incidents, conduct detailed investigations, and ensure effective containment and eradication of threats. You’ll act as the escalation point … within the SOC, providing technical expertise, mentoring junior analysts, and driving continuous improvement of incidentresponse processes. Key Responsibilities: Lead complex investigations into security incidents and breaches. Perform root cause analysis and provide actionable recommendations. Conduct static and dynamic malware analysis; reverse engineer to identify IOCs. Monitor, tune, and optimise SIEM tools Develop and refine SOC use cases More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls and identity management systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incidentresponse efforts Perform root cause analysis and maintain incidentresponse protocols Recommend enhancements to improve overall security posture Deliver security awareness training and ensure compliance with … segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identity and access management (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP, CISSP, Security+, or GSEC are advantageous Salary/Package Basic salary of between £50k-£55k 4% Pension More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls and identity management systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incidentresponse efforts Perform root cause analysis and maintain incidentresponse protocols Recommend enhancements to improve overall security posture Deliver security awareness training and ensure compliance with … segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identity and access management (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP, CISSP, Security+, or GSEC are advantageous Benefits: 4% Pension Life Insurance 3 x salary 25 days annual More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
TXP
e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls and identity management systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incidentresponse efforts Perform root cause analysis and maintain incidentresponse protocols Recommend enhancements to improve overall security posture Deliver security awareness training and ensure compliance with … segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identity and access management (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP, CISSP, Security+, or GSEC are advantageous Benefits: 4% Pension Life Insurance 3 x salary 25 days annual More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Regal Cloud
support cyber-recovery solutions across large-scale PowerScale platforms Lead data integration and migration initiatives, ensuring seamless synchronisation across enterprise systems Conduct risk assessments , develop recovery strategies, and coordinate incident-response testing Collaborate with internal and client teams to drive best practice in data security, recovery, and optimisation Troubleshoot complex issues and provide technical documentation, knowledge sharing, and … training 🧠 Skills & Experience Proven experience with PowerScale/Isilon and enterprise-grade storage technologies Strong understanding of cyber-security frameworks , incidentresponse, and data-recovery methodologies Hands-on experience with data migration, scripting (PowerShell, Python) , and automation tools Excellent communication and problem-solving skills Certifications such as EMC Proven Professional, CISSP, CISM are a plus More ❯
West Midlands (County), Birmingham, United Kingdom
Sherborne Talent Solutions
aligned with ISO 27001, NIST, and CIS frameworks. Produce detailed documentation for configurations, processes, and troubleshooting. Collaborate with global cloud, security, and infrastructure teams for consistent, secure operations. Support incidentresponse, root cause analysis, and ongoing improvements. Required Skills & Experience: Extensive experience executing network refresh projects. Strong expertise with Cisco, Palo Alto, HAProxy, and Azure networking. Solid understanding More ❯
Principles & Technologies. Experience of Security Related Technical Investigations Hands-On Technical Experience of Conducting Vulnerability Scanning & Evaluating Results Commercial Awareness & (Ideally) Experience of PCI DSS (Current Version) Experience with IncidentResponse Procedures & Investigations Strong Verbal & Written Communication Skills High Attention to Detail Strong Team Player Searches: Vulnerability Management Analyst/VM Analyst/Information Security Analyst/Information More ❯
security governance, risk, and compliance (GRC) . Experience in creating dashboards and reports using Power BI. Proven ability to document policies, procedures , and technical standards. Skilled in security operations , incidentresponse, and vulnerability management. Familiarity with ITIL v4, Agile methodologies, and SOC environments. More ❯
issues. Develop and enforce network security policies , including segmentation, access control, and threat prevention. Collaborate with cross-functional teams to support cloud connectivity, remote access, and hybrid environments. Lead incidentresponse for network-related security events and outages. Document network designs, configurations, and operational procedures. Required Skills & Experience 8+ years of experience in enterprise networking and connectivity roles. More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
EML
workloads. Continuously improve build and deployment processes with a focus on minimizing security risks. Site Reliability Engineering (SRE): Ensure system reliability, scalability, and performance through proactive monitoring and secure incident response. Develop and implement observability tools to monitor system health, detect anomalies, and identify security threats. Perform root cause analysis and implement solutions to prevent recurring issues, including security … Infrastructure Expertise : Experience in managing secure cloud, on-premises, and hybrid environments. Automation : Proficiency in automating workflows and infrastructure management with security controls. Reliability Practices : Strong knowledge of monitoring, incident management, and performance optimization with security considerations. Database Management : Experience with secure database design, optimization, and administration. Networking : Knowledge of secure network design, troubleshooting, and security best practices. Systems … KPIs): Uptime and reliability of secure infrastructure and applications. Efficiency and success rate of automated workflows with security controls. Database performance and availability metrics with secure configurations. Reduction in incident resolution times, including security incidents. Network and systems performance metrics with security monitoring. What you will be offered If you love what you do, you should love where you More ❯