with global business risk/objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security … security services and deploy new tools in support of the security roadmap. Must be capable of interacting effectively with various internal teams, peers, and management staff. Support the information security manager with creating information security metrics for the respective supported security products. This will be done monthly. Deploy new … processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security operations, legal, compliance, incident response teams More ❯
a SOC, via Team Lead (managing 2 Security Analysts) and a 3rd party SOC provider, ensure operational resilience, and drive governance, process, and risk management across the business. You won’t be hands-on with infrastructure, that’s handled by a dedicated team, but you’ll be the strategic … ensuring policies align with business and regulatory standards. Operational Resilience: Own the business continuity and disaster recovery (DR) strategy, including planning and regular testing. VulnerabilityManagement: Lead the vulnerability lifecycle process — from identification and reporting (e.g. via Tenable) to remediation and ongoing risk tracking. Risk Management … Collaborate across teams to identify and mitigate cybersecurity risks, delivering clear, actionable reporting to stakeholders. ✅ What You’ll Bring: Proven experience in a cybersecurity management or senior leadership role Experience overseeing a SOC function (internal or third-party) Strong understanding of cyber risk management, vulnerability scanning tools More ❯
birmingham, midlands, United Kingdom Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
birmingham, midlands, United Kingdom Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable VulnerabilityManagement (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Proftech Talent
Threat Intelligence . Provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. Vulnerability Assessment. Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. Risk Management . Ability to identify … Working Hours : Full time Monday - Friday Location : Birmingham/Hybrid Duration : Permanent Role of Senior IT Security Officer: Support in the management of the Security Operations, establishing and delivering methods and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability … where necessary. Support monitoring on external security environment, gathering information on emerging threats to the business and presenting them to leaders where required. Plan vulnerability assessment and penetration testing activities within IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. Contribute to More ❯
experience working with data and cloud technologies, including databases, cloud infrastructure, and basic cloud administration (e.g., networking, compute and storage resources, identity and access management). Familiarity with APIs, web services, and automation through scripting or programming languages. Practical knowledge and demonstrated experience in areas such as Data Loss … Prevention (DLP), Data Privacy/Protection, DSPM/CSPM, SIEM, or vulnerabilitymanagement is highly preferred. Proven success in a technical, customer-facing role within a software or SaaS company. Full spec available, please apply to Locke44 for the details. More ❯
birmingham, midlands, United Kingdom Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
DWP Digital
of Active Directory/Entra ID. Strong working knowledge and practical experience in 3rd/4th line knowledge of Windows Server Security, Monitoring and Vulnerability Management. Proven ability and experience of onboarding applications to Entra ID. Strong working knowledge and practical experience of SSO (Azure) & MFA. Significant demonstrable experience … of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management and CyberArk. Extensive experience and proven track record of working in a large enterprise and multi-supplier environment. You and your role We're the folks behind secure access to all …/7 for thousands of users. We manage everything from day-to-day support to long-term projects, including our custom-built Identity Management platform and integrations with ServiceNow. You will help us in pushing forward with cloud adoption across Azure, AWS, and Oracle Cloud. We're all about More ❯