Central London, London, United Kingdom Hybrid/Remote Options
Colt Technology Services
highly visible security operations function with global impact upon Colt, business units, partners, and customers. While working as part of this team, the successful individual will provide world class incidentresponse functions to detect, protect, respond, and sustain operations within cyberspace. Job description: Support SOC Manager to deliver the followingSIEM, IR tools platform management including all design, implementation … health checks Responsible for operational activities, Technology escalation support, Security Solution assessment, build activities , existing Service maturing and Build activities assist Analyse potential infrastructure security incidents to determine if incident qualifies as a legitimate security breach Establishing and governing the security incidentresponse processes, investigations and security operational processes. Maintenance and enhancement of formal service catalogue, service … agreed action plan and outcomes Understands cultural differences and utilises this understanding to build rapport across different teams in order to obtain the necessary cooperation. Required profile: Information Security IncidentResponse experience with a focus on detection and response to malicious activity using log data from various sources preferred. Strong Networking and Systems experience, preferably in an More ❯
well as improving our security posture through continuous monitoring and analysis. Key Responsibilities Investigate and respond to cyber security incidents, including malware outbreaks, phishing attempts, and insider threats. Lead incidentresponse efforts and conduct digital forensics. Enhance detection and response capabilities through process improvements and automation. Monitor alerts from SOC tools and perform root cause analysis. Collaborate … with IT and security teams to remediate vulnerabilities. Gather and analyse threat intelligence to inform detection strategies. Maintain detailed incident records and conduct post-incident reviews. Technical Skills Hands-on experience with SIEM, EDR, IDS/IPS, and SOAR platforms. Strong knowledge of operating systems (Windows, Linux), network protocols, and packet analysis tools. Familiarity with scripting languages (Python … GCP). Knowledge of frameworks such as NIST and MITRE ATT&CK. Qualifications Bachelor’s degree in Cyber Security, IT, or related field. 3–5 years in SOC operations, incidentresponse, or threat intelligence. Practical experience with forensic investigations and security monitoring tools. Excellent written and verbal communication skills. Preferred Certifications such as CISSP, GIAC (GCIH, GCIA, GCTI More ❯
Analysis of data collected from established Data Loss Prevention system(s) and methods to ensure compliance with Firm policies * Manages DLP systems and processes as required * Maintains and coordinates incidentresponse planning, assisting in execution of the incidentresponse plan as needed * Controls access to the Firm's Information Systems and related security configuration Key Skills … Excellent knowledge of a network/firewall security preferred * Good knowledge of Disaster Recovery preferred * Strong technical knowledge of cloud environments such as Azure/O365 * Familiarity with DLP incident handling, remediation, and reporting * Proficiency in Microsoft Office products * Experience in securing AI-driven systems and leveraging AI tools. * Familiar with Microsoft Defender for Endpoint, Thales, CrowdStrike Falcon and More ❯
Central London, London, United Kingdom Hybrid/Remote Options
Colt Technology Services
Company description: As the Lead - SOC Incident Manager, your role will encompass communicating cybersecurity incidents to key partners across the enterprise as well as being the main interface between the Colt business units and the cybersecurity groups. You will be the subject matter expert responsible for coordinating cyber security incidents across the enterprise. Job description: You will play a … key role within the SOC to manage incidents: Coordinate response efforts to cyber security incidents caused by internal and external threats to reduce the impact of these incidents to Colt and its customers. Act as the bridge between the SOC incident responders, IT support teams and business groups to ensure a consistently execution of incident triage and … remediation. Build and manage cyber incident tabletop exercises to ensure Colt is prepared to deal with cybersecurity incidents. Perform post incident analysis, identifying lessons learned throughout Fidelity with applicable teams for tactical and strategic remediation. Required profile: Bachelors degree (or foreign education equivalent) in Computer Science, Engineering, Information Technology, Information Systems, Mathematics, Physics, Business Administration, or a closely More ❯
City, London, United Kingdom Hybrid/Remote Options
The Bridge IT Recruitment
and Experience Essential: Degree in Cyber Security, Computer Science, or equivalent experience. Proven experience within a SOC (Security Operations Centre) or NOC (Network Operations Centre). Strong understanding of incidentresponse methodologies and the MITRE ATT&CK framework. Experience using SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. Technical expertise in Microsoft Defender, EDR (Endpoint Detection … and Response), and network architecture. Practical experience managing cyber incidents and implementing secure configurations. Excellent analytical and problem-solving skills, with clear documentation and communication abilities. Familiarity with NIST, ISO 27001, and CIS Controls frameworks. Ability to work under pressure, prioritise effectively, and maintain attention to detail. Desirable: Professional certifications such as GSEC, CISSP, OSCP, CISA, CompTIA Sec+, or More ❯
and container services (ACI, AKS). Proficient in Azure Monitor, Log Analytics, Application Insights, cost management and optimisation, resource tagging strategies, and maintaining platform availability through proactive monitoring and incident response. Infrastructure as Code (Terraform) - Strong working knowledge of Terraform for provisioning and managing Azure infrastructure including writing and maintaining Terraform modules for Azure resources and implementing infrastructure changes … backup vault management. Understanding of high availability architectures using Availability Zones, Azure Load Balancer, Azure Application Gateway, VM Scale Sets, and conducting DR tests to ensure business continuity. Collaboration & IncidentResponse - Strong team player with experience working across DevOps, infrastructure, security, and development teams. Skilled in incident management and managing status dashboards, coordinating platform incidents, documenting runbooks … creating standard operating procedures, and contributing to post-incident reviews with focus on continuous improvement and platform resilience. If you align to the key requirements then please apply with an updated CV. More ❯
procedures. * Own and manage the relationship with the firm's Managed Security Operations Centre (SOC), acting as the primary point of contact, ensuring service levels are met, and coordinating incident response. * Oversee operational security including server and endpoint protection, M365 security, identity and access management, vulnerability assessments, patching, and system hardening. Required Experience: * Extensive experience in information security management More ❯
This permanent role sits within a mature security function responsible for global operational security across IT infrastructure and business applications – including privileged access management, threat protection, threat detection and incident management. Working closely with the IT Security Manager, you will help ensure security services are delivered effectively and that core controls remain fully operational and fit for purpose. Key …/Defender suite Familiarity with technologies such as SIEM, PAM, Endpoint Protection, EDR, IPS/IDS, MFA, Encryption and Next Gen Firewalls Experience supporting cyber security event triage, incidentresponse and recovery Strong knowledge of operational security management and tooling This role offers the chance to work in a highly regulated, security-focused environment with genuine breadth across More ❯
What You'll Do Translate complex cybersecurity concepts into clear, actionable guidance. Assess client cyber risks and recommend practical mitigation strategies. Draft policies and procedures to enhance resilience and incident response. Evaluate vulnerabilities in systems, networks, and supply chains. Manage projects and coordinate team efforts to deliver high-quality outcomes. Prepare detailed client reports and contribute to proposals. Collaborate More ❯
london (city of london), south east england, united kingdom
Sokin
accountability, and continuous improvement within the team. Participate in code reviews, ensuring that team members adhere to high standards for quality, security, and performance. Actively engage in troubleshooting and incidentresponse to address production issues, continually learning from these experiences to improve future resilience. Design, develop, and maintain full-stack applications using Python, Flask, FastAPI, AWS, Angular, React More ❯
City of London, London, England, United Kingdom Hybrid/Remote Options
Broster Buchanan
re open to being a part of an on-call rota, ready to respond if we have a severe, platform-impacting security tooling failure or need second-line security incidentresponse assistance Desirable You have an interest in offensive security, potentially including participation in CTFs and past experience as a red team operator or pen tester You've More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Vanquish Technologies Limited
requirements, deliverables, and operational priorities. Deliver timely, high-quality threat briefings and risk assessments to operational stakeholders. Drive continuous improvement of threat intelligence processes, tooling, and automation. Participate in incidentresponse investigations, providing threat context and attribution support. Maintain awareness of global regulatory and compliance requirements related to threat intelligence and offensive security operations. Key Projects or Initiatives More ❯
management and uplift. This role suits a dependable, punctual AV professional with strong technical understanding and a passion for delivering excellent user experiences in high-profile environments. Key Responsibilities IncidentResponse & User Support Act as the first line of response for all AV incidents and requests. Troubleshoot and resolve AV and video conferencing issues quickly and effectively. More ❯
City, London, United Kingdom Hybrid/Remote Options
Bristow Holland Ltd
ensure seamless integration and deployment of applications. Implement and maintain security best practices and compliance standards across all AWS environments. Troubleshoot and resolve complex technical issues as part of incidentresponse efforts. Maintain detailed documentation of architectures, configurations, and processes. Apply design patterns to ensure code reusability and maintainability. Develop and execute unit tests, following test-driven development More ❯
Working closely with development teams to integrate reliability and performance into the software lifecycle. Managing and evolving CI/CD pipelines to ensure smooth deployments and rollbacks. Contributing to incidentresponse , post-mortems, and reliability improvements. Championing SRE principles such as error budgets, SLIs/SLOs, and automation-first thinking. What Were Looking For Strong experience running cloud More ❯
stories and acceptance tests that can be validated through automated pipelines. Embed privacy controls and assurance checks within CI/CD workflows, supporting continuous compliance and proactive risk detection. IncidentResponse & Coaching Act as the primary privacy SME for delivery and platform teams during privacy incidents or investigations. Provide technical insight during incident triage, root cause analysis More ❯
to grow something, and a clear path toward partnership or leadership, this is that moment.What You'll Do Lead and manage a caseload of complex data-breach and cyber-incident matters, including live ransomware events and regulatory investigations. Act as a trusted adviser during active crises — providing clear, strategic legal guidance under pressure. Supervise and mentor junior lawyers while … helping shape the direction of the team. Work alongside leading experts in digital forensics and threat intelligence to deliver fully integrated incident response. Contribute to new products, knowledge, and thought leadership in a rapidly evolving field. Support business development and client-relationship initiatives that will accelerate your route to partnership. What You'll Need Qualified solicitor (5+ PQE) with … hands-on experience in cyber, data-breach or regulatory incident work. Commercially astute with the confidence to manage C-suite and insurer clients in high-stakes situations. Comfortable operating in fast-moving, crisis-driven environments. Exposure to the cyber insurance market or coverage work (desirable, not essential). An entrepreneurial mindset — someone who sees the opportunity to build, not More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Plexus Resource Solutions Ltd
cloud, and container infrastructure. Ensure system reliability, security, and uptime across multi-cloud setups. Develop internal tools and scripts in Python, Go, or Node.js. Collaborate on architecture, deployments, and incident response. Requirements 5+ years in DevOps or infrastructure engineering. Strong with Docker, Kubernetes, Terraform, AWS/GCP. Scripting in Python/Go/Node.js/Rust. Experience working in More ❯
the development and continuous improvement of Business Resilience, Business Continuity, and Third-Party Risk frameworks. Oversee critical third-party relationships, especially in technology and enterprise services. Deliver scenario testing, incidentresponse, and regulatory reporting that informs senior leadership. Collaborate with internal teams, clients, and market stakeholders to ensure preparedness and compliance. We’re looking for someone with: Deep More ❯
months of proven penetration or security testing experience Knowledge of Metasploit, Burp Suite, and vulnerability scanning tools Experience with Windows, Linux and Mac operating systems Interest in threat hunting, incidentresponse, and security monitoring CRT/OSCP/Cyber Scheme training or aspirations to achieve them Eligibility for UK Security Clearance If you're looking to build a More ❯
City, London, United Kingdom Hybrid/Remote Options
Big Red Recruitment Midlands Limited
months of proven penetration or security testing experience Knowledge of Metasploit, Burp Suite, and vulnerability scanning tools Experience with Windows, Linux and Mac operating systems Interest in threat hunting, incidentresponse, and security monitoring CRT/OSCP/Cyber Scheme training or aspirations to achieve them Eligibility for UK Security Clearance If you're looking to build a More ❯
Entra ID and Active Directory, helping drive a full transition to cloud identity.Maintain and optimise Group Policies and Azure Virtual Desktop (AVD) environments.Troubleshoot complex infrastructure issues and lead structured incident response.Support post-acquisition IT integrations, ensuring secure and scalable outcomes.Monitor system health, produce performance reports, and proactively optimise infrastructure.Maintain up-to-date technical documentation and champion process improvements.Collaborate across More ❯
Camden, Greater London, Camden Town, United Kingdom
Apex Resources Ltd
of experience, for opportunities across various sectors. We are interested in candidates with experience in one or more of the following: Data protection/GDPR Privacy compliance Cybersecurity or incidentresponse Technology, digital, or regulatory advisory work If you are considering a move within data privacy or cybersecurity, please apply with your most up-to-date CV and More ❯
Infrastructure as Code) Work with virtualisation (VMware/vSphere, etc.) Configure/manage SAN/storage, Fibre Channel, zoning, LUN provisioning Participate in vulnerability assessments, patches, security hardening, and incidentresponse Required Skills & Experience NPPV3 clearance, either current or active within the last 12 months (non-negotiable) Strong track record with Windows?11 deployment (imaging, upgrade, Autopilot, Intune More ❯
highly visible security operations function with global impact upon Colt, business units, partners, and customers. While working as part of this team, the successful individual will provide world class incidentresponse functions to detect, protect, respond, and sustain operations click apply for full job details More ❯