Cyber Threat Jobs in England

1 to 25 of 89 Cyber Threat Jobs in England

Software Defined Network Engineer SC/DV

Stoke-on-Trent, Staffordshire, United Kingdom
Ex-Mil Recruitment Ltd
environment. Implement security controls, policies, and compliance requirements within the NSX-t environment, including access controls, encryption, logging, and monitoring, to protect against cyber threats and ensure regulatory compliance. Create comprehensive documentation, including design documents, configuration guides, and operational procedures, and provide training and knowledge transfer to IT more »
Employment Type: Permanent
Salary: £70000 - £75000/annum £75,000 pa + benefits/package
Posted:

SSPM Consultant

Knutsford, Cheshire, United Kingdom
Hybrid / WFH Options
Experis
skills to design, build and protect enterprise systems, applications, data, assets and people. Provide services to safeguard information, infrastructures, applications and business against Cyber Threats Develop telemetry solution to give full observability of malicious traffic. Investigate strategic XDR solution. Secure 3rd Party SaaS configuration - Uplift security posture management … s degree in Information Technology, Computer Science or a related discipline. Previous experience in the financial sector Good awareness of Enterprise Security and Cyber Security as problem domains Demonstrates excellent judgment for balancing between rapid development, long-term code maintainability and supportability. Believes in the power of and more »
Employment Type: Contract
Rate: £550 - £575/day
Posted:

Senior Threat Modeller (Remote)

Frimley, England, United Kingdom
Hybrid / WFH Options
CBS Butler
Senior Threat Modeller Remote-based with occasional travel to Preston or Frimley £45,000 - £55,000 + 2.5% bonus + excellent Benefits What you'll be doing - Senior Threat Modeller Building and implementing processes and procedures for continuous and effective threat modelling capability Producing reports detailing key … digest Contributing to plans and delivering activities in support of organisational and security development needs in accordance with regulatory requirements and changes in the threat landscape Maintaining up to date knowledge of cyber security threats, analyst toolsets and relevant activity group tactics, techniques, and procedures (TTPs) Identifies … and builds attack simulations to support Purple Team engagements by illustrating potential attack patterns to prioritise future remediation efforts Your skills and experiences - Senior Threat Modeller An in-depth understanding of the external security environment and how the organisation reacts to security threats Good knowledge of cyber more »
Posted:

Security Analyst

Doncaster, England, United Kingdom
Forward Role Recruitment
Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the use of industry leading SIEM, IDS … and threat Intelligence Technologies. Provide advice and guidance to client targets of cyber-attacks and malicious activity to a high standard. Provide incident reporting capabilities ensuring that all information is provided in a timely, accurate and effective manner. Provide analytical support to other SOC team members during … security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and Vulnerability Management tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable in a client facing role. A keen interest in cyber more »
Posted:

Cyber Threat Intelligence Analyst

London, England, United Kingdom
Hybrid / WFH Options
Jisc
More details Cyber Threat Intelligence Analyst Salary: Circa £40,000 per annum negotiable depending on experience Contract: Permanent Location: Hybrid - flexibility to work from home and at any of our main hubs (London, Bristol, Manchester and Milton Park - Oxfordshire) Jisc is the UK digital, data and technology … Protect, Detect, Response and Recover from cyber incidents. About the team: A core function of Jisc’s CTI Team is to investigate threat intelligence and to respond to security incidents, by working with our members to investigate the issue and helping them recover as quickly as possible … attacks more effectively and efficiently. You will assist in the development of dashboards for our members and management with Jisc and assist in profiling threat actors and their behaviour to improve the education and research sector. Your day-to-day activities will include the assisting in the operation of more »
Posted:

Senior Security Analyst

London Area, United Kingdom
Provide
expertise to map the attack chain across complex environments, encompassing cloud, identity, email, network, and endpoint. In-depth understanding of the cyber threat landscape, particularly in the aviation sector. Demonstrated ability to translate threat knowledge into proactive threat detection. Proficient in analyzing and researching new … or trending attacks, threat actors, malware samples, and tactics, techniques, and procedures (TTPs) Excellent English language skills in reading, writing, and speaking, with the capability to articulate security insights effectively, both in creating and interpreting security metrics, and in presenting them clearly to all levels of hierarchy, including senior … leadership. Experience: Minimum of 5 years of experience in endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse engineering, or digital forensics. Familiarity with AWS cloud infrastructure, with hands-on experience monitoring associated logs, including GuardDuty, CloudTrail, and VPC Flow. Proven experience with Akamai security tools such more »
Posted:

Cloud Architect - Senior Manager

London, England, United Kingdom
Pwc UK
The role Our Technology Resilience business is at the forefront of supporting organisations in safeguarding against, and responding to, major technology failures and cyber threat. We are now looking to expand our rapidly growing team, and are seeking experienced Senior Managers who can support us in delivering market … in, post incident reviews Working knowledge of IT asset management and IT Service and Continuity Management (ITSCM) practices Good knowledge of cyber threat and cyber recovery considerations Effective analysis and report writing skills Solid communication and client consulting skills The ideal candidate will play a more »
Posted:

Head of Technology - Major Festival Launch

London Area, United Kingdom
Urban Digital Recruitment Ltd
Connectivity: Ensure reliable WiFi across venues for attendees and exhibitors • Data Security: Implement robust data security measures for GDPR compliance and protection against cyber threats and website hacks • Data Management: Establish protocols for data collection, storage, and analysis while respecting privacy regulations. • Vendor Management: Collaborate with vendors to more »
Posted:

Principal Operational Technology Consultant

London Area, United Kingdom
Hybrid / WFH Options
Anson McCade
in Operational Technology (OT) security risk management. Your expertise in integrated information systems and OT, coupled with your ability to identify and address cyber threats, will be invaluable in propelling our clients' businesses forward through digitalization. What we're looking for: Experience in security management of industrial control more »
Posted:

IT Information Security Consultant - Leeds

Leeds, Horsforth, West Yorkshire, United Kingdom
Hybrid / WFH Options
Headway Recruitment
information security standards, including Cyber Essentials, ISO 27001, 27002, Data Protection Act, and GDPR. In-depth knowledge of the Microsoft O365 environment, threat intelligence analysis, Security Incident Response processes, disaster recovery, and business continuity principles. Familiarity with security testing principles, vulnerability scanning, risk identification, resolution, and reporting. … document creation, such as reports or procedures. Key Responsibilities include but not limited to: Assist with security incident management and response activities, emphasizing cyber threats. Conduct daily, weekly, and monthly security checks, reconciliation, and compliance checks. Handle security alerts and inquiries from systems and end users. Complete client … security requirement questionnaires and support the bidding process. Identify and raise awareness of cyber security risks. Develop and enhance security policies, processes, procedures, and technical controls. Take a proactive role in identifying cyber security risks, mitigations, and opportunities to strengthen resilience. Participate in the design and more »
Employment Type: Permanent
Salary: £50000 - £60000/annum DOE
Posted:

Information security analyst

City of London, London, United Kingdom
Harvey Nash
continuous improvement in information security. Evaluate and assess cybersecurity controls across the business and third-party vendors to ensure compliance with the NIST Cyber Security Framework (CSF). Conduct comprehensive risk assessments using the NIST CSF. Identify cyber threats, risks, and issues using risk management techniques. … deliver cyber risk reporting and appetite statements. Maintain and develop Information Security policies and procedures relevant to the current cyber threat landscape. Maintain, develop, and test the Cyber Incident Response Plan. Monitor and manage compliance with relevant cybersecurity regulations. Manage actions and output … from stakeholder engagements, including customers, regulators, and auditors. Stay current with emerging security trends, threat intelligence, industry standards, and security-enhancing technologies. Essential Skills, Knowledge & Experience: Proven experience in an Information Security role. Experience working in a professional or financial services environment. Hands-on experience conducting cyber more »
Employment Type: Permanent
Salary: £65,000
Posted:

Information Security Management System (ISMS) Controller

Cambridge, Cambridgeshire, East Anglia, United Kingdom
Hybrid / WFH Options
GMSL
assets. Conductingregular reviews and risk assessments of information security controls and processes. Implementing lessons learned to ensure continued improvement and staying abreast of emerging threat, vulnerabilities and best practices in information security. Preparing security and risk reports for GMSLs leadership and key stakeholders. Implementing ongoing security awareness training programs … to educate employees about the latest cyber threats and best practices. Supporting, where appropriate, information security incidents and IT transformation projects. Monitoring regulatory changes and ensuring compliance with laws, regulation and industry standards, specifically ISO/IEC 27001 standards. Your experience We are looking for someone who can … information security or a related field. Demonstrable understanding of information security principles, frameworks, specifically ISO27001, and best practices including knowledge of various security technologies, threat landscape, vulnerabilities and mitigation strategies. Understanding of the terms and definitions used in the ISO 27001 Standard, including risk and options for risk assessments. more »
Employment Type: Permanent, Work From Home
Posted:

Cyber Security Manager

London Area, United Kingdom
Harrington Starr
Cyber Security Manager Join a leading global investment bank as a Cyber Security manager within our clients IT department. In this hands-on role, you will be instrumental in … providing Cyber Security services globally, focusing on driving the Cyber Assurance programme to reduce the bank’s cyber threat landscape and ensure robust "Business As Usual" cyber assurance processes. Key Responsibilities: Cyber Test and Validation Management: Oversee the Cyber … and cryptography. Security Solutions: Experience in architecting and engineering complex security solutions, implementing global policies and standards. Methodologies: Familiar with "Attack and Defensive" methods, Threat Hunting, Threat modeling, Reverse engineering, Vulnerability Management, Data modeling, and security metrics. Automation and Scripting: Skilled in Python, Shell, Ansible, Jenkins. Cloud Technologies more »
Posted:

Senior Threat Analyst

Preston, England, United Kingdom
Iceberg Cyber Security
Senior Threat Analyst 🔒 Can you build and implement effective threat modelling processes? Join my clients Cyber Operations team to build and implement effective threat modelling processes, produce strategic threat reports, and support organizational security development. Staying ahead of cyber threats, identify security … gaps, and design attack simulations for Purple Team engagements. Key Responsibilities: Develop and execute continuous threat modelling procedures. Create strategic threat reports for their business units. Support security development in line with regulatory changes. Maintain up-to-date knowledge of cyber threats and analyst tools. Identify … security gaps and build attack simulations. Skills & Experience: Deep understanding of the external security environment and threat response. Knowledge of the cyber threat landscape, current affairs, and geopolitics. Expertise in infrastructure analysis (perimeters, network endpoints, user behavior). Package: £50,000 - £55,000 Hybrid - 2/ more »
Posted:

Security Operations Center Analyst

Greater Manchester, England, United Kingdom
developrec
require a SOC analyst with a desire to develop, work as part of a team and ultimately make a positive impact on the cyber security for the organisation. Role Analyses and monitors the organization's cyber security measures; responds to actual penetration attempts by malicious parties … and physical equipment Act as incident responder for potential incident identified Ability to work under pressure In-depth understanding of the cyber threat landscape and advances adversary tactics Conduct security assessments regularly to identify vulnerabilities and performing risk analysis. Analyse the breach to reach the root cause. … SOC documentation, processes and procedures and ensure currency. Skills and Experiences Ability to work under pressure In-depth understanding of the cyber threat landscape and advances adversary tactics The role requires an intermediate knowledge and experience of Linux; Windows; Azure; AWS; Elastic Stack; Tennable; Threat Intel more »
Posted:

Head of Cyber Security

Buckinghamshire, England, United Kingdom
Chapman Tate Associates
Lead Cyber Security Location: Buckinghamshire Salary: Up to £55,000 dependent on experience Role: My client who are market leaders in Cyber Security, are looking for a Cyber Security Lead to join their expanding team. As the Lead Cyber Analyst, you will … work in a varied technology landscape, be an active participant in cyber defence activities. You will be responsible for ensuring the successful execution of cyber defence strategies and you will collaborate with other departments, stakeholders, and external partners to enhance the organisation's cyber … analysing log data, security events, and alerts to identify any suspicious or malicious activity. Incident Response – gathering evidence, assessing the potential impact, and reporting. Threat Hunting - actively search for vulnerabilities in the system and identify potential threats before they exploit weaknesses. Security Reporting - generate security reports to keep stakeholders more »
Posted:

Head of Product Cyber Security SME

Hemel Hempstead, England, United Kingdom
Smiths Detection
for aviation, ports, borders, defense, and security across 55 countries around the globe Job Purpose: We are seeking an experienced Head of Product Cyber Security to join our team. This role is pivotal in developing, sustaining, and enhancing our cyber security architecture across all products and … from potential threats while effectively managing various stakeholders. You will also have a demonstrable background of enhancing Software Product Security (Secure Software Development), DevSecOps, threat modeling, secure coding practices, and vulnerability management. Key Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed … experience in cyber security leadership roles, particularly in product security within IoT or Operational Technology (OT) companies. Technical Expertise: Proficient in DevSecOps, threat modeling, secure coding practices, and vulnerability management. Leadership : Experience leading cross-cultural and geographically distributed teams. Regulatory Knowledge: Familiar with industry standards such as more »
Posted:

Security Engineer

Alconbury, England, United Kingdom
MM Flowers
will be a key enabler to ensure that the organisation has the processes, governance, and technology in place to protect the organisation from cyber threats. Working closely with the IT Team and business stakeholders, the Security Engineer will develop and deliver a programme of security enhancements alongside the … of threats and the role they play. Relentless focus to reducing vulnerabilities with a continuous improvement mindset. Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk. Work with key vendors to design and build a … point for any operational service issues. Driving a security by design mentality and ensure that security projects are understood and prioritised. Understand the current threat environment and always be aware of advances in technology trends and new threats that could impact MM Flowers. What you can already do Degree more »
Posted:

Head of Security Operations

London, England, United Kingdom
Legal & General
varied role where you'll lead and manage the day to day operations of the Security Operations Centre (SOC); this includes security event monitoring, threat monitoring and response activities. You'll also provide guidance in the event of escalations to help ensure Legal and General’s cyber … process adherence and identifying continuous improvement activities needed to achieve operational performance and risk management objectives related to the SOC Driving the development of threat management, threat modelling and identification of new threat vectors by keeping up to date with industry activity and methodology, to help ensure … revising and re-defining SOC service catalogue and the associated technologies, processes, talent (people) and data requirements to ensure it meets the continually evolving threat and business landscapes Managing, motivating and developing employees at all levels to maximise the performance of the area Qualifications Naturally you will come from more »
Posted:

Account Executive

London Area, United Kingdom
Trident Search
this vendor looks to expand their offerings across the UK and Central Europe. We are looking for someone with experience in cyber threat intelligence sales who has taken ownership of the entire sales process, from cradle to grave. We are looking to speak with problem solvers and more »
Posted:

Senior Incident Response Analyst

Greater London, England, United Kingdom
Provide
a week in the office (Heathrow Airport) Up to £80,000 + up to 20% bonus + Benefits ------------------------------------------------------------------------------------- Are you ready to tackle cyber threats head-on in a dynamic and high-stakes environment? Joining as a Senior Incident Response Analyst at a leading Aviation Company, you will … efficiency. With a focus on exceptional customer service and operational excellence. ------------------------------------------------------------------------------------- Skills and experience Minimum of 5 years’ experience in endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse engineering, or digital forensics. Must have strong experience in the operational side. Comprehensive knowledge of AWS cloud infrastructure … and piece together attack chains across complex environments, including cloud, identity, email, network, and endpoint. Maintain a deep understanding of the cyber threat landscape, particularly within the aviation sector. Communicate security insights effectively across all levels of the organisation, including senior leadership and high level stakeholders Participate more »
Posted:

Cloud Engineering Manager

London Area, United Kingdom
McCabe & Barton
on Azure. Proficiency in object-oriented programming and developing automated solutions through code. Passion for secure network design and protecting organizations from evolving cyber threats. Knowledge of configuration management systems like Ansible. Collaborative and able to communicate effectively and asynchronously. Excellent Stakeholder management skills. If you're excited more »
Posted:

UK SOC Security Analyst I

Leeds, England, United Kingdom
BlueVoyant
incoming issues (assess the priority, determine risk) Work with customers to deploy hardware and software monitoring systems Maintain a strong awareness of the current threat landscape Basic Qualifications Excellent teamwork skills Knowledge of and experience with intrusion detection/prevention systems and SIEM software Strong knowledge and understanding of … network protocols and devices. Strong experience with Mac OS, Windows, and Unix systems. Ability to analyze event logs and recognize signs of cyber intrusions/attacks Ability to handle high pressure situations in a productive and professional manner. Ability to work directly with customers to understand requirements for … field Exceptional candidates with proven experience in security/network operations will also be considered About BlueVoyant At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics, and technology, coupled with deep expertise, works more »
Posted:

Head of Information Security

Greater London, England, United Kingdom
Hybrid / WFH Options
itecopeople
managing the continual development of security tools, processes, and controls, ensuring compliance with all relevant legislation, and safeguarding systems from an array of cyber threats. Key Responsibilities: Develop and execute the Information Security Strategy, enhancing cyber resilience across the client. Collaborate with stakeholders to drive significant … in IT and cybersecurity, in a complex environment. Proven experience in a senior information security role, with substantial expertise across IT infrastructure and cyber risk management. Strategic thinker with strong interpersonal skills, to influence and engage at all levels of an organisation. Proficient in developing and implementing policies … compliant with international standards such as ISO 27001, Cyber Essentials, and GDPR. Qualifications : Essential: Honours degree or equivalent in IT, CISSP or other relevant security certifications.(CISM). Desirable: ITIL foundation, Project management qualifications like Prince 2, MSP, or PMP. Why Join them? Lead a dynamic team in more »
Posted:

DV Cleared - C++ Software Engineer

Gloucestershire, England, United Kingdom
Evolution
C++ Software Engineer - Security Cleared Evolution Recruitment is working closely with a leading Cyber Security organisation looking for a talented Software Engineer. The client systems support a range of clients, including Government, which helps to defend against cyber threats. Duration: 6 months + extensions Location: Full more »
Posted:
Cyber Threat
England
10th Percentile
£37,500
25th Percentile
£50,000
Median
£65,000
75th Percentile
£85,000
90th Percentile
£110,000