Incident Responder/IR Consultant Hybrid - UK WideUp to £85k + Bonus + Good bens. I'm currently working with an established cyber security business that's looking for an Incident Responder (IR/DFIR Consultant) to join their team. As an Incident Responder, you'll take the lead on active engagements involving real-world attacks such as … back incidents (occasionally concurrent) so this role would suit someone who enjoys the high-pressure environment of incident response and enjoys being busy. Responsibilities: Co-ordinate and manage cyber security incident response … for a diverse client base, ensuring effective containment, investigation, and recovery. Conduct in-depth digital forensic analysis of relevant incident data Monitor and interpret the evolving cyberthreat landscape, providing clients with timely, relevant insights into emerging threats, tactics, and vulnerabilities that may impact their organisation. Act as a key point of contact for clients, ensuring clear More ❯
Security Analyst 3 months - with extensions London - hybrid £400 per day inside IR35 - Umbrella only Active or lapsed SC Security Clearance required The Role As a Cyber Security Analyst in the Cyber Operations workstream, you will report to the Operational Cyber Security Architect and support BAU cyber activities across the organisation. You … will play a key role in helping the department detect, respond to, and manage cyberthreats, vulnerabilities, and operational risks. You will work closely with technical teams, service owners, and delivery partners to ensure robust security controls are in place and actively monitored. The role is hands-on and well-suited to someone who is proactive, curious, and … to meet ISO27001 & the Cyber Essentials+ certification. Administrative requirements of PAM tool. (CyberArk) Experience Experience administrating PAM solutions, such as CyberArk - MANDATORY Working understanding of security operations, threat detection, and incident response. Experience using SIEM and security tooling for triage and log analysis. Experience tracking and managing vulnerabilities using industry frameworks. Familiarity with enterprise systems including Microsoft More ❯
support. Dedication and willingness to provide support in response to ad hoc threats and periods of increased risk. This may entail on occasion: Ad hoc investigations and assessments Ancillary threat monitoring outside core business hours Proactive professional development through company trainings, industry certifications, and seeking new opportunities to maintain and grow relevant knowledge and skillsets. Identify and communicate enhancement … Public or private sector experience as an analyst, researcher, investigator or consultant supporting a security, risk or due diligence function. Experience in conducting studies and making recommendations to identify threat vectors, threat actors, and threat trends Experience in briefing decision-makers and senior leaders; High degree of knowledge of Social Media Platforms, blogs, IRC, message boards, Deep …/Darkweb; Knowledge of IPv4, IPv6, DNS records, E-mails Headers, P2P; Possession of excellent project/team leadership, development, and client relationship skills; Knowledge and familiarity with relevant threat landscapes or industry practice areas such as cybercrime, online fraud, physical/corporate security, activism, hacktivism, reputation risk, travel security, geopolitical or policy issues Bachelor's degree with relevant More ❯
and executive-level reports detailing risks, business impact, and remediation options Keep pace with new exploits, attack techniques, and security tooling Support internal awareness sessions and training around cyberthreats Feed into the development of security standards, guidance, and processes Skillset & requirements Solid background in penetration testing, ethical hacking, or red teaming engagements Strong knowledge of frameworks such More ❯
Gloucester, Gloucestershire, South West, United Kingdom Hybrid / WFH Options
NSD
days/week on-site) Clearance: Must hold Enhanced DV/UKIC Clearance About the Role We're looking for a hands-on Vulnerability Researcher to investigate emerging cyberthreats and vulnerabilities. You'll work across hardware and software, developing prototypes, conducting side-channel analysis, and uncovering security weaknesses that support national security operations. This role offers the More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Entasis Partners
IAM & PAM Architects – Manager Level Location: UK (Flexible/Hybrid) Practice: Identity & Access Management (IAM) As cyberthreats grow and digital landscapes evolve, identity has become the new security perimeter. We’re working with a leading consulting organisation that’s helping some of the UK’s most high-impact institutions redefine how they manage identity, trust, and access. More ❯
IAM & PAM Architects – Manager Level Location: UK (Flexible/Hybrid) Practice: Identity & Access Management (IAM) As cyberthreats grow and digital landscapes evolve, identity has become the new security perimeter. We’re working with a leading consulting organisation that’s helping some of the UK’s most high-impact institutions redefine how they manage identity, trust, and access. More ❯
london, south east england, united kingdom Hybrid / WFH Options
Entasis Partners
IAM & PAM Architects – Manager Level Location: UK (Flexible/Hybrid) Practice: Identity & Access Management (IAM) As cyberthreats grow and digital landscapes evolve, identity has become the new security perimeter. We’re working with a leading consulting organisation that’s helping some of the UK’s most high-impact institutions redefine how they manage identity, trust, and access. More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Entasis Partners
IAM & PAM Architects – Manager Level Location: UK (Flexible/Hybrid) Practice: Identity & Access Management (IAM) As cyberthreats grow and digital landscapes evolve, identity has become the new security perimeter. We’re working with a leading consulting organisation that’s helping some of the UK’s most high-impact institutions redefine how they manage identity, trust, and access. More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Entasis Partners
IAM & PAM Architects – Manager Level Location: UK (Flexible/Hybrid) Practice: Identity & Access Management (IAM) As cyberthreats grow and digital landscapes evolve, identity has become the new security perimeter. We’re working with a leading consulting organisation that’s helping some of the UK’s most high-impact institutions redefine how they manage identity, trust, and access. More ❯
come in. What You'll Do Lead with impact by building trusted partnerships with clients, helping them make decisive, confident choices to achieve their goals. Safeguard businesses from cyberthreats through best-in-class technical solutions, training, and education that support their teams. Deliver clarity on budget, cashflow, and tech life cycles—ensuring clients maintain a commercial edge More ❯
come in. What You'll Do Lead with impact by building trusted partnerships with clients, helping them make decisive, confident choices to achieve their goals. Safeguard businesses from cyberthreats through best-in-class technical solutions, training, and education that support their teams. Deliver clarity on budget, cashflow, and tech life cycles—ensuring clients maintain a commercial edge More ❯
come in. What You'll Do Lead with impact by building trusted partnerships with clients, helping them make decisive, confident choices to achieve their goals. Safeguard businesses from cyberthreats through best-in-class technical solutions, training, and education that support their teams. Deliver clarity on budget, cashflow, and tech life cycles—ensuring clients maintain a commercial edge More ❯
come in. What You'll Do Lead with impact by building trusted partnerships with clients, helping them make decisive, confident choices to achieve their goals. Safeguard businesses from cyberthreats through best-in-class technical solutions, training, and education that support their teams. Deliver clarity on budget, cashflow, and tech life cycles—ensuring clients maintain a commercial edge More ❯
maintain the ICT Risk Register. Manage security dashboards (SIEM, FortiMail, FortiConsole, SOPHOS, Windows Defender). Oversee job assignments and SLA performance across teams. Support projects aligned with the Cyber Assessment Framework (CAF). Assist in updating and maintaining IT security policies and procedures. Support strategic projects. Training Why choose our Cyber Security Engineer Level 4 apprenticeship … The Cyber Security Engineer apprentice can help to design, build and test secure networks, security products or systems to help protect your organisation against cyber threats. QA is a market leader in cyber security training, with a state-of-the-art immersive cyber gamified learning, giving apprentices a hands-on learning experience … in simulating a real cyber threat. QA's exclusive partnership with Circadence Corporation, the pioneer of the hands-on gamified learning platform Project Ares®, allows us to uniquely incorporate hands-on scenario training into our cyber security apprenticeships. The Project Ares platform offers a totally immersive experience, using automated features to support skills adoption with an More ❯
a hardworking, pro-active, highly able team player with drive and enthusiasm? Someone who understands the value of providing outstanding customer service and with a keen interest in Cyber Security? Who has proven themselves in their current role and wants to expand their horizons further? Then, we need you! We are looking to recruit a full-time Cyber Security Analyst into an expanding Cyber Security team, supporting over 10,000 Healthcare users to work securely, effectively, and efficiently and utilise a continually evolving suite of digital tools, systems, and services. To also enhance our cyber security readiness and capabilities, to tackle emerging cyber risks. The ideal candidate will have an … Incident Response Plan (CIRP) and Security Strategy. You will also work on and be actively involved with the development, implementation and maintenance of cyber security policies, controls, threat analysis, testing, assessments, auditing, reporting, detailed documentation, training, and other security activities. You'll be promoting cyber security awareness, good practice and compliance amidst end users, Trust More ❯
and suppliers. Trusted Advisor: Provide technical expertise and guidance to senior leadership on strategic approaches and solutions. Knowledge Navigator: Stay ahead of on business priorities, emerging technologies, and cyber threats. Proactively identify IAM and cybersecurity transformation opportunities. EA Champion: Supply to the overall success of Enterprise Architecture within Diageo. Minimum 5 years of experience as an Enterprise Architect More ❯
today's ever-connected world. Amidst a rapidly evolving security landscape, Druva offers a $10 million Data Resiliency Guarantee, ensuring customer data is protected and secured against every cyber threat. Visit and follow us on LinkedIn , X and Facebook . The Role and the Team We're looking for a dedicated, resourceful HR Generalist who thrives on variety More ❯
do, and Moorfields is undergoing digital transformation. With the ever-increasing need and interest in the use of digital technology in healthcare, there is also an increase of cyberthreats across the sector. You will be part of a team of Digital, Data and Technology experts that deliver excellence in a busy department. Main duties of the job … we offer please see our Moorfields benefits document. Job description Job responsibilities Information security Undertake Information Security Assessment activities, including supply chain/3rd party assessments following National Cyber Security Centre evaluation best practices for cloud and on premise technologies. Monitoring practices including key performance indicators on security enforcing tools such as anti-virus, patching, and driving security … penetration tests, forensic audits, or related investigations. This includes the ability to ensure remediation of findings are handled and fed into continuous service improvement activities. Incident management of cyber security events of all severities, throughout the incident lifecycle. Business Continuity Develop, maintain, and improve data and technology Business Continuity & Disaster Recovery Plans that enable us to respond to More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Morson Talent
a senior member of the Security Operations team, you will: Lead the response to escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate … and a collaborative approach to problem-solving. Essential Qualifications & Experience Proven experience in a SOC Level 2 or Level 3 role, with demonstrable expertise in incident response and advanced threat hunting. A degree in Computer Science, Cybersecurity, IT, or a related discipline, or equivalent professional experience. Industry-recognised certifications such as CISSP, GIAC/GCIA/GCIH, AZ … Experience in forensic analysis, red-team exercises, and crisis simulation activities. Desirable Experience managing or supporting both IT and OT environments. In-depth understanding of adversarial TTPs and complex threat landscapes. More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Talent
a senior member of the Security Operations team, you will: Lead the response to escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate … and a collaborative approach to problem-solving. Essential Qualifications & Experience Proven experience in a SOC Level 2 or Level 3 role, with demonstrable expertise in incident response and advanced threat hunting. A degree in Computer Science, Cybersecurity, IT, or a related discipline, or equivalent professional experience. Industry-recognised certifications such as CISSP, GIAC/GCIA/GCIH, AZ … Experience in forensic analysis, red-team exercises, and crisis simulation activities. Desirable Experience managing or supporting both IT and OT environments. In-depth understanding of adversarial TTPs and complex threat landscapes. More ❯
About The Role Do you thrive on staying one step ahead of cyberthreats? We are seeking a Cyber Security Analyst to join our central IT team, Thinking Technology. This is a fantastic opportunity to take a lead role in strengthening our cyber resilience and safeguarding the systems that underpin teaching, learning, and operations … across our Trust As Cyber Security Analyst, you will: Monitor, investigate, and respond to security alerts and incidents across the Trust's network and cloud services. Lead on the implementation and management of security tools and technologies including endpoint protection, SIEM, and Microsoft 365 security. Support the Trust's compliance with frameworks such as Cyber Essentials … Plus, DfE ICT standards, and UK GDPR. Deliver clear advice and guidance to school leaders and staff, raising awareness of cyber risks and promoting a culture of security. Work closely with IT colleagues, third-party providers, and external partners (including NCSC) to ensure our systems remain secure and resilient. We are looking for someone with: Practical experience in More ❯
About The Role Do you thrive on staying one step ahead of cyberthreats? We are seeking a Cyber Security Analyst to join our central IT team, Thinking Technology. This is a fantastic opportunity to take a lead role in strengthening our cyber resilience and safeguarding the systems that underpin teaching, learning, and operations … across our Trust As Cyber Security Analyst, you will: Monitor, investigate, and respond to security alerts and incidents across the Trust's network and cloud services. Lead on the implementation and management of security tools and technologies including endpoint protection, SIEM, and Microsoft 365 security. Support the Trust's compliance with frameworks such as Cyber Essentials … Plus, DfE ICT standards, and UK GDPR. Deliver clear advice and guidance to school leaders and staff, raising awareness of cyber risks and promoting a culture of security. Work closely with IT colleagues, third-party providers, and external partners (including NCSC) to ensure our systems remain secure and resilient. We are looking for someone with: Practical experience in More ❯
About The Role Do you thrive on staying one step ahead of cyberthreats? We are seeking a Cyber Security Analyst to join our central IT team, Thinking Technology. This is a fantastic opportunity to take a lead role in strengthening our cyber resilience and safeguarding the systems that underpin teaching, learning, and operations … across our Trust As Cyber Security Analyst, you will: Monitor, investigate, and respond to security alerts and incidents across the Trust's network and cloud services. Lead on the implementation and management of security tools and technologies including endpoint protection, SIEM, and Microsoft 365 security. Support the Trust's compliance with frameworks such as Cyber Essentials … Plus, DfE ICT standards, and UK GDPR. Deliver clear advice and guidance to school leaders and staff, raising awareness of cyber risks and promoting a culture of security. Work closely with IT colleagues, third-party providers, and external partners (including NCSC) to ensure our systems remain secure and resilient. We are looking for someone with: Practical experience in More ❯
About The Role Do you thrive on staying one step ahead of cyberthreats? We are seeking a Cyber Security Analyst to join our central IT team, Thinking Technology. This is a fantastic opportunity to take a lead role in strengthening our cyber resilience and safeguarding the systems that underpin teaching, learning, and operations … across our Trust As Cyber Security Analyst, you will: Monitor, investigate, and respond to security alerts and incidents across the Trust's network and cloud services. Lead on the implementation and management of security tools and technologies including endpoint protection, SIEM, and Microsoft 365 security. Support the Trust's compliance with frameworks such as Cyber Essentials … Plus, DfE ICT standards, and UK GDPR. Deliver clear advice and guidance to school leaders and staff, raising awareness of cyber risks and promoting a culture of security. Work closely with IT colleagues, third-party providers, and external partners (including NCSC) to ensure our systems remain secure and resilient. We are looking for someone with: Practical experience in More ❯