the sales systems, forecasting and quoting Additional Information The Team Palo Alto Networks has brought technology to the market that is reshaping the cybersecurity threat and protection landscape. Our ability to protect digital transactions is limited only by our ability to establish relationships with our potential customers and help More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
The Nottingham
button which will direct you to our careers site. If you require any adjustments to assist you in applying, please contact As a Cyber Analyst you will play a crucial role in monitoring and responding to security threats, managing vulnerabilities, and ensuring robust cyber resilience within … protect our systems and support a secure, inclusive workplace for everyone. Here's a taste of what you will be doing as a Cyber Analyst at Nottingham Building Society: Security Monitoring: Monitor and respond to security alerts across networks, systems, and cloud environments using SIEM and EDR tools. … IT teams to ensure timely remediation. Regulatory Compliance: Support compliance with regulatory requirements (FCA, PRA, GDPR) and internal security standards. Risk Assessments: Perform cyber risk assessments for third-party vendors and internal systems. Awareness Initiatives: Contribute to awareness initiatives and provide technical guidance to staff on security best More ❯
Protection Analysis (LOPA). Maintain accurate documentation of control systems and modifications. Implement and manage OT cybersecurity measures to protect control systems from cyberthreats, ensuring compliance with IEC 62443 standards. Develop and maintain safety programming on PCS7, ensuring compliance with IEC 61511 standards. Manage alarm systems in More ❯
problems for our clients. Join our engineering teams that build massively scalable software and systems, architect low latency infrastructure solutions, proactively guard against cyberthreats, and leverage machine learning alongside financial engineering to continuously turn data into action. Create new businesses, transform finance, and explore a world of More ❯
Henham, Hertfordshire, United Kingdom Hybrid / WFH Options
Planteria Group
scope, budgets, and timelines, ensuring measurable outcomes. Collaborate with business units to identify technology opportunities. Ensure IT security policies and procedures protect against cyberthreats and comply with regulations. Oversee risk management and business continuity planning. Work with vendors to ensure cybersecurity practices are effective. Manage IT procurement More ❯
problems for our clients. Join our engineering teams that build massively scalable software and systems, architect low latency infrastructure solutions, proactively guard against cyberthreats, and leverage machine learning alongside financial engineering to continuously turn data into action. Create new businesses, transform finance, and explore a world of More ❯
to communicate technical cybersecurity concepts in business terms to diverse audiences. Business Acumen: Proven capability to understand and articulate the business implications of cyberthreats, such as financial impact, operational downtime, and reputational risk. Risk Mitigation: Experience in crafting and executing mitigation strategies for high-risk vulnerabilities. Stakeholder More ❯
UK and Europe. As part of the Enterprise Security & Fraud (ES&F) organization, you will be at the forefront of protecting clients from cyberthreats while building and evolving critical identity and access management services. Key Responsibilities Design, develop, and enhance modern cloud-native cybersecurity services, spanning database More ❯
service desk functions efficiently, resolving issues promptly and delivering a high level of customer service. • Managing and mitigating IT-related risks, such as cyberthreats, data breaches, and system downtime. • Develop, analyse and reporting on key IT performance metrics, such as system uptime, response times, and user satisfaction. More ❯
service desk functions efficiently, resolving issues promptly and delivering a high level of customer service. • Managing and mitigating IT-related risks, such as cyberthreats, data breaches, and system downtime. • Develop, analyse and reporting on key IT performance metrics, such as system uptime, response times, and user satisfaction. More ❯
systems and services. Security of our systems is paramount and therefore anti-virus and malware solutions and procedures must be maintained. Awareness of cyberthreats and how to manage them is essential. Required Skills: A computer related degree or relevant professional certification and accreditation is preferred. At least More ❯
to solve critical challenges facing our customer’s secure environment, so you’re prepared to connect them with a solution for every stage of threat prevention. This role is a significant driver of company revenue and growth. As an experienced and dynamic sales professional, you’re responsible for leading More ❯
to solve critical challenges facing our customer’s secure environment, so you’re prepared to connect them with a solution for every stage of threat prevention. This role is a significant driver of company revenue and growth. As an experienced and dynamic sales professional, you’re responsible for leading More ❯
to solve critical challenges facing our customer’s secure environment, so you’re prepared to connect them with a solution for every stage of threat prevention. This role is a significant driver of company revenue and growth. As an experienced and dynamic sales professional, you’re responsible for leading More ❯
to solve critical challenges facing our customer’s secure environment, so you’re prepared to connect them with a solution for every stage of threat prevention. This role is a significant driver of company revenue and growth. As an experienced and dynamic sales professional, you’re responsible for leading More ❯
to solve critical challenges facing our customer’s secure environment, so you’re prepared to connect them with a solution for every stage of threat prevention. This role is a significant driver of company revenue and growth. As an experienced and dynamic sales professional, you’re responsible for leading More ❯
to solve critical challenges facing our customer’s secure environment, so you’re prepared to connect them with a solution for every stage of threat prevention. This role is a significant driver of company revenue and growth. As an experienced and dynamic sales professional, you’re responsible for leading More ❯
to solve critical challenges facing our customer’s secure environment, so you’re prepared to connect them with a solution for every stage of threat prevention. This role is a significant driver of company revenue and growth. As an experienced and dynamic sales professional, you’re responsible for leading More ❯
to solve critical challenges facing our customer’s secure environment, so you’re prepared to connect them with a solution for every stage of threat prevention. This role is a significant driver of company revenue and growth. As an experienced and dynamic sales professional, you’re responsible for leading More ❯
Permanent Job Description Cyber Security Analyst In this role as a Cyber Security Analyst, you'll be instrumental in safeguarding digital assets, ensuring data confidentiality, and maintaining system integrity. You'll work within a team to monitor, analyze, and respond to security incidents while implementing critical … security measures to defend against cyber threats. 3 days a week on-site in Shepherd's Bush, 2 days remote Benefits Performance-based annual bonus program Clothing allowance and discounts on current fashion ranges Additional holidays with each year of service Group pension plan and life insurance More ❯
identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and … management best practices. Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and Privileged Access Management (PAM). Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyberthreats using SIEM, endpoint security, and vulnerability management tools. Networking & Infrastructure More ❯
identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and … management best practices. • Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and Privileged Access Management (PAM). • Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyberthreats using SIEM, endpoint security, and vulnerability management tools. • Networking & Infrastructure More ❯
delivery (CI/CD) processes, ensuring speed, efficiency, and reliability in software deployment. Security: Develop and implement security strategies to protect systems from cyberthreats, ensuring the integrity, confidentiality, and availability of data. Incident Response: Provide second-line support for incident response, acting as the escalation point after More ❯
Exeter, Devon, South West, United Kingdom Hybrid / WFH Options
Hunter Selection
safe use of IT infrastructure, and update relevant technical documentation. Skills and Experience: MS Windows Environment experience CCNA/CCNP Accreditation Awareness of cyberthreats and how to manage them is absolutely essential. Cat6/fibre communication protocol skills Network - routers, switches, firewalls, LAN/WAN, servers Active More ❯
plymouth, south west england, united kingdom Hybrid / WFH Options
Hunter Selection
safe use of IT infrastructure, and update relevant technical documentation. Skills and Experience: MS Windows Environment experience CCNA/CCNP Accreditation Awareness of cyberthreats and how to manage them is absolutely essential. Cat6/fibre communication protocol skills Network - routers, switches, firewalls, LAN/WAN, servers Active More ❯