proxy, CrowdStrike-equivalent tools Data management : Supporting data labelling & retention projects using Purview or similar Governance support : Involved in data loss prevention, labelling, and stakeholder engagement (including DPO) Practical incidentresponse input : Advising IT on immediate steps during incidents, converting theory into quick, actionable responses Ongoing InfoSec operations : Metrics, monitoring, and security projects across applications and users Tech … tools you’ll use: Microsoft Purview – Data governance and policy enforcement Microsoft Defender – Endpoint & email protection CrowdStrike/equivalents – Endpoint detection & response Web proxy & email security tools Azure (beneficial) – IAM, monitoring, and security logging Why this role? Be central to shaping data governance and security operations in a dynamic SME environment Hands-on exposure to a wide range of More ❯
proxy, CrowdStrike-equivalent tools Data management : Supporting data labelling & retention projects using Purview or similar Governance support : Involved in data loss prevention, labelling, and stakeholder engagement (including DPO) Practical incidentresponse input : Advising IT on immediate steps during incidents, converting theory into quick, actionable responses Ongoing InfoSec operations : Metrics, monitoring, and security projects across applications and users Tech … tools you’ll use: Microsoft Purview – Data governance and policy enforcement Microsoft Defender – Endpoint & email protection CrowdStrike/equivalents – Endpoint detection & response Web proxy & email security tools Azure (beneficial) – IAM, monitoring, and security logging Why this role? Be central to shaping data governance and security operations in a dynamic SME environment Hands-on exposure to a wide range of More ❯
proxy, CrowdStrike-equivalent tools Data management : Supporting data labelling & retention projects using Purview or similar Governance support : Involved in data loss prevention, labelling, and stakeholder engagement (including DPO) Practical incidentresponse input : Advising IT on immediate steps during incidents, converting theory into quick, actionable responses Ongoing InfoSec operations : Metrics, monitoring, and security projects across applications and users Tech … tools you’ll use: Microsoft Purview – Data governance and policy enforcement Microsoft Defender – Endpoint & email protection CrowdStrike/equivalents – Endpoint detection & response Web proxy & email security tools Azure (beneficial) – IAM, monitoring, and security logging Why this role? Be central to shaping data governance and security operations in a dynamic SME environment Hands-on exposure to a wide range of More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
HSM health using appropriate tools Automate cryptographic processes using Python or other scripting languages SSH key and certificate lifecycle management Generate key components across IBM, Tandem, Unix platforms Support incident, change, and problem management (ITIL-aligned) Maintain accurate documentation and audit trails Collaborate with stakeholders across security, infrastructure, and operations teams Essential Skills Recent hands-on experience with HSMs … management and documentation skills Desirable Skills Experience in operational IT security roles Familiarity with SharePoint, Confluence, JIRA Unix/Windows OS knowledge Experience in change and release management Strong incidentresponse and communication skills If this role is of interest please don't hesitat to apply or get in otuch at (url removed More ❯
looking for a highly capable and technically skilled Security Analyst (Network & Endpoint) to join our cybersecurity team. This role focuses on network and endpoint security operations, threat intelligence, and incidentresponse within a Security Operations Centre (SOC) environment. The successful candidate will have hands-on experience with leading security platforms and demonstrate the ability to operate at a … level. Role Overview: Job Title: Security Analyst (Network & Endpoint) Location: England/Remote Contract Type: Contract Duration: Contract till 31st Mar 26 Sector: Healthcare . Key Responsibilities: Network Detection & Response: Administer and optimise Darktrace for network threat detection, model tuning, and behavioural analysis. Investigate anomalies and escalate incidents based on network telemetry. Endpoint Protection: Deploy and manage CrowdStrike Falcon … agents across enterprise endpoints. Maintain and update detection rules, ensuring alignment with threat intelligence. Security Operations Centre (SOC): Act as a Level 2 SOC Analyst and Incident Handler. Triage, investigate, and respond to security alerts and incidents. Collaborate with other SOC team members to ensure timely resolution and documentation. Threat Intelligence & Insider Threat Monitoring: Monitor threat feeds and manage More ❯
Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in SOC operations, incidentresponse, and forensic analysis. Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for efficient remediation. Experience in network security More ❯
IT security risks, maintaining risk registers and assessments. Ensure compliance with UK regulations (GDPR, NIS, Data Protection Act) and international standards (ISO 27001). Support audits, compliance reporting, and incidentresponse activities. Assist in drafting and updating security policies and governance frameworks. Contribute to staff awareness and training initiatives. Assess vendor/third-party security risks and compliance. More ❯
warrington, cheshire, north west england, united kingdom
Explore Group
IT security risks, maintaining risk registers and assessments. Ensure compliance with UK regulations (GDPR, NIS, Data Protection Act) and international standards (ISO 27001). Support audits, compliance reporting, and incidentresponse activities. Assist in drafting and updating security policies and governance frameworks. Contribute to staff awareness and training initiatives. Assess vendor/third-party security risks and compliance. More ❯
bolton, greater manchester, north west england, united kingdom
Explore Group
IT security risks, maintaining risk registers and assessments. Ensure compliance with UK regulations (GDPR, NIS, Data Protection Act) and international standards (ISO 27001). Support audits, compliance reporting, and incidentresponse activities. Assist in drafting and updating security policies and governance frameworks. Contribute to staff awareness and training initiatives. Assess vendor/third-party security risks and compliance. More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Altum HR
Translate complex security and compliance requirements into clear, actionable deliverables. Support the development of business cases for security initiatives. Contribute to security governance, standards, and best practices. Assist with incidentresponse planning and regulatory alignment (e.g., GDPR, ISO27001, NIST, Cyber Essentials). Skills & Experience Required: Proven experience as a Business Analyst within Cyber Security projects . Strong knowledge More ❯
warrington, cheshire, north west england, united kingdom Hybrid / WFH Options
Altum HR
Translate complex security and compliance requirements into clear, actionable deliverables. Support the development of business cases for security initiatives. Contribute to security governance, standards, and best practices. Assist with incidentresponse planning and regulatory alignment (e.g., GDPR, ISO27001, NIST, Cyber Essentials). Skills & Experience Required: Proven experience as a Business Analyst within Cyber Security projects . Strong knowledge More ❯
bolton, greater manchester, north west england, united kingdom Hybrid / WFH Options
Altum HR
Translate complex security and compliance requirements into clear, actionable deliverables. Support the development of business cases for security initiatives. Contribute to security governance, standards, and best practices. Assist with incidentresponse planning and regulatory alignment (e.g., GDPR, ISO27001, NIST, Cyber Essentials). Skills & Experience Required: Proven experience as a Business Analyst within Cyber Security projects . Strong knowledge More ❯
Advise on cloud security (AWS, Azure, GCP) and container security (Docker, Kubernetes) with a hands-on delivery mindset. Develop, implement, and enforce security policies, standards, and best practices. Lead incidentresponse and root cause analysis for security-related issues. Mentor and train teams on DevSecOps principles, ensuring knowledge transfer and capability building. What we're looking for: Proven More ❯
Stone, Staffordshire, England, United Kingdom Hybrid / WFH Options
Meritus Talent
ISO 27001, IEC 62443, NIS-D/NIS-R. Desirable Skills: Hands-on experience with offensive security tools and red teaming in OT environments. Exposure to Digital Forensics and IncidentResponse (DFIR) within industrial networks. Experience working with Agile project tools such as JIRA, Confluence or Microsoft Planner. Main Benefits: Negotiable salary (enquire for details) 28 days holiday More ❯
Required Skills/Experience The ideal candidate will have the following: Cybersecurity Expertise: ? Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incidentresponse, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud. ? Broad background across information technology with the ability to communicate clearly with non-security technical More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Castlefield Recruitment
sized environments. Solid experience with Microsoft technologies including Microsoft 365, Azure, and Active Directory. Good understanding of networks, servers, storage, and virtualisation. Knowledge of cyber security principles, tooling, and incident response. Ability to troubleshoot complex technical issues across systems and services. Comfortable working both independently and collaboratively across teams. Familiarity with IT service management frameworks (e.g. ITIL) and best More ❯
for the day-to-day monitoring using various SIEM Tools (Qradar, Sentinel & LogRhythm). Some of the responsibilities that come along with this role include the following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting Rule tuning and continual service improvement The role involves working alongside other team members including SOC engineers and … is a mandatory requirement for role fulfilmentExperience working with SIEM technologies and security toolingAn understanding of IT Infrastructure and NetworkingAn understanding of vulnerability and threat managementAn understanding of the incidentresponse lifecycleThe ability to work in a close team and independentlyThe ability to be adaptable to a high-paced changeable workload What you'll get in return More ❯
UK-Based | Remote with Occasional Onsite Travel Salary: £50,000 - £100,000 (dependent on experience) I'm looking for a Senior ServiceNow Technical Consultant with deep expertise in Security IncidentResponse (SIR) and/or Vulnerability Response (VR) ? We're seeking a skilled consultant to join our growing team. This role is focused on a UK-based More ❯
globally coordinated security operations that protect the organisation's people, systems, and data. This includes direct ownership of security controls, security testing, vendor management, vulnerability and threat management, and incident response. You will work daily with the Group CISO to support consistent, high-assurance security practices across all regions, in-line with regional regulation and to support the management … ensure 24/7 visibility and threat detection across global environments, driving maturity and constant improvements to support the ever-changing threat landscape. Defining and monitoring KPIs for detection, response, and containment performance. Owning and managing key security controls, along with managing the vendors responsible for supporting CFC. Ensuring security controls are deployed, tuned, and monitored effectively across cloud … assets. Leading the organisation's global vulnerability management program, ensuring threat led and risk-based prioritization, along with collaboration with IT for timely remediation. Leading on and refining the incidentresponse playbooks Support the Group CISO to define security maturity programme roadmaps, priorities and success metrics. As well as many more SecOps focused tasks. About you The ideal More ❯
ISO27001 standards and business objectives. - Lead the design, implementation, and continuous improvement of the Information Security Management System (ISMS) - Oversee risk management activities, including risk assessments, mitigation planning, and incident response. You will work with senior stakeholders to ensure alignment between security initiatives and organisational priorities and strive to continually harden and enhance the organisations IT systems. You will … be effective at managing relationships with third party suppliers and external auditors and will deliver awareness training, enhance and test the businesses disaster recovery, continuity and incidentresponse plans, and carry our internal audits for the InfoSec governance frameworks. This is an excellent opportunity for a Head of Information Security to join a market leading business. More ❯
ISO27001 standards and business objectives. - Lead the design, implementation, and continuous improvement of the Information Security Management System (ISMS) - Oversee risk management activities, including risk assessments, mitigation planning, and incident response. You will work with senior stakeholders to ensure alignment between security initiatives and organisational priorities and strive to continually harden and enhance the organisations IT systems. You will … be effective at managing relationships with third party suppliers and external auditors and will deliver awareness training, enhance and test the businesses disaster recovery, continuity and incidentresponse plans, and carry our internal audits for the InfoSec governance frameworks. This is an excellent opportunity for a Head of Information Security to join a market leading business. More ❯
deadlines and manage multiple priorities effectively. Proficiency in MS Office applications. Some other highly valued skills may include: Relevant security or project management certifications. Background in operational environments, including incidentresponse and change management. Strong documentation skills for operational procedures. Familiarity with SharePoint, Confluence, and JIRA. Unix/Windows operating system knowledge. Expertise in privacy, compliance, and data … being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. Incident management. Change management. ITIL. Ensure the integrity and availability of cryptographic and key management services to business functions and applications. Accountabilities Cryptographic Hardware Management - including on site local configuration … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of Monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance. Ensure governance and clear record keeping More ❯
Manager to lead the day-to-day operations of a Security Operations Centre. This is a hands-on leadership role where you'll manage a team of analysts, drive incidentresponse, and ensure the SOC delivers measurable value to a well-known end client within the Energy Sector. Key Requirements: Proven experience working within SOC management, within Energy … with NCSC CAF, ONR SyAPs, and ISO27001 frameworks. Nice to have: Experience in complex, regulated environments, especially Critical National Infrastructure (CNI). Awareness of SOAR platforms and automation in incident response. Immediate availability If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now. If this More ❯
Employment Type: Contract
Rate: £600.0 - £800.0 per day + up to £800 per day (Inside IR35)
Manager to lead the day-to-day operations of a Security Operations Centre. This is a hands-on leadership role where you'll manage a team of analysts, drive incidentresponse, and ensure the SOC delivers measurable value to a well-known end client within the Energy Sector. Key Requirements: Proven experience working within SOC management, within Energy … with NCSC CAF, ONR SyAPs, and ISO27001 frameworks. Nice to have: Experience in complex, regulated environments, especially Critical National Infrastructure (CNI). Awareness of SOAR platforms and automation in incident response. Immediate availability If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now.If this job More ❯
support IT Service Management (ITSM), Agile delivery, and operational excellence. This role ensures workflows, automations, and integrations are aligned with organisational processes and governance standards, enabling efficient service delivery, incidentresponse, and knowledge management. Key Duties and Responsibilities Design, build, and maintain JSM workflows, including request, incident, problem, and change management processes. Create and optimise automation rules … to streamline ticket handling and escalation processes. Develop and manage Proforma forms for structured data capture and improved user experience. Configure and support ITSM modules (Request, Incident, Problem, Change, Asset, and Configuration Management). Administer and maintain the Assets module (Insight), including: Asset schema design Custom field integrations Attribute-based automation and relationships Implement and manage webhooks to integrate … Implement tagging and labelling conventions to ensure discoverability and content consistency. Required Competencies Proven experience configuring and administering Jira Service Management and Jira Software. Strong understanding of ITSM principles (Incident, Problem, Change, and Request Management). Experience with JSM Automations, Workflows, and Assets (Insight). Competence in building dashboards and reports using Jira Query Language (JQL). Understanding of More ❯