Leatherhead, Surrey, England, United Kingdom Hybrid / WFH Options
Sanderson
security systems, including next-generation firewalls, IPS, SIEM tools, endpoint security, and other devices/services. Respond to and analyze security incidents, deploying patches and mitigating vulnerabilities promptly. Security IncidentResponse: Identify and respond to external and internal threats, investigate security incidents, and implement necessary fixes. Project Collaboration: Work on cyber security projects, particularly those requiring security input … manage firewall and data encryption software to protect sensitive business information. Risk Assessment: Continuously assess risks and report to management to support informed decision-making on cyber security matters. Incident & Service Management: Manage and resolve incidents or service requests in compliance with Service Level Agreements (SLAs). Documentation & Compliance: Create and maintain system documentation, execute housekeeping and maintenance routines More ❯
within defined limits. Develop, test, and refine our overarching Operational Resilience Framework , including policies, procedures, and test plans. Enhance and manage our Business Continuity Management Framework, Crisis Management, and IncidentResponse Plans . Coordinate and execute various operational resilience testing exercises, including scenario testing, stress testing, and crisis simulations. Monitor and report on operational incidents, ensuring that valuable … and understanding of PRA, FCA and Bank of England regulations on operational resilience, including SS1/21 and PS6/21. Strong knowledge and experience in BCP, disaster recovery, incident management, and crisis response. Strong risk management knowledge and experience in conducting risk assessments, impact tolerances, scenario testing and developing resilience metrics. Degree in IT, Cybersecurity or equivalent and More ❯
to ensure continuingoperability. Coordinatewith Cyber Defence and CTI Analysts in the management and administration theupdating of ingested data flows, cyber use cases and signatures for specialisedcyber defence applications in response to new or observed threats. Manage the compilation,cataloguing, distribution, and retrieval of data from a range of enterprisenetworks and data sources. Implement and develop datamanagement standards, policies, requirements … limitedto Linux, Android, and Windows operating systems. Knowledge of cyberdefence and information security policies, procedures, and regulations. Knowledge of networksecurity architecture concepts including topology, protocols, components, andprinciples. Knowledgeof cyber incidentresponse frameworks and handling methodologies. Knowledge of data backup andrecovery. Skills/Experience: Must-have - circa5 years + relevant experience. Must-have experience withEnterprise ICS/network architectures More ❯
rollout and enforcement of security policies such as MFA and endpoint protection. Provide support on IT projects, system upgrades, and internal documentation. Perform routine system health checks and support incidentresponse activities. Support scheduled backups and recovery testing procedures. Respond to helpdesk enquiries across multiple UK locations. Provide occasional support to international locations as the organisation grows globally More ❯
Sutton, Greater London, Carshalton, United Kingdom
IT Talent Solutions
rollout and enforcement of security policies such as MFA and endpoint protection. Provide support on IT projects, system upgrades, and internal documentation. Perform routine system health checks and support incidentresponse activities. Support scheduled backups and recovery testing procedures. Respond to helpdesk enquiries across multiple UK locations. Provide occasional support to international locations as the organisation grows globally More ❯
specifically with Azure. Experience with security frameworks and compliance standards (e.g., ISO 27001, NIST, GDPR). Familiarity with penetration testing and vulnerability assessment tools. Hands-on experience with security incidentresponse and forensic analysis ECS Recruitment Group Ltd is acting as an Employment Agency in relation to this vacancy. More ❯
years of experience in Threat Intelligence, Vulnerability Management, or cyber research. Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. Experience in technical incidentresponse and cloud-based security operations. Proficiency in open-source intelligence (OSINT) and deep technical analysis. Knowledge of Windows/Linux internals, networking, and cloud platforms (e.g. Azure More ❯
Cyber Security at Director level. Extensive experience in the insurance sector - essential. Strong grasp of regulatory and compliance frameworks (e.g. FCA, GDPR). Deep knowledge of enterprise security architecture, incidentresponse, cloud security (Azure/AWS), and threat intelligence. Hands-on approach with the ability to operate at both strategic and tactical levels. Must be UK-based and More ❯
to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security policies, documentation, and awareness training Support incidentresponse efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST More ❯
to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security policies, documentation, and awareness training Support incidentresponse efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST More ❯
to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security policies, documentation, and awareness training Support incidentresponse efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST More ❯
to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security policies, documentation, and awareness training Support incidentresponse efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST More ❯
to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security policies, documentation, and awareness training Support incidentresponse efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST More ❯
Business development: Identifying opportunities in cyber risk management and technology resilience. Managing key client relationships supported by account, sales, and marketing plans. Positioning our cyber threat intelligence, assurance, and incidentresponse practices. Providing energetic consulting leadership in KSA, promoting Control Risks as a cyber and technology risk advisor, leading to increased long-term, programmatic work. Supporting practice growth More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
In Technology Group
strong focus on application security, web application firewalls, and secure DevOps pipelines. Provide security leadership and mentoring , supporting colleagues and enhancing security awareness across the business. Actively contribute to incidentresponse , security training , supplier reviews , and client security assurance Stay ahead of evolving threats, and help shape our strategy using frameworks such as OWASP, SASE, and Zero Trust. More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
In Technology Group
strong focus on application security, web application firewalls, and secure DevOps pipelines. Provide security leadership and mentoring , supporting colleagues and enhancing security awareness across the business. Actively contribute to incidentresponse , security training , supplier reviews , and client security assurance Stay ahead of evolving threats, and help shape our strategy using frameworks such as OWASP, SASE, and Zero Trust. More ❯
development: Identify and originate cyber risk management and technology resilience opportunities. Manage key client relationships, supported by account, sales, and marketing plans. Position our cyber threat intelligence, assurance, and incidentresponse practices. Provide energetic consulting leadership in KSA, promoting Control Risks as a trusted advisor on cyber and technology risk, leading to increased long-term, programmatic work. Support More ❯
development: Identify and originate cyber risk management and technology resilience opportunities. Manage key client relationships, supported by account, sales, and marketing plans. Position our cyber threat intelligence, assurance, and incidentresponse practices. Provide energetic consulting leadership in KSA, promoting Control Risks as a trusted advisor on cyber and technology risk, leading to increased long-term, programmatic work. Support More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Client Server
activities to proactively discover potential compromises, work with external teams on penetration tests and red team engagements and manage SIEM and XDR tooling, establish processes and workflows to support incidentresponse SOC. Location/WFH: You'll join colleagues in the Central London office for two days a week with flexibility to work from home the other three More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
activities to proactively discover potential compromises, work with external teams on penetration tests and red team engagements and manage SIEM and XDR tooling, establish processes and workflows to support incidentresponse SOC. Location/WFH: You'll join colleagues in the Central London office for two days a week with flexibility to work from home the other three More ❯
Derby, Derbyshire, United Kingdom Hybrid / WFH Options
risual Limited
Microsoft Defender) Excellent written and verbal communication skills Experience configuring and deploying Microsoft technologies such as Microsoft Defender and Azure Experience using and developing playbooks for SOC processes and incidentresponse Strong understanding of IT & networking fundamentals (eg TCP, DNS, TLS) Able to work effectively in a team as well as confident working independently and taking accountability for More ❯
warnings). Notify the government of suspected cyber incidents and articulate the event's history, status, and potential impact for further action in accordance with the government's cyber incidentresponse plan. Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities. Knowledge of cybersecurity and privacy principles, computer networking concepts, protocols, network security methodologies, laws, regulations More ❯
Prometheus, Grafana, ELK stack, or similar tools to improve system reliability. Security & Compliance: Apply best practices for cloud security, IAM policies, and compliance frameworks (SOC2, ISO 27001, etc.). IncidentResponse & Performance Optimization: Troubleshoot issues, perform root cause analysis, and implement fixes to optimize performance. Infrastructure as Code (IaC): Utilize Terraform, Ansible, or similar tools to automate infrastructure More ❯
business to explore new opportunities for us and influence global retailers. You maintain a strong understanding of Tools, Tactics and Procedures (TTP's) used in advanced threats, continuous monitoring, incidentresponse, know how to detect and monitor for these threats, as well as how to mitigate them. We want to find the best candidates for the role, so More ❯