Gloucester, Gloucestershire, England, United Kingdom
Opus Recruitment Solutions Ltd
compliance teams to embed security best practices. Define and enforce security policies, standards, and governance frameworks. Evaluate and integrate security tools (e.g., Microsoft Defender, Sentinel, Entra ID). Support incidentresponse and vulnerability management processes. Essential Skills Minimum 5 years’ experience as a Security Architect, with a strong focus on Azure environments. Deep understanding of cloud security frameworks More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
fortice
Role Description: - SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. - Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. - IncidentResponse - Work with security teams to analyze and mitigate security incidents. - Custom Rule Creation - Develop and fine-tune detection rules and alerts to identify malicious activities. - Security Reporting More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Picture More
days in the office, 2 days from home The Role: Support the delivery of robust information security and privacy practices across global operations. Conduct security risk assessments, support incidentresponse, and contribute to audits and compliance initiatives. Maintain and enhance the firm’s ISMS and Business Continuity frameworks. Complete client cyber due diligence and collaborate closely with internal More ❯
Cyber Essentials, ISO 27001, NIST, and GDPR Configure and deploy essential tools: firewalls, IDS/IPS, endpoint protection, and encryption Overhaul Active Directory, Group Policies, and server configurations Lead incidentresponse, forensic analysis, and threat mitigation Monitor and adapt to new threats with continuous improvement initiatives About You: Proven experience delivering security solutions in cloud, on-prem, and More ❯
Cyber Essentials, ISO 27001, NIST, and GDPR Configure and deploy essential tools: firewalls, IDS/IPS, endpoint protection, and encryption Overhaul Active Directory, Group Policies, and server configurations Lead incidentresponse, forensic analysis, and threat mitigation Monitor and adapt to new threats with continuous improvement initiatives About You: Proven experience delivering security solutions in cloud, on-prem, and More ❯
Cyber Essentials, ISO 27001, NIST, and GDPR Configure and deploy essential tools: firewalls, IDS/IPS, endpoint protection, and encryption Overhaul Active Directory, Group Policies, and server configurations Lead incidentresponse, forensic analysis, and threat mitigation Monitor and adapt to new threats with continuous improvement initiatives About You: Proven experience delivering security solutions in cloud, on-prem, and More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. IncidentResponse - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop and fine-tune detection rules and alerts to identify malicious activities. Security Reporting More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis
/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. IncidentResponse - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop and fine-tune detection rules and alerts to identify malicious activities. Security Reporting More ❯
Wokingham, Berkshire, South East, United Kingdom Hybrid / WFH Options
Experis
/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. IncidentResponse - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop and fine-tune detection rules and alerts to identify malicious activities. Security Reporting More ❯
Middlesbrough, North Yorkshire, North East, United Kingdom Hybrid / WFH Options
Reed Technology
and review of data protection policies and procedures. Support data classification initiatives and ensure appropriate access controls are in place. Collaborate on information security projects, including risk assessments and incidentresponse planning. Liaise with internal teams to provide guidance on compliance and data protection matters. Help respond to data subject access requests (DSARs) and regulatory queries. What We More ❯
City of London, London, United Kingdom Hybrid / WFH Options
British Business Bank
Banks security posture through governance, assurance, architecture, and operations. Manage the relationship and performance of our Managed Security Services Provider (MSSP). Oversee security operations including monitoring, threat detection, incidentresponse, and threat hunting. Lead investigations, forensic analysis, and ensure lessons learned from incidents. Drive project delivery to mitigate key risks and ensure audit-readiness. Deliver effective risk More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
British Business Bank
Banks security posture through governance, assurance, architecture, and operations. Manage the relationship and performance of our Managed Security Services Provider (MSSP). Oversee security operations including monitoring, threat detection, incidentresponse, and threat hunting. Lead investigations, forensic analysis, and ensure lessons learned from incidents. Drive project delivery to mitigate key risks and ensure audit-readiness. Deliver effective risk More ❯
s security posture through governance, assurance, architecture, and operations. Manage the relationship and performance of our Managed Security Services Provider (MSSP). Oversee security operations including monitoring, threat detection, incidentresponse, and threat hunting. Lead investigations, forensic analysis, and ensure lessons learned from incidents. Drive project delivery to mitigate key risks and ensure audit-readiness. Deliver effective risk More ❯
Sheffield, Yorkshire, United Kingdom Hybrid / WFH Options
British Business Bank plc
s security posture through governance, assurance, architecture, and operations. Manage the relationship and performance of our Managed Security Services Provider (MSSP). Oversee security operations including monitoring, threat detection, incidentresponse, and threat hunting. Lead investigations, forensic analysis, and ensure lessons learned from incidents. Drive project delivery to mitigate key risks and ensure audit-readiness. Deliver effective risk More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
British Business Bank
Banks security posture through governance, assurance, architecture, and operations. Manage the relationship and performance of our Managed Security Services Provider (MSSP). Oversee security operations including monitoring, threat detection, incidentresponse, and threat hunting. Lead investigations, forensic analysis, and ensure lessons learned from incidents. Drive project delivery to mitigate key risks and ensure audit-readiness. Deliver effective risk More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
BAE Systems (New)
working arrangements available. Please consult your recruiter for details. Grade: GG10 - GG11 Referral Bonus: £5,000 Job Description Serve as the point of escalation for intrusion analysis, forensics, and incidentresponse queries. Provide root cause analysis for complex, non-standard findings and anomalies without existing playbooks. Mentor team members and share knowledge proactively. Contribute to the SOC Knowledge More ❯
training during onboarding and annually there after Review (initially and annually thereafter), understand, and adhere to Information Security/Privacy Policies and Procedures such as (but not limited to): IncidentResponse Policy/Procedures Mobile Device Policy Access Control Policy Privacy Policy Saviynt is an amazing place to work. We are a high-growth, Platform as a Service More ❯
with implementation experience Experience designing and managing enterprise device management programs globally Advanced knowledge of networking architecture, security design, and infrastructure planning Experience with security frameworks, risk assessment, and incidentresponse leadership Proven ability to design and support remote and hybrid work environments at scale Strategic vendor management experience, including contract negotiation and relationship building Excellent leadership, communication More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Junglee Games India Private Limited
maintaining security. Continuously assess the program's maturity across brands and implement improvements to process or technology to elevate weaker areas. The role also entails planning for product-related incidentresponse and disaster recovery - ensuring that teams are prepared to handle a security incident. Project and Vendor Management: Oversee Secure by Design project execution and coordinate with project More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
aligned with financial services compliance standards (e.g., ISO 27001, SOC 2, PCI-DSS). Collaborate with DevOps, Security, and Application teams to support CI/CD pipelines, monitoring, and incident response. Optimize cloud costs and performance through resource governance, tagging strategies, and usage analytics. Develop and maintain documentation for infrastructure standards, procedures, and best practices. Participate in disaster recovery More ❯
include): Operating Systems: Proficiency on Windows, Linux, and Unix environments. Database Management: Knowledge of SQL, Oracle, and other database management systems. Cybersecurity: Experience with vulnerability assessments, penetration testing, and incident response. IT Governance: Knowledge of ITIL, ISO 27001, and other IT governance frameworks. Software Development: Understanding of SDLC, DevOps practices, and application security. Data Analytics: Proficiency in data analytics More ❯
Stay abreast of the latest cybersecurity threats and trends, as well as advancements in network security technologies. Develop and enforce policies and procedures for network access, monitoring, and security incident response. What youll bring Youll have professional security certifications such as CISSP, CISM, or equivalent Youll have a minimum of 3 years of experience in network security or a More ❯
expert in operating within an enterprise security program and developing a security model in the AWS cloud - identity and access management, logging and monitoring, infrastructure security, data protection, and incident response. Delivery - As a consultant you will often go on-site to customers to deliver projects proving the use of AWS services and security technology to support information security More ❯
to resolve technical incidents in unfamiliar production systems. Technical and process documentation champion. Experience of operationally managing production software components, including observability, logging, metrics, error reporting, debugging, and live incident management. Your time will be spent roughly as follows: 60% - Proactive technical work (e.g. migrating DB hosting provider, new message bus system proof of concept, deploying new algorithms to … kubernetes) 20% - Reactive technical work (e.g. incidentresponse, unblocking engineers, code review) 10% - Technical leadership initiatives (e.g. establishing technical standards, architectural principles, & staff training) 10% - Planning and administration Any of the following would further strengthen an application Proficiency with Hashicorp Vault including secret and role management. Proficiency in one or more programming languages (we primarily use Go and More ❯
Burton Latimer, Northamptonshire, United Kingdom Hybrid / WFH Options
Weetabix
we can support you. The Recipe (About the Role) Take charge of enhancing and safeguarding our organisation's IT security landscape! You'll be diving into the analysis and response to security events and incidents, as well as spearheading engaging user awareness campaigns and training sessions. In addition, you'll play a vital role in supporting the implementation and … management of identity, access, and threat management controls throughout our IT environment. Identify, analyse, and respond to security events and incidents, escalating as per the incidentresponse plan. Develop and deliver IT Security Education and Awareness materials for the entire organisation. Support IT Security Penetration Tests, Assessments, and audits, resolving findings promptly. Analyse vulnerability scans and provide recommendations … MFA, SSO, conditional access, Azure RBAC, PIM Experience with the following products and technologies: Microsoft Defender, Exchange Online, vulnerability management tools, phishing simulation tools Experience creating policies, procedures and response plans Excellent communicator with the ability to reduce complex issues and ideas to simple terms and express these both to non-technical and highly technical audiences. Ability to work More ❯