As part of our Cyber team, you will help us build a world-class security automation, orchestration, and response capability that will navigate challenging security incidents, drive process improvement, and develop an open culture where we grow from our mistakes as an organization. In this role, you will also build the tools needed to scale our detection and response capabilities across all threats to our Studio and gaming environments. What you'll be doing: Build security automations, logging, and SIEM detections to improve efficiency, scalability, and incidentresponse capabilities. Design, implement, and maintain automated workflows and playbooks to streamline operations, including incidentresponse, threat hunting, cyber threat intelligence, and vulnerability management. Collaborate with analysts … to identify repetitive tasks and automate them to improve operational efficiency. Work with Threat Intelligence, IncidentResponse, and Attack Surface Management teams to build and tune robust SIEM detections for proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements as necessary. Partner with third-party vendors and service providers to More ❯
As part of or Cyber team You will help us build out a world class security automations, orchestration and response capability that will navigate challenging security incidents, drive process improvement, develop an open culture where we grow from our mistakes as an organization. In this role, you will also build the tools that we need to scale our detection … and response capability across all threats to our Studio and gaming environments. What you'll be doing: Build security automations, logging, and SIEM detections to improve the efficiency, scalability, and incidentresponse capabilities. Design, implement, and maintain automated workflows and playbooks to streamline operations, including incidentresponse, threat hunting, cyber threat intelligence and vulnerability management. … Collaborate with analysts to identify repetitive tasks and automate them to improve operational efficiency. Collaborate with Threat Intelligence, IncidentResponse, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary. Collaborate with third-party vendors and More ❯
Salford, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Inspire People
alert fatigue. You'll create bespoke analytic rules and collaborate with analysts to refine detection capabilities. You'll also take an active role in managing security alerts and leading incidentresponse and investigation efforts. As a senior colleague, you'll advise on cyber risks, emerging threats, and mitigation strategies aligned with the Government Security Framework and standards. You … as expected, ensuring requirements, policies, and standards to govern all activities and outputs are met. Reviewing high-priority or high-complexity analysis of security event data to manage security incidentresponse, making key decisions on reporting or escalations for monitoring Containing and remediating those incidents, identifying potential process improvements. Communicating with a broad range of senior stakeholders and … be responsible for defining the vision, principles, and strategy for incidentresponse Deputising for the SOC manager as a when required. Reviewing incident documentation ensuring that appropriate lessons learned are captured and implemented. Maintaining and integrating Cyber Threat Intelligence services to enhance the Departments capabilities to detect threats. Mentor junior engineers and contribute to the development of More ❯
as the monitoring and deployment services that enable the rest of engineering to develop, deliver and maintain our platform services. You will also be instrumental in both monitoring and incidentresponse, playing a key role in ensuring maximum reliability and minimal downtime. You will collaborate with teams across the company, including developers, customer support, product owners and sales … to track the health, performance, and availability of infrastructure components and applications. Configure alerting mechanisms to notify teams of potential issues and proactively address them before they impact users. IncidentResponse and Root Cause Analysis: Participate in incidentresponse activities to identify, troubleshoot, and resolve incidents. Communicate incident status and updates to ensure both internal More ❯
such as CrowdStrike Falcon, RoboShadow, Microsoft Defender, ThreatLocker Evaluate and onboard new security technologies; liaise with vendors Lead technical onboarding of cyber tools for both internal and client deployments IncidentResponse & Threat Management: Develop and own incidentresponse playbooks Act as the lead escalation point for live security incidents Analyse alerts, threat intelligence, and forensic data … of: CrowdStrike Falcon - policy config, triage, alerting RoboShadow or similar - vulnerability workflows Microsoft Defender, Conditional Access, MFA, Secure Score Familiarity with frameworks: Cyber Essentials Plus, ISO 27001, PCI DSS Incidentresponse experience with real-world investigations Understanding of identity security, patch management, and user awareness training Excellent written and verbal communication - able to simplify complex concepts for clients More ❯
patch management processes for virtual machines, containers and serverless functions. Integrate vulnerability scanning (e.g. Qualys, Sonar Cloud, Tenable or Azure-native scanners) into CI/CD pipelines. Security Analysis & IncidentResponse Perform root-cause analysis of security incidents and vulnerabilities. Conduct threat modelling, code and infrastructure reviews. Develop and execute incidentresponse procedures, leveraging Sentinel playbooks … security subject-matter expert during architecture and design reviews. Mentor and upskill engineers on secure coding and DevSecOps best practices Continuous Improvement Develop and refine security playbooks, runbooks and incidentresponse procedures. Monitor security metrics and key risk indicators and identify opportunities to improve tooling and processes. Evaluate and pilot emerging security technologies, especially within the Microsoft security More ❯
response. • Soft Services Management - Ensuring effective delivery of cleaning, waste management, catering, reception, and porterage. • Contract & Supplier Management - Managing outsourced service providers and ensuring compliance with SLAs. • Business Continuity & Incident Management - Developing and maintaining business continuity plans for NBIP (BCP). • Compliance, Insurance & Risk Management - Ensuring adherence to health, safety, and environmental policies. • Mechanical, Electrical & Building Fabric Maintenance - Supporting … control systems, working with the EI Business Support team as needed who locally manage systems within the EI Building. Operational Management • Analyse Business Systems data to identify trends, improve response times, and enhance efficiency. • Work with the FM Business Partner to provide data-driven insights for performance monitoring. • Drive continuous improvement to ensure customer-focused service delivery. Soft Services … ensure compliance and contractual performance. • Develop and sustain relationships with key stakeholders. Security & Access Management • Manage site security services, including contracted security staff, access control, and CCTV. • Ensure robust incidentresponse procedures, coordinating with emergency services when necessary. • Work with internal stakeholders to manage security risks, access controls and mitigate threats. • Oversee visitor management protocols, ensuring compliance with More ❯
automation, cloud technology, and fast-paced problem-solving—and want your work to have a real impact—this could be the perfect role for you. Key Responsibilities Lead security incidentresponse and threat detection efforts, prioritising the protection of customer data and experience Build automated detection and remediation workflows using SOAR, SIEM, and scripting (Python, SQL) Apply deep … facing and payment systems into the security monitoring platform Perform threat hunting and detection engineering to identify and address emerging risks Support security audits, compliance (PCI-DSS), and post-incident reviews Mentor junior team members and contribute to a culture of continuous improvement Participate in the on-call rotation to ensure fast, effective incidentresponse during critical … events Key requirements: Proven Experience: 4+ years in Security Operations or IncidentResponse, ideally in ecommerce, retail, or fintech environments Technical Depth: Hands-on expertise with SIEM, SOAR, EDR, automation tools, Python, SQL, and cloud-native security tooling Cloud Security: Strong knowledge of AWS and Azure, especially services like WAF, Shield, IAM, and API Gateway Forensic Skills: Experience More ❯
addresses computer vulnerabilities in internal servers, external servers, and applications (cloud or on-premises) and collaborates with stakeholders to ensure associated risks are mitigated and closed. Follows the Security Incident Management Response Policy in responding to security incidents and guides the IncidentResponse Team in handling information security incidents, to include advising and participating in remediation … similar field. Possess certifications from accredited bodies, including Microsoft SC-200, Certified SOC Analyst (CSA), CompTIA CySA+, GIAC Security Operations Certified (GSOC), GIAC Continuous Monitoring Certification (GMON), GIAC Certified Incident Handler (GCIH), CCNA Cyber Ops, or other specialized security certification that assesses the candidates' security analysis, SOC operations, and incident handling skills. Substantial experience in information security across … knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g., ArcSight, Splunk, Nitro/McAfee Enterprise Security Manager, QRadar, LogLogic). Understanding of event and incident investigations and incidentresponse in a 24/7 SOC environment. Proficiency in configuring and managing security technologies such as firewalls, IDS/IPS, SIEM, DLP, and More ❯
Bath, England, United Kingdom Hybrid / WFH Options
Computer Network Defence Ltd (CND)
and ISO27001:2022. Risk Management : Lead the identification and mitigation of information security risks across all operations. Security Architecture : Oversee secure system and software design throughout the development lifecycle. IncidentResponse : Manage the full lifecycle of security incidents, including reporting to relevant authorities. Awareness & Training : Drive a strong security culture through staff training and awareness initiatives. Regulatory Compliance … Deep understanding of secure SDLC and embedding security into product and system architecture. Risk Management : Expertise in building and managing security risk frameworks using methodologies like OCTAVE or FAIR. IncidentResponse : Hands-on experience leading incidentresponse, including regulatory reporting and crisis management. Policy & Governance : Skilled in developing and enforcing comprehensive security policies and governance structures. More ❯
taunton, south west england, united kingdom Hybrid / WFH Options
Computer Network Defence Ltd (CND)
and ISO27001:2022. Risk Management : Lead the identification and mitigation of information security risks across all operations. Security Architecture : Oversee secure system and software design throughout the development lifecycle. IncidentResponse : Manage the full lifecycle of security incidents, including reporting to relevant authorities. Awareness & Training : Drive a strong security culture through staff training and awareness initiatives. Regulatory Compliance … Deep understanding of secure SDLC and embedding security into product and system architecture. Risk Management : Expertise in building and managing security risk frameworks using methodologies like OCTAVE or FAIR. IncidentResponse : Hands-on experience leading incidentresponse, including regulatory reporting and crisis management. Policy & Governance : Skilled in developing and enforcing comprehensive security policies and governance structures. More ❯
bristol, south west england, united kingdom Hybrid / WFH Options
Computer Network Defence Ltd (CND)
and ISO27001:2022. Risk Management : Lead the identification and mitigation of information security risks across all operations. Security Architecture : Oversee secure system and software design throughout the development lifecycle. IncidentResponse : Manage the full lifecycle of security incidents, including reporting to relevant authorities. Awareness & Training : Drive a strong security culture through staff training and awareness initiatives. Regulatory Compliance … Deep understanding of secure SDLC and embedding security into product and system architecture. Risk Management : Expertise in building and managing security risk frameworks using methodologies like OCTAVE or FAIR. IncidentResponse : Hands-on experience leading incidentresponse, including regulatory reporting and crisis management. Policy & Governance : Skilled in developing and enforcing comprehensive security policies and governance structures. More ❯
organised crime remains the biggest concern for digital leaders. Public services, councils and healthcare providers continue to be high-profile victims. This is driving demand for security operations specialists, incidentresponse teams and forensic analysts. Supply chain risk is under the spotlight Breaches linked to third-party providers have exposed vulnerabilities beyond company walls. In response, organisations … evolving threats and advising on proactive measures. Typical salary: £50,000 to £85,000 Cybersecurity Analyst - A key all-rounder role, analysts monitor networks, investigate suspicious activity and support incidentresponse efforts. They are often the first to identify and flag vulnerabilities. Typical salary: £45,000 to £70,000 We're also seeing new hybrid titles emerge, such … business. The Skills Employers Are Prioritising Employers are looking for more than technical knowledge, they're searching for people who can make a real impact. Core technical skills include: Incidentresponse and threat hunting Identity and access management Zero Trust architecture Familiarity with UK regulatory standards and NCSC guidance Certifications often requested: CISSP, CISM, CISA CompTIA Security+ ISO More ❯
is a pivotal opportunity for an experienced Senior Consultant to lead large-scale cybersecurity projects across a diverse client base. The role focuses on cyber resilience, including threat intelligence, incidentresponse, risk management, compliance, and security architecture. You will act as a trusted advisor, delivering tailored solutions that help clients enhance their cyber posture and protect their critical … the end-to-end delivery of cyber resilience projects, ensuring solutions are scalable, secure, and aligned with client goals Design and implement advanced cyber resilience solutions and frameworks Manage incidentresponse, guiding teams through breach containment and recovery Engage directly with clients to identify requirements, provide expertise, and drive successful outcomes Facilitate Agile ceremonies to support efficient project … members, encouraging skill development and knowledge sharing Contribute to business development by producing high-quality proposals and identifying growth opportunities Skills & Experience ? Extensive expertise in threat intelligence, risk management, incidentresponse, compliance (e.g. GDPR, ISO 27001), and security architecture ? Proficiency with tools such as Rapid7 InsightIDR/InsightVM, SentinelOne, Fortinet, Netskope, SOAR automation (Rapid7 InsightConnect), and cloud security More ❯
strategy, ensuring robust protection for our IT systems, OT infrastructure, and critical business data. Reporting directly to the Senior European IT Director, you’ll develop and implement policies, lead incidentresponse, ensure compliance with industry standards, and promote best practice in technology risk management. Key Responsibilities: Develop, implement, and maintain a robust cybersecurity strategy and governance framework aligned … with business and regulatory requirements. Oversee technical security controls including firewalls, IDS/IPS, SIEM, IAM, endpoint protection, and cloud security (Azure, AWS). Lead threat detection, incidentresponse, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network security across internal and customer-facing systems. Conduct risk assessments, penetration testing, and … plans related to cybersecurity. Act as the primary contact for cybersecurity vendors, regulators, auditors, and third-party assessments. About You: Proven track record in cybersecurity management, including threat detection, incidentresponse, and vulnerability management. Strong knowledge of security frameworks (ISO 27001, NIST, CIS Controls) and regulatory compliance requirements (GDPR, NIS2). Hands-on expertise with firewalls, SIEM, IAM More ❯
strategy, ensuring robust protection for our IT systems, OT infrastructure, and critical business data. Reporting directly to the Senior European IT Director, you’ll develop and implement policies, lead incidentresponse, ensure compliance with industry standards, and promote best practice in technology risk management. Key Responsibilities: Develop, implement, and maintain a robust cybersecurity strategy and governance framework aligned … with business and regulatory requirements. Oversee technical security controls including firewalls, IDS/IPS, SIEM, IAM, endpoint protection, and cloud security (Azure, AWS). Lead threat detection, incidentresponse, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network security across internal and customer-facing systems. Conduct risk assessments, penetration testing, and … plans related to cybersecurity. Act as the primary contact for cybersecurity vendors, regulators, auditors, and third-party assessments. About You: Proven track record in cybersecurity management, including threat detection, incidentresponse, and vulnerability management. Strong knowledge of security frameworks (ISO 27001, NIST, CIS Controls) and regulatory compliance requirements (GDPR, NIS2). Hands-on expertise with firewalls, SIEM, IAM More ❯
strategy, ensuring robust protection for our IT systems, OT infrastructure, and critical business data. Reporting directly to the Senior European IT Director, you’ll develop and implement policies, lead incidentresponse, ensure compliance with industry standards, and promote best practice in technology risk management. Key Responsibilities: Develop, implement, and maintain a robust cybersecurity strategy and governance framework aligned … with business and regulatory requirements. Oversee technical security controls including firewalls, IDS/IPS, SIEM, IAM, endpoint protection, and cloud security (Azure, AWS). Lead threat detection, incidentresponse, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network security across internal and customer-facing systems. Conduct risk assessments, penetration testing, and … plans related to cybersecurity. Act as the primary contact for cybersecurity vendors, regulators, auditors, and third-party assessments. About You: Proven track record in cybersecurity management, including threat detection, incidentresponse, and vulnerability management. Strong knowledge of security frameworks (ISO 27001, NIST, CIS Controls) and regulatory compliance requirements (GDPR, NIS2). Hands-on expertise with firewalls, SIEM, IAM More ❯
london (city of london), south east england, united kingdom
AirSearch
strategy, ensuring robust protection for our IT systems, OT infrastructure, and critical business data. Reporting directly to the Senior European IT Director, you’ll develop and implement policies, lead incidentresponse, ensure compliance with industry standards, and promote best practice in technology risk management. Key Responsibilities: Develop, implement, and maintain a robust cybersecurity strategy and governance framework aligned … with business and regulatory requirements. Oversee technical security controls including firewalls, IDS/IPS, SIEM, IAM, endpoint protection, and cloud security (Azure, AWS). Lead threat detection, incidentresponse, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network security across internal and customer-facing systems. Conduct risk assessments, penetration testing, and … plans related to cybersecurity. Act as the primary contact for cybersecurity vendors, regulators, auditors, and third-party assessments. About You: Proven track record in cybersecurity management, including threat detection, incidentresponse, and vulnerability management. Strong knowledge of security frameworks (ISO 27001, NIST, CIS Controls) and regulatory compliance requirements (GDPR, NIS2). Hands-on expertise with firewalls, SIEM, IAM More ❯
strategy, ensuring robust protection for our IT systems, OT infrastructure, and critical business data. Reporting directly to the Senior European IT Director, you’ll develop and implement policies, lead incidentresponse, ensure compliance with industry standards, and promote best practice in technology risk management. Key Responsibilities: Develop, implement, and maintain a robust cybersecurity strategy and governance framework aligned … with business and regulatory requirements. Oversee technical security controls including firewalls, IDS/IPS, SIEM, IAM, endpoint protection, and cloud security (Azure, AWS). Lead threat detection, incidentresponse, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network security across internal and customer-facing systems. Conduct risk assessments, penetration testing, and … plans related to cybersecurity. Act as the primary contact for cybersecurity vendors, regulators, auditors, and third-party assessments. About You: Proven track record in cybersecurity management, including threat detection, incidentresponse, and vulnerability management. Strong knowledge of security frameworks (ISO 27001, NIST, CIS Controls) and regulatory compliance requirements (GDPR, NIS2). Hands-on expertise with firewalls, SIEM, IAM More ❯
individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethical hacking, incidentresponse, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and interactive sessions, guiding … support, feedback, and mentorship Collaborate with the Teaching Assistant and wider team to support learner development Lead or support additional activities such as webinars, hands-on labs, and simulated incidentresponse exercises Contribute to the evaluation of the programme, offering feedback for continuous improvement Areas of Knowledge We are looking for people who have working experience or comfortable … e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) IncidentResponse and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR More ❯
individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethical hacking, incidentresponse, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and interactive sessions, guiding … support, feedback, and mentorship Collaborate with the Teaching Assistant and wider team to support learner development Lead or support additional activities such as webinars, hands-on labs, and simulated incidentresponse exercises Contribute to the evaluation of the programme, offering feedback for continuous improvement Areas of Knowledge We are looking for people who have working experience or comfortable … e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) IncidentResponse and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR More ❯
individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethical hacking, incidentresponse, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and interactive sessions, guiding … support, feedback, and mentorship Collaborate with the Teaching Assistant and wider team to support learner development Lead or support additional activities such as webinars, hands-on labs, and simulated incidentresponse exercises Contribute to the evaluation of the programme, offering feedback for continuous improvement Areas of Knowledge We are looking for people who have working experience or comfortable … e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) IncidentResponse and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR More ❯
About this role WRITER is seeking a Detection and Response Engineer to defend our AI/AGI platforms, training data, and deployed models against sophisticated and evolving threats. At WRITER, protecting the integrity of our AI systems is as critical as advancing their capabilities. This role blends hands-on security engineering with strategic threat detection, ensuring our defenses evolve … of attackers and can turn cutting-edge AI threat intelligence into production-grade detection systems, we'd love to hear from you. Role Boundaries & Collaboration What You Own (Responsible) Incidentresponse coordination Real-time threat monitoring and detection Production AI monitoring (not research) Forensic investigation Detection engineering across all security domains AI threat detection implementation What You Don … including prompt injection, model extraction, data poisoning, and adversarial inputs. Automate security responses - Build playbooks and orchestration workflows that contain AI-targeted attacks in minutes, not hours. Lead AI incidentresponse - Coordinate cross-team investigations into compromises of models, training data, and inference endpoints. Hunt for AI-specific threats - Proactively search for active attacks across GPU clusters, training More ❯
and apply today! Responsibilities: Monitor and analyse security events within the SOC, ensuring timely detection and response. Perform threat analysis, vulnerability assessments, and implement mitigation strategies. Develop and refine incidentresponse playbooks and procedures. Conduct root cause analysis (RCA) for high-priority incidents to prevent recurrence. Collaborate with internal teams and clients to strengthen security posture. Provide technical … expertise and guidance on security incidents and resolutions. Participate in the on-call rota to provide 24/7 incidentresponse support. Contribute to process improvements and knowledge-sharing within the SOC team. Required Skills/Must Have: Minimum of two years' experience in a SOC or managed security environment. Strong knowledge of network security (firewalls, IDS/… IPS, VPNs). Proficiency in incidentresponse, threat analysis, and vulnerability management. Experience working with SIEM tools for monitoring and event analysis. Understanding of malware analysis, forensic investigations, and endpoint security. Strong analytical and problem-solving skills. Excellent communication skills, with the ability to explain technical concepts to non-technical stakeholders. Salary More ❯
and data remain protected, compliant, and resilient against emerging cyber threats. Working within the broader technology and security teams, the Cloud Security Engineer will be responsible for policy enforcement, incidentresponse, security tooling, and embedding security across the development lifecycle. Key Responsibilities: Develop, implement, and maintain comprehensive cloud security policies, standards, and technical controls for GCP and Azure … and hosted applications. Monitor cloud platforms for security threats, suspicious activity, misconfigurations , and vulnerabilities using automated tools and custom detection methods. Act as a key lead in cloud security incidentresponse , including triage, analysis, containment, and remediation. Work closely with development and DevOps teams to integrate security best practices into CI/CD pipelines, infrastructure-as-code deployments … and Microsoft 365 cloud security controls and best practices. Deep understanding of cloud security architecture , the shared responsibility model, and infrastructure-as-code security principles. Experience with threat modelling, incidentresponse, and forensic analysis in cloud environments. Familiarity with container security, Kubernetes, and hybrid or multi-cloud deployments is advantageous. Preferred certifications: Google Professional Cloud Security Engineer Microsoft More ❯