I am currently assisting a client who operate in a regulated industry, financial services, who are currently embarking a programme of work focused on maturity/designing and implementing securityposture utilising SIEM tools such as Google Chronicle & implementing UEBA/SOAR (Security Orchestration, Automation, and Response/User and Entity Behaviour Analytics) built on GCP/… Google Cloud so Google SecOps/Security Operations experience is highly desirable. Key Responsibilities; - Enable and validate UEBA alerting within Chronicle SIEM, based on log sources - Deliver a minimum viable UEBA capability with tested detection logic - Provide engineering support to accelerate onboarding of log sources required for UEBA enrichment and detection fidelity - Demonstrate the ability to work with Google … log source coverage - Design and implement detection use cases aligned to MITRE ATT&CK framework - Enable SOAR integration by identifying high-fidelity detections and mapping Key Technical/IT Security Skills; - Chronicle SIEM - Google SecOps - UEBA Tooling - Windows Event Logs - BindPlane - MITRE ATT&CK - Strong SOC background - SOAR playbooks - GCP Finer Details; - Outside IR35 - Contract until End of December More ❯
I am currently assisting a client who operate in a regulated industry, financial services, who are currently embarking a programme of work focused on maturity/designing and implementing securityposture utilising SIEM tools such as Google Chronicle & implementing UEBA/SOAR (Security Orchestration, Automation, and Response/User and Entity Behaviour Analytics) built on GCP/… Google Cloud so Google SecOps/Security Operations experience is highly desirable. Key Responsibilities; - Enable and validate UEBA alerting within Chronicle SIEM, based on log sources - Deliver a minimum viable UEBA capability with tested detection logic - Provide engineering support to accelerate onboarding of log sources required for UEBA enrichment and detection fidelity - Demonstrate the ability to work with Google … log source coverage - Design and implement detection use cases aligned to MITRE ATT&CK framework - Enable SOAR integration by identifying high-fidelity detections and mapping Key Technical/IT Security Skills; - Chronicle SIEM - Google SecOps - UEBA Tooling - Windows Event Logs - BindPlane - MITRE ATT&CK - Strong SOC background - SOAR playbooks - GCP Finer Details; - Outside IR35 - Contract until End of December More ❯
I am currently assisting a client who operate in a regulated industry, financial services, who are currently embarking a programme of work focused on maturity/designing and implementing securityposture utilising SIEM tools such as Google Chronicle & implementing UEBA/SOAR (Security Orchestration, Automation, and Response/User and Entity Behaviour Analytics) built on GCP/… Google Cloud so Google SecOps/Security Operations experience is highly desirable. Key Responsibilities; - Enable and validate UEBA alerting within Chronicle SIEM, based on log sources - Deliver a minimum viable UEBA capability with tested detection logic - Provide engineering support to accelerate onboarding of log sources required for UEBA enrichment and detection fidelity - Demonstrate the ability to work with Google … log source coverage - Design and implement detection use cases aligned to MITRE ATT&CK framework - Enable SOAR integration by identifying high-fidelity detections and mapping Key Technical/IT Security Skills; - Chronicle SIEM - Google SecOps - UEBA Tooling - Windows Event Logs - BindPlane - MITRE ATT&CK - Strong SOC background - SOAR playbooks - GCP Finer Details; - Outside IR35 - Contract until End of December More ❯
london (city of london), south east england, united kingdom
SF Technology Solutions
I am currently assisting a client who operate in a regulated industry, financial services, who are currently embarking a programme of work focused on maturity/designing and implementing securityposture utilising SIEM tools such as Google Chronicle & implementing UEBA/SOAR (Security Orchestration, Automation, and Response/User and Entity Behaviour Analytics) built on GCP/… Google Cloud so Google SecOps/Security Operations experience is highly desirable. Key Responsibilities; - Enable and validate UEBA alerting within Chronicle SIEM, based on log sources - Deliver a minimum viable UEBA capability with tested detection logic - Provide engineering support to accelerate onboarding of log sources required for UEBA enrichment and detection fidelity - Demonstrate the ability to work with Google … log source coverage - Design and implement detection use cases aligned to MITRE ATT&CK framework - Enable SOAR integration by identifying high-fidelity detections and mapping Key Technical/IT Security Skills; - Chronicle SIEM - Google SecOps - UEBA Tooling - Windows Event Logs - BindPlane - MITRE ATT&CK - Strong SOC background - SOAR playbooks - GCP Finer Details; - Outside IR35 - Contract until End of December More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
Duration of assignment 06 Months Any other working conditions - travel/on call/shifts To be published on job boards from below onwards The Role Were looking for Security Consultant/Senior Security Consultant with expertise in penetration testing. As part of our Cyber Security team, you shall perform penetration testing which includes internet, intranet, wireless … from kickoff with clients through scoping engagements, penetration testing and reporting while adhering to the agreed scope and deadlines. Perform penetration testing which includes Network, web application, APIs Cloud Security, Thick Client application, wireless, social engineering, physical penetration testing. Execute penetration testing projects using the established methodology, tools and rules of engagements. Execute red team assessments to highlight gaps … impacting organizations security postures. Identify and exploit security vulnerabilities in a wide array of systems in a variety of situations. Perform in-depth analysis of penetration testing results and create report that describes findings, exploitation procedures, risks and recommendations. Convey complex technical security concepts to technical and non-technical audiences including executives. Perform technical quality reviews and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
TDA TELECOM LIMITED
Solutions Architect Salary: £70,000 to £80,000 Location: Hybrid role on site and in office based in and around London Overview We are seeking an experienced Solutions Architect Security Solutions to join our clients growing pre-sales team. Acting as a trusted technical advisor, you will work closely with account managers, vendor partners, and clients to identify business … challenges, translate them into security requirements, and design tailored, high-impact solutions. This role is pivotal in driving business growth, strengthening client relationships, and ensuring our client delivers innovative, compliant, and effective security outcomes. Key Responsibilities Partnering with Sales Collaborate with sales teams to qualify opportunities and align client needs with the right security solutions. Conduct discovery … sessions with business and technical stakeholders to uncover requirements. Deliver engaging presentations, demos, and proof-of-concepts that clearly communicate value and differentiation. Solution Architecture Design comprehensive security architectures across network, endpoint, identity, cloud, and data protection domains. Ensure alignment with industry frameworks such as NIST, ISO, and CIS, and compliance with regulatory standards (PCI-DSS, HIPAA, etc.). More ❯
corporate mobile estate-focused on iPhones and iPads. You will design and maintain Jamf-based device configurations and app deployments, manage SIM/carrier, and ensure the fleet's security, compliance, and lifecycle hygiene. Whilst the wider endpoint stack includes both Intune and Jamf, this role is dedicated to Apple mobile devices in Jamf, collaborating with the broader team … where policies intersect (identity, conditional access, networking, and security). Key Responsibilities Architect, implement, and maintain Jamf Pro configurations for iOS/iPadOS: enrollment (ABM/DEP), supervision, profiles (passcode, restrictions, Wi-Fi/VPN, certificates, email), SSO, and compliance baselines. Own iPhone/iPad lifecycle: procurement, zero-touch enrollment, kitting, deployment, break/fix, RMA, refresh, and secure … carrier relationships: new lines and ports, plan/right-sizing, roaming enablement/policies, usage monitoring, cost optimization, invoice reconciliation, and contract renewals. Monitor and remediate device compliance and securityposture (encryption, passcode, OS version minimums, managed open-in, DLP); coordinate with Security for incident response and hardening. Maintain accurate asset and SIM inventory; track chain of More ❯
lead the IT service desk team to deliver exceptional IT support to end-users via effective and efficient handling of IT incidents & requests. Whilst maintaining the systems health and securityposture via regular maintenance and patching activities. ITIL V4, CompTIA certification (A+/Network/Security) would be advantageous and having worked in an MSP environment. You … and, where required, contact end-users directly to improve customer satisfaction. Prioritise the ongoing NOC health monitoring, maintain patch compliance lisaing with Change Management & customer facing functions Liase with Security Ops to ensure vulnerability management tools are available and configured to support operational requirements Generate patch status reports at least monthly and escalate exceptions or delays promptly Ensure minimal More ❯
corporate mobile estate-focused on iPhones and iPads. You will design and maintain Jamf-based device configurations and app deployments, manage SIM/carrier, and ensure the fleet's security, compliance, and life cycle hygiene. Whilst the wider endpoint stack includes both Intune and Jamf, this role is dedicated to Apple mobile devices in Jamf, collaborating with the broader … team where policies intersect (identity, conditional access, networking, and security). Key Responsibilities Architect, implement, and maintain Jamf Pro configurations for iOS/iPadOS: enrollment (ABM/DEP), supervision, profiles (passcode, restrictions, Wi-Fi/VPN, certificates, email), SSO, and compliance baselines. Own iPhone/iPad life cycle: procurement, zero-touch enrollment, kitting, deployment, break/fix, RMA, refresh … carrier relationships: new lines and ports, plan/right-sizing, roaming enablement/policies, usage monitoring, cost optimization, invoice reconciliation, and contract renewals. Monitor and remediate device compliance and securityposture (encryption, passcode, OS version minimums, managed open-in, DLP); coordinate with Security for incident response and hardening. Maintain accurate asset and SIM inventory; track chain of More ❯
home for some of your working week. Find out more about our flexible work culture at computershare.com/flex. We give you a world of potential The Global Information Security team is responsible to drive the development, deployment, monitoring and management of information and Cyber Security across the Computershare businesses, globally. Through partnerships with the business units, Technology … Services and other support functions, the Global Information Security team actively supports the business objectives whilst reducing the overall composite risk to Computershare. This role sits within the Cyber Assurance team, who are responsible for delivering a complementary suite of security assessment, testing and assurance services globally across Computershare environments. A role you will love The Vulnerability Remediation … Management Analyst plays a critical role in safeguarding the organisation’s global infrastructure by driving the timely and effective resolution of identified security vulnerabilities. You will be responsible for tracking remediation efforts, escalating issues where necessary, producing detailed reports, and driving the implementation of processes to prevent the reintroduction of resolved vulnerabilities. By collaborating across teams and driving accountability More ❯
Cambridge, Cambridgeshire, England, United Kingdom
The One Group
Office 365, Exchange Online and SharePoint Online Oversee virtualisation platforms (VMware, Hyper-V) Take ownership of networking (Cisco) and firewalls (Cisco, Palo Alto) Drive improvements in automation, monitoring, and securityposture Collaborate with internal dev teams to support cloud-hosted solutions The Setup Working alongside a highly experienced Head of IT, you'll take the lead on delivering … new infrastructure projects across servers, networking, and cloud. The environment is a blend of on-prem and Azure, with virtualisation, automation, and security at the heart of every decision.You'll have the freedom to introduce new tools, refine processes, and drive technical standards, while still keeping your hands on the kit. There are a couple of IT Technicians doing More ❯
threats to organizations growing, and breach notices in the news every day, our market is growing exponentially. We need a Senior Solutions Engineer to help our customers improve their security posture. As an SE at DomainTools, you will have the opportunity to work with the largest companies in the world, to conceptualize and implement new and inventive ways to More ❯
threats to organizations growing, and breach notices in the news every day, our market is growing exponentially. We need a Senior Solutions Engineer to help our customers improve their security posture. As an SE at DomainTools, you will have the opportunity to work with the largest companies in the world, to conceptualize and implement new and inventive ways to More ❯
threats to organizations growing, and breach notices in the news every day, our market is growing exponentially. We need a Senior Solutions Engineer to help our customers improve their security posture. As an SE at DomainTools, you will have the opportunity to work with the largest companies in the world, to conceptualize and implement new and inventive ways to More ❯
threats to organizations growing, and breach notices in the news every day, our market is growing exponentially. We need a Senior Solutions Engineer to help our customers improve their security posture. As an SE at DomainTools, you will have the opportunity to work with the largest companies in the world, to conceptualize and implement new and inventive ways to More ❯
london (city of london), south east england, united kingdom
DomainTools
threats to organizations growing, and breach notices in the news every day, our market is growing exponentially. We need a Senior Solutions Engineer to help our customers improve their security posture. As an SE at DomainTools, you will have the opportunity to work with the largest companies in the world, to conceptualize and implement new and inventive ways to More ❯
West Midlands (County), Birmingham, United Kingdom
Sherborne Talent Solutions
e.g., Netskope, Zscaler, Cisco Umbrella). Manage and maintain secure network architectures including firewalls, VPNs, switching, routing, and load balancing (HAProxy). Monitor, analyse, and optimise network performance and security posture. Implement security policies aligned with ISO 27001, NIST, and CIS frameworks. Produce detailed documentation for configurations, processes, and troubleshooting. Collaborate with global cloud, security, and infrastructure More ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Bristol/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter you … will be responsible for proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITRE ATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and analytical … problem-solver who can work independently and as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, Threat Intelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding of More ❯
Peterborough, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Peterborough/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter you … will be responsible for proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITRE ATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and analytical … problem-solver who can work independently and as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, Threat Intelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding of More ❯
and a group personal pension plan of an additional 5% of your base salary paid by us monthly to save for your future. Your Role And Responsibilities As a Security Consultant specializing in Identity & Access Management (IAM), you will help organizations secure and streamline the entire identity lifecycle. You'll design and implement solutions using leading IAM platforms to … and governance of identities across cloud, enterprise, OT, and IoT environments. This is a highly technical, client-facing role that combines deep IAM expertise with the ability to translate security requirements into business-focused outcomes. Responsibilities Design, implement, and manage IAM solutions using platforms such as Okta, Azure AD, Ping Identity, Saviynt, or SailPoint. Support the full IAM lifecycle … IAM-related compliance and governance requirements using frameworks such as ISO, NIST, and Zero Trust architectures. Collaborate with client stakeholders to define IAM strategies aligned to business objectives and security standards. Contribute to the secure integration of cloud, enterprise IT, OT, and IoT identities. Recommend and implement IAM tooling enhancements to improve efficiency, scalability, and security posture. Preferred More ❯
and configuration of Identity Governance and Administration technologies such as SailPoint is preferred. The ideal candidate will contribute to the design, implementation, and maintenance of the identity platforms, enhancing securityposture across the environment. * Initially the focus will be on performing immediate remediation activities in Active Directory and working with our delivery partner to safely update the environment More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Stackstudio Digital Ltd
Lead client engagements from kickoff through to scoping, penetration testing, and reporting, ensuring delivery within agreed scope and deadlines. Perform comprehensive penetration testing across networks, web applications, APIs, cloud security, thick client applications, wireless, social engineering, and physical environments. Execute red team assessments to highlight gaps impacting organizational security postures. Identify and exploit security vulnerabilities in a … wide array of systems and scenarios. Conduct in-depth analysis of penetration testing results and create detailed reports with findings, exploitation procedures, risks, and actionable recommendations. Communicate complex technical security concepts to both technical and non-technical audiences, including executive stakeholders. Perform technical quality reviews and engage in direct technical conversations with clients. Utilize tools such as BurpSuite, Nessus … to deliver high-quality software solutions . Desirable: Bachelor's degree in Computer Science, Cybersecurity, or a related field (Master's preferred). 8+ years of experience in information security, with a focus on technical cyber security. Minimum of 5 years' experience in a network/cloud security environment. Certifications such as CISSP, CCSP, OSCP, SANS or equivalent. More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Crimson
Head of IT Security Incident and Threat Management - Solihull Crimson and IMI have joined forces to build IMI's new security team, and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security and want to be part of a dynamic team that is shaping the future … of security within a successful global company, we want to hear from you! We are seeking a highly skilled and experienced Head of IT Security Incident and Threat Management to join our team. In this role, you will be responsible for leading the strategic efforts to safeguard the company's digital assets against potential threats and incidents. This … note this role is based on site for the first 3 months followed by a hybrid working arrangement. Key Responsibilities Develop and implement comprehensive incident response strategies to address security threats swiftly and effectively Lead the threat and intelligence program, ensuring timely detection and mitigation of cyber risks. Ensure compliance with relevant security standards and regulations. Conduct regular More ❯
London, England, United Kingdom Hybrid / WFH Options
Palo Alto Networks
employees, our mental and financial health resources, and our personalized learning opportunities - just to name a few! About Unit 42 Consulting Unit 42 Consulting is Palo Alto Networks' elite security advisory team. Our vision is to create a more secure digital world by delivering the highest quality incident response, risk management, and digital forensic services to clients of all … record of delivering mission-critical cybersecurity solutions, we work swiftly to provide effective incident response, attack readiness, and remediation plans, focusing on long-term support to enhance our clients’ security posture. Job Description Your Career Unit 42 is a dynamic, energetic, and highly collaborative organization within Palo Alto Networks. If you possess an entrepreneurial spirit, thrive in fast-paced … the compelling business value of Unit 42's offerings. Your efforts will directly contribute to increasing Unit 42's market share and strengthening our brand identity as the elite security advisory team Cross-Functional & Partner Collaboration: Collaborate seamlessly with internal stakeholders (Field Sales, Marketing, Sales Operations, etc.) and leverage strategic regional partners to maximize growth, expand reach, and ensure More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Castlefield Recruitment
and data are secure, compliant, and reliable, while supporting wider improvements across IT infrastructure and cyber security. Key Responsibilities Support the development and delivery of IT infrastructure and cyber security improvements. Lead on the secure deployment of systems and services across cloud and on-prem environments. Monitor, maintain, and enhance the organisation’s security posture. Respond to infrastructure … operations. Manage and maintain key infrastructure components including servers, networks, and cloud platforms. Deliver technical input into IT service management and improvement projects. Ensure systems are compliant with relevant security standards and best practices. Identify and mitigate risks through regular assessments and reviews. Drive continuous improvement in monitoring, automation, and performance optimisation. Essential Skills and Experience Strong background in … in enterprise or mid-sized environments. Solid experience with Microsoft technologies including Microsoft 365, Azure, and Active Directory. Good understanding of networks, servers, storage, and virtualisation. Knowledge of cyber security principles, tooling, and incident response. Ability to troubleshoot complex technical issues across systems and services. Comfortable working both independently and collaboratively across teams. Familiarity with IT service management frameworks More ❯