Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure … with security embedded at every stage. Cloud Security Implementation: Leverage Azure Security Centre, Microsoft Defender for Cloud, and Microsoft Sentinel for advanced security monitoring. Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion … Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured action More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure … with security embedded at every stage. Cloud Security Implementation: Leverage Azure Security Centre, Microsoft Defender for Cloud, and Microsoft Sentinel for advanced security monitoring. Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion … Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured action More ❯
Employment Type: Contract, Work From Home
Rate: From £500 to £700 per day (direct contract with the client)
a leading provider of advanced cybersecurity services, safeguarding organizations against evolving digital threats. We are seeking an Associate Director who will spearhead the Forensics, ThreatIntelligence and Incident Response practice area for EMEA. This pivotal role involves leading a team of elite cybersecurity consultants, overseeing a substantial revenue … is imperative for you to remain abreast of advancements in technology and evolving market trends, particularly those pertaining to Data security and privacy, Artificial Intelligence, Zero Trust, and Secure Access Service Edge (SASE), Cyber resilience and risk quantification as well as market regulatory needs and compliance. Ability to understand … enhance the field's knowledge of cyber operations, evolving threats, regulations, and relevant case studies. Managing the business and P&L of the Verizon Threat and Advisory Practice for EMEA. You'll Need to have: Experience working as a Cyber Security executive at a leading Cyber Security company or More ❯
for engineering solutions to complex security challenges, and recognize and fill gaps in capabilities. Above all, you should be passionate about information security, the threat landscape and security automation and tooling. BASIC QUALIFICATIONS - BS degree in Computer Science, Computer Engineering, Electrical Engineering or equivalent related field - 3 years or … security incidents. - Proficiency with one high-level programming or scripting language PREFERRED QUALIFICATIONS - 3+ years experience working in security response, security automation tooling, or threatintelligence - Familiarity with malware analysis, forensics, SOAR, SIEM platforms, and a variety of Operating Systems (MS Windows, Linux, MacOS) - Experience with Amazon Web More ❯
for engineering solutions to complex security challenges, and recognize and fill gaps in capabilities. Above all, you should be passionate about information security, the threat landscape and security automation and tooling. BASIC QUALIFICATIONS BS degree in Computer Science, Computer Engineering, Electrical Engineering or equivalent related field 3 years or … security incidents. Proficiency with one high-level programming or scripting language PREFERRED QUALIFICATIONS 3+ years experience working in security response, security automation tooling, or threatintelligence Familiarity with malware analysis, forensics, SOAR, SIEM platforms, and a variety of Operating Systems (MS Windows, Linux, MacOS) Experience with Amazon Web More ❯
Please do not waste anytime and apply right now! Skillset: ** Cyber Essentials ** ISO 27001/27002 ** Networking Security ** O365 Security Solutions ** Security Testing Principles ** ThreatIntelligence Analysis Desirable: ** Disaster Recovery ** Security Incident Response ** O365 Environments In Technology Group Ltd is acting as an Employment Agency in relation to More ❯
London, England, United Kingdom Hybrid / WFH Options
Entasis Partners
collaborating with global teams to maintain and improve cyber resilience. Key Responsibilities: Manage and optimize key security tools, including Defender, CrowdStrike, and Zscaler Lead threatintelligence activities, IT controls, and performance dashboards Develop and run phishing simulations & cyber security awareness programs Collaborate with global teams to ensure consistent More ❯
7+ years in SOC leadership roles. Proven experience designing and operating Security Operations Centers. Hands-on experience with SIEM platforms Expertise implementing SOAR and ThreatIntelligence solutions. More ❯
7+ years in SOC leadership roles. Proven experience designing and operating Security Operations Centers. Hands-on experience with SIEM platforms Expertise implementing SOAR and ThreatIntelligence solutions. More ❯
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate More ❯
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response, as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate More ❯
strong understanding of managed security services. Technical Expertise: Hands-on experience with security technologies such as SIEM, EDR, SOAR, vulnerability and exposure management tooling, threatintelligence, and data security solutions. Pre-Sales & Consulting Experience: Proven experience in a pre-sales, solution consulting, or technical advisory role within cyber More ❯
strong understanding of managed security services. Technical Expertise: Hands-on experience with security technologies such as SIEM, EDR, SOAR, vulnerability and exposure management tooling, threatintelligence, and data security solutions. Pre-Sales & Consulting Experience: Proven experience in a pre-sales, solution consulting, or technical advisory role within cyber More ❯
of Okta implementation—streamlining access, enforcing MFA, and reducing risk Design and establishment of a new Unified Security Operations Centre (SOC), integrating detection, response, threatintelligence, and automation Qualifications & Experience Proven experience (7+ years) in technical programme management, with a strong focus on IT/security transformation initiatives More ❯
of Okta implementation—streamlining access, enforcing MFA, and reducing risk Design and establishment of a new Unified Security Operations Centre (SOC), integrating detection, response, threatintelligence, and automation Qualifications & Experience Proven experience (7+ years) in technical programme management, with a strong focus on IT/security transformation initiatives More ❯
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate More ❯
metrics and monitoring/audits Network, VM & container image and system hardening, Cloud issues and misconfigurations Endpoint Security, Infrastructure Identity and Access Management, SIEM, Threatintelligence, common misconfigs (DNS, email, networking, etc.) Organising and performing penetration testing of our infrastructure, and collaborating with external parties on those tests. More ❯
of cybersecurity solution architecture and domain expertise, with a comprehensive grasp of strategic and operational industry dynamics. Specialized understanding of SOC architecture, SIEM technologies, ThreatIntelligence/Hunting, and proficiency in Endpoint & Cloud Security. Demonstrated success in partnering with IT and Security executives to devise and implement effective More ❯
and vulnerability management to protect critical systems. Design, implement, and maintain security architectures and frameworks aligned with government standards. Lead and support risk assessments, threat modelling, and incident response initiatives. Work closely with stakeholders to ensure compliance with NCSC and other relevant security policies. Develop and deliver security strategies … technical expertise in areas such as network security, endpoint security, cloud security, and secure system architecture. Experience in penetration testing, vulnerability management, and cyber threat intelligence. Solid knowledge of security technologies such as SIEM, IDS/IPS, firewalls, and endpoint detection and response (EDR). Strong understanding of risk More ❯
To apply direct for this role please visit Civil service Jobs and quote ref no. HMRC is the UKs tax, payments, and customs authority. Our vital purpose is to collect the money that pays for the UKs public services and More ❯
To apply direct for this role pleas visit civil service jobs and quote ref no. HMRC is the UKs tax, payments, and customs authority. Our vital purpose is to collect the money that pays for the UKs public services and More ❯
Management: Monitor, analyze, and respond to IT security incidents and threats. Maintain an incident management tracker and generate reports for review. Stay updated on threatintelligence and conduct periodic security audits. Documentation and Compliance: Prepare and update network diagrams and security documentation. Maintain a record of firewall policies … firewall configuration and management (e.g., Sophos). Hands-on experience with antivirus servers and endpoint security tools. Familiarity with IT security incident response and threat management processes. Solid understanding of network protocols, VLANs, and IP addressing. Excellent problem-solving skills and ability to work under pressure. More ❯
with background research and context. Collaborate with marketing to provide feedback on campaign performance and market signals. Stay up to date on cybersecurity trends, threatintelligence, and The clients products and value proposition. You’ll need: 1–2 years’ experience in a sales or business development role, ideally More ❯
with background research and context. Collaborate with marketing to provide feedback on campaign performance and market signals. Stay up to date on cybersecurity trends, threatintelligence, and The clients products and value proposition. You’ll need: 1–2 years’ experience in a sales or business development role, ideally More ❯
standards. The main measure of success is maintaining regulatory compliance and improving the technical and organisational resilience of UKPN concerning the ever-changing cyber threat landscape. People - work collaboratively in a team environment and with a range of internal and external people Suppliers - regular interaction with 3rd party service … Security Knowledge: An understanding of the principles and standards of cyber security, such as encryption, authentication, authorization, network security, application security, cloud security, and threat intelligence. Security Technologies: Proficient in using different security technologies, such as firewalls, end point protection, web protection, email protection, intrusion detection and prevention systems More ❯