Head of IT Security Incident and ThreatManagement – Solihull Crimson and IMI have joined forces to build IMI's new security team, and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security and want to be part of a dynamic team that is shaping the future of … security within a successful global company, we want to hear from you! We are seeking a highly skilled and experienced Head of IT Security Incident and ThreatManagement to join our team. In this role, you will be responsible for leading the strategic efforts to safeguard the company’s digital assets against potential threats and incidents. This role … requires a seasoned professional with a deep understanding of cybersecurity, incident response an threatmanagement within a FTSE 100 environment. The salary on offer for this position is between £90,000 and £110,000 per annum plus benefits. Please note this role requires you to be on site for the first 3 months full time, there is a More ❯
Head of IT Security Incident and ThreatManagement – Solihull Crimson and IMI have joined forces to build IMI's new security team, and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security and want to be part of a dynamic team that is shaping the future of … security within a successful global company, we want to hear from you! We are seeking a highly skilled and experienced Head of IT Security Incident and ThreatManagement to join our team. In this role, you will be responsible for leading the strategic efforts to safeguard the company’s digital assets against potential threats and incidents. This role … requires a seasoned professional with a deep understanding of cybersecurity, incident response an threatmanagement within a FTSE 100 environment. The salary on offer for this position is between £90,000 and £110,000 per annum plus benefits. Please note this role requires you to be on site for the first 3 months full time, there is a More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Crimson
Head of IT Security Incident and ThreatManagement - Solihull Crimson and IMI have joined forces to build IMI's new security team, and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security and want to be part of a dynamic team that is shaping the future of … security within a successful global company, we want to hear from you! We are seeking a highly skilled and experienced Head of IT Security Incident and ThreatManagement to join our team. In this role, you will be responsible for leading the strategic efforts to safeguard the company's digital assets against potential threats and incidents. This role … requires a seasoned professional with a deep understanding of cybersecurity, incident response an threatmanagement within a FTSE 100 environment. The salary on offer for this position is between £90,000 and £110,000 per annum plus benefits. Please note this role is based on site for the first 3 months followed by a hybrid working arrangement. Key More ❯
a team at the heart of the global economy! The Department for International Trade (DIT) and Inspire People are partnering together to bring you an exciting opportunity for a Threat and Vulnerability Manager to protect DIT and the wider UK government from cyber threats in a fast paced and exciting role, responsible for the Vulnerability Management and Threat … wider UK government from cyber threats in a fast paced and exciting role. Reporting to the Head of Cyber Security Operations, you will manage and be responsible for the Threat and Vulnerability Management function within the SOC, by providing leadership on identification and improvement opportunities, and ensuring service owners are aware of weaknesses in their security posture and … day-to-day role will involve the need to: Working with the Security Leadership team to develop a strategic road map for an effective vulnerability detection, assessment, remediation, and threat intelligence program. Line management of the threat and vulnerability management team. Building sustainable relationships to champion the adoption of vulnerability and threatmanagement, compliance More ❯
Head of IT Security Incident and ThreatManagement Package to £117k DOE + 15% Bonus + Benefits Based Birmingham This is an exciting opportunity to take a strategic leadership role at the forefront of cybersecurity. As Head of IT Security Incident and ThreatManagement, you will shape and lead the organization s global response to cyber … threats ensuring they stay one step ahead of emerging risks. You will have the scope to define and deliver a world-class threat intelligence and incident response strategy, working with innovative cutting-edge tools, partners, and experts. The successful candidate will lead and develop a talented in-house team, while managing the external Security Operations Centre (SOC) to ensure … proactive defence and rapid response to incidents. Key Responsibilities Develop and execute incident response and threatmanagement strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust security More ❯
Birmingham, Chelmsley Wood, West Midlands (County), United Kingdom
SSR General & Management
Head of IT Security Incident and ThreatManagement Package to £117k DOE + 15% Bonus + Benefits Based Birmingham This is an exciting opportunity to take a strategic leadership role at the forefront of cybersecurity. As Head of IT Security Incident and ThreatManagement, you will shape and lead the organization’s global response to cyber … threats — ensuring they stay one step ahead of emerging risks. You will have the scope to define and deliver a world-class threat intelligence and incident response strategy, working with innovative cutting-edge tools, partners, and experts. The successful candidate will lead and develop a talented in-house team, while managing the external Security Operations Centre (SOC) to ensure … proactive defence and rapid response to incidents. Key Responsibilities Develop and execute incident response and threatmanagement strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust security More ❯
but a deep local presence, Colt is big enough to deliver and small enough to care. Why we need this role? We are seeking a dynamic and motivated Vulnerability Management Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. The Vulnerability Management Lead will … security compliance status. The role requires collaboration with various partners to ensure that vulnerability assessments and emerging threats are prioritized and advanced. Additionally, the successful candidate will work with management to continuously evolve the vulnerability management program. What you will do: You will be responsible for supporting CSOC in order to achieve the below: The development and implementation … of the Colt Vulnerability Management Framework. Enhancing the scope and efficiency of current vulnerability scanning and management tools and integration between them. Design and manage the periodic penetration testing exercise. Collaborating with identified stakeholders to provide specialist guidance and support, ensuring effective vulnerability identification, prioritisation and remediation activity definition. Perform Vulnerability scans using Vulnerability Management tool Responsible More ❯
of planning and testing for complex technology, information security audits and high-level reviews, including designing test strategies, audit test papers and drafting of audit findings. Validation to confirm management's remediation of audit and regulatory issues. Management and tracking of businesses remediation activities. Actively contributing to the ongoing improvement of audit practices and methodology. Proactively maintain knowledge … GTAGs. Working experience with regulatory standards/requirements (US, UK) ie, GDPR, BCBS 239, FFIEC 101, 3402, CHAP. Working experience and/or knowledge of Security domains including Access management, Threatmanagement, Incident response and recovery, Data protection, Vulnerability management, Monitoring and logging, Physical security, and Security risk management and governance. Working experience and/… knowledge of data analytics/predictive analytics, data governance. Understand policy/directives, and ability to assess risks across all types of IT systems and operations. Audit/Project Management Certifications (desirable) - CMIIA (UK), CIA (US), CISA, CGEIT, CISSP, CISM, CompTIA, SANS, ISC2, Prince2, Agile etc. More ❯
The departmentCovers Cybersecurity, Information Security, IT Audit, IT Risks, IT Controls,Access Management, Security Operation, ThreatManagement and the portfolio forChange for all these areas.This is a rolling fixed term contract, initially 6 months. You will play a key role in overseeing our Threat Intelligence Centreefforts and ensuring alignment with strategic planning objectives. You will beresponsible … for the end-to-end management of major projects that enhance ourglobal cyber threat intelligence capabilities. This role requiresstrong project management expertise, a solid understanding of cybersecurityoperations, and the ability to effectively collaborate across global teams. Lead the end-to-endmanagement of the threat intelligence activities while ensuring alignment withour global cybersecurity strategy. Develop and maintaindetailed … Facilitatecommunication and coordination with global stakeholders across multiple regionsto ensure alignment of requirements and deliverables. Track activityprogress, manage risks, and implement risk mitigation strategies to ensuresuccessful outcomes. DriveStandardisation of threat intelligence protocols, tools, and governance acrossthe region. Partner withtechnology, compliance, and risk management teams to ensure compliance withregulatory and legal requirements in each jurisdiction such as GDPR &ISO27001 More ❯
The departmentCovers Cybersecurity, Information Security, IT Audit, IT Risks, IT Controls,Access Management, Security Operation, ThreatManagement and the portfolio forChange for all these areas. This is a rolling fixed term contract, initially 6 months. You will play a key role in overseeing our Threat Intelligence Centreefforts and ensuring alignment with strategic planning objectives. You will … beresponsible for the end-to-end management of major projects that enhance ourglobal cyber threat intelligence capabilities. This role requiresstrong project management expertise, a solid understanding of cybersecurityoperations, and the ability to effectively collaborate across global teams. Lead the end-to-endmanagement of the threat intelligence activities while ensuring alignment withour global cybersecurity strategy. Develop and … Facilitatecommunication and coordination with global stakeholders across multiple regionsto ensure alignment of requirements and deliverables. Track activityprogress, manage risks, and implement risk mitigation strategies to ensuresuccessful outcomes. DriveStandardisation of threat intelligence protocols, tools, and governance acrossthe region. Partner withtechnology, compliance, and risk management teams to ensure compliance withregulatory and legal requirements in each jurisdiction such as GDPR &ISO27001 More ❯
monitoring using various SIEM Tools (Qradar, Sentinel & LogRhythm). Some of the responsibilities that come along with this role include the following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting Rule tuning and continual service improvement The role involves working alongside other team members including SOC engineers and Service Managers. Skills required: Microsoft Certified … Certification (SC200) is a mandatory requirement for role fulfilment Experience working with SIEM technologies and security tooling An understanding of IT Infrastructure and Networking An understanding of vulnerability and threatmanagement An understanding of the incident response lifecycle T he ability to work in a close team and independently The ability to be adaptable to a high pace … changeable workload An interest in security and threatmanagement Benefits Include: Contributory pension scheme Employee Assistance Program Medical and Dental cover 22 days holiday + bank holidays Maternity Pay/Shared Parental leave and paternity leave Sick pay Suitable Candidates should submit CVs in the first instance. More ❯
You will ensure robust, efficient and globally coordinated security operations that protect the organisation's people, systems, and data. This includes direct ownership of security controls, security testing, vendor management, vulnerability and threatmanagement, and incident response. You will work daily with the Group CISO to support consistent, high-assurance security practices across all regions, in-line … with regional regulation and to support the management of cyber incidents. It is essential the individual who will fill this role has prior management experience, has supported building security teams previously and has knowledge around their responsibility at this level to report incidents and security concerns within regulatory timelines and standards. About the role Within this role, you … will have been supporting the Group CISO by managing the security team and programmes of work in your responsibility area. You will be responsible for the management of any global Cyber Incidents by supporting the CISO team. Additionally, you will be: Working collaboratively with the SOC to ensure 24/7 visibility and threat detection across global environments More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
MFK Recruitment
and secure core client infrastructure and cloud environments. Ensure centralised security, monitoring, and incident response platforms operate effectively. You will collaborate closely with our Service Desk, Projects and Account Management teams to maintain high standards of service, document solutions and mentor junior engineers in line with cybersecurity best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. … attacks, phishing attempts, and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and … networks, in alignment with best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. Lead and coordinate incident response efforts, including root cause analysis, threat containment and post-incident reporting for clients. Collaborate with the Project and Service Desk teams to embed security into deployments, migrations, upgrades, and automation workflows, ensuring systems remain secure by design. Maintain More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
and Team Manager, M365, Hybrid Digital Workplace Technology Consultant required for a leading financial serviced company based in London. You will manage essential technologies, including Desktop, M365, Azure, identity management, email hygiene, SharePoint storage, MS Teams/telephony services and overall Cloud infrastructure security. Hybrid working - 2 days per week on site. Limited company engagement is permitted; IR35 determination … AV environments ITIL Able to technically manage a team of engineers and manage own and others workload M365 Technical expertise - Office/OneDrive/Teams/Sharepoint integration M365 management portal, conditional access and licence management Active Directory and Azure AD (Entra) management Skills working with cloud infrastructure (AWS or Azure) Understanding of Data networking Knowledge of … firewall requirements Windows 11 Laptop management, SCCM, Intune, Autopilot Provision of email services, and email routing technologies (eg M365 Exchange Online/Hybrid Exchange) Mail protection e.g. Mimecast Security and Threatmanagement in an enterprise environment (eg Defender for Endpoint, Vulnerability reporting and remediation) Reasonable Adjustments: Respect and equality are core values to us. We are proud More ❯
Infrastructure Security Design & Implementation: Develop, implement, and maintain robust security architectures and controls for cloud and on-premises infrastructures, supporting business growth while ensuring security best practices are followed. ThreatManagement: Proactively monitor and respond to security incidents, vulnerabilities, and threats, applying advanced techniques to safeguard systems from cyber-attacks. System Hardening & Configuration: Ensure that all infrastructure systems … relevant data protection laws (e.g., GDPR), security frameworks, and internal policies, contributing to audits and risk assessments where required. Automation & Optimisation: Identify opportunities for automation within security operations, from threat detection to patch management, to drive efficiency and scalability. Continuous Improvement: Stay up to date with emerging security trends, vulnerabilities, and technologies, and continually improve security processes and … policies to adapt to a dynamic threat landscape. Who are you: You will thrive on solving complex problems and have a natural curiosity for identifying vulnerabilities before they become threats. The ideal candidate will possess strong analytical skills, allowing them to think critically and anticipate challenges in rapidly changing environments. Detail-oriented and methodical, you will leave no stone More ❯
Microsoft Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Work with internal IT and other security teams to ensure the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk More ❯
Microsoft Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Work with internal IT and other security teams to ensure the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk More ❯
Microsoft Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Work with internal IT and other security teams to ensure the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk More ❯
Microsoft Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Work with internal IT and other security teams to ensure the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk More ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
Microsoft Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Work with internal IT and other security teams to ensure the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk More ❯
Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Your core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Utilize Microsoft Entra ID Protection to identify and respond to compromised More ❯
Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Your core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Utilize Microsoft Entra ID Protection to identify and respond to compromised More ❯
Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Your core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Utilize Microsoft Entra ID Protection to identify and respond to compromised More ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Your core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Utilize Microsoft Entra ID Protection to identify and respond to compromised More ❯
Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Your core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Utilize Microsoft Entra ID Protection to identify and respond to compromised More ❯