Entra, LAN, WAN, Internet access, security and hosted Exchange. * Take responsibility of issues, escalations and requests maintaining customer communication * Diagnose and resolve customer problems * Liaise with third party organisations * Management of customer technical documentation, providing reports to the client and the company The Person: Ideally you will have a background in 3rd line technical consultancy working for a Managed … 3rd Level IT support * Technical knowledge of Microsoft Windows Desktop, Office and Server environments * Excellent communication skills both written and verbal * Ability to diagnose and resolve problems * Good time management and prioritisation * Initiative and self-motivated * A professional working attitude * To learn and develop new product knowledge and skill sets * The ability to record and report with detailed technical … routers, switches, Wi-Fi, firewall) * Communications (VOIP, Leased Lines) * Dell/HP Server Hardware * Storage infrastructures SAN, NAS, DAS * Backup and DR technologies (experience of Veeam and Datto) * SharePoint management and support * IT Security including data loss prevention, encryption, EDR, MDR, Unified ThreatManagement, 2FA Education/Qualification: * Minimum of 5 GCSEs * 2 A Level passes or More ❯
Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Your core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … as a subject matter expert for the core components of the Defender XDR suite. Manage endpoint protection, detection, and response across our device fleet. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Utilize Microsoft Entra ID Protection to identify and respond to compromised More ❯
The department Covers Cybersecurity, Information Security, IT Audit, IT Risks, IT Controls,Access Management, Security Operation and Threat Management.This is a rolling fixed term contract, initially 6 months - on site. The Business administrator will play a key role in overseeing our Threat Intelligence Centreefforts and ensuring alignment with strategic planning objectives. You will beresponsible for the end … to-end management of major projects that enhance ourglobal cyber threat intelligence capabilities. This role requiresstrong project management expertise, a solid understanding of cybersecurityoperations, and the ability to effectively collaborate across global teams. Lead the end-to-endmanagement of the threat intelligence activities while ensuring alignment withour global cybersecurity strategy. Develop and maintaindetailed activity plans, timelines … Facilitatecommunication and coordination with global stakeholders across multiple regionsto ensure alignment of requirements and deliverables. Track activityprogress, manage risks, and implement risk mitigation strategies to ensuresuccessful outcomes. DriveStandardisation of threat intelligence protocols, tools, and governance acrossthe region. Partner withtechnology, compliance, and risk management teams to ensure compliance withregulatory and legal requirements in each jurisdiction such as GDPR &ISO27001 More ❯
The department Covers Cybersecurity, Information Security, IT Audit, IT Risks, IT Controls,Access Management, Security Operation and Threat Management. This is a rolling fixed term contract, initially 6 months - on site. The Business administrator will play a key role in overseeing our Threat Intelligence Centreefforts and ensuring alignment with strategic planning objectives. You will beresponsible for the … end-to-end management of major projects that enhance ourglobal cyber threat intelligence capabilities. This role requiresstrong project management expertise, a solid understanding of cybersecurityoperations, and the ability to effectively collaborate across global teams. Lead the end-to-endmanagement of the threat intelligence activities while ensuring alignment withour global cybersecurity strategy. Develop and maintaindetailed activity plans … Facilitatecommunication and coordination with global stakeholders across multiple regionsto ensure alignment of requirements and deliverables. Track activityprogress, manage risks, and implement risk mitigation strategies to ensuresuccessful outcomes. DriveStandardisation of threat intelligence protocols, tools, and governance acrossthe region. Partner withtechnology, compliance, and risk management teams to ensure compliance withregulatory and legal requirements in each jurisdiction such as GDPR &ISO27001 More ❯
deployments (Cisco Meraki or equivalent) in high-density/temporary environments Ability to build and manage secure VPN tunnels and site-to-site connections globally Knowledge of cybersecurity principles, threatmanagement, and network segmentation Experience with network monitoring tools (SolarWinds, PRTG, NetFlow) and scripting (Python, Ansible) is advantageous Strong problem-solving skills under pressure, especially during live events More ❯
deployments (Cisco Meraki or equivalent) in high-density/temporary environments Ability to build and manage secure VPN tunnels and site-to-site connections globally Knowledge of cybersecurity principles, threatmanagement, and network segmentation Experience with network monitoring tools (SolarWinds, PRTG, NetFlow) and scripting (Python, Ansible) is advantageous Strong problem-solving skills under pressure, especially during live events More ❯
Primary Details Time Type: Full time Worker Type: Employee Threat Intelligence Specialist London Permanent (Hybrid) At QBE, our purpose is to enable a more resilient future. We are an international insurer and reinsurer with a local presence in 27 countries. The Opportunity We’re excited to be hiring a Threat Intelligence Specialist to join our Advanced Threat … ll be part of a supportive team that thrives on teamwork and innovation, where your expertise will be valued as we work together to tackle the ever-evolving cyber threat landscape. We’re looking to welcome our new team member from early January 2026 , so if you’re ready to make an impact in the new year, we’d … love to hear from you! Your New Role Reporting to the Technical Threat Manager , you’llbe responsible for researching, analysing, and reporting on cyber threats targeting QBE’s global operations and technology environment. This role has a strong technical focus, centred on the collection, enrichment, automation, and analysis of adversary tactics, techniques, and procedures (TTPs) across the Unified Kill More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
Anson McCade
SOC Manager £75,000 - £85,000 + 15% bonus + £6k car allowance Warrington – Remote-first A leading global technology organisation is seeking a SOC Response & Threat Manager to lead their elite Tier 3 security team. As a SOC Response & Threat Manager, you will take ownership of complex security incidents, lead high-performing analysts, and shape the Cyber … Threat Intelligence capability. Working hands-on with cutting-edge tools, you'll orchestrate critical incidents while hunting sophisticated threat actors across enterprise environments. Key Experience: • Proven experience leading incident response operations and managing security analysts. • Deep expertise in digital forensics and incident response (DFIR). • Strong knowledge of threat hunting methodologies and adversary tactics. • Ability to make … 6k car allowance • Generous pension with double-matched contributions • 25 days holiday plus bank holidays • Private medical insurance and flexible benefits To hear more about the SOC Incident Response & Threat Hunting Manager opportunity, get in touch with Connor Smyth at Anson McCade on 020 7780 6706. More ❯
is looking for a technically strong Cyber Security Product Owner/Security Project Leader to lead the evolution of their Enterprise Security platforms — with a focus on Security Posture Management (SPM) and Secure Service Edge (SSE) solutions. In this role, you’ll own multiple cyber-security products end-to-end, driving change across software development, infrastructure, and service delivery. … need to have a strong technical security background, with experience of architecting and delivering complex enterprise security solutions, focused on infrastructure security, cloud security, and in particular Security Posture Management and Security Service Edge based solutions. You will work with architects and outsourced suppliers to ensure solutions are delivered as well as optimising current security solutions across the business. … You will be responsible for: Own and manage the product lifecycle for enterprise security platforms. Drive the enhancement of SPM tooling and SSE capabilities for better visibility, compliance, and threat management. Collaborate with engineers, architects, and service providers to deliver secure, high-quality outcomes using Scrum or Kanban. Oversee integrations, automation, and performance optimisation across complex environments. Prioritise and More ❯