role, you will be at the forefront of our efforts to protect and defend against malicious cyber-attacks. Our modern, proactive operational Cyber Security team is dedicated to providing: Threat Hunting: Actively seek out potential threats before they can cause harm. This involves continuous monitoring and analysis of network traffic, system logs, and other data sources to identify unusual … protect against malicious content. Configure and maintain web and email filtering solutions to block phishing attempts, malware, and other threats. EDR and XDR Technologies: Administer and respond to Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) technologies to swiftly mitigate threats. Monitor alerts, investigate incidents, and take appropriate actions to contain and remediate threats. Security … and Statutory and Regulatory obligations. SIEM Management: Manage, monitor, and respond to security incidents and events using the Council's Security Incident and Event Monitoring (SIEM) platform. Ensure timely detection, analysis, and response to security incidents to minimise impact and support recovery efforts. As part of our team, the successful candidate will play a crucial role in ensuring the More ❯
The Role: We are looking for a highly skilled Senior Information Security Engineer with deep expertise in security tooling across both on-premise and cloud environments. You will lead threatdetection, incident response, and security architecture efforts within a hybrid environment. This is a highly technical engineering role, where you'll be hands-on developing and maintaining our … advanced security configurations across the Microsoft Defender suite (Cloud, Endpoint and Identity), Microsoft Sentinel, Purview and Azure infrastructure (including RBAC, PIM, NSGs and identity protections). Lead security incident detection, investigation, and response activities alongside the SOC. Lead the implementation and tuning of Microsoft Sentinel: build KQL queries, implement custom rules, conduct threat hunting, workbooks, design and automate … network architectures including segmentation, access control, and perimeter defence. Collaborate with other teams to ensure compliance with internal security policies and external regulations (e.g., ISO 27001, NIST, GDPR). Threat Intelligence - analyse potential threats, identify vulnerabilities, and implement measures to mitigate risks. Conduct vulnerability scans, validate findings and use a risk-based approach to track and manage remediation. Stay More ❯
Skelmersdale, Lancashire, North West, United Kingdom Hybrid / WFH Options
Police Digital Services
national programme delivery. The National Management Centre will provide visibility and control of information risks for Policing. It will support the 24x7x365 nature of the police operations, providing a threatdetection and response capability for digital services before, during and after cyber attacks, enabling stakeholders to understand and proactively manage risk across the technology estate at both the More ❯
Company Description I am working closely with a Cyber Security and IT services provider that operates on a global scale, offering a wide range of services, including testing, threatdetection, risk management, and network security. As part of the gaming industry, they offer exciting positions and never-ending learning opportunities. Standing out because of their extensive expertise, this More ❯