reporting and the risk register Supporting on audits and bolstering the ISMS methodology for ISO27001 certifications Contributing towards security policy creation Assisting with cyber security awareness Completing security risk assessments accurately and in a timely manner Managing and engaging with internal and external stakeholders on security questionnaires Advising … on risk mitigation Advising on contemporary threats and cyber trends to enhance the organisation's security Completing all of the above in line with the organisation's risk strategy, appetite, and framework. What we're looking for: Practical knowledge of various information security and risk frameworks and standards … role won't see you utilising technical cyber security tools in your day-to-day, an understanding of technical cyber (threat, vulnerability, network security) is crucial, and prior practical experience is ideal. Excellent communication skills, ability to work at pace and deal with complex works More ❯
leicester, midlands, United Kingdom Hybrid / WFH Options
Cloud Decisions
security previews, and frontline support. You'll work at the sharp end of cyber defence, directly contributing to investigations involving nation-state threat actors (including IR, CH, and NK based campaigns) while refining your craft across enterprise-scale log ingestion and customised Sentinel integration engineering that will … wide log onboarding into Microsoft Sentinel – deploying standard and custom connectors, Function Apps, and parsers to build tailored SIEM solutions that drive real-world threat detection and response. Log ingestion at scale across numerous hybrid and multi-cloud environments Enhance custom Function Apps and ingestion pipelines Parse, normalise, and … optimise log telemetry to ensure precision and cost control Partner with IR teams on real attacks – tuning rules against live threat actor activity Sync closely with Microsoft teams to build cutting-edge detection capabilities Contribute to internal knowledge base and help shape engineering standards What's needed? Experience building More ❯
Element has an opportunity for a Senior Cyber Engineer to become part of our growing Cyber Engineering Services. A successful candidate for the Cyber Engineer role will possess a solid foundation as a security engineer, responsible for ensuring the security of complex global environments … expertise in application, cloud, and infrastructure domains. In this hybrid role you will design and implement highly secure technical solutions to protect against cyberthreats and potential cyber-attacks. The role will be focused on detection engineering within the strategic Element security tooling. Core Responsibilities Assist … in the design and implementation of technical solutions and security toolsets to address security vulnerabilities, mitigate cyberthreats, and automate tasks. Contribute to the planning, implementation, and management of the security operations tooling roadmap. Collaborate on the engineering, implementation, management, monitoring, and upgrades of cyber security More ❯
Coalville, Leicestershire, East Midlands, United Kingdom
Ibstock Brick
Build Your Cyber Career with Ibstock PLC - Cyber Security Engineer Apprentice Location: Ibstock Plc Head Office -20 minute drive from Hinckley and Shepshed - 25 minute drive from Loughborough - 30 minute drive from Leicester Looking to kick-start a career in Cyber Security?Join Ibstock … Plc as a Cyber Security Engineer Apprentice and take your first steps into the exciting world of IT security. This hands-on programme will equip you with a Level 4 Cyber Security Engineer apprenticeship through a leading external training provider, while you gain real-world experience … in a FTSE 250 manufacturing business. What We Offer: A starting salary of £23,000 per annum. A nationally recognised Level 4 Cyber Security Apprenticeship. More information here: Support from experienced IT professionals and industry mentors. A chance to join a dynamic Tech Team supporting business-critical cyberMore ❯
UK and Europe. As part of the Enterprise Security & Fraud (ES&F) organization, you will be at the forefront of protecting clients from cyberthreats while building and evolving critical identity and access management services. Key Responsibilities Design, develop, and enhance modern cloud-native cybersecurity services, spanning database More ❯
to hardware and software, including OOH maintenance Participate in a rota to provide emergency technical support Keep informed on the latest technologies and cyberthreats to strengthen network defences Skills will include: Certifications such as CCNA, plus advanced certifications like CCNP or CCDP Deep understanding of routing protocols More ❯
leicester, midlands, United Kingdom Hybrid / WFH Options
Context Recruitment
and strengthen security operations at scale. A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation … for enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security analysts, engineers … contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security More ❯
experienced analysts, contributing to the delivery of sophisticated intelligence products. What You’ll Be Doing Lead or support digital investigations across a variety of threat areas. Use OSINT techniques to collect and assess data from public sources. Craft high-quality analytical reports, combining text and visuals to explain technical … findings. Analyseth network traffic and test investigative tools. Engage in online community monitoring related to data leaks or cyber threats. Evaluate new data sources and integrate them into existing workflows. Collaborate with colleagues to develop and refine data-driven methodologies. Present findings and strategic recommendations to clients and More ❯
both staff and students. You’ll lead a team of IT professionals and collaborate across departments to develop and implement IT strategy, strengthen cyber resilience, and ensure the delivery of exceptional IT services. This role reports directly to the executive team and plays a key part in digital … policies, regular training, and breach response readiness. Act as a senior escalation point for incidents, lead post-incident reviews, and coordinate responses to cyber threats. Manage supplier relationships, licensing agreements, and IT budgets with a focus on value, performance, and accountability. Collaborate closely with peers in creative technology … in infrastructure planning, security strategy, and enterprise-level IT operations. Adept in managing IT budgets, procurement processes, and strategic partnerships. Deep understanding of cyber security risks, mitigation strategies, and compliance requirements. Excellent communicator and collaborator who thrives in a cross-functional leadership environment. A relevant degree or equivalent More ❯
Kingdom + Travel to Clients on Request The Client Success Team is composed of Client Success Managers (CSMs) who are well versed in cyber security, and whose purpose is to assist customers in getting the most value out of BlueVoyant platform and solutions. BlueVoyant’s renowned cybersecurity SaaS … offerings, benefits, SOPs and deliverables without hesitation Advanced understanding of assigned BV Specific Product sets Qualifications: 5+ years of client services, IT and cyber security background Extensive experience managing large, complex accounts with multiple LOB’s and stakeholders Able to operate independently with minimal support from leadership Able … and top national firms Security +, Network +, CISSP, and other relevant certifications preferred About BlueVoyant At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics, and technology, coupled with deep expertise, works as More ❯
leicester, midlands, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
Great opportunity to join a ground breaking start up their cutting edge technology empowers organisations worldwide to uncover, investigate and respond to cyberthreats with unparalleled precision and speed. They are on a journey to redefine the future of Digital Forensics and Incident Response. The product Automates Cyber … Looking For: Proven track record of success in enterprise sales, with a minimum of 5 years of experience in enterprise software sales, ideally cyber security. Experience using Command of the Message and MEDDICC is required. Exceptional communication, demonstration, and interpersonal skills, with the ability to engage and influence … a results-oriented mindset and the ability to thrive in a fast-paced, dynamic environment. Solid understanding of enterprise software solutions, technology trends, cyber security and industry best practices. Proficiency in CRM software (e.g. HubSpot) and other sales productivity tools. Willingness to travel as needed to meet with More ❯