key member of our Cyber Security Incident Response Team (CSIRT), responsible for identifying, analyzing, and mitigating cyber threats. This role requires a proactive approach to threat hunting, cyberthreat intelligence, and incident response, ensuring the protection of BCG's global network. You will work closely with the Security Operations Center (SOC), Security … posture and minimizing business risks associated with cyber threats. Act as a Tier 3 Incident Responder, supporting complex investigations into cyber security incidents. Conduct proactive threat hunting to detect and neutralize emerging threats. Monitor and analyze logs via SIEM, EDR, and network traffic analysis tools for potential attack indicators. Investigate security incidents, including malware infections … phishing attacks, and unauthorized access attempts. Develop and enhance incident response playbooks, ensuring alignment with evolving threats. Analyze threat intelligence sources to identify new attack vectors and adversary tactics. Provide forensic analysis and malware reverse engineering to assess security incidents. Collaborate with IT, Risk, and Compliance teams to ensure regulatory compliance and security best practices. Produce timely reports on More ❯
re a leading Managed Service Provider (MSP) delivering cutting-edge IT and security solutions to businesses worldwide. Our mission is to protect digital assets through proactive security measures, advanced threat intelligence, and world-class support. Join a dynamic, innovation-driven team where your skills make a real impact. Your Mission: As a Cyber Security Engineer, you’ll … take charge of designing and implementing advanced security systems, supporting clients in improving their security posture, and staying ahead of emerging cyber threats. You’ll play a crucial role in delivering technical excellence, leading customer engagements, and mentoring team members. Key Responsibilities: Design, implement, and manage enterprise-grade security solutions (firewalls, SIEM, IDS/IPS, endpoint protection, cloud … on experience with SIEM, EDR, VPNs, firewalls, and cloud platforms (AWS, Azure, GCP). Expertise in Microsoft Sentinel, Cisco Splunk or Palo Alto QRadar, and KQL. Proven skills in threat detection, incident response, and forensic analysis. Knowledge of SOAR tools (especially Palo Alto XSOAR or similar). Familiarity with compliance standards: ISO 27001, NIST, CIS, GDPR, HIPAA. Bonus: scripting More ❯
technical acumen and an ability to lead incident response and effectively manage risk is essential. Key Responsibilities Security Strategy & Governance Act as the company's lead advisor on cyber and information security, ensuring risks are identified, prioritised, and addressed with appropriate technical and procedural controls. Shape and embed practical security governance aligned with real-world operational needs - integrating … the Executive and project leadership to ensure security is represented in commercial proposals, assurance processes, and delivery planning. Maintain strong relationships with relevant external stakeholders (e.g. NCSC, NPSA), monitoring threat intelligence and security guidance. Operational Security & Risk Management Lead the design, implementation, and monitoring of controls across endpoint security, identity and access management, and cloud infrastructure (e.g., AWS). … -attacks and disruptions. Support secure architecture and infrastructure reviews across projects and services. Risk Management & Security Engineering Conduct and lead structured technical and procedural risk assessments, including threat modelling and security reviews for new projects or systems. Collaborate with IT and engineering teams to identify, address, and continuously improve security control effectiveness. Oversee the management of external More ❯
protection across cloud platforms. Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO 27001, NIST … requirements (GDPR, SOC2), and risk management best practices. Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and Privileged Access Management (PAM). Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyberthreats using SIEM, endpoint security, and vulnerability management tools. Networking & Infrastructure Security: Understanding of firewalls, VPNs More ❯
Risk Committee (ARC). Your Mission: Set Vision and Strategy: Define and own the Group-wide cyber security strategy aligned with business ambition, ESG goals, and evolving threat landscapes. Lead from the Front: Inspire, build, and mentor a high-performing global cyber team-across defensive security, threat intelligence, and cyber engineering. Board … with authority and clarity. Drive Transformation: Lead security by design across cloud, data, AI, IoT, and operational technology landscapes-embedding security in every initiative. Stay Ahead of Threats: Oversee threat detection, incident response, and resilience programs with precision and global coordination. Shape Culture: Champion a cyber-aware culture across 100,000+ employees, embedding secure behaviours in the … a bias for action, pragmatism, and delivery. scale. Gravitas and credibility with boards, senior management, regulators, auditors, and external stakeholders. Hands-on understanding of security architecture, cloud, identity and threat intelligence. Resilience under pressure - the ability to make calm, fast decisions in high-stakes situations. Specifically, the role covers: Leadership: Industry leading vision and communication to the business on More ❯
protection across cloud platforms. Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO 27001, NIST … requirements (GDPR, SOC2), and risk management best practices. Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and Privileged Access Management (PAM). Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyberthreats using SIEM, endpoint security, and vulnerability management tools. Networking & Infrastructure Security: Understanding of firewalls, VPNs More ❯
protection across cloud platforms. • Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO 27001, NIST … requirements (GDPR, SOC2), and risk management best practices. • Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and Privileged Access Management (PAM). • Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyberthreats using SIEM, endpoint security, and vulnerability management tools. • Networking & Infrastructure Security: Understanding of firewalls, VPNs More ❯
Management (SIEM) platforms and the configuration of our wider security tools are key. We are also seeking candidates with experience leveraging AI to enhance productivity and effectiveness. Key Deliverables: Threat Detection & Incident Response Leading investigation and analysis of security alerts to identify and promptly respond to security events. Leading the response to major cyber security incidents, collaborating … improving our security operations processes, escalation paths and playbooks. Leveraging AI capabilities to enhance the effectiveness of our security capabilities and your own productivity in the role. Consuming relevant threat intelligence to drive proactive action within the Cyber Security and wider IT environment. Indicative Performance Measures Mean time for business recovery to C1 (Highest criticality) level security … common response frameworks. Experience within the gaming industry providing security operations support to game releases, game infrastructure monitoring and live game operations. Strong appreciation of the cyberthreat landscape and attacker tactics, techniques and procedures. Experience developing operational processes and playbooks. Desirable Interpersonal Skills: Ability to remain composed and effective during high-pressure situations. Clear focus on More ❯
protection across cloud platforms. Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO 27001, NIST … requirements (GDPR, SOC2), and risk management best practices. Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and Privileged Access Management (PAM). Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyberthreats using SIEM, endpoint security, and vulnerability management tools. Networking & Infrastructure Security: Understanding of firewalls, VPNs More ❯
operations efforts alongside Incident Response Managers. They will have intimate knowledge of Varonis and must be dedicated to a career in detecting and responding to insider threats and cyber-attacks. They will develop knowledge of the security ecosystem (e.g., SIEM, SOAR, ITSM, EDR, IPS/IDS, Active Directory, Firewall, DNS, etc.) and will develop additional expertise in Varonis … operations, coordinating efforts across multiple regions and departments. Additionally, they will educate customers and other Varonis employees on Varonis capabilities, cyberthreats, and security trends. Responsibilities Deliver Threat Detection & Response initiatives to Varonis customers. Consult with customers to ensure Varonis products are integrated into their Security Program. Integrate Varonis products into the customers' security ecosystem and threat detection workflows. Monitor security threats and operational impact on Threat Detection and Response. Participate in Incident Response operations, assisting Incident Response Management across regions. Identify inhibitors of product value and communicate with leadership and product management. Continuously develop and expand security knowledge. Document, track, and manage work via SalesForce. Qualifications At least 1 year of experience as a More ❯
to work in the office 3 days per week. In this role of significant responsibility, you will operate at the cutting edge of technology, protecting the business from cyber threats. You will design, implement, and maintain security solutions that protect networks, systems, and data. You will identify vulnerabilities, harden systems, respond to threats, and ensure compliance with security … order to be suitable for this role you must have demonstrable hands-on expertise with monitoring and securing enterprise class technology estates. You will have proven experience with Cyber Security best practice including the NIST Cloud Security guidelines. You will support ISO 27001 compliance and have strong documentation skills. Experience in the Telco sector and knowledge of the … management, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threat analysis and act as a subject matter expert for mitigating cyber risks. This is an outstanding opportunity for an accomplished Information Security Engineer to join a market More ❯
An impressive multinational Telecoms business is looking for a Senior Cyber Security Engineer to join its team based in London. Please note, this role is hybrid so you will be required to work in the office 3 days per week. In this role of significant responsibility, you will operate at the cutting edge of technology, protecting the business … from cyber threats. You will design, implement, and maintain security solutions that monitor and protect networks, systems, and data. You will identify vulnerabilities, harden systems, respond to threats, and ensure compliance with security best practices and industry standards, including ISO27001. In order to be suitable for this role you must have demonstrable expertise with monitoring and securing enterprise … management, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threat analysis and act as a subject matter expert for mitigating cyber risks. This is an outstanding opportunity for an accomplished Cyber Security Engineer to join More ❯
London, England, United Kingdom Hybrid / WFH Options
Airbus
technical, hands-on role that will work with a variety of security tools and technologies protecting our whole enterprise. You will be responsible for managing our CyberThreat Intelligence (CTI) research and Threat Hunting activities, the entire lifecycle of our detection rules repository and SOC automation stack. You will be responsible for the technical evolution of … who live and breathe cyber security and to work for a company with great products and technologies around the globe. **HOW YOU WILL CONTRIBUTE TO THE TEAM** * **Threat Analysis - **Leverage the organization’s CTI provider as a strategic asset , not just a data source-integrating external intel with internal context to assess real impact and relevance. Conduct … depth analysis of cyberthreats (APT groups, malware campaigns, zero-days, etc.) and assess their relevance to Airbus operations, especially the aerospace and defense-related. Translate complex threat data into clear, actionable intelligence for technical and non-technical stakeholders. Produce regular and ad hoc threat intelligence reports , briefings, and dashboards tailored to specific business units or More ❯
Hybrid (London Hub) Does this sound like you? You're a proactive and detail-driven cyber security professional who thrives on staying ahead of threats and building resilient systems. Analytical by nature, you're always two steps ahead - translating complex risks into real-world solutions. Whether it's leading incident response, identifying vulnerabilities, or influencing strategy, you combine … shape a forward-thinking security culture across the business. Day-to-day you can expect to: Lead incident response for breaches, malware attacks, root cause analysis, and recovery Monitor threat feeds and correlate intelligence with tooling to identify emerging risks Oversee vulnerability management and assess remediation effectiveness Collaborate with IT, DevOps, and GRC to align security efforts with business … and remediating software/hardware issues A solid understanding of both automated and manual penetration testing Hands-on experience identifying, testing, and mitigating system vulnerabilities A strong grasp of threat intelligence and incident response processes A collaborative mindset, with the ability to explain technical risks to non-technical audiences Logical and lateral problem-solving skills Calmness under pressure and More ❯
Hybrid (London Hub) Does this sound like you? You're a proactive and detail-driven cyber security professional who thrives on staying ahead of threats and building resilient systems. Analytical by nature, you're always two steps ahead - translating complex risks into real-world solutions. Whether its leading incident response, identifying vulnerabilities, or influencing strategy, you combine technical … shape a forward-thinking security culture across the business. Day-to-day you can expect to: Lead incident response for breaches, malware attacks, root cause analysis, and recovery Monitor threat feeds and correlate intelligence with tooling to identify emerging risks Oversee vulnerability management and assess remediation effectiveness Collaborate with IT, DevOps, and GRC to align security efforts with business … and remediating software/hardware issues A solid understanding of both automated and manual penetration testing Hands-on experience identifying, testing, and mitigating system vulnerabilities A strong grasp of threat intelligence and incident response processes A collaborative mindset, with the ability to explain technical risks to non-technical audiences Logical and lateral problem-solving skills Calmness under pressure and More ❯
Head of Cyber Security DGH Recruitment are currently recruiting on behalf of a leading client in the Professional Services industry who require a Head of Cyber Security to join the firm in London. The role is responsible for all aspects of Cyber security and the Firm's IT infrastructure. Responsibilities: * Determine the cyber … approach and operating model in consultation with stakeholders and aligned with the risk management approach and compliance monitoring of non-digital risk areas. * Manage the budget for the cyber security. * Lead, manage, develop … coach and mentor team members. * Develop and deliver a cyber security strategy, which ensures that the Firm responds and adapts to changes in the cyberthreat landscape. * Manage the cyber security and infrastructure budgets, to ensure value for money and alignment with IT, cyber security, and infrastructure strategies and roadmaps. * Develop More ❯
Central London, London, United Kingdom Hybrid / WFH Options
STK Recruitment
AI Firewall deployments integrate smoothly into customer AI implementations and provide robust security measures while protecting customer data and privacy. Implement policies and access controls to protect against cyberthreats effectively. Advanced Troubleshooting: Utilize your deep knowledge and experience to troubleshoot complex issues related to Zscaler AI Firewall deployments. Address and resolve performance, connectivity, and security incidents promptly. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Solutions Through Knowledge
AI Firewall deployments integrate smoothly into customer AI implementations and provide robust security measures while protecting customer data and privacy. Implement policies and access controls to protect against cyberthreats effectively. Advanced Troubleshooting: Utilize your deep knowledge and experience to troubleshoot complex issues related to Zscaler AI Firewall deployments. Address and resolve performance, connectivity, and security incidents promptly. More ❯
role where you'll actively identify, exploit, and help remediate security weaknesses in web, mobile, and cloud-based applications. You'll be at the forefront of defending against cyberthreats by implementing cutting-edge security tools, collaborating with development teams to integrate security into the SDLC, and playing a critical role in protecting the organisation's digital assets. More ❯
escalation of reports and requests from Government organisations. Support Incident Management when required during periods of heightened operational activity. Maintain an understanding of the real-world cyberthreat, identifying trends and emerging threats. Maintain an understanding of the cyberthreats likely to target the business. Facilitate the timely sharing of high-quality actionable CyberThreat Intelligence, both through regular and ad-hoc reporting, and through briefings to customers and stakeholders. Work collaboratively with Incident Management, providing insights on adversaries to enable a more effective response, and capturing insights for wider use. Support the implementation and ongoing management of Threat Intelligence tooling and infrastructure, including, malware sandboxes, and threat intelligence … platforms. Engage with the wider public sector cyber security, cyberthreat intelligence and assessment communities on behalf of business. SKILLS/EXPERIENCE Experience of working in cyber security, ideally within a Security Operations environment. Good foundational knowledge of IT and digital services. Ability to produce well written and structured products and notifications in More ❯
escalation of reports and requests from Government organisations. * Support Incident Management when required during periods of heightened operational activity. * Maintain an understanding of the real-world cyberthreat, identifying trends and emerging threats. * Maintain an understanding of the cyberthreats likely to target the business. * Facilitate the timely sharing of high-quality actionable CyberThreat Intelligence, both through regular and ad-hoc reporting, and through briefings to customers and stakeholders. * Work collaboratively with Incident Management, providing insights on adversaries to enable a more effective response, and capturing insights for wider use. * Support the implementation and ongoing management of Threat Intelligence tooling and infrastructure, including, malware sandboxes, and threat intelligence … platforms. * Engage with the wider public sector cyber security, cyberthreat intelligence and assessment communities on behalf of business. SKILLS/EXPERIENCE * Experience of working in cyber security, ideally within a Security Operations environment. * Good foundational knowledge of IT and digital services. * Ability to produce well written and structured products and notifications in More ❯
escalation of reports and requests from Government organisations. * Support Incident Management when required during periods of heightened operational activity. * Maintain an understanding of the real-world cyberthreat, identifying trends and emerging threats. * Maintain an understanding of the cyberthreats likely to target the business. * Facilitate the timely sharing of high-quality actionable CyberThreat Intelligence, both through regular and ad-hoc reporting, and through briefings to customers and stakeholders. * Work collaboratively with Incident Management, providing insights on adversaries to enable a more effective response, and capturing insights for wider use. * Support the implementation and ongoing management of Threat Intelligence tooling and infrastructure, including, malware sandboxes, and threat intelligence … platforms. * Engage with the wider public sector cyber security, cyberthreat intelligence and assessment communities on behalf of business. SKILLS/EXPERIENCE * Experience of working in cyber security, ideally within a Security Operations environment. * Good foundational knowledge of IT and digital services. * Ability to produce well written and structured products and notifications in More ❯
Manor Park, Greater London, UK Hybrid / WFH Options
Control Risks
We now have an exciting opportunity for a Director to join our Digital Risks (Cyber Security) team in London. This senior role aims to support the growth of Digital Risks in EMEA, focusing on cyber security and digital risk management programs, including IT/OT security, enterprise security, cloud security, and GRC. The role also involves … aligned with industry frameworks and compliance requirements such as NIST800-53, ISO27001, NIST CSF, NIS 2, DORA. Applying expertise in emerging technologies like AI, IoT, cloud solutions, and advanced threat detection systems. Advising on their application, assessing suitability, and determining optimal implementation timing and approach. Managing large-scale programmatic engagements, stakeholder engagement, scoping, resource management, milestone delivery, and issue … Business development: Identifying opportunities in cyber risk management and technology resilience. Managing key client relationships supported by account, sales, and marketing plans. Positioning our cyberthreat intelligence, assurance, and incident response practices. Providing energetic consulting leadership in KSA, promoting Control Risks as a cyber and technology risk advisor, leading to increased long-term More ❯
We now have an exciting opportunity for a Director to join our Digital Risks (Cyber Security) team in London. This is a senior role to support the growth of Digital Risks in EMEA, specifically to lead on cyber security and digital risk management programmes, focused but not limited to IT/OT security, enterprise security, cloud … projects aligned with industry frameworks and compliance requirements, such as NIST800-53, ISO27001, NIST CSF, NIS 2, DORA. Leverage emerging technologies such as AI, IoT, cloud solutions, and advanced threat detection systems. Advise on their application, assess their suitability for specific environments, and determine optimal implementation timing and approach. Manage large-scale programmatic engagements, including stakeholder engagement, scoping, pricing … development: Identify and originate cyber risk management and technology resilience opportunities. Manage key client relationships, supported by account, sales, and marketing plans. Position our cyberthreat intelligence, assurance, and incident response practices. Provide energetic consulting leadership in KSA, promoting Control Risks as a trusted advisor on cyber and technology risk, leading to increased More ❯
We now have an exciting opportunity for a Director to join our Digital Risks (Cyber Security) team in London. This is a senior role to support the growth of Digital Risks in EMEA, specifically to lead on cyber security and digital risk management programmes, focused but not limited to IT/OT security, enterprise security, cloud … projects aligned with industry frameworks and compliance requirements, such as NIST800-53, ISO27001, NIST CSF, NIS 2, DORA. Leverage emerging technologies such as AI, IoT, cloud solutions, and advanced threat detection systems. Advise on their application, assess their suitability for specific environments, and determine optimal implementation timing and approach. Manage large-scale programmatic engagements, including stakeholder engagement, scoping, pricing … development: Identify and originate cyber risk management and technology resilience opportunities. Manage key client relationships, supported by account, sales, and marketing plans. Position our cyberthreat intelligence, assurance, and incident response practices. Provide energetic consulting leadership in KSA, promoting Control Risks as a trusted advisor on cyber and technology risk, leading to increased More ❯