Threat Detection Jobs in London

26 to 50 of 247 Threat Detection Jobs in London

Cyber Security Analyst

London, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
in defensive strategies for operational infrastructure. Your typical day involves reviewing recent events, coordinating investigations, analyzing alerts, logs, network traffic, or endpoint data using tools like Splunk, and developing detection content. You will also utilize threat intelligence to proactively enhance security measures and respond swiftly to incidents. Opportunities to explore Digital Forensics and support security incidents are also … house, on-the-job, and external training, including industry-recognized certifications from SANS Institute and OFFSEC. You will be paired with a mentor and gain hands-on experience in threat detection, incident response, and operational strategies. Opportunities for travel, conferences, and staying updated on cybersecurity developments are available but not mandatory. Rewards and Benefits Starting salary of More ❯
Posted:

Cloud Solution Architect

City of London, England, United Kingdom
JR United Kingdom
of cloud adoption. Technical Leadership & Delivery Support Act as a technical mentor for development teams, ensuring best practices in cloud solution implementation. Oversee cloud security controls, including access management, threat detection, and incident response strategies. Troubleshoot and resolve complex cloud infrastructure and application architecture challenges. Your Profile Essential skills/knowledge/experience: Cloud Expertise: Extensive hands-on …/CD automation. Deep understanding of transitioning strategies from legacy to cloud-native applications. Security & Compliance - Strong understanding of cloud security controls, IAM, compliance frameworks (GDPR, SOC2, NIST), and threat mitigation strategies. Strategic Collaboration - Experience working with CIOs and IT leaders to define digital transformation roadmaps. TOGAF Certification Microsoft Azure Solutions Architect SABSA (Security Architecture) AWS Certified Solutions Architect More ❯
Posted:

Lead Security Engineer

London, England, United Kingdom
JPMorgan Chase & Co
as Code (IaC), and work with CI/CD pipelines and automation tools. Integrate security testing into CI/CD pipelines (e.g., SCA, SAST, DAST). Conduct code reviews, threat modeling, and vulnerability assessments on applications. Develop production deployment strategies, thinking beyond routine approaches. Create scripts and automation to streamline security operations, using Python or Go. Collaborate effectively with … simplify and automate security measures. Work with stakeholders to understand security needs and recommend improvements. Analyze current architecture and applications, providing security guidance. Develop frameworks and tools for automated threat detection. Ensure security controls are tested and hardened during deployments. Assess technology risks, including cyber security and application threats. Build strong relationships with external teams and share knowledge for More ❯
Posted:

Lead Security Engineer

London, England, United Kingdom
J.P. Morgan
infrastructure as Code (IaC), work with CI/CD pipelines, and automation tools. Integrate security testing into CI/CD pipelines (e.g., SCA, SAST, DAST). Conduct code reviews, threat modeling, and vulnerability assessments on applications. Develop production deployment strategies that go beyond routine approaches to meet stakeholder needs. Create scripts and automation to streamline security operations, using Python … and automation. Work with stakeholders to understand security needs and recommend modifications during vulnerabilities. Analyze current architecture and processes to provide security guidance. Develop frameworks and tools for automated threat detection. Ensure security controls are hardened through testing and deployment. Assess technology risks, including cyber security weaknesses and application threats (e.g., OWASP). Build strong relationships with external teams More ❯
Posted:

Analyst, Cybersecurity Operations (Detection & Response) L3

London, England, United Kingdom
McDonald's
Analyst, Cybersecurity Operations (Detection & Response) L3 Full-time McDonald's Office Location: International Office McDonald’s growth strategy, Accelerating the Arches, encompasses all aspects of our business as the leading global omni-channel restaurant brand. As the consumer landscape shifts, we are using our competitive advantages to further strengthen our brand. One of our core growth strategies is to … event monitoring, eDiscovery, forensics, and incident response will be key in this role. The ideal candidate for this role should possess a solid understanding of cybersecurity practices, cloud technologies, detection and response frameworks, and incident handling procedures (containment, eradication, recovery, and lessons learned). They should excel in adhering to and enforcing the use of established incident response playbooks … and network security methodologies. Strong expertise in analysing and mitigating cyber threats and vulnerabilities. Advanced competence in authentication, authorization, and access control methods. Proficiency in utilizing and developing intrusion detection methodologies and techniques for detecting host and network-based intrusions. In-depth knowledge of system and application security threats and vulnerabilities, with the ability to develop and implement mitigation More ❯
Posted:

Senior Security Operations Center Analyst

London, England, United Kingdom
ZipRecruiter
to work with a market-leading business, contribute to cutting-edge security operations, and play a key role in enhancing security capabilities across global retail clients. Key Responsibilities Advanced threat detection and monitoring using industry-leading tools. Building and tuning detections using Kusto Query (KQL). Responding to and managing security incidents effectively. Engineering robust detections and performing … proactive threat hunts. Supporting security automation and infrastructure-as-code initiatives. Qualifications We're looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like Carbon Black, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and container technologies (e.g. … Docker) Threat Hunting, Detection Engineering, Incident Response Security Automation (SOAR), Hyper Automation practices Familiarity with the MITRE ATT&CK framework SIEM platforms (Microsoft Sentinel, Splunk, Google Chronicle, etc.) Experience with Zero Trust Network Architecture, IDS/IPS, vulnerability scanners, and web proxies Scripting or programming (Python, PowerShell, Bash, etc.) Join a global leader at the forefront of data More ❯
Posted:

DevOps Engineer

London, England, United Kingdom
Smartedge Solutions
of AWS Security, Identity, and Compliance services, including IAM, AWS Organizations, SCPs, Secrets Manager, AWS Config, GuardDuty, Security Hub, CloudTrail, and AWS KMS for encryption, ensuring robust cloud security Threat Detection & Compliance: Implementation of AWS security tools like Amazon Detective, AWS Shield, WAF, AWS Firewall Manager, enforcing security compliance standards such as ISO 27001, SOC2, GDPR, and NIST … Automation Cloud Cost Optimization & FinOps (AWS Trusted Advisor, Compute Savings Plans, cost forecasting strategies) AWS-native Security Services (Macie for sensitive data discovery, Inspector for vulnerability scanning, GuardDuty for threat detection) Programming & Scripting (proficiency in Python and Shell Scripting for automation, cloud resource management, and infrastructure monitoring) AWS Database Expertise AWS Networking Expertise (strong knowledge of VPC design More ❯
Posted:

Security Engineer - Engine by Starling

London, England, United Kingdom
Hybrid / WFH Options
Starling Bank
mechanisms are in place Help us to stay nimble by building compliance and security control automations Drive security infrastructure deployments across our growing environments Perform regular security assessments, audits, threat modeling and architecture design reviews to identify risks and vulnerabilities, triage found risks, identify improvements appropriately and design controls to implement as corrective actions Lead incident response efforts, including … the DevSecOps mindset that we have created across our technology teams Requirements What skills are essential: You have an in-depth knowledge of security principles, technologies, best practices and threat detection and mitigation strategies Knowledge of common attack vectors and methodologies (OWASP Top 10, Mitre ATT&CK Framework and social engineering tactics The ability to identify potential threats … are a plus) Container security knowledge including container image provenance (e.g. Sigstore, Notary) with an in-depth knowledge of container runtimes Strong understanding of network protocols & practices, firewalls, intrusion detection/prevention systems and WAFs Understanding of integrating security into the software development lifecycle Experience performing secure code reviews and security approvals including the use of static and dynamic More ❯
Posted:

Cyber Security Analyst

London, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
collaborate with a close-knit team to defend against cyber threats such as malware, insider threats, DDoS attacks, and phishing. Your responsibilities include monitoring security events, analyzing alerts, developing detection strategies, and responding to incidents swiftly. Opportunities to explore Digital Forensics and deepen your understanding of operational security are also available. About You You should have a passion for … Development We support your growth through in-house and external training, including industry-recognized certifications from SANS and OFFSEC. You will be mentored and gain hands-on experience in threat detection, incident response, and operational strategies, with opportunities to attend conferences and travel. Rewards and Benefits Starting salary of £36,408 25 days annual leave, rising to More ❯
Posted:

Lead Devops

London, England, United Kingdom
Tata Consultancy Services
of AWS Security, Identity, and Compliance services, including IAM, AWS Organizations, SCPs, Secrets Manager, AWS Config, GuardDuty, Security Hub, CloudTrail, and AWS KMS for encryption, ensuring robust cloud security Threat Detection & Compliance: Implementation of AWS security tools like Amazon Detective, AWS Shield, WAF, AWS Firewall Manager, enforcing security compliance standards such as ISO 27001, SOC2, GDPR, and NIST … Automation Cloud Cost Optimization & FinOps (AWS Trusted Advisor, Compute Savings Plans, cost forecasting strategies) AWS-native Security Services (Macie for sensitive data discovery, Inspector for vulnerability scanning, GuardDuty for threat detection) Programming & Scripting (proficiency in Python and Shell Scripting for automation, cloud resource management, and infrastructure monitoring) AWS Database Expertise AWS Networking Expertise (strong knowledge of VPC design More ❯
Posted:

Security Engineer

London, England, United Kingdom
Hybrid / WFH Options
Smart Communications group
of the role include: Advocating for infrastructure/application Security and providing support for security projects. Competence in reviewing new technologies, methodologies and integration opportunities. Support in enhancing security detection and incident response efforts/playbooks. Monitoring, remediating, and reporting on security events. Supporting team and activities required for maintaining Smart Communications standards and certification requirements. What we’re … Must have skills and experience : At least 3 years of hands-on, proven industry experience in a similar role. Good understanding of security principles, technologies, and best practices, including threat detection and mitigation strategies. Good level of knowledge of cloud security: AWS and Azure. Experience ensuring data confidentiality, integrity, and availability throughout its lifecycle, including during transmission, storage … understanding of application security principals, best practices, OWASP/related standards. Knowledge of security frameworks & controls, hardening standards & security best practices. An understanding of network protocols & practices, firewalls, intrusion detection/prevention systems and WAFs. We look for the following SMART values in everyone we hire at Smart Communications: S peak Openly - We are positive, creative, helpful, kind and More ❯
Posted:

Security Engineer

London, England, United Kingdom
Hybrid / WFH Options
Smart Communications group
existing infrastructure/application architecture. Advocating for infrastructure/application Security Design. Reviewing new technologies and methodologies and introducing integration opportunities (where feasible). Support Management in enhancing security detection and incident response efforts/playbooks. Monitoring, remediating, and reporting on security events. Network management fundamentals are required to be able to enhance security posture across network tools. Supporting … experience in a similar role. Bachelor/master’s degree in computer science, Information Security, or a related field. Good understanding of security principles, technologies, and best practices, including threat detection and mitigation strategies. Good level of knowledge on cloud security architecture, specifically with Azure (preferable) and AWS. Demonstrated proven ability to ensure data confidentiality, integrity, and availability … undertaking internal pen testing and creation of external penetration testing scopes. Knowledge of security frameworks & controls, hardening standards & security best practices. An understanding of network protocols & practices, firewalls, intrusion detection/prevention systems, and WAFs. Our values S peak Openly - We are positive, creative, helpful, kind and we have fun. We listen and provide constructive feedback. Through meaningful conversations More ❯
Posted:

Head of Cyber Security

London Area, United Kingdom
Burman Recruitment
standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat detection and response. Collaborate with internal stakeholders and external agencies to maintain a strong security posture. Provide cybersecurity training and guidance to staff and students. Lead cybersecurity projects More ❯
Posted:

Head of Cyber Security

City of London, London, United Kingdom
Burman Recruitment
standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat detection and response. Collaborate with internal stakeholders and external agencies to maintain a strong security posture. Provide cybersecurity training and guidance to staff and students. Lead cybersecurity projects More ❯
Posted:

Security Engineer (Azure)

London, United Kingdom
Michael Page (UK)
solutions. Experience with security automation using PowerShell, Azure Policy, or Infrastructure-as-Code (IaC). Strong understanding of compliance frameworks (ISO 27001, NIST, CIS Benchmarks, GDPR). Experience in threat detection, incident response, and forensic analysis. Familiarity with Identity and Access Management (IAM) principles, Azure AD, and MFA. Experience working in a DevSecOps environment and improving IT systems More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer (Azure)

City of London, England, United Kingdom
Michael Page (UK)
solutions. Experience with security automation using PowerShell, Azure Policy, or Infrastructure-as-Code (IaC). Strong understanding of compliance frameworks (ISO 27001, NIST, CIS Benchmarks, GDPR). Experience in threat detection, incident response, and forensic analysis. Familiarity with Identity and Access Management (IAM) principles, Azure AD, and MFA. Experience working in a DevSecOps environment and improving IT systems More ❯
Posted:

Information Security Manager

London, United Kingdom
Hybrid / WFH Options
Randstad (Schweiz) AG
GDPR, and other standards. Manage risk proactively : identify and mitigate vulnerabilities across cloud environments and applications. Embed secure development : working with Engineering to integrate DevSecOps best practices. Enhance threat detection and incident response : improving our ability to react quickly and effectively. Assess and secure third-party vendors : ensuring strong security across our ecosystem of vendors and partners. Amazing More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IAM Architect

London, England, United Kingdom
Alight Solutions
and enforce privileged access management (PAM) solutions, securing admin accounts and critical systems. Support security audits and identity risk assessments, addressing access anomalies and reducing attack surfaces. Enhance identity threat detection and response capabilities in collaboration with SOC and SIEM teams. Required Skills & Experience 6+ years of hands-on IAM experience, with at least 2 years in an More ❯
Posted:

Senior Security Operations Center Analyst

City of London, England, United Kingdom
JR United Kingdom
to work with a market-leading business, contribute to cutting-edge security operations, and play a key role in enhancing security capabilities across global retail clients. Key Responsibilities Advanced threat detection and monitoring using industry-leading tools. Building and tuning detections using Kusto Query Language (KQL). Responding to and managing security incidents effectively. Engineering robust detections and … performing proactive threat hunts. Supporting security automation and infrastructure-as-code initiatives. Qualifications We're looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like Carbon Black, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and container technologies … e.g., Docker) Threat Hunting, Detection Engineering, Incident Response Security Automation (SOAR), Hyper Automation practices Familiarity with the MITRE ATT&CK framework Experience with Zero Trust Network Architecture, IDS/IPS, vulnerability scanners, and web proxies Scripting or programming (Python, PowerShell, Bash, etc.) Join a global leader at the forefront of data-driven customer insights, where you’ll contribute More ❯
Posted:

OT Cyber Security Analyst

London, England, United Kingdom
THAMES WATER UTILITIES LIMITED
and processes, mentoring the SOC team, and managing OT alerts and incidents. You should have a deep understanding of SecOps, IT, and OT environments, with skills in incident management, threat detection, and security improvement. Strong communication and collaboration skills are essential for working with cross-functional teams to mitigate risks. Key Responsibilities Contextualise OT Threats: Understand OT estate … processes; support tools such as Microsoft Sentinel, SOAR, EDR/XDR, and PAM; reduce alert fatigue and improve incident resolution times. Proactive Risk Remediation: Identify and evaluate risks; perform threat hunting; demonstrate risk reduction through metrics. Incident Response: Lead incident triage and response; improve management processes; educate staff on incident reporting. Continuous Improvement: Drive automation and process enhancements; track More ❯
Posted:

Chief Information Security Officer

London Area, United Kingdom
Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST, SOC … governance controls. Security Strategy: Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threat detection, incident response, vulnerability management, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance More ❯
Posted:

Chief Information Security Officer

City of London, London, United Kingdom
Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST, SOC … governance controls. Security Strategy: Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threat detection, incident response, vulnerability management, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance More ❯
Posted:

Chief Information Security Officer

South East London, England, United Kingdom
Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST, SOC … governance controls. Security Strategy: Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threat detection, incident response, vulnerability management, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance More ❯
Posted:

Chief Information Security Officer

London, England, United Kingdom
SR2 | Socially Responsible Recruitment | Certified B Corporation™
has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST, SOC 2, etc.), and … governance controls. Security Strategy: Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threat detection, incident response, vulnerability management, and network security. Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance & Regulatory: Ensure More ❯
Posted:

Senior Cloud Security Engineer

London, United Kingdom
Molten Ventures plc
applications. Deploy and Manage Security Tooling: Select, implement, and operate key tools across GCP , such as Cloud Armor , Cloud Identity , Security Command Center , and VPC Service Controls for ongoing threat detection and response. Integrate Security in SDLC: Collaborate with product and engineering teams to integrate security into every stage of the software development lifecycle. Threat Modeling and … Risk Analysis: Perform structured threat modeling using frameworks such as STRIDE and PASTA to proactively mitigate security risks. Champion Developer Education: Promote secure development practices by educating engineers on cloud and application security fundamentals. Mentor and Lead: Act as a mentor to future hires, helping scale a high-impact cloud security function as the business grows. What you'll … with core cloud security components including IAM , WAFs , SIEM , CSPM , and vulnerability scanners. Technical Skills: Proficiency in at least one scripting or programming language (e.g. Python, Go, Bash). Threat Modeling: Practical knowledge of frameworks like STRIDE and PASTA. Education: Bachelor's degree in Computer Science, Information Security, or a related technical field. Collaborative Expertise: Clear and effective communication More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Threat Detection
London
10th Percentile
£51,250
25th Percentile
£61,125
Median
£80,000
75th Percentile
£92,500
90th Percentile
£109,000