London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
in defensive strategies for operational infrastructure. Your typical day involves reviewing recent events, coordinating investigations, analyzing alerts, logs, network traffic, or endpoint data using tools like Splunk, and developing detection content. You will also utilize threat intelligence to proactively enhance security measures and respond swiftly to incidents. Opportunities to explore Digital Forensics and support security incidents are also … house, on-the-job, and external training, including industry-recognized certifications from SANS Institute and OFFSEC. You will be paired with a mentor and gain hands-on experience in threatdetection, incident response, and operational strategies. Opportunities for travel, conferences, and staying updated on cybersecurity developments are available but not mandatory. Rewards and Benefits Starting salary of More ❯
of cloud adoption. Technical Leadership & Delivery Support Act as a technical mentor for development teams, ensuring best practices in cloud solution implementation. Oversee cloud security controls, including access management, threatdetection, and incident response strategies. Troubleshoot and resolve complex cloud infrastructure and application architecture challenges. Your Profile Essential skills/knowledge/experience: Cloud Expertise: Extensive hands-on …/CD automation. Deep understanding of transitioning strategies from legacy to cloud-native applications. Security & Compliance - Strong understanding of cloud security controls, IAM, compliance frameworks (GDPR, SOC2, NIST), and threat mitigation strategies. Strategic Collaboration - Experience working with CIOs and IT leaders to define digital transformation roadmaps. TOGAF Certification Microsoft Azure Solutions Architect SABSA (Security Architecture) AWS Certified Solutions Architect More ❯
as Code (IaC), and work with CI/CD pipelines and automation tools. Integrate security testing into CI/CD pipelines (e.g., SCA, SAST, DAST). Conduct code reviews, threat modeling, and vulnerability assessments on applications. Develop production deployment strategies, thinking beyond routine approaches. Create scripts and automation to streamline security operations, using Python or Go. Collaborate effectively with … simplify and automate security measures. Work with stakeholders to understand security needs and recommend improvements. Analyze current architecture and applications, providing security guidance. Develop frameworks and tools for automated threat detection. Ensure security controls are tested and hardened during deployments. Assess technology risks, including cyber security and application threats. Build strong relationships with external teams and share knowledge for More ❯
infrastructure as Code (IaC), work with CI/CD pipelines, and automation tools. Integrate security testing into CI/CD pipelines (e.g., SCA, SAST, DAST). Conduct code reviews, threat modeling, and vulnerability assessments on applications. Develop production deployment strategies that go beyond routine approaches to meet stakeholder needs. Create scripts and automation to streamline security operations, using Python … and automation. Work with stakeholders to understand security needs and recommend modifications during vulnerabilities. Analyze current architecture and processes to provide security guidance. Develop frameworks and tools for automated threat detection. Ensure security controls are hardened through testing and deployment. Assess technology risks, including cyber security weaknesses and application threats (e.g., OWASP). Build strong relationships with external teams More ❯
Analyst, Cybersecurity Operations (Detection & Response) L3 Full-time McDonald's Office Location: International Office McDonald’s growth strategy, Accelerating the Arches, encompasses all aspects of our business as the leading global omni-channel restaurant brand. As the consumer landscape shifts, we are using our competitive advantages to further strengthen our brand. One of our core growth strategies is to … event monitoring, eDiscovery, forensics, and incident response will be key in this role. The ideal candidate for this role should possess a solid understanding of cybersecurity practices, cloud technologies, detection and response frameworks, and incident handling procedures (containment, eradication, recovery, and lessons learned). They should excel in adhering to and enforcing the use of established incident response playbooks … and network security methodologies. Strong expertise in analysing and mitigating cyber threats and vulnerabilities. Advanced competence in authentication, authorization, and access control methods. Proficiency in utilizing and developing intrusion detection methodologies and techniques for detecting host and network-based intrusions. In-depth knowledge of system and application security threats and vulnerabilities, with the ability to develop and implement mitigation More ❯
to work with a market-leading business, contribute to cutting-edge security operations, and play a key role in enhancing security capabilities across global retail clients. Key Responsibilities Advanced threatdetection and monitoring using industry-leading tools. Building and tuning detections using Kusto Query (KQL). Responding to and managing security incidents effectively. Engineering robust detections and performing … proactive threat hunts. Supporting security automation and infrastructure-as-code initiatives. Qualifications We're looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like Carbon Black, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and container technologies (e.g. … Docker) Threat Hunting, Detection Engineering, Incident Response Security Automation (SOAR), Hyper Automation practices Familiarity with the MITRE ATT&CK framework SIEM platforms (Microsoft Sentinel, Splunk, Google Chronicle, etc.) Experience with Zero Trust Network Architecture, IDS/IPS, vulnerability scanners, and web proxies Scripting or programming (Python, PowerShell, Bash, etc.) Join a global leader at the forefront of data More ❯
London, England, United Kingdom Hybrid / WFH Options
Starling Bank
mechanisms are in place Help us to stay nimble by building compliance and security control automations Drive security infrastructure deployments across our growing environments Perform regular security assessments, audits, threat modeling and architecture design reviews to identify risks and vulnerabilities, triage found risks, identify improvements appropriately and design controls to implement as corrective actions Lead incident response efforts, including … the DevSecOps mindset that we have created across our technology teams Requirements What skills are essential: You have an in-depth knowledge of security principles, technologies, best practices and threatdetection and mitigation strategies Knowledge of common attack vectors and methodologies (OWASP Top 10, Mitre ATT&CK Framework and social engineering tactics The ability to identify potential threats … are a plus) Container security knowledge including container image provenance (e.g. Sigstore, Notary) with an in-depth knowledge of container runtimes Strong understanding of network protocols & practices, firewalls, intrusion detection/prevention systems and WAFs Understanding of integrating security into the software development lifecycle Experience performing secure code reviews and security approvals including the use of static and dynamic More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
collaborate with a close-knit team to defend against cyber threats such as malware, insider threats, DDoS attacks, and phishing. Your responsibilities include monitoring security events, analyzing alerts, developing detection strategies, and responding to incidents swiftly. Opportunities to explore Digital Forensics and deepen your understanding of operational security are also available. About You You should have a passion for … Development We support your growth through in-house and external training, including industry-recognized certifications from SANS and OFFSEC. You will be mentored and gain hands-on experience in threatdetection, incident response, and operational strategies, with opportunities to attend conferences and travel. Rewards and Benefits Starting salary of £36,408 25 days annual leave, rising to More ❯
London, England, United Kingdom Hybrid / WFH Options
Smart Communications group
of the role include: Advocating for infrastructure/application Security and providing support for security projects. Competence in reviewing new technologies, methodologies and integration opportunities. Support in enhancing security detection and incident response efforts/playbooks. Monitoring, remediating, and reporting on security events. Supporting team and activities required for maintaining Smart Communications standards and certification requirements. What we’re … Must have skills and experience : At least 3 years of hands-on, proven industry experience in a similar role. Good understanding of security principles, technologies, and best practices, including threatdetection and mitigation strategies. Good level of knowledge of cloud security: AWS and Azure. Experience ensuring data confidentiality, integrity, and availability throughout its lifecycle, including during transmission, storage … understanding of application security principals, best practices, OWASP/related standards. Knowledge of security frameworks & controls, hardening standards & security best practices. An understanding of network protocols & practices, firewalls, intrusion detection/prevention systems and WAFs. We look for the following SMART values in everyone we hire at Smart Communications: S peak Openly - We are positive, creative, helpful, kind and More ❯
London, England, United Kingdom Hybrid / WFH Options
Smart Communications group
existing infrastructure/application architecture. Advocating for infrastructure/application Security Design. Reviewing new technologies and methodologies and introducing integration opportunities (where feasible). Support Management in enhancing security detection and incident response efforts/playbooks. Monitoring, remediating, and reporting on security events. Network management fundamentals are required to be able to enhance security posture across network tools. Supporting … experience in a similar role. Bachelor/master’s degree in computer science, Information Security, or a related field. Good understanding of security principles, technologies, and best practices, including threatdetection and mitigation strategies. Good level of knowledge on cloud security architecture, specifically with Azure (preferable) and AWS. Demonstrated proven ability to ensure data confidentiality, integrity, and availability … undertaking internal pen testing and creation of external penetration testing scopes. Knowledge of security frameworks & controls, hardening standards & security best practices. An understanding of network protocols & practices, firewalls, intrusion detection/prevention systems, and WAFs. Our values S peak Openly - We are positive, creative, helpful, kind and we have fun. We listen and provide constructive feedback. Through meaningful conversations More ❯
standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threatdetection and response. Collaborate with internal stakeholders and external agencies to maintain a strong security posture. Provide cybersecurity training and guidance to staff and students. Lead cybersecurity projects More ❯
standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threatdetection and response. Collaborate with internal stakeholders and external agencies to maintain a strong security posture. Provide cybersecurity training and guidance to staff and students. Lead cybersecurity projects More ❯
solutions. Experience with security automation using PowerShell, Azure Policy, or Infrastructure-as-Code (IaC). Strong understanding of compliance frameworks (ISO 27001, NIST, CIS Benchmarks, GDPR). Experience in threatdetection, incident response, and forensic analysis. Familiarity with Identity and Access Management (IAM) principles, Azure AD, and MFA. Experience working in a DevSecOps environment and improving IT systems More ❯
solutions. Experience with security automation using PowerShell, Azure Policy, or Infrastructure-as-Code (IaC). Strong understanding of compliance frameworks (ISO 27001, NIST, CIS Benchmarks, GDPR). Experience in threatdetection, incident response, and forensic analysis. Familiarity with Identity and Access Management (IAM) principles, Azure AD, and MFA. Experience working in a DevSecOps environment and improving IT systems More ❯
GDPR, and other standards. Manage risk proactively : identify and mitigate vulnerabilities across cloud environments and applications. Embed secure development : working with Engineering to integrate DevSecOps best practices. Enhance threatdetection and incident response : improving our ability to react quickly and effectively. Assess and secure third-party vendors : ensuring strong security across our ecosystem of vendors and partners. Amazing More ❯
and enforce privileged access management (PAM) solutions, securing admin accounts and critical systems. Support security audits and identity risk assessments, addressing access anomalies and reducing attack surfaces. Enhance identity threatdetection and response capabilities in collaboration with SOC and SIEM teams. Required Skills & Experience 6+ years of hands-on IAM experience, with at least 2 years in an More ❯
to work with a market-leading business, contribute to cutting-edge security operations, and play a key role in enhancing security capabilities across global retail clients. Key Responsibilities Advanced threatdetection and monitoring using industry-leading tools. Building and tuning detections using Kusto Query Language (KQL). Responding to and managing security incidents effectively. Engineering robust detections and … performing proactive threat hunts. Supporting security automation and infrastructure-as-code initiatives. Qualifications We're looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like Carbon Black, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and container technologies … e.g., Docker) Threat Hunting, Detection Engineering, Incident Response Security Automation (SOAR), Hyper Automation practices Familiarity with the MITRE ATT&CK framework Experience with Zero Trust Network Architecture, IDS/IPS, vulnerability scanners, and web proxies Scripting or programming (Python, PowerShell, Bash, etc.) Join a global leader at the forefront of data-driven customer insights, where you’ll contribute More ❯
and processes, mentoring the SOC team, and managing OT alerts and incidents. You should have a deep understanding of SecOps, IT, and OT environments, with skills in incident management, threatdetection, and security improvement. Strong communication and collaboration skills are essential for working with cross-functional teams to mitigate risks. Key Responsibilities Contextualise OT Threats: Understand OT estate … processes; support tools such as Microsoft Sentinel, SOAR, EDR/XDR, and PAM; reduce alert fatigue and improve incident resolution times. Proactive Risk Remediation: Identify and evaluate risks; perform threat hunting; demonstrate risk reduction through metrics. Incident Response: Lead incident triage and response; improve management processes; educate staff on incident reporting. Continuous Improvement: Drive automation and process enhancements; track More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST, SOC … governance controls. Security Strategy: Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threatdetection, incident response, vulnerability management, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance More ❯
City of London, London, United Kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST, SOC … governance controls. Security Strategy: Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threatdetection, incident response, vulnerability management, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance More ❯
South East London, England, United Kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST, SOC … governance controls. Security Strategy: Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threatdetection, incident response, vulnerability management, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST, SOC 2, etc.), and … governance controls. Security Strategy: Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threatdetection, incident response, vulnerability management, and network security. Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance & Regulatory: Ensure More ❯
applications. Deploy and Manage Security Tooling: Select, implement, and operate key tools across GCP , such as Cloud Armor , Cloud Identity , Security Command Center , and VPC Service Controls for ongoing threatdetection and response. Integrate Security in SDLC: Collaborate with product and engineering teams to integrate security into every stage of the software development lifecycle. Threat Modeling and … Risk Analysis: Perform structured threat modeling using frameworks such as STRIDE and PASTA to proactively mitigate security risks. Champion Developer Education: Promote secure development practices by educating engineers on cloud and application security fundamentals. Mentor and Lead: Act as a mentor to future hires, helping scale a high-impact cloud security function as the business grows. What you'll … with core cloud security components including IAM , WAFs , SIEM , CSPM , and vulnerability scanners. Technical Skills: Proficiency in at least one scripting or programming language (e.g. Python, Go, Bash). Threat Modeling: Practical knowledge of frameworks like STRIDE and PASTA. Education: Bachelor's degree in Computer Science, Information Security, or a related technical field. Collaborative Expertise: Clear and effective communication More ❯