a team at the heart of the global economy! The Department for International Trade (DIT) and Inspire People are partnering together to bring you an exciting opportunity for a Threat and Vulnerability Manager to protect DIT and the wider UK government from cyber threats in a fast paced and exciting role, responsible for the Vulnerability Management and Threat … wider UK government from cyber threats in a fast paced and exciting role. Reporting to the Head of Cyber Security Operations, you will manage and be responsible for the Threat and Vulnerability Management function within the SOC, by providing leadership on identification and improvement opportunities, and ensuring service owners are aware of weaknesses in their security posture and … day-to-day role will involve the need to: Working with the Security Leadership team to develop a strategic road map for an effective vulnerability detection, assessment, remediation, and threat intelligence program. Line management of the threat and vulnerability management team. Building sustainable relationships to champion the adoption of vulnerability and threatmanagement, compliance More ❯
of planning and testing for complex technology, information security audits and high-level reviews, including designing test strategies, audit test papers and drafting of audit findings. Validation to confirm management's remediation of audit and regulatory issues. Management and tracking of businesses remediation activities. Actively contributing to the ongoing improvement of audit practices and methodology. Proactively maintain knowledge … GTAGs. Working experience with regulatory standards/requirements (US, UK) ie, GDPR, BCBS 239, FFIEC 101, 3402, CHAP. Working experience and/or knowledge of Security domains including Access management, Threatmanagement, Incident response and recovery, Data protection, Vulnerability management, Monitoring and logging, Physical security, and Security risk management and governance. Working experience and/… knowledge of data analytics/predictive analytics, data governance. Understand policy/directives, and ability to assess risks across all types of IT systems and operations. Audit/Project Management Certifications (desirable) - CMIIA (UK), CIA (US), CISA, CGEIT, CISSP, CISM, CompTIA, SANS, ISC2, Prince2, Agile etc. More ❯
The departmentCovers Cybersecurity, Information Security, IT Audit, IT Risks, IT Controls,Access Management, Security Operation, ThreatManagement and the portfolio forChange for all these areas.This is a rolling fixed term contract, initially 6 months. You will play a key role in overseeing our Threat Intelligence Centreefforts and ensuring alignment with strategic planning objectives. You will beresponsible … for the end-to-end management of major projects that enhance ourglobal cyber threat intelligence capabilities. This role requiresstrong project management expertise, a solid understanding of cybersecurityoperations, and the ability to effectively collaborate across global teams. Lead the end-to-endmanagement of the threat intelligence activities while ensuring alignment withour global cybersecurity strategy. Develop and maintaindetailed … Facilitatecommunication and coordination with global stakeholders across multiple regionsto ensure alignment of requirements and deliverables. Track activityprogress, manage risks, and implement risk mitigation strategies to ensuresuccessful outcomes. DriveStandardisation of threat intelligence protocols, tools, and governance acrossthe region. Partner withtechnology, compliance, and risk management teams to ensure compliance withregulatory and legal requirements in each jurisdiction such as GDPR &ISO27001 More ❯
The departmentCovers Cybersecurity, Information Security, IT Audit, IT Risks, IT Controls,Access Management, Security Operation, ThreatManagement and the portfolio forChange for all these areas. This is a rolling fixed term contract, initially 6 months. You will play a key role in overseeing our Threat Intelligence Centreefforts and ensuring alignment with strategic planning objectives. You will … beresponsible for the end-to-end management of major projects that enhance ourglobal cyber threat intelligence capabilities. This role requiresstrong project management expertise, a solid understanding of cybersecurityoperations, and the ability to effectively collaborate across global teams. Lead the end-to-endmanagement of the threat intelligence activities while ensuring alignment withour global cybersecurity strategy. Develop and … Facilitatecommunication and coordination with global stakeholders across multiple regionsto ensure alignment of requirements and deliverables. Track activityprogress, manage risks, and implement risk mitigation strategies to ensuresuccessful outcomes. DriveStandardisation of threat intelligence protocols, tools, and governance acrossthe region. Partner withtechnology, compliance, and risk management teams to ensure compliance withregulatory and legal requirements in each jurisdiction such as GDPR &ISO27001 More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
MFK Recruitment
and secure core client infrastructure and cloud environments. Ensure centralised security, monitoring, and incident response platforms operate effectively. You will collaborate closely with our Service Desk, Projects and Account Management teams to maintain high standards of service, document solutions and mentor junior engineers in line with cybersecurity best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. … attacks, phishing attempts, and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and … networks, in alignment with best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. Lead and coordinate incident response efforts, including root cause analysis, threat containment and post-incident reporting for clients. Collaborate with the Project and Service Desk teams to embed security into deployments, migrations, upgrades, and automation workflows, ensuring systems remain secure by design. Maintain More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
and Team Manager, M365, Hybrid Digital Workplace Technology Consultant required for a leading financial serviced company based in London. You will manage essential technologies, including Desktop, M365, Azure, identity management, email hygiene, SharePoint storage, MS Teams/telephony services and overall Cloud infrastructure security. Hybrid working - 2 days per week on site. Limited company engagement is permitted; IR35 determination … AV environments ITIL Able to technically manage a team of engineers and manage own and others workload M365 Technical expertise - Office/OneDrive/Teams/Sharepoint integration M365 management portal, conditional access and licence management Active Directory and Azure AD (Entra) management Skills working with cloud infrastructure (AWS or Azure) Understanding of Data networking Knowledge of … firewall requirements Windows 11 Laptop management, SCCM, Intune, Autopilot Provision of email services, and email routing technologies (eg M365 Exchange Online/Hybrid Exchange) Mail protection e.g. Mimecast Security and Threatmanagement in an enterprise environment (eg Defender for Endpoint, Vulnerability reporting and remediation) Reasonable Adjustments: Respect and equality are core values to us. We are proud More ❯
Microsoft Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Work with internal IT and other security teams to ensure the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk More ❯
Microsoft Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Work with internal IT and other security teams to ensure the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk More ❯
Microsoft Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Work with internal IT and other security teams to ensure the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk More ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
Microsoft Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Work with internal IT and other security teams to ensure the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk More ❯
Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Your core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Utilize Microsoft Entra ID Protection to identify and respond to compromised More ❯
Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Your core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Utilize Microsoft Entra ID Protection to identify and respond to compromised More ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Your core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Utilize Microsoft Entra ID Protection to identify and respond to compromised More ❯
Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Your core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … as a subject matter expert for the core components of the Defender XDR suite. Manage endpoint protection, detection, and response across our device fleet. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Utilize Microsoft Entra ID Protection to identify and respond to compromised More ❯
The department Covers Cybersecurity, Information Security, IT Audit, IT Risks, IT Controls,Access Management, Security Operation and Threat Management.This is a rolling fixed term contract, initially 6 months - on site. The Business administrator will play a key role in overseeing our Threat Intelligence Centreefforts and ensuring alignment with strategic planning objectives. You will beresponsible for the end … to-end management of major projects that enhance ourglobal cyber threat intelligence capabilities. This role requiresstrong project management expertise, a solid understanding of cybersecurityoperations, and the ability to effectively collaborate across global teams. Lead the end-to-endmanagement of the threat intelligence activities while ensuring alignment withour global cybersecurity strategy. Develop and maintaindetailed activity plans, timelines … Facilitatecommunication and coordination with global stakeholders across multiple regionsto ensure alignment of requirements and deliverables. Track activityprogress, manage risks, and implement risk mitigation strategies to ensuresuccessful outcomes. DriveStandardisation of threat intelligence protocols, tools, and governance acrossthe region. Partner withtechnology, compliance, and risk management teams to ensure compliance withregulatory and legal requirements in each jurisdiction such as GDPR &ISO27001 More ❯
The department Covers Cybersecurity, Information Security, IT Audit, IT Risks, IT Controls,Access Management, Security Operation and Threat Management. This is a rolling fixed term contract, initially 6 months - on site. The Business administrator will play a key role in overseeing our Threat Intelligence Centreefforts and ensuring alignment with strategic planning objectives. You will beresponsible for the … end-to-end management of major projects that enhance ourglobal cyber threat intelligence capabilities. This role requiresstrong project management expertise, a solid understanding of cybersecurityoperations, and the ability to effectively collaborate across global teams. Lead the end-to-endmanagement of the threat intelligence activities while ensuring alignment withour global cybersecurity strategy. Develop and maintaindetailed activity plans … Facilitatecommunication and coordination with global stakeholders across multiple regionsto ensure alignment of requirements and deliverables. Track activityprogress, manage risks, and implement risk mitigation strategies to ensuresuccessful outcomes. DriveStandardisation of threat intelligence protocols, tools, and governance acrossthe region. Partner withtechnology, compliance, and risk management teams to ensure compliance withregulatory and legal requirements in each jurisdiction such as GDPR &ISO27001 More ❯
Primary Details Time Type: Full time Worker Type: Employee Threat Intelligence Specialist London Permanent (Hybrid) At QBE, our purpose is to enable a more resilient future. We are an international insurer and reinsurer with a local presence in 27 countries. The Opportunity We’re excited to be hiring a Threat Intelligence Specialist to join our Advanced Threat … ll be part of a supportive team that thrives on teamwork and innovation, where your expertise will be valued as we work together to tackle the ever-evolving cyber threat landscape. We’re looking to welcome our new team member from early January 2026 , so if you’re ready to make an impact in the new year, we’d … love to hear from you! Your New Role Reporting to the Technical Threat Manager , you’llbe responsible for researching, analysing, and reporting on cyber threats targeting QBE’s global operations and technology environment. This role has a strong technical focus, centred on the collection, enrichment, automation, and analysis of adversary tactics, techniques, and procedures (TTPs) across the Unified Kill More ❯