unauthorized access, cyberthreats, and data breaches. The ideal candidate should have a strong background in cybersecurity, particularly in DLP of email security, cloud applications, endpoints and threat prevention with a proven ability to respond to evolving security challenges. Responsibilities: Proofpoint Management: Configure, deploy, integrate, and manage Proofpoint security solutions, including email security, data loss prevention (DLP … threat protection, and information protection. Monitor and analyse Proofpoint alerts and logs to detect and respond to security incidents and threats. Regularly update and optimise Proofpoint configurations to adapt to evolving threat landscapes and organisational needs. Develop and maintain custom filters and rules within Proofpoint to enhance security measures tailored to organisational needs. Collaborate with vendors and external … regular risk assessments and vulnerability scans to identify potential security risks and implement mitigation strategies. Lead incident response efforts related to email security breaches, ensuring quick containment and remediation. Threat Intelligence and Incident Response: Analyse threat intelligence to anticipate and mitigate potential cyberthreats targeting the organisation. Participate in or lead incident response activities related to More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
ECS Resource Group Ltd
the risk register. To Be Considered for This Role, You Will Need: Cybersecurity Experience: Demonstrated experience in implementing and managing security controls across hybrid environments. Familiarity with endpoint protection, threat detection, and vulnerability management tools. Incident Response & Problem Solving: Ability to respond swiftly and effectively to security incidents. Skilled in structured analysis and incident remediation to ensure rapid recovery. … Threat Awareness & Risk Mitigation: Proficient in identifying vulnerabilities, assessing risks, and applying up-to-date security practices. Ability to defend against evolving cyber threats. Infrastructure Awareness: Solid understanding of core infrastructure components including servers, networks, and storage systems. Experience in supporting and securing both on-premise and cloud-based environments. Skills & Tools, Familiarity with the following tools … is advantageous: Palo Alto, Microsoft Defender for Endpoint Tenable, Microsoft Sentinel, Zscaler, Tanium, Illumio Strong understanding of cybersecurity principles, including threat detection, firewalls, intrusion prevention systems, and encryption. Working knowledge of network protocols with the ability to interpret and troubleshoot connectivity and security issues across diverse environments. Awareness of data storage concepts (e.g., SAN, NAS) and secure data handling More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Commify
Principal Security Operations Engineer to join our Technical Operations team. In this pivotal role, you will spearhead security operations initiatives and ensure that our platforms are resilient against cyberthreats while maintaining compliance with industry standards. In your role as Principal Security Operations Engineer, you will: Act as a primary point of contact for security incidents, leading investigations … and infrastructure teams to integrate security practices into the DevOps pipeline Oversee the deployment and management of security monitoring tools to ensure real-time visibility and response capabilities Conduct threat assessments and vulnerability assessments, and implement appropriate mitigation strategies Upskill and mentor the security team on best practices, emerging threats, and innovative security solutions Stay current on the latest More ❯
newport, midlands, united kingdom Hybrid / WFH Options
AIRBUS Defence and Space Limited
technical, hands-on role that will work with a variety of security tools and technologies protecting our whole enterprise. You will be responsible for managing our CyberThreat Intelligence (CTI) research and Threat Hunting activities, the entire lifecycle of our detection rules repository and SOC automation stack. You will be responsible for the technical evolution of … who live and breathe cyber security and to work for a company with great products and technologies around the globe. **HOW YOU WILL CONTRIBUTE TO THE TEAM** * **Threat Analysis - **Leverage the organization’s CTI provider as a strategic asset , not just a data source-integrating external intel with internal context to assess real impact and relevance. Conduct … depth analysis of cyberthreats (APT groups, malware campaigns, zero-days, etc.) and assess their relevance to Airbus operations, especially the aerospace and defense-related. Translate complex threat data into clear, actionable intelligence for technical and non-technical stakeholders. Produce regular and ad hoc threat intelligence reports , briefings, and dashboards tailored to specific business units or More ❯
newport, midlands, united kingdom Hybrid / WFH Options
AIRBUS Defence and Space Limited
technical, hands-on role that will work with a variety of security tools and technologies protecting our whole enterprise. You will be responsible for managing our CyberThreat Intelligence (CTI) research and Threat Hunting activities, the entire lifecycle of our detection rules repository and SOC automation stack. You will be responsible for the technical evolution of … who live and breathe cyber security and to work for a company with great products and technologies around the globe. **HOW YOU WILL CONTRIBUTE TO THE TEAM** * **Threat Analysis - **Leverage the organization’s CTI provider as a strategic asset , not just a data source-integrating external intel with internal context to assess real impact and relevance. Conduct … depth analysis of cyberthreats (APT groups, malware campaigns, zero-days, etc.) and assess their relevance to Airbus operations, especially the aerospace and defense-related. Translate complex threat data into clear, actionable intelligence for technical and non-technical stakeholders. Produce regular and ad hoc threat intelligence reports , briefings, and dashboards tailored to specific business units or More ❯
Derby, Derbyshire, United Kingdom Hybrid / WFH Options
ENGINEERINGUK
John Lewis Partnership to help build a secure future for an iconic brand. We work to protect our customers, Partners, and business against an ever-evolving cyberthreat landscape. The John Lewis Partnership's Information Security strategy is bold and ambitious. We provide a collection of security services, delivered via people, processes and technology. Working collaboratively, these … services ensure that customers can shop with us efficiently, safely and securely, every single day. Our Threat Defence team is at the forefront of our cyber resilience, proactively monitoring threats, identifying vulnerabilities, and engineering robust security defences. As we expand our Security Engineering service, you'll be instrumental in developing cutting-edge capabilities and empowering our Security … Operations Centre to stay ahead of the latest threats. This is a great opportunity to directly shape our security posture, getting hands-on with next-generation cyber security tools. You'll thrive in an agile, supportive, and highly collaborative team where innovation isn't just encouraged, it's expected. At a Glance Salary: £50,000 - £74,000 depending More ❯
most challenging and pressing engineering problems for our clients. Join our engineering teams that build massively scalable software and systems, architect low latency infrastructure solutions, proactively guard against cyberthreats, and leverage machine learning alongside financial engineering to continuously turn data into action. Create new businesses, transform finance, and explore a world of opportunity at the speed of More ❯
Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
Akkodis
CyberThreat Intelligence Analyst Akkodis are currently working in partnership with a leading service provider to recruit a CyberThreat Intelligence Analyst to join a leading Cyber Defence Team and play a pivotal role in providing actionable technical intelligence to detection engineers, threat hunters and security operations. This role offers a … highly competitive salary and the opportunity for remote working. The Role As a CyberThreat Intelligence Analyst you will support the rest of the Cyber Defence engineering team in regard to the roadmap and what to focus on. You will share intel to help them understand what's emerging as well as what advanced persistent … threat actors are leveraging to compromise systems. You will work directly across all areas of Cyber Defence to produce bespoke and technical intelligence across Tactical, Strategic, and Operational intelligence. The Responsibilities Conduct in-depth analysis of threat groups, their capabilities, motivations, and tactics A strong understanding of threats posed Articulate complex concepts to various stakeholders across More ❯
Warwick, Warwickshire, West Midlands, United Kingdom
La Fosse
CyberThreat Intelligence Analyst We are helping a household name that impacts all of our lives to develop new cyber capabilities from the ground up. They're looking for a CyberThreat Intelligence analyst to help out with their Threat Intell function and keep them ahead of the curve when it … comes to threat management and security automation. This is a rare opportunity to join a large organisation and play a pivotal role in building new capabilities with no legacy systems in place and you'll have the chance to shape the future of their cybersecurity operations from the very beginning. We're looking for candidates with experience in: Threat management and modelling TTPs Cyberthreat intelligence tools and technologies. Staying up to date with new and emerging threats Details: Location: West Midlands – 2x a month on-site Salary: Up to £79,000 If you're interested in this exciting opportunity, please apply or send your CV to More ❯
Management, and Platform Solutions. Finance Technology Engineering : Covers audits related to software engineering, product management, and system design within Compliance & Legal, Controllers & Tax, Enterprises, and Risk & Capital Planning. Cyber Security : Responsible for audits related to AI, cyberthreats, and system design within the Engineering division. Basic Qualifications Bachelor's degree 0-3 years of relevant work More ❯
most challenging and pressing engineering problems for our clients. Join our engineering teams that build massively scalable software and systems, architect low latency infrastructure solutions, proactively guard against cyberthreats, and leverage machine learning alongside financial engineering to continuously turn data into action. Create new businesses, transform finance, and explore a world of opportunity at the speed of More ❯
What do you want to search? Keyword Apprenticeship Type Location Cyber Security Technologist Apprentice Cyber Security Technologist Apprentice , Apply From: 20/05/2025 Learning Provider Delivered by METAGEDU APPRENTICESHIPS LTD Employer GLOBAL BANKING SCHOOL LTD Vacancy Description Skills an apprentice will learn: Discover vulnerabilities in a … system by using a mix of research and practical exploration Analyse and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. National Cyber Security Centre) Combine different sources to create an enriched view of cyberthreats and hazards Research and investigate common … security technology Recommend improvements to the cyber security posture of an employer or customer based on research into future potential cyberthreats and considering threat trends Write program code or scripts to meet a given design requirement in accordance with employers' coding standards Identify cyber security threats relevant to a defined context More ❯
/Bristol As a Product Security Engineer, you will be responsible to secure a range of Roll-Royce products against an ever-evolving range of security threats (i.e. - cyber, supply chain, etc.). You may be involved at any stage of a project life cycle from concept development, design and integration, integrated/component testing through final production … color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, or any other protected characteristic. You can learn more here. Key Accountabilities: Contributes to the Secure Cyber Resilient Engineering (SCRE) of our products, applying technical knowledge and providing technical direction as required throughout the product lifecycle: requirements, design, build, test, production, operations, and support. Contribute to … relevant engineering environment (Electrical, Software, Controls, Systems), with 0+ years' experience ORJD/PhD Preferred Qualifications: 3+ years of experience working in Systems Security Engineering on real-time cyber-physical embedded systems (i.e. - aviation systems, software defined vehicles, medical devices, weapon systems, etc.) OR 4+ years of experience working in a related Engineering role (i.e. - Systems Engineering, Software More ❯
most challenging and pressing engineering problems for our clients. Join our engineering teams that build massively scalable software and systems, architect low latency infrastructure solutions, proactively guard against cyberthreats, and leverage machine learning alongside financial engineering to continuously turn data into action. Create new businesses, transform finance, and explore a world of opportunity at the speed of More ❯
most challenging and pressing engineering problems for our clients. Join our engineering teams that build massively scalable software and systems, architect low latency infrastructure solutions, proactively guard against cyberthreats, and leverage machine learning alongside financial engineering to continuously turn data into action. Create new businesses, transform finance, and explore a world of opportunity at the speed of More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Goldman Sachs Bank AG
and solve the most challenging and pressing engineering problems for our clients. Our engineering teams build scalable software and systems, architect low latency infrastructure solutions, proactively guard against cyberthreats, and leverage machine learning alongside financial engineering to continuously turn data into action. Internal Audit Engineering is a part of Core Engineering Team in Goldman Sachs. In Internal More ❯
Coventry, Warwickshire, United Kingdom Hybrid / WFH Options
Cadent Gas
Job Function: Information Technology Working Hours: 37 Location Type: Hybrid Contract Type: Permanent Protecting the digital backbone of our business Lead the charge in cyber risk governance and resilience As our Cyber Risk Manager , you'll be at the forefront of safeguarding Cadent's digital infrastructure. This isn't just about compliance-it's about embedding … a culture of proactive risk management, ensuring our systems, data, and people are protected against evolving cyber threats. You'll lead a team of analysts and work closely with IT and Cyber functional leaders to shape and maintain a robust risk and compliance framework. From managing audits and regulatory requirements to driving continuous improvement in risk … This is a high-impact role with strategic visibility, offering the opportunity to influence at the highest levels while mentoring a capable team. If you're passionate about cyber governance and ready to make a difference, this is your chance to lead from the front. Why you will love this role: Strategic Influence - Operate at the heart of More ❯
Leicester, Leicestershire, East Midlands, United Kingdom
Baltic Apprenticeships
records. Create and update IT user guides and ensure a clean and safe IT working environment. Stay current with security practices and technology trends, implementing measures to mitigate cyber threats. Adhere to all company policies, procedures, and QHSE guidelines, acting consistently with Oadbys core Vision, Mission, and Values. Effectively manage time, prioritise tasks, and undertake other reasonable responsibilities More ❯