Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Thames Water offices as required Working More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
with global business risk/objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security … security services and deploy new tools in support of the security roadmap. Must be capable of interacting effectively with various internal teams, peers, and management staff. Support the information security manager with creating information security metrics for the respective supported security products. This will be done monthly. Deploy new … processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security operations, legal, compliance, incident response teams More ❯
someone with broad security expertise who enjoys variety and continual development. You’ll take the lead on: First and second line security operations, including vulnerabilitymanagement Investigating and responding to security incidents Ensuring policies and procedures remain aligned to industry best practice Providing assurance that security controls are … Key skills for the Senior Information Security Analyst: Proven experience in a security-focused role, ideally across several of the following areas: security operations, vulnerabilitymanagement, security assurance, risk management, or project consultancy A clear enthusiasm for cybersecurity, with a proactive attitude and eagerness to learn Solid More ❯
to leverage your skills and make positive impact? We are looking for an experienced IT professional to join during the transition of legacy case management systems to modern, cloud-based solutions. Your role will focus on maintaining and supporting on prem legacy systems during ongoing transformation to cloud-based … support. Therefore we are looking for all-arounder, with good SQL knowledge. What You Will Do Provide expert support and maintenance for legacy case management systems (Extranet, CMS, DTS, EKS2, and ADMS) in collaboration with the IT teams. Ensure the legacy systems continue to run smoothly during the transition … patches, and general system maintenance for both legacy and cloud-based systems. What do you need to be successful? Strong experience in SQL server management and replication. Experience in writing and optimising SQL scripts for system management and troubleshooting. Strong knowledge of SharePoint (on-premise & cloud). Experience More ❯
Vulnerability Analyst - up to £50K - Manchester (3 days in office) *** We are currently recruiting for an well known consulting organisation, who are looking for an internal facing Vulnerability Analyst to join their team. This role will form part of a growing team, providing a crucial service to secure … their internal IT Estate. This is a Junior - Mid level position, so we're looking for a minimum of 2+ years of vulnerabilitymanagement experience. Key responsibilities are as follows: Identification and ongoing management of vulnerabilities within the IT estate. Analysing identified vulnerabilities through infrastructure scans and … penetration testing. They work with Tenable as their VM platform, but experience with any tooling is fine. Prioritisation of vulnerabilities. Stakeholder management, to engage with business and technical stakeholder to effectively mitigate/resolve issues. Participation in ongoing process improvement activities. This is a great opportunity to join a More ❯
reading, south east england, United Kingdom Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
reading, south east england, United Kingdom Hybrid / WFH Options
Advanced Resource Managers
with infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerabilitymanagement Your skillset may include: Proven experience as a Security Architect supporting major infrastructure transformation … with cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation, communication, and stakeholder engagement More ❯
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerabilitymanagement tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
reading, south east england, United Kingdom Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable VulnerabilityManagement (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
reading, south east england, United Kingdom Hybrid / WFH Options
RiverSafe
specialising in designing, implementing and managing advanced security solutions. With expertise in SOC engineering tools and one of either Cloud Security, Identity and Access Management (IAM) or Threat Modelling, this role focuses on enhancing the security posture of organisations. The consultant will lead strategic security initiatives, collaborate with clients … Security, with a significant portion in a leadership role. A background in SOC engineering tools combined with expertise in either cloud security, Identity & Access Management or threat modelling. Proficiency in cloud platforms and services (AWS, Azure, GCP) with deep knowledge of native security tools. Hands-on experience designing and … implementing SIEM solutions in enterprise environments. Skilled in scripting and automation (e.g., Python, PowerShell) for security processes. Familiarity with tools for threat modelling, vulnerabilitymanagement, and incident response. SIEM-specific certifications like Splunk Certified Architect, Sentinel Expert, or equivalent. IAM certifications (e.g., Okta Certified Consultant, SailPoint IdentityNow, or More ❯
reading, south east england, United Kingdom Hybrid / WFH Options
talego
architecture and service management. Introducing and implementing solutions and platforms on cloud technologies (ideally Azure). Set the strategy for the provisioning and lifecycle management of all end-user equipment and software. Own, maintain, and develop the CMDB for all end-user assets to enable effective budget planning and … Entra and AAD (including provisioning). Possesses a good understanding of endpoint security and measures to secure assets and data, including SSO/MFA, vulnerabilitymanagement, email security, scanning, and pen testing. Experience with managing a hybrid device estate including MACs, Windows, and Linux as well as Intune … managed portable devices. Experience with Enterprise MDM, EPP, EDR, Patch management, and other tools from vendors like Microsoft, JAMF, CrowdStrike, ManageEngine, and Esentire to protect, monitor, and respond to incidents. Familiar with Enterprise service delivery platforms such as ServiceNow, FreshService, or similar, with experience customizing and using reporting for More ❯
and SD-WAN. Understanding of Zero Trust Architecture, microsegmentation, and secure cloud networking (e.g., Azure, AWS, GCP). Experience with security information and event management (SIEM), threat intelligence, and vulnerability management. Excellent communication and documentation skills, with the ability to influence and educate stakeholders. Relevant certifications strongly preferred More ❯
experience working with data and cloud technologies, including databases, cloud infrastructure, and basic cloud administration (e.g., networking, compute and storage resources, identity and access management). Familiarity with APIs, web services, and automation through scripting or programming languages. Practical knowledge and demonstrated experience in areas such as Data Loss … Prevention (DLP), Data Privacy/Protection, DSPM/CSPM, SIEM, or vulnerabilitymanagement is highly preferred. Proven success in a technical, customer-facing role within a software or SaaS company. Full spec available, please apply to Locke44 for the details. More ❯
reading, south east england, United Kingdom Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯