London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
/Day Inside IR35. C learance: DV Role Profile: Have experience with dealing with real world threats in the serious and organised crime or cyberthreat incidents Have experience in analysing malware behaviour and an ability to identify associated infrastructure Have an excellent understanding of how cyberthreat attackers build and use infrastructure to … undertake malicious activity CompTIA Cybersecurity Analyst (CySA+) or a similar certification GIAC CyberThreat Intelligence (GCTI) or a similar certification GIAC Reverse Engineering Malware (GREM) or a similar certification Certified Ethical Hacker (CEH) Offensive Security Certified Professional (OSCP) or a similar certification*HM will accept 2 of the above qualifications* Data analysis and visualisation Understanding of Cybersecurity … Concepts and Threat Intelligence Internet infrastructure/security architecture If you are interested in the above role - Click the "Apply Now" button now for immediate review Cyber Security Analyst, Security Analyst, Security, OSCP, ETHICAL HACKER, Cyber Security Analyst, Cyber Security Analyst, DV CLEARANCE, DV CLEARED, CYBER ATTACK, Cyber Security More ❯
Rickmansworth, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Senior plc
our continual information security strategy, joining us on our journey and developing yourself along the way. Why Join Us? Work with a talented team of security professionals in a threat-driven environment. Ability to help shape the future of our cyber defence capabilities across a wide and diverse range of businesses. Competitive compensation and benefits package. Flexible … environment with opportunities for remote work and professional development. Key responsibilities: Reporting to the Director of Information Security & Information Technology, you will be responsible for: - Build and own Seniors threat intelligence strategy. Develop and own the threat management program with regular assessments, threat modelling, risk prioritisation and remediation activities. The individual will serve as a subject matter … expert incyber threat management, advising our various businesses on adversary activities, situational awareness and defensive actions. Designing tactical and strategic responses to emerging security threats Define, implement and manage our cyberthreat capability working with our local IT teams, MSSP partners, vendors and other key stakeholders. Provide our IT teams with guidance on adversary intentions, objectives More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
As a Senior Security Penetration Tester , you will be responsible for supporting the design, implementation, and maintenance of TVM (Threat & Vulnerability Management) solutions, controls and processes across the organisation. You will be liaising with Digital teams to ensure appropriate mitigation and remediation of vulnerabilities detected across our IT estate. This role requires an understanding of TVM concepts, technologies, and … and provide appropriate mitigation actions. Liaise and coordinate with technology and business stakeholders in relation to cybersecurity patching and vulnerability management issues/actions. Maintain a cyberthreat assessment methodology, align to evolving industry standards and integrate into BAU and project-based business processes. Support with proactive threat hunting for new and emerging cyber threats. Develop and maintain dashboards with cybersecurity threat and vulnerability metrics. Support compliance with relevant industry standards, regulations, and best practices, such as GDPR, NIS and ISO 27001. Base location - Hybrid - Clearwater Court Reading. Working pattern - 36 hours Monday to Friday. What you should bring to the role Strong knowledge of manual penetration testing techniques and confident More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
software delivery lifecycle. A key part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure Security: Architect and secure Azure … and optimize Azure DevOps pipelines with security embedded at every stage. Cloud Security Implementation: Leverage Azure Security Centre, Microsoft Defender for Cloud, and Microsoft Sentinel for advanced security monitoring. Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability … cyber threats. Incident Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured action plans for proactive risk mitigation. More ❯
West Malling, Kent, United Kingdom Hybrid / WFH Options
Lumina Energy
evolving, and our team is at the heart of protecting critical infrastructure and data. As a Cyber Security Engineer, you'll help lead our proactive efforts in threat detection, response, and mitigation. This role is vital to safeguarding the confidentiality, integrity, and availability of systems and services. What you'll be doing Act on security alerts, incidents … ensure timely responses. Diagnose and investigate security incidents following agreed procedures. Escalate and document unresolved incidents and support recovery efforts. Operate within our enterprise-level SOC and collaborate on threat intelligence. Utilise tools like Microsoft E5, Sentinel, and Darktrace to monitor and prevent threats. Analyse malware and respond to high-priority incidents. Support vulnerability management and threat analysis … Proficiency with Microsoft Security Suite (including Sentinel) and Darktrace or similar. Must have an understanding of cyberthreats including malware, ransomware, DDoS, insider threats. Strong knowledge of threat modelling, security monitoring, and cloud environments. Familiarity with GDPR, data protection, and privacy impact assessments. Excellent communication and collaboration skills with a proactive mindset. Industry certifications (e.g., CISSP, CEH More ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
defining scopes with clients, executing technical assessments, and delivering detailed reports with remediation guidance. The position requires strong technical leadership, mentoring junior testers, and staying ahead of emerging cyberthreats through research and innovation. Key Responsibilities: Perform advanced penetration tests and vulnerability assessments. Engage with clients to define testing objectives and provide expert consultancy. Lead junior testers, review More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Involved Solutions
Senior Research Officer - Cyber Rate: £660 per day Inside IR35 Working Hours: Full-time - 40 days total until 19 December 2025 Location: Home-based, with possible attendance at a secure site Start Date: ASAP Clearance: Active DV Clearance required Role Purpose - Senior Research Officer - Cyber The Senior Research Officer will lead a small team to deliver … high-impact research on Critical Information Infrastructure (CII) dependencies across the UK's international partners. This work will shape future cyber security risk mitigation activities by providing an evidence-based prioritisation of international engagement based on dependency risk analysis. Key Responsibilities - Senior Research Officer - Cyber Lead the design, development, and implementation of a CII prioritisation approach … dependency research , ensuring accuracy and relevance across multiple sectors. Update and refine data evaluation methodologies to support consistent and robust research outcomes. Identify and present opportunities for future cyber security risk mitigation at national and enterprise levels. Facilitate stakeholder workshops and interviews , gathering insight and validating findings. Engage directly with stakeholders in the public and private sector , as More ❯