London, South East, England, United Kingdom Hybrid / WFH Options
Adecco
cloud security, particularly Azure services and tools.* Familiarity with security frameworks such as ISO 27001, NIST, or CIS.* Knowledge of security technologies (firewalls, remote access, ZTNA).* Exposure to threat modelling and cyber threatintelligence is advantageous.Core Skills* Excellent communication and stakeholder engagement abilities.* Analytical mindset with strong problem-solving skills.* Ability to balance security priorities with … strictest confidence and we would always speak to you before discussing your CV with any potential employer. Keywords: Cyber Security, Azure Security, Cloud Security, ISO 27001, NIST, CIS, ZTNA, Threat Modelling, CISSP, CISM, CEH, Risk Management, Security Consultant, Information Security More ❯
About Our Client Join Our Client , a fast-growing fintech innovator securing next-gen payment platforms for leading banks and startups. With a focus on AI-driven threat detection and zero-trust architecture, Our Client has been named one of Europe’s Top 50 Cybersecurity Scale-ups. Role Snapshot As an Associate Cybersecurity Analyst , you’ll be the eye … alongside world-class security engineers, hone your skills on cutting-edge tools, and shape the future of digital payments security. Your Day-to-Day Alert Triage: Analyze SIEM and threat-intelligence feeds to spot anomalies. Threat Hunting: Use forensic tools to track indicators of compromise across networks. Vulnerability Management: Run scans, prioritize remediation tasks, and validate fixes. … and DevOps teams to contain breaches. Report & Recommend: Draft concise, actionable incident summaries for executive stakeholders. Continuous Learning: Attend weekly knowledge-shares, capture insights, and contribute to our internal threat library. What You Bring Must-Haves Bachelor’s degree in Cybersecurity, Computer Science, or related field. Practical experience with at least one SIEM platform (e.g., Splunk, QRadar). Understanding More ❯
Employment Type: Full-Time
Salary: £36,000 - £43,000 per annum, Negotiable, OTE
Kingston Upon Thames, Surrey, United Kingdom Hybrid / WFH Options
Unilever
advancing purple team maturity, the ideal candidate will bring deep technical acumen, a transformation mindset, and a proven ability to lead and inspire high-performing teams in a dynamic, threat-informed environment. RESPONSIBILITIES Technical Leadership & Execution - Personally lead and execute advanced penetration tests, red/purple team exercises, and adversary emulation campaigns across cloud, application, and infrastructure layers. - Identify … vulnerabilities to simulate real-world attack scenarios, validate detection and response capabilities, and uncover control gaps. - Develop and maintain a Purple Team playbook tailored to business-specific technologies and threat models. - Integrate offensive findings into SOC tuning, detection engineering, and control validation workflows. Program Ownership - Own and evolve the offensive security roadmap, including internal testing services, external bug bounty … broader Cyber Transformation roadmap. Team Building & Transformation - Build and mentor a high-performing global team of offensive security engineers and red teamers. - Lead the transformation from traditional pentesting to intelligence-driven, continuous offensive security. - Foster a culture of innovation, experimentation, and continuous learning. Collaboration & Influence - Partner with ThreatIntelligence, SOC, and Engineering teams to contextualize findings and More ❯
during live security incidents Improving detection rules, playbooks, and tooling with MITRE ATT&CK-driven enhancements Producing clear incident reports for both technical and non-technical audiences Contributing to threatintelligence initiatives Staying ahead of the curve on emerging threats, tactics, and techniques To secure this SOC role: Proven experience in a Security Operations Centre (SOC) environment Hands … on knowledge of SIEM tools (Microsoft Sentinel, Splunk, etc.) Familiarity with MITRE ATT&CK and threat detection methodologies Strong analytical mindset with log, endpoint, and network analysis skills Understanding of network protocols (TCP/IP, DNS, HTTP, SMTP) Awareness of enterprise security architecture: firewalls, AV, VPNs, IDS/IPS Eligible for DV Clearance – British citizens who have resided in More ❯
Guildford, Surrey, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
ISO 27001, and other security standards. Risk Management: Maintain risk frameworks and produce assurance documentation. Secure by Design: Partner with project teams to integrate security requirements early in development. ThreatIntelligence: Research emerging threats and mitigation strategies. Testing & Audits: Oversee penetration tests and security audits. Policy Development: Keep security policies and staff training programs up to date. Requirements More ❯
Chelmsford, Essex, South East, United Kingdom Hybrid / WFH Options
Keystream Group Limited
over 9,000 users - working collaboratively across internal teams and over 100 partners and suppliers. Maintain external networks and collaborate across Greater Essex and with national partners to share intelligence and best practices. Drive innovation and lead continuous improvement in security practices and user assurance across all services delivered by EDS. Lead a team of approximately 15, including six … and execution of ECCs information and cyber security strategy, ensuring alignment with their overall risk appetite and transformation goals. Oversee governance, risk, compliance, and security operations including incident response, threatintelligence, vulnerability management, and penetration testing. Direct the selection, deployment, and maintenance of appropriate security technologies and processes to protect ECCs data and assets. You will be responsible More ❯
Hampshire, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
IT Security Specialist Counter Threat - HYBRID WORKING We have an exciting opportunity for an IT Security Specialist to join one of our biggest customers who are in the financial services sector. As an IT Security Specialist, you will support the day-to-day operations of the Counter Threat Unit, applying your strong background in infrastructure engineering, cloud-based … hybrid environments, leveraging your expertise in both on-premises and cloud platforms such as Azure, AWS, and GCP. Main Responsibilities as IT Security Specialist: Assist in gathering and analysing threatintelligence; monitor systems and networks to identify anomalies and support situational awareness. Follow established processes to help ensure compliance with legal, regulatory, and internal security requirements. Contribute to More ❯
scalability, automation, and resilience. Collaborating with security analysts, engineers, and stakeholders to ensure seamless integration of tools and workflows. Leading technical discussions and providing guidance on best practices for threat detection, incident response, and log management. Supporting pre-sales engagements with technical expertise and solution design input. Staying ahead of emerging threats and technologies to continuously improve SOC capabilities … . What You’ll Bring: Strong experience in designing and implementing SOC platforms (e.g., SIEM, SOAR, EDR). Deep understanding of security operations workflows, threatintelligence, and incident response. Hands-on experience with tools like Splunk, Sentinel, QRadar, or similar. Ability to engage with both technical and non-technical stakeholders. Familiarity with cloud environments (Azure, AWS, GCP) and More ❯
scalability, automation, and resilience. Collaborating with security analysts, engineers, and stakeholders to ensure seamless integration of tools and workflows. Leading technical discussions and providing guidance on best practices for threat detection, incident response, and log management. Supporting pre-sales engagements with technical expertise and solution design input. Staying ahead of emerging threats and technologies to continuously improve SOC capabilities … . What You’ll Bring: Strong experience in designing and implementing SOC platforms (e.g., SIEM, SOAR, EDR). Deep understanding of security operations workflows, threatintelligence, and incident response. Hands-on experience with tools like Splunk, Sentinel, QRadar, or similar. Ability to engage with both technical and non-technical stakeholders. Familiarity with cloud environments (Azure, AWS, GCP) and More ❯
london (city of london), south east england, united kingdom
Anson McCade
scalability, automation, and resilience. Collaborating with security analysts, engineers, and stakeholders to ensure seamless integration of tools and workflows. Leading technical discussions and providing guidance on best practices for threat detection, incident response, and log management. Supporting pre-sales engagements with technical expertise and solution design input. Staying ahead of emerging threats and technologies to continuously improve SOC capabilities … . What You’ll Bring: Strong experience in designing and implementing SOC platforms (e.g., SIEM, SOAR, EDR). Deep understanding of security operations workflows, threatintelligence, and incident response. Hands-on experience with tools like Splunk, Sentinel, QRadar, or similar. Ability to engage with both technical and non-technical stakeholders. Familiarity with cloud environments (Azure, AWS, GCP) and More ❯
Someone to assure security controls, manage vulnerabilities, and maintain policies A mentor to support junior analysts while contributing to governance and compliance work Strong technical background – SOC, incident response, threatintelligence or security engineering Experience with Microsoft Security tools (Sentinel, Defender, etc.) Knowledge of governance, risk and compliance frameworks (PCI, FCA, GDPR) Please apply if this would be More ❯
Someone to assure security controls, manage vulnerabilities, and maintain policies A mentor to support junior analysts while contributing to governance and compliance work Strong technical background – SOC, incident response, threatintelligence or security engineering Experience with Microsoft Security tools (Sentinel, Defender, etc.) Knowledge of governance, risk and compliance frameworks (PCI, FCA, GDPR) Please apply if this would be More ❯
objectives. Perform deep analysis and develop metrics that measure current risk Identify appropriate technology/data sources and drive the collection of data necessary to effectively evaluate threats. Communicate threatintelligence and vulnerability management options Analysing threats and current security controls to identify gaps in current defensive posture Meet with clients and leading workshops Candidates ideally need to More ❯
Surrey, England, United Kingdom Hybrid / WFH Options
Sanderson
business units - Act as a security advocate and guide cross-functional teams in secure practices. Lead technical initiatives - Provide hands-on leadership and mentor more junior team members. Conduct threat and vulnerability assessments - Take a proactive role in identifying potential security threats. Skills and experience required: Strong experience in risk & controls within the information security, ideally in a regulated … complex enterprise environments (e.g., multiple sites, technologies). Hands-on leadership in technical InfoSec initiatives. Strong understanding and implementation of control frameworks (NIST CSF, COBIT). Ability to run threatintelligence and vulnerability assessments. Experience collaborating with 2nd and 3rd line governance teams (e.g., audit, compliance). Strong stakeholder engagement and influencing skills. Reasonable Adjustments: Respect and equality More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Lorien
This role would be based on a hybrid working basis in Central London Experience Experience of working in Cyber Security, ideally within SOC Excellent stakeholder management skills Experience with threatintelligence platforms Active SC clearance would be required If you are an SC cleared Cyber Security Analyst looking for a new role, please apply now! Carbon60, Lorien & SRG More ❯
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threatintelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threatintelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
london (city of london), south east england, united kingdom
Iceberg
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threatintelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
london, south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
slough, south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
Bedford, Bedfordshire, South East, United Kingdom Hybrid / WFH Options
Total IT
clients, ensuring their IT environments are resilient against cyber threats. Act as a primary point of contact for clients, providing expert advice on cyber security measures, best practices, and threat management. Develop and maintain documentation, including best practice guides and incident reports, to educate clients and team members on security awareness. Conduct vulnerability assessments and participate in the development … members, fostering a culture of continuous learning and improvement within the security domain. Experience: Proven experience in a Security Consultant Role, with a strong background in incident response and threat intelligence. Familiarity with SIEM tools, CompTIA Security+, and other cyber security certifications are highly desirable. Collaborating with stakeholders and 3 rd parties. Creating security strategies and leading the implementation … skills, with the ability to convey complex information clearly and concisely. Demonstrated ability to manage projects, prioritize tasks, and meet deadlines in a fast-paced environment. Foundational knowledge in threat analysis, forensic investigations, and security countermeasures. The Candidate: We are seeking candidates with a comprehensive IT background, analytical problem-solving skills, and a keen understanding of cyber defence strategies. More ❯