Exeter, Devon, South West, United Kingdom Hybrid / WFH Options
Hunter Selection
safe use of IT infrastructure, and update relevant technical documentation. Skills and Experience: MS Windows Environment experience CCNA/CCNP Accreditation Awareness of cyberthreats and how to manage them is absolutely essential. Cat6/fibre communication protocol skills Network - routers, switches, firewalls, LAN/WAN, servers Active More ❯
basis. BMC is looking for a Product Manager to join our amazing team! The BMC AMI Cloud Vault product provides mainframe cyberthreat protection that enables customers to create highly secure, off-platform backup copies of mainframe data—and quickly recover it in case of an attack. … This complex and mission-critical product plays a pivotal role in safeguarding data, providing peace of mind, and ensuring resilience against cyber threats. In this role, you will lead the transformation of this cutting-edge product originally developed by Model9, a startup acquired by BMC, into a solution More ❯
basis. BMC is looking for a Product Manager to join our amazing team! The BMC AMI Cloud Vault product provides mainframe cyberthreat protection that enables customers to create highly secure, off-platform backup copies of mainframe data—and quickly recover it in case of an attack. … This complex and mission-critical product plays a pivotal role in safeguarding data, providing peace of mind, and ensuring resilience against cyber threats. In this role, you will lead the transformation of this cutting-edge product originally developed by Model9, a startup acquired by BMC, into a solution More ❯
basis. BMC is looking for a Product Manager to join our amazing team! The BMC AMI Cloud Vault product provides mainframe cyberthreat protection that enables customers to create highly secure, off-platform backup copies of mainframe data—and quickly recover it in case of an attack. … This complex and mission-critical product plays a pivotal role in safeguarding data, providing peace of mind, and ensuring resilience against cyber threats. In this role, you will lead the transformation of this cutting-edge product originally developed by Model9, a startup acquired by BMC, into a solution More ❯
basis. BMC is looking for a Product Manager to join our amazing team! The BMC AMI Cloud Vault product provides mainframe cyberthreat protection that enables customers to create highly secure, off-platform backup copies of mainframe data—and quickly recover it in case of an attack. … This complex and mission-critical product plays a pivotal role in safeguarding data, providing peace of mind, and ensuring resilience against cyber threats. In this role, you will lead the transformation of this cutting-edge product originally developed by Model9, a startup acquired by BMC, into a solution More ❯
basis. BMC is looking for a Product Manager to join our amazing team! The BMC AMI Cloud Vault product provides mainframe cyberthreat protection that enables customers to create highly secure, off-platform backup copies of mainframe data—and quickly recover it in case of an attack. … This complex and mission-critical product plays a pivotal role in safeguarding data, providing peace of mind, and ensuring resilience against cyber threats. In this role, you will lead the transformation of this cutting-edge product originally developed by Model9, a startup acquired by BMC, into a solution More ❯
basis. BMC is looking for a Product Manager to join our amazing team! The BMC AMI Cloud Vault product provides mainframe cyberthreat protection that enables customers to create highly secure, off-platform backup copies of mainframe data—and quickly recover it in case of an attack. … This complex and mission-critical product plays a pivotal role in safeguarding data, providing peace of mind, and ensuring resilience against cyber threats. In this role, you will lead the transformation of this cutting-edge product originally developed by Model9, a startup acquired by BMC, into a solution More ❯
basis. BMC is looking for a Product Manager to join our amazing team! The BMC AMI Cloud Vault product provides mainframe cyberthreat protection that enables customers to create highly secure, off-platform backup copies of mainframe data—and quickly recover it in case of an attack. … This complex and mission-critical product plays a pivotal role in safeguarding data, providing peace of mind, and ensuring resilience against cyber threats. In this role, you will lead the transformation of this cutting-edge product originally developed by Model9, a startup acquired by BMC, into a solution More ❯
south west london, south east england, united kingdom
BMC Software
basis. BMC is looking for a Product Manager to join our amazing team! The BMC AMI Cloud Vault product provides mainframe cyberthreat protection that enables customers to create highly secure, off-platform backup copies of mainframe data—and quickly recover it in case of an attack. … This complex and mission-critical product plays a pivotal role in safeguarding data, providing peace of mind, and ensuring resilience against cyber threats. In this role, you will lead the transformation of this cutting-edge product originally developed by Model9, a startup acquired by BMC, into a solution More ❯
swindon, wiltshire, south west england, united kingdom
BMC Software
basis. BMC is looking for a Product Manager to join our amazing team! The BMC AMI Cloud Vault product provides mainframe cyberthreat protection that enables customers to create highly secure, off-platform backup copies of mainframe data—and quickly recover it in case of an attack. … This complex and mission-critical product plays a pivotal role in safeguarding data, providing peace of mind, and ensuring resilience against cyber threats. In this role, you will lead the transformation of this cutting-edge product originally developed by Model9, a startup acquired by BMC, into a solution More ❯
Play a Critical Role in Global Cyber Defence – Join a Leading Cyber Operations Team! Salary: £70,000 + Benefits Location: Newbury – 2 Days On-Site Type: Permanent Are you an experienced SOC Analyst looking to make a real impact in defending against high-severity cyber … and reporting on risks with precision. Key Responsibilities Lead Incident Investigations – Take ownership of high-severity security incidents, ensuring complete and accurate triage Advanced Threat Analysis – Perform deep-dive analysis to uncover root causes, residual risks, and stealthy attack vectors Mentor and Guide – Support junior analysts with expertise and … source) to detect and analyse modern threats Fine-Tuning & Reporting – Tune SIEM and SOAR systems for accuracy, and deliver clear, actionable incident reports Technical Threat Intelligence – Stay ahead of emerging attack vectors, especially those identified via EDR; apply this insight to investigations and tuning efforts What You’ll Bring More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Motability Operations
Security Engineer is responsible for designing, implementing, and maintaining MO's data security frameworks to safeguard sensitive information against unauthorised access, breaches and cyber threats. This role focuses on identifying vulnerabilities, establishing robust security protocols and ensuring compliance with industry standards and regulatory requirements. The Data Security Engineer … explaining technical concepts to non-technical stakeholders, ensuring alignment across teams. Collaborative and adaptable you enjoy staying current with emerging technologies and evolving cyber threats. Integrity, resourcefulness and a commitment to continuous improvement define your approach to ensuring data security and organisational resilience. Qualifications Minimum Criteria You'll … need all of these. Experience in a hands-on Cyber Security focused role, primarily in the data security domain. A strong & demonstratable knowledge of security frameworks, standards and regulations (NIST, GDPR for example). Familiarity with cloud security principles and experience working with cloud platforms such as AWS More ❯
Employment Type: Permanent, Part Time, Work From Home
user productivity and associated systems. This role is critical in shaping and enforcing a secure environment, aligning with organizational goals, compliance mandates, and evolving threat landscapes. This role is a pivotal role which resides in the delivery function but must have strong relationships with Information Security function to help … Provide architectural security assurance for other technologies which fall into the delivery portfolio. Guide governance around identity, access management, data protection, device management, and threat protection within the M365 ecosystem. Collaborate with stakeholders across IT, security, legal, and compliance teams to ensure alignment on security policies and controls. Conduct … technical leadership for incident response and remediation related to M365 and other end user services. Stay current with M365 roadmap developments and evolving cyberthreats to proactively recommend improvements. Required Skills and Qualifications: Extensive experience in architecting secure M365 solutions in complex enterprise environments. Deep expertise in Microsoft More ❯
bath, south west england, United Kingdom Hybrid / WFH Options
Context Recruitment
and strengthen security operations at scale. A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation … for enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security analysts, engineers … contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security More ❯
gloucester, south west england, United Kingdom Hybrid / WFH Options
Context Recruitment
and strengthen security operations at scale. A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation … for enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security analysts, engineers … contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security More ❯
cheltenham, south west england, United Kingdom Hybrid / WFH Options
Context Recruitment
and strengthen security operations at scale. A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation … for enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security analysts, engineers … contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security More ❯
exeter, south west england, United Kingdom Hybrid / WFH Options
Context Recruitment
and strengthen security operations at scale. A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation … for enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security analysts, engineers … contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security More ❯
plymouth, south west england, United Kingdom Hybrid / WFH Options
Context Recruitment
and strengthen security operations at scale. A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation … for enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security analysts, engineers … contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security More ❯
bournemouth, south west england, United Kingdom Hybrid / WFH Options
Context Recruitment
and strengthen security operations at scale. A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation … for enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security analysts, engineers … contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security More ❯
bristol, south west england, United Kingdom Hybrid / WFH Options
Context Recruitment
and strengthen security operations at scale. A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation … for enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security analysts, engineers … contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security More ❯
south west london, south east england, United Kingdom Hybrid / WFH Options
Context Recruitment
and strengthen security operations at scale. A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation … for enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security analysts, engineers … contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security More ❯
swindon, wiltshire, south west england, United Kingdom Hybrid / WFH Options
Context Recruitment
and strengthen security operations at scale. A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation … for enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security analysts, engineers … contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security More ❯
Kingdom + Travel to Clients on Request The Client Success Team is composed of Client Success Managers (CSMs) who are well versed in cyber security, and whose purpose is to assist customers in getting the most value out of BlueVoyant platform and solutions. BlueVoyant’s renowned cybersecurity SaaS … offerings, benefits, SOPs and deliverables without hesitation Advanced understanding of assigned BV Specific Product sets Qualifications: 5+ years of client services, IT and cyber security background Extensive experience managing large, complex accounts with multiple LOB’s and stakeholders Able to operate independently with minimal support from leadership Able … and top national firms Security +, Network +, CISSP, and other relevant certifications preferred About BlueVoyant At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics, and technology, coupled with deep expertise, works as More ❯
Kingdom + Travel to Clients on Request The Client Success Team is composed of Client Success Managers (CSMs) who are well versed in cyber security, and whose purpose is to assist customers in getting the most value out of BlueVoyant platform and solutions. BlueVoyant’s renowned cybersecurity SaaS … offerings, benefits, SOPs and deliverables without hesitation Advanced understanding of assigned BV Specific Product sets Qualifications: 5+ years of client services, IT and cyber security background Extensive experience managing large, complex accounts with multiple LOB’s and stakeholders Able to operate independently with minimal support from leadership Able … and top national firms Security +, Network +, CISSP, and other relevant certifications preferred About BlueVoyant At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics, and technology, coupled with deep expertise, works as More ❯
Kingdom + Travel to Clients on Request The Client Success Team is composed of Client Success Managers (CSMs) who are well versed in cyber security, and whose purpose is to assist customers in getting the most value out of BlueVoyant platform and solutions. BlueVoyant’s renowned cybersecurity SaaS … offerings, benefits, SOPs and deliverables without hesitation Advanced understanding of assigned BV Specific Product sets Qualifications: 5+ years of client services, IT and cyber security background Extensive experience managing large, complex accounts with multiple LOB’s and stakeholders Able to operate independently with minimal support from leadership Able … and top national firms Security +, Network +, CISSP, and other relevant certifications preferred About BlueVoyant At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics, and technology, coupled with deep expertise, works as More ❯