Reading, England, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Limited
ideal candidate will have advanced expertise in monitoring, analyzing, and mitigating cybersecurity threats, as well as managing security tools and mentoring junior analysts. This role involves proactive threat hunting, incidentresponse, and collaboration with cross-functional teams to enhance the organization s security posture. Key responsibilities: Incident Detection and Response: Lead investigations and remediation of complex … and other security technologies to analyze and correlate security alerts. Take ownership of Tier 3-level escalations from Tier 1 and Tier 2 analysts and guide them through complex incidentresponse procedures. Threat Hunting & Analysis: Proactively search for threats across the environment using behavioral analysis and threat intelligence data. Analyze data from logs, network traffic, endpoint activities, and … threat intelligence feeds to detect unusual or malicious activity. Collaborate with other security teams to uncover hidden threats and vulnerabilities. Incident Forensics: Perform in-depth forensic analysis to determine the scope, impact, and root cause of security incidents. Collect, preserve, and analyze evidence related to breaches, intrusions, or malware infections while adhering to legal and regulatory requirements. Prepare reports More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Focus on SAP
We are seeking an experienced and highly capable SOC Tier 3 Analyst to serve as a senior member of our Security Operations Center (SOC). You will lead advanced incidentresponse efforts, conduct proactive threat hunting, perform digital forensics, and collaborate cross-functionally to safeguard our digital assets and infrastructure. This is a pivotal role for those passionate … about cybersecurity, threat detection, and investigative analysis. Key Responsibilities 🔍 Advanced Incident Detection & Response Lead the investigation and resolution of complex cyber incidents, including APTs, malware outbreaks, and data breaches. Take charge of escalated alerts from Tier 1 and 2 analysts and guide them through advanced response protocols. Utilize SIEM, EDR, and threat intelligence platforms to perform deep … to uncover hidden anomalies or malicious behavior. Partner with security engineering teams to build detection capabilities based on evolving threats. 🔬 Digital Forensics & Investigation Conduct detailed forensic investigations to determine incident scope, root cause, and impact. Collect and preserve digital evidence in accordance with legal and regulatory standards. Deliver comprehensive findings, timelines, and impact reports. 🛠 Remediation & Recovery Advise on containment More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
In Technology Group Limited
and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure system architecture and application development. Maintain and enhance incidentresponse procedures and disaster recovery plans. Investigate and document security breaches, providing root cause analysis and remediation plans. Conduct security awareness training for staff and ensure compliance with More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
security stacks. You will handle complex incidents like APTs, malware, and data breaches, ensuring swift, effective responses to minimize risk to the organization and its clients. Key Responsibilities: 1. Incident Detection and Response: o Utilize advanced SIEM (Security Information and Event Management) tools, threat intelligence platforms, and other security technologies to analyze and correlate security alerts. 2. Threat … the environment using behavioural analysis and threat intelligence data. o Analyse data from logs, network traffic, endpoint activities, and threat intelligence feeds to detect unusual or malicious activity. 3. Incident Forensics: o Perform in-depth forensic analysis to determine the scope, impact, and root cause of security incidents. o Collect, preserve, and analyze evidence related to breaches, intrusions, or … Collaborate with threat intelligence teams to identify indicators of compromise (IOCs) and ensure proper actions are taken to block further attacks. 5. Compliance and Risk Management: o Ensure all incidentresponse activities align with industry standards, regulations, and best practices (e.g., NIST, ISO 27001, GDPR, HIPAA). o Work with legal and compliance teams to manage incidents within More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Morgan Hunt
day-to-day security operations and services, both in-house and outsourced Lead a small team covering Microsoft 365, identity management, and security Oversee security tools, monitoring systems, and incidentresponse Guide improvements to identity and access processes with a focus on automation Work with IT teams to ensure security is built into systems and projects Maintain a … high-quality technical services Other Commitment to ongoing training and development Willing to travel between sites if needed Desirable Criteria Experience managing Microsoft 365 services ITIL certification or similar Incidentresponse training (e.g., CREST, GIAC) Knowledge of public cloud (Azure, Oracle Cloud) Experience in 24/7 operations Familiarity with AHV Hypervisor Experience working with teams beyond core More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
National Grid plc
collaborative and innovative environment. Stakeholder Communication: Act as a key point of contact for security-related matters, effectively communicating complex technical concepts to both technical and non-technical stakeholders. IncidentResponse: Lead the response to security incidents, coordinating with relevant teams to contain and remediate issues quickly and effectively. Continuous Improvement: Drive continuous improvement initiatives to enhance More ❯
Designing and architecting secure IT environments: This may involve network security design, cloud security architecture (AWS, Azure, GCP), and implementing security technologies. Developing and assisting in the implementation of incidentresponse plans: Creating documented procedures for handling security breaches and other incidents. Conducting tabletop exercises and simulations: Helping organizations practice their incidentresponse procedures. Delivering technical More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Allica Bank
threats. Lead, mentor and grow a high-performing team of security engineers. Provide leadership in the creation of security awareness programs. Be a key player in the organisation's incidentresponse efforts. Personal Attributes & Experience Deep experience with endpoint monitoring, CSPM, network security, intrusion detection and management. Proven track record in managing continuous threat exposure management programs and More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
DCL
remote Berkshire SC-200 Senior SOC Analyst Level 2/3 to join a specialist Managed Security Services business. You will be responsible for advanced threat hunting/triage, incidentresponse etc with a strong focus on the Microsoft Security Stack. Key Responsibilities: Lead and resolve complex security incidents/escalations Conduct advanced threat hunting using the Microsoft … Security Stack. Build, optimise and maintain workbooks, rules, analytics etc. Correlate data across Microsoft 365 Defender, Azure Defender and Sentinel. Perform root cause analysis and post-incident reporting. Aid in mentoring and upskilling Level 1 and 2 SOC analysts. Required Skills & Experience: The ability to achieve UK Security Clearance (SC) - existing clearance ideal. (Sorry no visa applications) Must have More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Ciphr
performance of cloud services, delivering a seamless and high quality experience for end users. Take accountability of the on-call rota, ensuring appropriate coverage, managing participation, and leading rapid incidentresponse to maintain service availability Continuously assess and improve team processes and procedures, fostering a culture of innovation and engineering excellence to optimise performance and minimise downtime. Act More ❯
Financial Service firm seeks an IncidentResponse Manager to join their CIRT team. This role plays an essential part in the safeguarding of the firm’s assets, and the strengthening of the firm’s Cyber Security posture. Elements of the role will include but not limited to the following: Lead Security incidents, driving Global remediation efforts. Run tabletop … technical stakeholders, including Senior Leadership. Ensure Vulnerabilities highlighted by the CTI team or Vulnerability Management team are correctly triaged and if required prepare a remediation plan and ensure an incident is stood up to coordinate this including any required detection rules to provide coverage pending remediation. Lesson learnt write up. If you are looking to be part of a More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
adversarial testing, model bias assessments, and trustworthiness evaluations. Contribute to training and awareness initiatives on AI/ML security best practices. Act as a key stakeholder in AI-related incidentresponse and mitigation. Your Profile Essential Experience & Skills Proven experience as a Security Architect with direct focus on AI/ML security. Strong knowledge of AI/ML More ❯
Slough, Berkshire, United Kingdom Hybrid / WFH Options
Modix International
We're on the lookout for a strategic and hands-on leader to own the end-to-end delivery of IT services-covering Service Desk, End User Computing, Major Incident, Change & Problem Management, Service Transition, and Supplier Management. As part of our Product & Technology Group , you'll drive a culture of service excellence, lead cross-functional improvements, and ensure … Europe. What You'll Do Lead and develop high-performing service teams Own service management strategy aligned with ITIL and ISO standards Ensure smooth operations, change management, and major incidentresponse Drive continual improvement through data, insight, and collaboration Act as a key liaison between senior stakeholders , service providers, and CAPTG teams Support the Director of Service & Infrastructure More ❯