Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Thames Water offices as required Working More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
be responsible for safeguarding our critical scientific and technological assets. This role demands a proactive leader with deep expertise in Security Operations, Risk & Compliance Management, Identity & Access Management and the ability to work cross-functionally with IT, research teams and executive leadership. The successful candidate will be instrumental … Engineering Develop, implement, and oversee enterprise-wide security operations to detect, prevent, and respond to cyber threats. Lead and enhance Security Information and Event Management (SIEM) and Threat Intelligence capabilities. Lead security incident response and forensic investigations, ensuring robust incident handling and mitigation. Report on cybersecurity KPIs and manage … significant IS risks and their appropriate Risk Treatment Plans. Risk & Compliance Management Define and enforce IT security policies, standards, and procedures. Ensure compliance with industry accreditations (e.g., ISO 27001, NIST, GDPR), working closely with external auditors and regulatory bodies. Conduct regular risk assessments and vulnerabilitymanagement, and More ❯
SOC) , with one analyst reporting to you Oversee incident response , manage security incidents from detection to resolution Work closely with the compliance manager on vulnerabilitymanagement Architect secure solutions, validate baseline configurations, and recommend improvements to stay compliant Collaborate with key stakeholders including Compliance and Infrastructure teams Required … network security and firewalls Exposure to PenTesting methodologies or practices (desirable) Experience with NAC solutions like Cisco ISE , ForeScout , or similar Strong grasp of vulnerabilitymanagement processes Desired Certifications Microsoft Security certifications (preferred) CISM or CISSP (beneficial, not essential) Apply now or reach out for a confidential chat More ❯
SOC) , with one analyst reporting to you Oversee incident response , manage security incidents from detection to resolution Work closely with the compliance manager on vulnerabilitymanagement Architect secure solutions, validate baseline configurations, and recommend improvements to stay compliant Collaborate with key stakeholders including Compliance and Infrastructure teams Required … network security and firewalls Exposure to PenTesting methodologies or practices (desirable) Experience with NAC solutions like Cisco ISE , ForeScout , or similar Strong grasp of vulnerabilitymanagement processes Desired Certifications Microsoft Security certifications (preferred) CISM or CISSP (beneficial, not essential) Apply now or reach out for a confidential chat More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Banco Santander SA
you'll bring: Essential requirements: Knowledge and experience in Cyber Security disciplines such as network analysis, host analysis, malware analysis, penetration testing, EDR, SIEM, vulnerabilitymanagement, or incident response in cloud environments Experience working within a SOC or similar team investigating security alerts Understanding of Threat Actor Tactics More ❯
Newbury, Berkshire, United Kingdom Hybrid / WFH Options
Vodafone
comply with Baseline Security Requirements and security policy. Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & Access Management, SIEM and Vulnerability Management. Ensure internal customers, external suppliers and delivery partners are aware of security standards and future … of IT and telecommunications solutions. Competent in applying security policies and principles defined in security architecture to real world scenarios. Understands and applies risk management principles. Effective communication skills to influence stakeholders and explain complex security requirements in simple terms. Stakeholder Management - established as the go-to person More ❯
reading, south east england, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
academic environment. Access ongoing professional development opportunities and cutting-edge security tools. Responsibilities: Lead and manage security operations, including threat detection, incident response, and vulnerability management. Act as a technical manager for identity and access management services, ensuring secure, automated access for university staff and students. Design and … relevant professional networks. Skills/Must Have: Proven experience managing security operations, including SIEM, EDR, and incident response. Strong knowledge of identity and access management technologies (e.g., Microsoft Entra, M365). Familiarity with network security best practices, including firewall management, network segmentation, and intrusion detection. Exceptional troubleshooting skills More ❯