Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
set up the team's processes and frameworks Lead on a number of Cyber IT and OT defined projects. What you'll need to succeed Experience of use-case analysis Experience of systems modelling and design using UML Experience of modelling security architecture using ArchiMate or similar tools Experience of using architecture modelling software (e.g., Enterprise Architect) Ability to … work independently and as part of a team. Excellent communication and interpersonal skills. Ability to obtain UK Security Clearance Familiarity with User BehaviouralAnalysis Hands on experience of being heavily involved with a security maturity improvement program Skilled in reviewing and analysing security controls for their suitability Experience of drafting Security Solutions Design documentation sets Strong experience in More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Thames Water
delivery of asset health performance commitments. Maintain and deploy operational performance reports and regulatory reporting, to deliver accurate and trusted reports and insights, with appropriate commentary. Undertake performance and behaviouralanalysis on waste network assets, interpreting asset and operational data to identify performance trends and risk insights, and disseminate findings with appropriate visualisations and commentary. Develop and maintain More ❯
candidate will play a key role in identifying, investigating, and mitigating risks posed by insiders - whether malicious, negligent, or compromised. This role requires a blend of technical investigation, behavioral analysis, and business awareness to detect and respond to potential insider threats, ensuring both security and ethical standards are upheld. Key Responsibilities Monitor, investigate, and analyze insider-related activities across … management and employee privacy. What You Will Ideally Bring 3+ years’ experience in cybersecurity operations, insider threat programs, or related investigative/analytical roles (SOC, threat detection, or risk analysis). Hands-on experience with tools such as SIEM, DLP, UEBA, EDR, or SOAR . Strong understanding of data protection, behavioral analysis, and incident response principles. Experience managing More ❯