all of us." - Julie Sweet, Accenture CEO In our team you will learn: How businesses can improve their ability to recover from a sophisticated cyberattack How industries and sectors differ in their approach to cyber resilience How to manage diverse clients, projects and internal teams How to interact with More ❯
all of us." - Julie Sweet, Accenture CEO In our team you will learn: How businesses can improve their ability to recover from a sophisticated cyberattack How industries and sectors differ in their approach to cyber resilience How to manage diverse clients, projects and internal teams How to interact with More ❯
all of us." - Julie Sweet, Accenture CEO In our team you will learn: How businesses can improve their ability to recover from a sophisticated cyberattack How industries and sectors differ in their approach to cyber resilience How to manage diverse clients, projects and internal teams How to interact with More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
RSM
The purpose of this role is to deliver our offensive security services including digital footprint reconnaissance, social engineering, vulnerability assessments, penetration testing, threat modelling, cyber-attack simulation exercises, and more to high profile clients across all industries. You'll benefit from ongoing coaching, career mentoring, and be supported by our More ❯
awareness and incident response readiness. *YOU ARE GOOD AT* * Strong verbal and written communication skills for stakeholder engagement and incident reporting. * Deep knowledge of cyber-attack techniques, including phishing, malware, ransomware, lateral movement, and data exfiltration. * Strong hands-on experience with SIEM, EDR, IDS/IPS, and forensic analysis tools. More ❯
source SIEMs, full packet capture tools, and network analysis tools (Splunk, Wireshark, SOF-ELK). Have a demonstrated knowledge of common intrusion methods and cyber-attack tactics, techniques, and procedures (TTPs). Exhibit skills using common Incident Response and Security Monitoring applications such as SIEM (Splunk), EDR (FireEye HX, CrowdStrike More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Experian Ltd
commercial & opensource SIEMs, full packet capture tools, and network analysis tools (Splunk, Wireshark, SOF-ELK) Have a demonstrated knowledge of common intrusion methods and cyber-attack tactics, techniques, and procedures (TTPs). Exhibit skills using common Incident Response and Security Monitoring?applications such as SIEM (Splunk), EDR (FireEye HX, CrowdStrike More ❯
insights into data, assets and infrastructure. Under its Securitas Summa program, Fenix24 ensures organizations are prepared to effectively resist and rapidly recover from a cyberattack, offering a combination of managed data and infrastructure protection, real-time threat intelligence, and ongoing hardening and breach resistance. About This Position The Lieutenant is More ❯
and incident response readiness. What You Are Good At Strong verbal and written communication skills for stakeholder engagement and incident reporting. Deep knowledge of cyber-attack techniques, including phishing, malware, ransomware, lateral movement, and data exfiltration. Strong hands-on experience with SIEM, EDR, IDS/IPS, and forensic analysis tools. More ❯
ruling and tuning Enterprise level SIEM tools. Extensive operations experience (minimum of 3+ years). Extensive knowledge of Security including types and methods of cyber-attack and underlying network protocols. Extensive experience escalating incidents to, and in driving incident resolution with, technology vendors and stakeholders. Demonstrable experience in supporting large More ❯
managing and collaborating with multiple team members and reporting progress to stakeholders. Experience in managing security incidents on behalf of stakeholders. Experience within Defensive Cyber-attack methodologies and frameworks. Foundational level of scripting knowledge is desirable. 2+ years' experience working within Security Operations Centres (SOCs) or as a security analyst More ❯
and experience analysing and interpreting security logs, event data, and alerts to identify potential threats Knowledge and experience of network protocols, traffic analysis, and cyber-attack methodologies Knowledge and experience of threat intelligence, risk management, vulnerability management, and penetration testing Please note sponsorship is not available for this position, and More ❯
glasgow, central scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
scenario testing. What They're Looking For Extensive experience in cybersecurity incident response and operational leadership within a Security Operations environment. Strong knowledge of cyberattack vectors, threat actors, and risk mitigation strategies. Proficiency in cybersecurity metrics, risk management, and incident response best practices. Excellent communication and stakeholder management skills. More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Eden Scott
leadership, offering insight into incidents, risks, and ongoing threat landscapes. 💡 Your background: Proven experience leading incident response operations and cybersecurity investigations. Deep understanding of cyberattack vectors, threat actors, and red team/blue team methodologies. Strong analytical skills with a data-driven approach to incident management and risk assessment. More ❯
RCA) for security incidents and the tracking of actions to prevent incident recurrence and strengthen relevant controls. Plan, execute and learn lessons from regular cyber-attack simulation exercises to test the company’s IT and organisation resilience to improve cyber defences and attack preparedness. Manage and maintain the suite of More ❯
processing systems, identifying potential weaknesses and recommending suitable protection measures. Participating in red teaming and simulation exercises (technical & non-technical), to better understand our cyber-attack and defence posture, rehearse responses, and evaluate readiness. Assisting with the creation and delivery of security awareness collateral, promoting an effective security culture. Providing More ❯
against advanced persistent threats and state-level actors. We have more junior roles for exceptional individuals with a proven personal interest and engagement in cyberattack and defence, and outstanding academic and career performance even if experience is limited. Our goal is to build an entirely new level of assurance More ❯
Durham, County Durham, United Kingdom Hybrid / WFH Options
National Savings and Investments
ensure the agreed Disaster Recovery (DR) standards across the NS&I IT estate. This will help ensure the impacts of an outage, disaster, or cyber-attack affecting IT systems can be recovered in a timely manner. The role holder will also be required to work with all suppliers from across More ❯
The role defines appropriate policies and standards, oversees information security strategy and improvement initiatives, and ensures the university remains a resilient organisation, resistant to cyber-attack and hostile activity. We value, empower, and support every member of staff to get the best out of your unique talents, so you'll More ❯
activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY SKILLS Technical cyber security knowledge and practical experience of cloud computing technologies e.g. AWS, GCP and Azure. Detailed understanding More ❯
activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY SKILLS Technical cyber security knowledge and practical experience of cloud computing technologies e.g. AWS, GCP and Azure. Detailed understanding More ❯
activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY SKILLS Technical cyber security knowledge and practical experience of cloud computing technologies e.g. AWS, GCP and Azure. Detailed understanding More ❯
activities performed and presenting them to management and stakeholders, highlighting any areas for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY SKILLS Technical cyber security knowledge and practical experience of cloud computing technologies e.g. AWS, GCP and Azure. Detailed understanding More ❯
with all local and corporate regulatory controls to deliver control systems which are Cyber secure to prevent Process Safety catastrophic events due to a Cyber-attack whilst ensuring production is optimized by efficient utilization of Control systems. Manage the day-to-day engineering, maintenance and troubleshooting requirements related to BPCS More ❯
the EUC environment to support the organisation in better ways. Ensure that the EUC environment remains secure, protecting HSE's data and users from cyber-attack and unauthorised loss. Engage with users, supporting their needs and ensuring that a high quality, customer-focused service is delivered. More ❯