including tools, processes, and team structure. Provide 24/7 oversight of security operations across multiple time zones. Create and maintain SOC playbooks and incidentresponse procedures. OT Security Lead integration of IT and OT monitoring solutions. Build OT-specific detection and response capabilities, including custom playbooks. … source experience. Technical expertise with SIEM, SOAR, EDR, and OT protocols Familiar with SCADA/ICS environments and MITRE ATT&CK framework. Skilled in incidentresponse, threat hunting, SLA management, and executive communication. Preferred Qualifications Degree in Computer Science, InfoSec, or related field. Certifications: CISSP, CISM, GIAC (e.g. More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Intaso
including tools, processes, and team structure. Provide 24/7 oversight of security operations across multiple time zones. Create and maintain SOC playbooks and incidentresponse procedures. OT Security Lead integration of IT and OT monitoring solutions. Build OT-specific detection and response capabilities, including custom playbooks. … source experience. Technical expertise with SIEM, SOAR, EDR, and OT protocols Familiar with SCADA/ICS environments and MITRE ATT&CK framework. Skilled in incidentresponse, threat hunting, SLA management, and executive communication. Preferred Qualifications Degree in Computer Science, InfoSec, or related field. Certifications: CISSP, CISM, GIAC (e.g. More ❯
bristol, south west england, United Kingdom Hybrid / WFH Options
Datamine
implement, and manage the global cybersecurity strategy. Oversee information security risk assessments and mitigation plans. Establish and enforce cybersecurity policies, procedures, and standards. Lead incidentresponse efforts, including investigation, resolution, and post-incident reviews. Monitor, analyse, and respond to threats across global IT environments. Manage security tools … business. Strong understanding of enterprise security technologies and best practices. Professional certifications such as CISSP, CISM, or CISA are highly desirable. Proven experience managing incidentresponse and regulatory compliance. Excellent analytical and communication skills. Comfortable operating in complex, cross-functional environments. What do you get in return? There More ❯
Digital Operational Resilience Act) - EU financial sector PCI-DSS (if handling payment data) Experience in: Managing vendor risk assessments for third-party compliance. Handling incidentresponse & reporting (e.g., Data Breach Notifications under GDPR). Key Skills & Technical Knowledge: Deep understanding of data protection laws (UK GDPR, EU GDPR … applicable standards. Align ISMS activities with ISO 27001 framework. Develop and implement security policies, controls, and procedures. Conduct security risk assessments & compliance audits. Manage incidentresponse & data breach reporting (ICO & EU authorities). Liaise with regulators, legal teams, and third-party auditors. Deliver security awareness training across the More ❯
cutting-edge technologies in a fast-paced, collaborative environment. What You'll Do Lead 24/7 SOC operations, ensuring timely threat detection and incidentresponse Drive continuous improvement in SOC processes, playbooks, and performance metrics Manage, mentor, and grow a team of SOC Analysts and Security Specialists … SIEM, EDR, SOAR, IDS/IPS, Firewalls, and cloud security Deep understanding of MITRE ATT&CK, NIST, ISO 27001, CIS frameworks Proven experience in incidentresponse, threat intelligence, and multi-tenant SOCs Excellent leadership, communication, and client engagement skills Bonus Points for Certifications such as CISSP, CISM, GIAC More ❯
hampshire, south east england, United Kingdom Hybrid / WFH Options
Computappoint
cutting-edge technologies in a fast-paced, collaborative environment. What You’ll Do Lead 24/7 SOC operations, ensuring timely threat detection and incidentresponse Drive continuous improvement in SOC processes, playbooks, and performance metrics Manage, mentor, and grow a team of SOC Analysts and Security Specialists … SIEM, EDR, SOAR, IDS/IPS, firewalls, and cloud security Deep understanding of MITRE ATT&CK, NIST, ISO 27001, CIS frameworks Proven experience in incidentresponse, threat intelligence, and multi-tenant SOCs Excellent leadership, communication, and client engagement skills Bonus Points for Certifications such as CISSP, CISM, GIAC More ❯
healthcare needs of the future. As a Senior Information Security Engineer you will conduct network security investigations, cloud forensics, log analysis, host-based forensics, incidentresponse, and case management. Candidates should be proficient at communicating verbal and written findings to stakeholders at all levels of the enterprise regarding … providing training and guidance through complex incidents Identify deficiencies in processes and tools, make corrective recommendations, and drive implementation of solutions and efficiencies Monitor incident throughput and ensure team consistently follows established processes Improve incidentresponse times, establishing SLAs Integrate and collaborate with other subject matter experts … investigation and other related fields Proven experience conducting complex forensic investigations using industry standard forensic tools including but not limited to EnCase, FTK, F-Response or X-Ways Experience with cloud environments and Forensics techniques in Azure, AWS, and GCP cloud services providers. Knowledge of enterprise level triage; collecting More ❯
optimal resource allocation. Compliance and Risk Management: Ensure infrastructure compliance with relevant regulations and standards, as well as mitigation of security risks and vulnerabilities. IncidentResponse: Lead and or participate in incidentresponse team(s) during events that impact business operations. Disaster Recovery and Business Continuity More ❯
s integrity and performance. You'll have freedom to help research and recommend solutions for hosting applications at scale. You'll be fundamental in incidentresponse, troubleshooting and containing issues. Key responsibilities Debug Node.js applications and contribute to their optimisation and performance tuning. Configuration and ongoing management of … of workloads using a scripting language like Python or JavaScript Strong problem-solving skills and the ability to troubleshoot complex issues. Good understanding of incidentresponse best practices, post-incident reviews, and continuous improvement. Ability and willingness to proactively improve ways of working and processes. Desire to More ❯
workingclosely with cross-functional teams to ensure the products meet the highestsecurity standards and address customer needs. You’ll play a critical role in incidentresponse, swiftly investigating andmitigating security breaches to minimize their impact and proactively monitorand detect emerging threats and communicate findings to stakeholders. Additional responsibilities … to ensure compliance withregulatory requirements and industry best practices. - Protecting systems by defining access privileges, control structures, andresources. - Implement and maintain security controls. - Providing incidentresponse in the event of a security incident or breach. - Monitoring systems and networks for intrusions, attacks and unusual activity. - Keeping up … designing and implementing secureapplication architectures, including authentication mechanisms, accesscontrols, encryption, and secure communication protocols Who we’re looking for You’ll have experience in incident management processes and tools, as well asworking with APIs (Application Programming Interfaces) for integrating securitysolutions. This role also requires experience of key cybersecurity controls More ❯
doncaster, yorkshire and the humber, united kingdom
Drax
workingclosely with cross-functional teams to ensure the products meet the highestsecurity standards and address customer needs. You’ll play a critical role in incidentresponse, swiftly investigating andmitigating security breaches to minimize their impact and proactively monitorand detect emerging threats and communicate findings to stakeholders. Additional responsibilities … to ensure compliance withregulatory requirements and industry best practices. - Protecting systems by defining access privileges, control structures, andresources. - Implement and maintain security controls. - Providing incidentresponse in the event of a security incident or breach. - Monitoring systems and networks for intrusions, attacks and unusual activity. - Keeping up … designing and implementing secureapplication architectures, including authentication mechanisms, accesscontrols, encryption, and secure communication protocols Who we’re looking for You’ll have experience in incident management processes and tools, as well asworking with APIs (Application Programming Interfaces) for integrating securitysolutions. This role also requires experience of key cybersecurity controls More ❯
workingclosely with cross-functional teams to ensure the products meet the highestsecurity standards and address customer needs. You’ll play a critical role in incidentresponse, swiftly investigating andmitigating security breaches to minimize their impact and proactively monitorand detect emerging threats and communicate findings to stakeholders. Additional responsibilities … to ensure compliance withregulatory requirements and industry best practices. - Protecting systems by defining access privileges, control structures, andresources. - Implement and maintain security controls. - Providing incidentresponse in the event of a security incident or breach. - Monitoring systems and networks for intrusions, attacks and unusual activity. - Keeping up … designing and implementing secureapplication architectures, including authentication mechanisms, accesscontrols, encryption, and secure communication protocols Who we’re looking for You’ll have experience in incident management processes and tools, as well asworking with APIs (Application Programming Interfaces) for integrating securitysolutions. This role also requires experience of key cybersecurity controls More ❯
tadcaster, yorkshire and the humber, united kingdom
Drax
workingclosely with cross-functional teams to ensure the products meet the highestsecurity standards and address customer needs. You’ll play a critical role in incidentresponse, swiftly investigating andmitigating security breaches to minimize their impact and proactively monitorand detect emerging threats and communicate findings to stakeholders. Additional responsibilities … to ensure compliance withregulatory requirements and industry best practices. - Protecting systems by defining access privileges, control structures, andresources. - Implement and maintain security controls. - Providing incidentresponse in the event of a security incident or breach. - Monitoring systems and networks for intrusions, attacks and unusual activity. - Keeping up … designing and implementing secureapplication architectures, including authentication mechanisms, accesscontrols, encryption, and secure communication protocols Who we’re looking for You’ll have experience in incident management processes and tools, as well asworking with APIs (Application Programming Interfaces) for integrating securitysolutions. This role also requires experience of key cybersecurity controls More ❯
workingclosely with cross-functional teams to ensure the products meet the highestsecurity standards and address customer needs. You’ll play a critical role in incidentresponse, swiftly investigating andmitigating security breaches to minimize their impact and proactively monitorand detect emerging threats and communicate findings to stakeholders. Additional responsibilities … to ensure compliance withregulatory requirements and industry best practices. - Protecting systems by defining access privileges, control structures, andresources. - Implement and maintain security controls. - Providing incidentresponse in the event of a security incident or breach. - Monitoring systems and networks for intrusions, attacks and unusual activity. - Keeping up … designing and implementing secureapplication architectures, including authentication mechanisms, accesscontrols, encryption, and secure communication protocols Who we’re looking for You’ll have experience in incident management processes and tools, as well asworking with APIs (Application Programming Interfaces) for integrating securitysolutions. This role also requires experience of key cybersecurity controls More ❯
knottingley, yorkshire and the humber, united kingdom
Drax
workingclosely with cross-functional teams to ensure the products meet the highestsecurity standards and address customer needs. You’ll play a critical role in incidentresponse, swiftly investigating andmitigating security breaches to minimize their impact and proactively monitorand detect emerging threats and communicate findings to stakeholders. Additional responsibilities … to ensure compliance withregulatory requirements and industry best practices. - Protecting systems by defining access privileges, control structures, andresources. - Implement and maintain security controls. - Providing incidentresponse in the event of a security incident or breach. - Monitoring systems and networks for intrusions, attacks and unusual activity. - Keeping up … designing and implementing secureapplication architectures, including authentication mechanisms, accesscontrols, encryption, and secure communication protocols Who we’re looking for You’ll have experience in incident management processes and tools, as well asworking with APIs (Application Programming Interfaces) for integrating securitysolutions. This role also requires experience of key cybersecurity controls More ❯
castleford, yorkshire and the humber, united kingdom
Drax
workingclosely with cross-functional teams to ensure the products meet the highestsecurity standards and address customer needs. You’ll play a critical role in incidentresponse, swiftly investigating andmitigating security breaches to minimize their impact and proactively monitorand detect emerging threats and communicate findings to stakeholders. Additional responsibilities … to ensure compliance withregulatory requirements and industry best practices. - Protecting systems by defining access privileges, control structures, andresources. - Implement and maintain security controls. - Providing incidentresponse in the event of a security incident or breach. - Monitoring systems and networks for intrusions, attacks and unusual activity. - Keeping up … designing and implementing secureapplication architectures, including authentication mechanisms, accesscontrols, encryption, and secure communication protocols Who we’re looking for You’ll have experience in incident management processes and tools, as well asworking with APIs (Application Programming Interfaces) for integrating securitysolutions. This role also requires experience of key cybersecurity controls More ❯
pontefract, yorkshire and the humber, united kingdom
Drax
workingclosely with cross-functional teams to ensure the products meet the highestsecurity standards and address customer needs. You’ll play a critical role in incidentresponse, swiftly investigating andmitigating security breaches to minimize their impact and proactively monitorand detect emerging threats and communicate findings to stakeholders. Additional responsibilities … to ensure compliance withregulatory requirements and industry best practices. - Protecting systems by defining access privileges, control structures, andresources. - Implement and maintain security controls. - Providing incidentresponse in the event of a security incident or breach. - Monitoring systems and networks for intrusions, attacks and unusual activity. - Keeping up … designing and implementing secureapplication architectures, including authentication mechanisms, accesscontrols, encryption, and secure communication protocols Who we’re looking for You’ll have experience in incident management processes and tools, as well asworking with APIs (Application Programming Interfaces) for integrating securitysolutions. This role also requires experience of key cybersecurity controls More ❯
market weighton, yorkshire and the humber, united kingdom
Drax
workingclosely with cross-functional teams to ensure the products meet the highestsecurity standards and address customer needs. You’ll play a critical role in incidentresponse, swiftly investigating andmitigating security breaches to minimize their impact and proactively monitorand detect emerging threats and communicate findings to stakeholders. Additional responsibilities … to ensure compliance withregulatory requirements and industry best practices. - Protecting systems by defining access privileges, control structures, andresources. - Implement and maintain security controls. - Providing incidentresponse in the event of a security incident or breach. - Monitoring systems and networks for intrusions, attacks and unusual activity. - Keeping up … designing and implementing secureapplication architectures, including authentication mechanisms, accesscontrols, encryption, and secure communication protocols Who we’re looking for You’ll have experience in incident management processes and tools, as well asworking with APIs (Application Programming Interfaces) for integrating securitysolutions. This role also requires experience of key cybersecurity controls More ❯
with cross-functional teams to ensure the products meet the highest security standards and address customer needs. You’ll play a critical role in incidentresponse, swiftly investigating and mitigating security breaches to minimize their impact and proactively monitor and detect emerging threats and communicate findings to stakeholders. … compliance with regulatory requirements and industry best practices. - Protecting systems by defining access privileges, control structures, and resources. - Implement and maintain security controls. - Providing incidentresponse in the event of a security incident or breach. - Monitoring systems and networks for intrusions, attacks and unusual activity. - Keeping up … implementing secure application architectures, including authentication mechanisms, access controls, encryption, and secure communication protocols Who we’re looking for You’ll have experience in incident management processes and tools, as well as working with APIs (Application Programming Interfaces) for integrating security solutions. This role also requires experience of key More ❯
teams to ensure the products meet the highest br security standards and address customer needs. br br You’ll play a critical role in incidentresponse, swiftly investigating and br mitigating security breaches to minimize their impact and proactively monitor br and detect emerging threats and communicate findings … and industry best practices. br - Protecting systems by defining access privileges, control structures, and br resources. br - Implement and maintain security controls. br - Providing incidentresponse in the event of a security incident or breach. br - Monitoring systems and networks for intrusions, attacks and unusual activity. br … br controls, encryption, and secure communication protocols br br strong Who we’re looking for/strong br br You’ll have experience in incident management processes and tools, as well as br working with APIs (Application Programming Interfaces) for integrating security br solutions. br br This role also More ❯
teams to ensure the products meet the highest br security standards and address customer needs. br br You’ll play a critical role in incidentresponse, swiftly investigating and br mitigating security breaches to minimize their impact and proactively monitor br and detect emerging threats and communicate findings … and industry best practices. br - Protecting systems by defining access privileges, control structures, and br resources. br - Implement and maintain security controls. br - Providing incidentresponse in the event of a security incident or breach. br - Monitoring systems and networks for intrusions, attacks and unusual activity. br … br controls, encryption, and secure communication protocols br br strong Who we’re looking for/strong br br You’ll have experience in incident management processes and tools, as well as br working with APIs (Application Programming Interfaces) for integrating security br solutions. br br This role also More ❯
teams to ensure the products meet the highest br security standards and address customer needs. br br You’ll play a critical role in incidentresponse, swiftly investigating and br mitigating security breaches to minimize their impact and proactively monitor br and detect emerging threats and communicate findings … and industry best practices. br - Protecting systems by defining access privileges, control structures, and br resources. br - Implement and maintain security controls. br - Providing incidentresponse in the event of a security incident or breach. br - Monitoring systems and networks for intrusions, attacks and unusual activity. br … br controls, encryption, and secure communication protocols br br strong Who we’re looking for/strong br br You’ll have experience in incident management processes and tools, as well as br working with APIs (Application Programming Interfaces) for integrating security br solutions. br br This role also More ❯
teams to ensure the products meet the highest br security standards and address customer needs. br br You’ll play a critical role in incidentresponse, swiftly investigating and br mitigating security breaches to minimize their impact and proactively monitor br and detect emerging threats and communicate findings … and industry best practices. br - Protecting systems by defining access privileges, control structures, and br resources. br - Implement and maintain security controls. br - Providing incidentresponse in the event of a security incident or breach. br - Monitoring systems and networks for intrusions, attacks and unusual activity. br … br controls, encryption, and secure communication protocols br br strong Who we’re looking for/strong br br You’ll have experience in incident management processes and tools, as well as br working with APIs (Application Programming Interfaces) for integrating security br solutions. br br This role also More ❯
teams to ensure the products meet the highest br security standards and address customer needs. br br You’ll play a critical role in incidentresponse, swiftly investigating and br mitigating security breaches to minimize their impact and proactively monitor br and detect emerging threats and communicate findings … and industry best practices. br - Protecting systems by defining access privileges, control structures, and br resources. br - Implement and maintain security controls. br - Providing incidentresponse in the event of a security incident or breach. br - Monitoring systems and networks for intrusions, attacks and unusual activity. br … br controls, encryption, and secure communication protocols br br strong Who we’re looking for/strong br br You’ll have experience in incident management processes and tools, as well as br working with APIs (Application Programming Interfaces) for integrating security br solutions. br br This role also More ❯
teams to ensure the products meet the highest br security standards and address customer needs. br br You’ll play a critical role in incidentresponse, swiftly investigating and br mitigating security breaches to minimize their impact and proactively monitor br and detect emerging threats and communicate findings … and industry best practices. br - Protecting systems by defining access privileges, control structures, and br resources. br - Implement and maintain security controls. br - Providing incidentresponse in the event of a security incident or breach. br - Monitoring systems and networks for intrusions, attacks and unusual activity. br … br controls, encryption, and secure communication protocols br br strong Who we’re looking for/strong br br You’ll have experience in incident management processes and tools, as well as br working with APIs (Application Programming Interfaces) for integrating security br solutions. br br This role also More ❯