Threat Modeling & Risk Assessment: Strong knowledge of security risk management. Cloud & Container Security: Expertise in AWS, Azure, GCP, Docker, and Kubernetes. Security Governance: Experience developing and enforcing security standards. IncidentResponse Leadership: Skilled in leading incidentresponse and root cause analysis. Training & Mentorship: Ability to upskill teams on DevSecOps best practices. Please apply with your updated More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Adecco
Threat Modeling & Risk Assessment: Strong knowledge of security risk management. Cloud & Container Security: Expertise in AWS, Azure, GCP, Docker, and Kubernetes. Security Governance: Experience developing and enforcing security standards. IncidentResponse Leadership: Skilled in leading incidentresponse and root cause analysis. Training & Mentorship: Ability to upskill teams on DevSecOps best practices. Please apply with your updated More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
teams to ensure security best practices and secure-by-design principles. Identify and mitigate security risks in solution architectures. Create security documentation (e.g., RMADS, Security Assurance Documents). Support incidentresponse and remediation efforts for security breaches. Provide security guidance and training to teams across the organization. Key Skills & Experience: Strong knowledge of security frameworks (ISO 27001, NIST … modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incidentresponse and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Certifications such as CISSP More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
teams to ensure security best practices and secure-by-design principles. Identify and mitigate security risks in solution architectures. Create security documentation (e.g., RMADS, Security Assurance Documents). Support incidentresponse and remediation efforts for security breaches. Provide security guidance and training to teams across the organization. Key Skills & Experience: Strong knowledge of security frameworks (ISO 27001, NIST … modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incidentresponse and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Certifications such as CISSP More ❯
on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems … scenarios, ensuring high-fidelity alerts and minimal false positives. Threat Intelligence Integration Integrate threat intelligence feeds into Sentinel to enhance detection capabilities and contextualize alerts within the OT landscape. IncidentResponse Automation Design and implement playbooks using Logic Apps to automate incidentresponse workflows for common OT security events. Execution of the use cases on SIEM More ❯
on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems … scenarios, ensuring high-fidelity alerts and minimal false positives. Threat Intelligence Integration Integrate threat intelligence feeds into Sentinel to enhance detection capabilities and contextualize alerts within the OT landscape. IncidentResponse Automation Design and implement playbooks using Logic Apps to automate incidentresponse workflows for common OT security events. Execution of the use cases on SIEM More ❯
on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems … scenarios, ensuring high-fidelity alerts and minimal false positives. Threat Intelligence Integration Integrate threat intelligence feeds into Sentinel to enhance detection capabilities and contextualize alerts within the OT landscape. IncidentResponse Automation Design and implement playbooks using Logic Apps to automate incidentresponse workflows for common OT security events. Execution of the use cases on SIEM More ❯
on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems … scenarios, ensuring high-fidelity alerts and minimal false positives. Threat Intelligence Integration Integrate threat intelligence feeds into Sentinel to enhance detection capabilities and contextualize alerts within the OT landscape. IncidentResponse Automation Design and implement playbooks using Logic Apps to automate incidentresponse workflows for common OT security events. Execution of the use cases on SIEM More ❯
on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems … scenarios, ensuring high-fidelity alerts and minimal false positives. Threat Intelligence Integration Integrate threat intelligence feeds into Sentinel to enhance detection capabilities and contextualize alerts within the OT landscape. IncidentResponse Automation Design and implement playbooks using Logic Apps to automate incidentresponse workflows for common OT security events. Execution of the use cases on SIEM More ❯
on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems … scenarios, ensuring high-fidelity alerts and minimal false positives. Threat Intelligence Integration Integrate threat intelligence feeds into Sentinel to enhance detection capabilities and contextualize alerts within the OT landscape. IncidentResponse Automation Design and implement playbooks using Logic Apps to automate incidentresponse workflows for common OT security events. Execution of the use cases on SIEM More ❯
on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems … scenarios, ensuring high-fidelity alerts and minimal false positives. Threat Intelligence Integration Integrate threat intelligence feeds into Sentinel to enhance detection capabilities and contextualize alerts within the OT landscape. IncidentResponse Automation Design and implement playbooks using Logic Apps to automate incidentresponse workflows for common OT security events. Execution of the use cases on SIEM More ❯
delivers logs, metrics, traces, and security monitoring — cutting costs by up to 70% while boosting efficiency. They are looking for a Lead SRE to own and elevate our Alerting & Incident Management platform . You’ll be the driving force behind reliability, customer satisfaction, and product excellence — ensuring smooth alert management, fewer engineering interruptions, and a best-in-class incidentresponse experience. This role blends technical depth, customer impact, and product strategy — perfect for someone who thrives at the intersection of engineering, incidentresponse, and product innovation. What You’ll Do Champion customer experience by speeding up alert resolution and reducing interruptions for engineers. Build solutions to common pain points, shaping roadmaps, documentation, and technical knowledge. … Develop benchmarking tools to improve performance, reliability, and scalability. Stay ahead of incident management trends to drive new workflows and product improvements. Mentor teams and lead with clear, impactful communication. What We’re Looking For 5+ years in software engineering, DevTools, or infrastructure. Strong expertise in incident management, alert routing, and large-scale orchestration. SaaS or incidentMore ❯
delivers logs, metrics, traces, and security monitoring — cutting costs by up to 70% while boosting efficiency. They are looking for a Lead SRE to own and elevate our Alerting & Incident Management platform . You’ll be the driving force behind reliability, customer satisfaction, and product excellence — ensuring smooth alert management, fewer engineering interruptions, and a best-in-class incidentresponse experience. This role blends technical depth, customer impact, and product strategy — perfect for someone who thrives at the intersection of engineering, incidentresponse, and product innovation. What You’ll Do Champion customer experience by speeding up alert resolution and reducing interruptions for engineers. Build solutions to common pain points, shaping roadmaps, documentation, and technical knowledge. … Develop benchmarking tools to improve performance, reliability, and scalability. Stay ahead of incident management trends to drive new workflows and product improvements. Mentor teams and lead with clear, impactful communication. What We’re Looking For 5+ years in software engineering, DevTools, or infrastructure. Strong expertise in incident management, alert routing, and large-scale orchestration. SaaS or incidentMore ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
is a hands-on role where youll play a key part in strengthening the organisations cyber defence posture by collecting, analysing, and disseminating actionable intelligence. Youll work closely with incidentresponse, security operations, vulnerability management, and leadership teams to anticipate threats, mitigate risks, and improve resilience. Key Responsibilities: Collect and analyse intelligence to address high-priority security requirements. … Produce and share actionable threat intelligence with stakeholders across security operations, incidentresponse, and fraud prevention. Conduct dark web investigations and OSINT gathering to support requests for intelligence. Proactively identify internal and external threats, including insider threats, and escalate as appropriate. Support the running of a threat intelligence platform to structure and standardise cyber threat data. Write and … edge global security team. Your Profile: Strong background in technical investigations, OSINT, and dark web intelligence. At least 2 years of security experience, ideally with exposure to threat intelligence, incident detection, or response. Solid understanding of the threat intelligence lifecycle and common cyber threat groups. Strong analytical skills with the ability to turn complex data into actionable insights. Self More ❯
Rickmansworth, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Senior plc
and experience: An experienced threat intelligence lead (or similar). Expert in cybersecurity, with a focus on threat management and defensive security in regulated environments. Proficient in threat management, incidentresponse and remediation tools. Strategic development in cyber threat intelligence research, process automation, knowledge sharing and team training. Skilled in using threat frameworks (e.g. MITRE ATT&CK, Cyber … Kill chain). Experienced in using OSINT and security analysis tools (e.g. Shodan, Censys, Qualys, Virus Total, EDR, AV). Experience supporting incidentresponse or vulnerability management programs. Professional certifications in Cyber and Information Security (e.g. OCSP, GREM, CEH). Strong analytical and problem-solving abilities, translating complex technical issues into actionable recommendations. An excellent communicator with the More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Found Talent Limited
Leadership, leading key initiatives to protect systems, data and users while helping shape the organisations security posture. What youll be doing: Managing day-to-day information security operations, including incidentresponse and risk assessments Leading the development and implementation of security policies, standards, and controls Driving continuous improvement initiatives to strengthen cyber resilience Developing and supporting security roadmaps … to Cyber Essentials, ISO27001 or similar What youll need: Proven experience managing IT security or information security functions Strong technical knowledge of Microsoft environments and security controls Experience with incidentresponse, vulnerability management, and security risk mitigation Confident working with both technical teams and business stakeholders Solid understanding of security frameworks and compliance standards Ability to lead projects More ❯
policies across IT and OT environments. Conduct risk assessments and implement proactive threat mitigation measures. Oversee Microsoft 365 security, endpoint protection, email security, and other key cybersecurity tools. Manage incidentresponse plans and investigations, coordinating with internal teams and external partners. Ensure compliance with standards like ISO 27001, GDPR, and NIST frameworks. Promote security awareness and training across … stakeholder engagement. Strong knowledge of cybersecurity frameworks, ICS/OT security, and risk management. Hands-on experience with Microsoft 365 security tools, EDR, and related technologies. Demonstrated leadership in incidentresponse and cross-functional security initiatives. More ❯
policies across IT and OT environments. Conduct risk assessments and implement proactive threat mitigation measures. Oversee Microsoft 365 security, endpoint protection, email security, and other key cybersecurity tools. Manage incidentresponse plans and investigations, coordinating with internal teams and external partners. Ensure compliance with standards like ISO 27001, GDPR, and NIST frameworks. Promote security awareness and training across … stakeholder engagement. Strong knowledge of cybersecurity frameworks, ICS/OT security, and risk management. Hands-on experience with Microsoft 365 security tools, EDR, and related technologies. Demonstrated leadership in incidentresponse and cross-functional security initiatives. More ❯
policies across IT and OT environments. Conduct risk assessments and implement proactive threat mitigation measures. Oversee Microsoft 365 security, endpoint protection, email security, and other key cybersecurity tools. Manage incidentresponse plans and investigations, coordinating with internal teams and external partners. Ensure compliance with standards like ISO 27001, GDPR, and NIST frameworks. Promote security awareness and training across … stakeholder engagement. Strong knowledge of cybersecurity frameworks, ICS/OT security, and risk management. Hands-on experience with Microsoft 365 security tools, EDR, and related technologies. Demonstrated leadership in incidentresponse and cross-functional security initiatives. More ❯
policies across IT and OT environments. Conduct risk assessments and implement proactive threat mitigation measures. Oversee Microsoft 365 security, endpoint protection, email security, and other key cybersecurity tools. Manage incidentresponse plans and investigations, coordinating with internal teams and external partners. Ensure compliance with standards like ISO 27001, GDPR, and NIST frameworks. Promote security awareness and training across … stakeholder engagement. Strong knowledge of cybersecurity frameworks, ICS/OT security, and risk management. Hands-on experience with Microsoft 365 security tools, EDR, and related technologies. Demonstrated leadership in incidentresponse and cross-functional security initiatives. More ❯
london (city of london), south east england, united kingdom
ConSol Partners
policies across IT and OT environments. Conduct risk assessments and implement proactive threat mitigation measures. Oversee Microsoft 365 security, endpoint protection, email security, and other key cybersecurity tools. Manage incidentresponse plans and investigations, coordinating with internal teams and external partners. Ensure compliance with standards like ISO 27001, GDPR, and NIST frameworks. Promote security awareness and training across … stakeholder engagement. Strong knowledge of cybersecurity frameworks, ICS/OT security, and risk management. Hands-on experience with Microsoft 365 security tools, EDR, and related technologies. Demonstrated leadership in incidentresponse and cross-functional security initiatives. More ❯
tests, identifying risks and driving remediation efforts. Monitor infrastructure for security incidents or unauthorised activity, responding swiftly to mitigate potential threats. Investigate security breaches and incidents, and develop robust incidentresponse plans to ensure timely and effective resolution. Collaborate with cross-functional teams to design, implement, and manage security controls and configurations across a range of platforms and … . Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong capability in risk assessment, vulnerability management, and data informed decision -making. Solid understanding of incidentresponse procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols More ❯
CSIS has three main GSICs located in Tampa, London, and Singapore. All CSIS GSICs are responsible for the execution of four core programs, including: CCTV/Alarm Monitoring and Response - provide comprehensive physical security monitoring for threats to the firm's assets, employees, and customers. GSICs monitor the access control system, intrusion detection and panic alarm systems for threats … and use the systems and CCTV systems to initiate and coordinate a security response to security and safety incidents or crisis events. Threat Monitoring - execute disruptive, targeted and executive threat monitoring plans following the CSIS Intelligence Threat Monitoring Procedures. GSICs also engage and leverage the CSIS Strategic Intelligence team to enhance situational awareness of threats to Citi facilities and … people, as well as context when dealing with disruptive events or crises. Workplace Violence Monitoring and Response - GSICs execute the CSIS verbal threats and workplace violence programs and serve as the primary intake utility for reporting of security threats and incidents by Citi employees, contractors and other stakeholders. GSICs record all incidents managed and produce ongoing and final reports More ❯
hybrid role with a balance of operational and governance responsibilities. Kent (Hybrid – 2 days office) What we are looking for: A Senior Security Analyst to lead security operations and incidentresponse Someone to assure security controls, manage vulnerabilities, and maintain policies A mentor to support junior analysts while contributing to governance and compliance work Strong technical background – SOC … incidentresponse, threat intelligence or security engineering Experience with Microsoft Security tools (Sentinel, Defender, etc.) Knowledge of governance, risk and compliance frameworks (PCI, FCA, GDPR) Please apply if this would be of interest. More ❯
hybrid role with a balance of operational and governance responsibilities. Kent (Hybrid – 2 days office) What we are looking for: A Senior Security Analyst to lead security operations and incidentresponse Someone to assure security controls, manage vulnerabilities, and maintain policies A mentor to support junior analysts while contributing to governance and compliance work Strong technical background – SOC … incidentresponse, threat intelligence or security engineering Experience with Microsoft Security tools (Sentinel, Defender, etc.) Knowledge of governance, risk and compliance frameworks (PCI, FCA, GDPR) Please apply if this would be of interest. More ❯