network protocols, encryption techniques, and security technologies (e.g., firewalls, IDS/IPS, VPNs, SIEM) ️ Experience with cloud security and hybrid environments (AWS, Azure, GCP) ️ Hands-on experience with security incidentresponse and vulnerability management tools ️ Certifications such as CISSP, CEH, CompTIA Security+, or Cisco Security certifications are highly desirable More ❯
Responsibilities: Monitor, triage, and investigate security incidents on critical client infrastructure. Conduct in-depth analysis of network traffic, system events, and logs to detect security threats and vulnerabilities. Provide IncidentResponse support and maintain thorough incident documentation. Continuously improve SOC tool usage, operational practices, and knowledge-sharing across the team. Prepare and present reports for managed clients More ❯
analyzing, and disseminating threat intelligence from multiple sources to identify emerging cyber threats ️ Identifying attack patterns, trends, and vulnerabilities to inform defensive strategies ️ Collaborating with internal teams to enhance incidentresponse and improve threat detection capabilities ️ Producing detailed threat reports, including indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs) ️ Supporting vulnerability management and assisting with the development More ❯
robust cybersecurity strategy to safeguard DBT's sensitive data and digital assets. Lead risk management, ensuring compliance with UK government standards (eg, NCSC, GDPR, and NIST frameworks). Oversee incidentresponse, threat intelligence, and resilience planning to protect against cyber threats. Collaborate with cross-government partners, industry stakeholders, and international counterparts to enhance cybersecurity capabilities. Provide strategic leadership … and emerging risks. About you We're looking for a proven leader with tangible experience of: Strategic Cyber Security Planning Cyber Security Governance Cyber Risk Management Security Architecture Cyber Incident Management You'll be part of both the Government Digital and Data and Government Security professions, with access to a vibrant cross-government community of experts. View the Government More ❯
Monitoring identity and access to network and applications • Using and configuring security tools including MDM, Web and Email Security Gateway, SOC/SIEM, etc • Investigating security alerts and provide incidentresponse, document findings and provide recommendation for remediation. • Assist, participate and enhance patching and upgrade procedures. • Identifying potential weaknesses in security procedures and recommend remediations. • Keeping up to … developments • Testing and evaluating security products • Making recommendations for enhancing and improving security processes and tools • Leading the delivery of cyber security awareness training and testing for colleagues • Reviewing incident management processes to be followed in the event of any security breaches. • Planning and testing disaster recovery processes • Liaising with stakeholders in relation to security issues and risks • Generating More ❯
Security at Director level. Extensive experience in the insurance sector - essential . Strong grasp of regulatory and compliance frameworks (e.g. FCA, GDPR). Deep knowledge of enterprise security architecture, incidentresponse, cloud security (Azure/AWS), and threat intelligence. Hands-on approach with the ability to operate at both strategic and tactical levels. Must be UK-based and More ❯
Security at Director level. Extensive experience in the insurance sector - essential . Strong grasp of regulatory and compliance frameworks (e.g. FCA, GDPR). Deep knowledge of enterprise security architecture, incidentresponse, cloud security (Azure/AWS), and threat intelligence. Hands-on approach with the ability to operate at both strategic and tactical levels. Must be UK-based and More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
CyberNorth
and information security, providing up-to-date risk assessments and recommendations. Ensure policies and controls align with relevant legislation (e.g. GDPR) and internal compliance frameworks. Support business continuity and incidentresponse planning to minimise operational disruption. Contribute to internal audits and facilitate compliance with regulatory standards. Key Skills and Experience: Ideally two years of experience delivering and implementing More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Suits Me Limited
Support vulnerability management efforts, including patching and system hardening. Assist in maintaining secure and efficient identity and access management practices, including integration with M365 and Azure AD. Contribute to incidentresponse planning and participate in post-incident reviews. Continuously improve IT security posture by identifying gaps and implementing effective solutions in line with best practices and regulatory More ❯
to ensure continuingoperability. Coordinatewith Cyber Defence and CTI Analysts in the management and administration theupdating of ingested data flows, cyber use cases and signatures for specialisedcyber defence applications in response to new or observed threats. Manage the compilation,cataloguing, distribution, and retrieval of data from a range of enterprisenetworks and data sources. Implement and develop datamanagement standards, policies, requirements … limitedto Linux, Android, and Windows operating systems. Knowledge of cyberdefence and information security policies, procedures, and regulations. Knowledge of networksecurity architecture concepts including topology, protocols, components, andprinciples. Knowledgeof cyber incidentresponse frameworks and handling methodologies. Knowledge of data backup andrecovery. Skills/Experience: Must-have - circa5 years + relevant experience. Must-have experience withEnterprise ICS/network architectures More ❯
Central London, London, England, United Kingdom Hybrid / WFH Options
GreatFind Recruitment
evolve security controls, policies, and standards Ensure compliance with GDPR, CIS18, PCI DSS, and ISO27001 Lead on third-party audits and provide documentation and evidence Support cybersecurity programmes and incidentresponse planning Provide GRC advisory to senior leadership and cross-functional teams Promote a culture of risk awareness through training and communication Monitor changes in regulation and adapt More ❯
specifically with Azure. Experience with security frameworks and compliance standards (e.g., ISO 27001, NIST, GDPR). Familiarity with penetration testing and vulnerability assessment tools. Hands-on experience with security incidentresponse and forensic analysis ECS Recruitment Group Ltd is acting as an Employment Agency in relation to this vacancy. More ❯
to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security policies, documentation, and awareness training Support incidentresponse efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST More ❯
to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security policies, documentation, and awareness training Support incidentresponse efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST More ❯
to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security policies, documentation, and awareness training Support incidentresponse efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST More ❯
to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security policies, documentation, and awareness training Support incidentresponse efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST More ❯
to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security policies, documentation, and awareness training Support incidentresponse efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST More ❯
to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security policies, documentation, and awareness training Support incidentresponse efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST More ❯
FDA pre/postmarket cybersecurity guidance, and related frameworks Collaborate with Product, Engineering, and Compliance to embed security-by-design across our software lifecycle Lead enterprise risk assessments, incidentresponse, disaster recovery, and business continuity planning Oversee security architecture across cloud infrastructure, mobile apps, and data pipelines Represent security matters to the executive team, Board of Directors, and More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
In Technology Group
strong focus on application security, web application firewalls, and secure DevOps pipelines. Provide security leadership and mentoring , supporting colleagues and enhancing security awareness across the business. Actively contribute to incidentresponse , security training , supplier reviews , and client security assurance Stay ahead of evolving threats, and help shape our strategy using frameworks such as OWASP, SASE, and Zero Trust. More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
In Technology Group
strong focus on application security, web application firewalls, and secure DevOps pipelines. Provide security leadership and mentoring , supporting colleagues and enhancing security awareness across the business. Actively contribute to incidentresponse , security training , supplier reviews , and client security assurance Stay ahead of evolving threats, and help shape our strategy using frameworks such as OWASP, SASE, and Zero Trust. More ❯
from initial consulting on a range of areas including Risk Assessments, Vulnerability Management, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), IncidentResponse, Protective Monitoring Services, Penetration Testing and much more. We take clients through a journey to improve their overall security posture and maturity to ensure they feel reassured More ❯
from initial consulting on a range of areas including Risk Assessments, Vulnerability Management, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), IncidentResponse, Protective Monitoring Services, Penetration Testing and much more. We take clients through a journey to improve their overall security posture and maturity to ensure they feel reassured More ❯
lifecycle management. Establish security policies and procedures for infrastructure and databases for any certifications required (ISO 27001, NIST, GDPR and any certifications established for logistics data security). Lead incidentresponse, root cause analysis, and forensic investigation for infrastructure-related outages for both internal and external environment areas. Drive cloud migration and modernization efforts (hybrid/multi-cloud More ❯