security systems, identifying vulnerabilities, and recommending mitigation strategies ️ Developing and implementing comprehensive security solutions, policies, and frameworks ️ Conducting security audits, risk assessments, and penetration testing ️ Advising on data protection, incidentresponse, and regulatory compliance (e.g., GDPR, ISO 27001) ️ Providing training and guidance to clients on best practices for cybersecurity What We're Looking For: ️ Proven experience as a More ❯
you will: Act as a bridge between the Customer and the Operational Delivery Teams Act as a primary escalation point of contact to the customer Coordinate the Security Operations, IncidentResponse Teams and other technical resources needed to troubleshoot major incidents to determine the affected/vulnerable systems, affected/vulnerable users Identify any business areas impacted and … coordinate communications with all relevant stakeholders as per Major Incident Management process. Coordinate the remediation and containment activities as advised by either the NTT DATA SOC or IncidentResponse Team. Oversee, support, and manage through to completion the investigative and remediation activities in conjunction with relevant support teams. Coordinate post incident investigation with relevant teams or … of the following fields of expertise: At least 10 years of experience in providing technical support and advice for a Security Operations Centre Demonstrate in-depth knowledge of Security incident Management and Security Operations. Excellent communication and client relationship skills to interface with clients, stakeholders, and senior leadership. At least 5 years' experience in providing Vulnerability Management Services Demonstrable More ❯
Looking For: ️ Proven experience as a CISO or in a senior cybersecurity leadership role ️ Extensive knowledge of information security frameworks, governance, and compliance standards ️ Strong experience in risk management, incidentresponse, and disaster recovery planning ️ Ability to communicate complex security concepts to non-technical stakeholders ️ Relevant certifications such as CISSP, CISM, CISA, or equivalent are highly preferred More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Salt Search
Microsoft Sentinel and Azure , including automation using Sentinel playbooks . You'll also be expected to mentor internal analysts and drive cross-departmental engagement on cyber posture, compliance, and incidentresponse readiness. Key Responsibilities: Act as the lead for cyber security across multiple projects and programmes Design and implement Sentinel playbooks to automate detection and response Lead More ❯
strategic decisions and exercise sound legal judgment to develop proactive, risk-appropriate, and commercially business-oriented solutions.Among your tasks are the following: Providing counsel on all aspects of cybersecurity incident prevention and response, including customer and regulatory notifications, contractual obligations, and legal risk mitigation, to cyber and information security stakeholders. Advising business stakeholders on regulatory inquiries regarding cyber … Instructing Citi's Cybersecurity Fusion Center and Citi's business lines on legal risks associated with various components of Citi's cyber and information security program, including matters involving incidentresponse strategies, incident investigations, and regulatory compliance. Tracking existing and proposed cybersecurity rules and regulations (such as DORA and the EU Cyber Resilience Act) and advising on More ❯
reliability, establish SLOs, and implement monitoring and alerting strategies Team Leadership: Build, mentor, and grow a high-performing SRE team while fostering a culture of innovation and continuous improvement Incident Management: Establish and optimize incidentresponse processes, lead major incident reviews, and drive systematic improvements Automation Development: Spearhead automation initiatives to reduce manual operations and improve … Deep understanding of distributed systems, cloud platforms (AWS/GCP/Azure), and modern infrastructure technologies Operational Excellence: Strong background in implementing SLOs, SLIs, and SLAs, with expertise in incident management and post-mortem processes Team Development: Experience in hiring, mentoring, and growing high-performing technical teams while fostering a culture of continuous learning Strategic Planning: Ability to develop More ❯
Belfast, County Antrim, Northern Ireland, United Kingdom
Nominate Recruitment Ltd
technical way to facilitate informed business decision making. Work collaboratively : Work across all Airport departments in order to contribute to the profitable development, and increased security of the business. IncidentResponse & Management : Manage security alerts and incidents, including threat detection and mitigation. Policy & Compliance : Writing, reviewing and ensuring adherence to internal policies and external regulations, including data protection … practical solutions and manage robust implementations on schedule. Essential Criteria: At least 3 years Information security experience, managing an ISMS, or delivering against information security audits in the past. Incident management experience - working with industry standard systems, or in a Security Operations Centre (SOC), or adjacently having managed workstreams with a SOC function. Email Security and Data Loss Prevention More ❯
initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organization. This role is crucial in the escalated investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts. As a Tier 2 Analyst you will works closely with senior and Junior Analysts to ensure … a seamless SOC operation and act as a bridge between foundational and advanced threat detection and response functions. Responsibilities: * Conducting escalated triage and analysis on security events identified by Tier 1 Analysts, determining threat severity and advising on initial response actions. * Applying expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, event correlation, and … thorough documentation of security incidents. * Identifying and escalating critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response and adherence to service Tier objectives (SLOs). * Investigating potential security incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or malicious activity. * Using OSINT (Open-Source Intelligence More ❯
initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organization. This role is crucial in the escalated investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts. As a Tier 2 Analyst you will works closely with senior and junior analysts to ensure … a seamless SOC operation and act as a bridge between foundational and advanced threat detection and response functions. Responsibilities: * Conducting escalated triage and analysis on security events identified by Tier 1 Analysts, determining threat severity and advising on initial response actions. * Applying expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, event correlation, and … thorough documentation of security incidents. * Identifying and escalating critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response and adherence to service Tier objectives (SLOs). * Investigating potential security incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or malicious activity. * Using OSINT (Open-Source Intelligence More ❯
Livingston, West Lothian, Scotland, United Kingdom
FPSG Connect
initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organization. This role is crucial in the escalated investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts. As a Tier 2 Analyst you will works closely with senior and junior analysts to ensure … a seamless SOC operation and act as a bridge between foundational and advanced threat detection and response functions. Responsibilities: * Conducting escalated triage and analysis on security events identified by Tier 1 Analysts, determining threat severity and advising on initial response actions. * Applying expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, event correlation, and … thorough documentation of security incidents. * Identifying and escalating critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response and adherence to service Tier objectives (SLOs). * Investigating potential security incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or malicious activity. * Using OSINT (Open-Source Intelligence More ❯
you will implement and maintain IT security measures across infrastructure, conduct system audits and security assessments, and enhance risk management processes. You ll be responsible for creating and maintaining incidentresponse plans, supporting external audits, and contributing to security governance. Additionally, you ll monitor systems using modern security tools and ensure compliance with relevant legal and regulatory standards. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Picture More
days in the office, 2 days from home The Role: Support the delivery of robust information security and privacy practices across global operations. Conduct security risk assessments, support incidentresponse, and contribute to audits and compliance initiatives. Maintain and enhance the firm’s ISMS and Business Continuity frameworks. Complete client cyber due diligence and collaborate closely with internal More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Picture More
days in the office, 2 days from home The Role: Support the delivery of robust information security and privacy practices across global operations. Conduct security risk assessments, support incidentresponse, and contribute to audits and compliance initiatives. Maintain and enhance the firm’s ISMS and Business Continuity frameworks. Complete client cyber due diligence and collaborate closely with internal More ❯
The role encompasses both monitoring and responding to alerts raised by various toolsets as part of an ongoing managed security monitoring service, coupled with analysing data sets gathered from IncidentResponse investigations and assisting Investigative Consultants to deliver positive investigative outcomes to our breach investigation consultancy engagements. Qualification As a SOC Analyst you will: Be an integral part … specific training. Set yourself apart: Understanding of basic cybersecurity principles and concepts Knowledge of common attack vectors and malware types. Awareness of security tools and technologies. Basic understanding of incidentresponse principles. Networking fundamentals. Analytical and problem solving skills. What's in it for you At Accenture in addition to a competitive basic salary, you will also have More ❯
known organisations. Youll play a key role in helping our customers achieve greater visibility, performance, and reliability across their IT estatescontributing to their operational success through proactive insight and incident prevention. What you'll do Design, implement, and manage observability solutions using industry-leading tools such as Dynatrace (primary), Grafana, and Splunk Collect and analyse telemetry data (metrics, logs … platforms with ITSM tools (e.g. ServiceNow) and CI/CD pipelines to enable proactive alerting and resolution workflows Act as a Monitoring & Observability SME within customer delivery teams Support incidentresponse activities and postmortems by identifying patterns, root causes, and optimisation opportunities Work collaboratively with cross-functional teams to define and implement best practices in observability and monitoring More ❯
NCSC guidance Strong understanding of risk management, security assurance, and vulnerability management Experience conducting risk assessments, supporting audits, and producing security documentation Familiarity with network and endpoint security controls, incidentresponse processes, and access management Ability to work within secure or regulated environments, ideally with the UK law enforcement or policing industry. Interviews will take place ASAP so More ❯
You'll play a key role in helping our customers achieve greater visibility, performance, and reliability across their IT estates-contributing to their operational success through proactive insight and incident prevention. What you'll do Design, implement, and manage observability solutions using industry-leading tools such as Dynatrace (primary), Grafana, and Splunk Collect and analyse telemetry data (metrics, logs … platforms with ITSM tools (e.g. ServiceNow) and CI/CD pipelines to enable proactive alerting and resolution workflows Act as a Monitoring & Observability SME within customer delivery teams Support incidentresponse activities and postmortems by identifying patterns, root causes, and optimisation opportunities Work collaboratively with cross-functional teams to define and implement best practices in observability and monitoring More ❯
You'll play a key role in helping our customers achieve greater visibility, performance, and reliability across their IT estates-contributing to their operational success through proactive insight and incident prevention. What you'll do Design, implement, and manage observability solutions using industry-leading tools such as Dynatrace (primary), Grafana, and Splunk Collect and analyse telemetry data (metrics, logs … platforms with ITSM tools (e.g. ServiceNow) and CI/CD pipelines to enable proactive alerting and resolution workflows Act as a Monitoring & Observability SME within customer delivery teams Support incidentresponse activities and postmortems by identifying patterns, root causes, and optimisation opportunities Work collaboratively with cross-functional teams to define and implement best practices in observability and monitoring More ❯
matters. Provide regular updates to senior management on the status of projects, operational performance, and security compliance. Facilitate effective communication between IT teams and business units. Problem Solving and Incident Management: Manage and resolve high-priority incidents and critical issues. Conduct root cause analysis and implement corrective actions to prevent recurrence. Develop and maintain incidentresponse plans More ❯
security incidents ensuring they are properly documented and escalated as required. Act as the escalation point for security incidents that have been processed by the CTOC Analysts. Write detailed incident reports which are consumable by audiences of varying technical understanding. Support the IncidentResponse function by providing technical guidance and analysis on active or ongoing incidents. Respond … as required the existing detections, ensuring they are fit for purpose, tested and validated. About y ou Proven experience in a security operations role, or technical security role, supporting incident investigations and remediation activities. Excellent security analysis skills utilising SIEM technologies and query languages for advanced analysis and threat hunting Ability to research and deploy new threat-driven detections More ❯
security incidents ensuring they are properly documented and escalated as required. Act as the escalation point for security incidents that have been processed by the CTOC Analysts. Write detailed incident reports which are consumable by audiences of varying technical understanding. Support the IncidentResponse function by providing technical guidance and analysis on active or ongoing incidents. Respond … as required the existing detections, ensuring they are fit for purpose, tested and validated. About y ou Proven experience in a security operations role, or technical security role, supporting incident investigations and remediation activities. Excellent security analysis skills utilising SIEM technologies and query languages for advanced analysis and threat hunting Ability to research and deploy new threat-driven detections More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
security incidents ensuring they are properly documented and escalated as required. Act as the escalation point for security incidents that have been processed by the CTOC Analysts. Write detailed incident reports which are consumable by audiences of varying technical understanding. Support the IncidentResponse function by providing technical guidance and analysis on active or ongoing incidents. Respond … as required the existing detections, ensuring they are fit for purpose, tested and validated. About y ou Proven experience in a security operations role, or technical security role, supporting incident investigations and remediation activities. Excellent security analysis skills utilising SIEM technologies and query languages for advanced analysis and threat hunting Ability to research and deploy new threat-driven detections More ❯
Employment Type: Permanent, Part Time, Work From Home
Bradley Stoke, Gloucestershire, UK Hybrid / WFH Options
Hargreaves Lansdown
security incidents ensuring they are properly documented and escalated as required. Act as the escalation point for security incidents that have been processed by the CTOC Analysts. Write detailed incident reports which are consumable by audiences of varying technical understanding. Support the IncidentResponse function by providing technical guidance and analysis on active or ongoing incidents. Respond … as required the existing detections, ensuring they are fit for purpose, tested and validated. About y ou Proven experience in a security operations role, or technical security role, supporting incident investigations and remediation activities. Excellent security analysis skills utilising SIEM technologies and query languages for advanced analysis and threat hunting Ability to research and deploy new threat-driven detections More ❯
bristol, south west england, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
security incidents ensuring they are properly documented and escalated as required. Act as the escalation point for security incidents that have been processed by the CTOC Analysts. Write detailed incident reports which are consumable by audiences of varying technical understanding. Support the IncidentResponse function by providing technical guidance and analysis on active or ongoing incidents. Respond … as required the existing detections, ensuring they are fit for purpose, tested and validated. About y ou Proven experience in a security operations role, or technical security role, supporting incident investigations and remediation activities. Excellent security analysis skills utilising SIEM technologies and query languages for advanced analysis and threat hunting Ability to research and deploy new threat-driven detections More ❯
bradley stoke, south west england, united kingdom Hybrid / WFH Options
Hargreaves Lansdown
security incidents ensuring they are properly documented and escalated as required. Act as the escalation point for security incidents that have been processed by the CTOC Analysts. Write detailed incident reports which are consumable by audiences of varying technical understanding. Support the IncidentResponse function by providing technical guidance and analysis on active or ongoing incidents. Respond … as required the existing detections, ensuring they are fit for purpose, tested and validated. About y ou Proven experience in a security operations role, or technical security role, supporting incident investigations and remediation activities. Excellent security analysis skills utilising SIEM technologies and query languages for advanced analysis and threat hunting Ability to research and deploy new threat-driven detections More ❯