Sindlesham, Berkshire, United Kingdom Hybrid / WFH Options
National Grid plc
Communication: Act as a key point of contact for security-related matters, effectively communicating complex technical concepts to both technical and non-technical stakeholders. IncidentResponse: Lead the response to security incidents, coordinating with relevant teams to contain and remediate issues quickly and effectively. Continuous Improvement: Drive More ❯
Drive the creation and refinement of security monitoring rules, techniques and processes. Proactively hunt for evidence of threats or compromise using all available tools. Incident Management Investigate and resolve escalated security incidents both independently and by leading a team of SOC colleagues. Ensure the defined playbooks are followed correctly … and accurate logs are made of all actions during incident response. Support and mentor colleagues with best-practice incident management techniques and behaviours. Perform root cause analysis, recommend process improvements, and write final post-incident reports. Project Delivery Take part in the team's project delivery initiative … Prevention policies in line with the company's data classification requirements, and implement exceptions for business-approved procedures where required. Improve the detection and response capabilities of the remaining security controls with a focus on insider threats. Escalation Analyst - support analysts during incidentresponse and take the More ❯
Analyst at Nottingham Building Society: - Security Monitoring: Monitor and respond to security alerts across networks, systems, and cloud environments using SIEM and EDR tools. Incident Investigation: Investigate security incidents and support the full incidentresponse lifecycle, including documentation and root cause analysis. Vulnerability Assessments: Conduct regular vulnerability More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
The Nottingham
Analyst at Nottingham Building Society: Security Monitoring: Monitor and respond to security alerts across networks, systems, and cloud environments using SIEM and EDR tools. Incident Investigation: Investigate security incidents and support the full incidentresponse lifecycle, including documentation and root cause analysis. Vulnerability Assessments: Conduct regular vulnerability More ❯
infrastructure. Role & Responsibilities: Monitor networks and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incidentresponse support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Intec Select
infrastructure. Role & Responsibilities: Monitor networks and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incidentresponse support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools More ❯
their journey toward cyber resilience. Clients count on us for quick and expert support in the event of and in preparation against a cyber incident; from incidentresponse to risk assessments, and complex forensics to breach notification and ID theft remediation we help clients - of all sizes More ❯
Information Security Consultant you will work with the wider IT Security Team to support and maintain enterprise wide solutions. The Responsibilities Assist with security incident management and response activities General day-to-day support on managing and responding to security alerts from systems and end users Perform daily … resolving, and reporting risks Experience of formal document creation, such as the creation of reports or procedures Threat Intelligence analysis and best practice Security IncidentResponse processes, procedures, and best practices Disaster Recovery and Business Continuity principles Event and log analysis If you are looking for an exciting More ❯
ll lead the charge in deploying high-tech solutions that not only meet compliance with regulations and industry standards but also exceed expectations. Oversee incidentresponse, vulnerability management, and cyber threat hunting. Execute security solutions applying cutting-edge technologies like firewalls, intrusion detection and prevention systems, antivirus software … customer and industry data to continually enhance the value of our services. Required Skills and Experience Extensive experience ( at least 5 years ) of Security Incident Handling & Security Incident Response. Experience in ruling and tuning Enterprise level SIEM tools. Extensive operations experience (minimum of 3+ years). Extensive knowledge … of Security including types and methods of cyber-attack and underlying network protocols. Extensive experience escalating incidents to, and in driving incident resolution with, technology vendors and stakeholders. Demonstrable experience in supporting large, complex Networks and Hosting Estates using multiple technologies including: Managing SIEM's - (Qradar Preferred) (e.g. ArcSight More ❯
tech-related roles, ownership, and proactive problem-solving. Strong knowledge of computer science fundamentals and distributed systems. Exposure to serverless cloud computing. Experience with incidentresponse and incident management. Ability to automate system administration tasks through scripting. Experience with TDD, CI/CD, and zero-touch deployments. More ❯
tech-related work, ownership, and proactive problem-solving. Strong knowledge of computer science fundamentals and distributed systems. Exposure to serverless cloud computing. Experience with incidentresponse and incident management. Ability to automate system administration tasks through scripts and tools. Familiarity with Test Driven Development and CI/ More ❯
recommendations. Advise clients on risk mitigation strategies and security best practices, and support the implementation of those strategies, contributing to measurable improvements. Support security incidentresponse and investigations, contributing to thorough post-incident reviews and identifying areas for improvement. Stakeholder Engagement and Technical Leadership: Provide expert guidance More ❯
hardware, software, and SaaS issues. Security Knowledge: Familiarity with security frameworks and standards such as SOC 2, ISO 27001, GDPR, or NIST. Experience with incidentresponse and risk management. Knowledge of Zero Trust architectures and security-first IT practices. Soft Skills: Excellent problem-solving and communication skills. Ability More ❯
to make a real impact by ensuring the integrity and resilience of the company's IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly … Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incidentresponse processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding of Disaster Recovery (DR) and Business Continuity More ❯
to make a real impact by ensuring the integrity and resilience of the company's IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly … Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incidentresponse processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding of Disaster Recovery (DR) and Business Continuity More ❯
and company strategy. Integrate processes with Cyber Threat Intelligence to ensure appropriate monitoring of the threat landscape for emerging security risks and ensure swift response to zero-day threats. Collaborating on Security Risk Management strategies, aligning toa 3 lines of defence model and enforcing alignment of risk taxonomy to … and incorporate new ideas and capabilities to enhance our security posture and make the team stronger and better. Decisive: provides clear direction during cyber incidentresponse to the Security Operations team and all associated stakeholders. Identify risks : Able to synthesize capability gaps and articulate them so the Firm … integrity and ethical judgement to handle sensitive information responsibly. Familiarity with cloud security controls and securing hybrid IT environments. Knowledge of vulnerability management and incident management practices. Evidence of working in the Financial Service Industry preferred. Our commitment to employees: At CLS, we celebrate diversity and consider this to More ❯
london, south east england, United Kingdom Hybrid / WFH Options
CLS Group
and company strategy. Integrate processes with Cyber Threat Intelligence to ensure appropriate monitoring of the threat landscape for emerging security risks and ensure swift response to zero-day threats. Collaborating on Security Risk Management strategies, aligning toa 3 lines of defence model and enforcing alignment of risk taxonomy to … and incorporate new ideas and capabilities to enhance our security posture and make the team stronger and better. Decisive: provides clear direction during cyber incidentresponse to the Security Operations team and all associated stakeholders. Identify risks : Able to synthesize capability gaps and articulate them so the Firm … integrity and ethical judgement to handle sensitive information responsibly. Familiarity with cloud security controls and securing hybrid IT environments. Knowledge of vulnerability management and incident management practices. Evidence of working in the Financial Service Industry preferred. Our commitment to employees: At CLS, we celebrate diversity and consider this to More ❯
IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO … practices. • Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and Privileged Access Management (PAM). • Threat Management & IncidentResponse: Ability to detect, respond to, and mitigate cyber threats using SIEM, endpoint security, and vulnerability management tools. • Networking & Infrastructure Security: Understanding of More ❯
IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO … practices. • Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and Privileged Access Management (PAM). • Threat Management & IncidentResponse: Ability to detect, respond to, and mitigate cyber threats using SIEM, endpoint security, and vulnerability management tools. • Networking & Infrastructure Security: Understanding of More ❯
IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO … practices. • Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and Privileged Access Management (PAM). • Threat Management & IncidentResponse: Ability to detect, respond to, and mitigate cyber threats using SIEM, endpoint security, and vulnerability management tools. • Networking & Infrastructure Security: Understanding of More ❯
IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO … practices. • Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and Privileged Access Management (PAM). • Threat Management & IncidentResponse: Ability to detect, respond to, and mitigate cyber threats using SIEM, endpoint security, and vulnerability management tools. • Networking & Infrastructure Security: Understanding of More ❯
and be a key player in ensuring the organisation's overall cybersecurity posture remains strong. You will also be involved in proactive security measures, incidentresponse, and disaster recovery planning. This role is office-based at our Coventry site, with travel to other UK sites as required, sometimes … including firewalls, VPNs, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and penetration testing. Apply patches and updates to mitigate security threats. Lead response efforts in cyber-attacks or security breaches, including containment and remediation. Perform root cause analysis and recommend mitigation strategies. Collaborate on incident handling More ❯
you and your household Onsite perks including free parking, tea and coffee stations, and a subsidized café with free breakfast toast Responsibilities Security Monitoring & IncidentResponse: Use SIEM tools like Exabeam, LogRhythm, Splunk, or Arcsight to monitor security events, detect threats, and analyze data to address incidents swiftly. More ❯
JRC members in decision-making processes. Hands-On Security Experience: Take an active role in the day-to-day management of security operations, including incidentresponse, threat hunting, vulnerability management, and other proactive measures. Provide expertise in implementing technical security solutions and ensuring they align with organisational goals. More ❯
threat protection Security automation and DevSecOps integration Security Operations SOC transformation and cloud-native security ops Threat detection with XDR, NDR, and SOAR platforms Incidentresponse planning and threat intelligence integration Regulatory alignment for DORA, NIS2, and UK-specific mandates Risk frameworks tailored by industry (FS, critical infrastructure More ❯