servicing, and proactive maintenance interventions. o Security & Surveillance: Integration of advanced DJI drone-based remote site monitoring solutions, CCTV, and motion detection systems for real-time security oversight and incident response. · Integrate SCADA systems, sensors, meters, and IoT devices into a single unified platform with a robust user interface for operations and engineering teams. · Ensure the platform is scalable More ❯
proxy, CrowdStrike-equivalent tools Data management : Supporting data labelling & retention projects using Purview or similar Governance support : Involved in data loss prevention, labelling, and stakeholder engagement (including DPO) Practical incidentresponse input : Advising IT on immediate steps during incidents, converting theory into quick, actionable responses Ongoing InfoSec operations : Metrics, monitoring, and security projects across applications and users Tech … tools you’ll use: Microsoft Purview – Data governance and policy enforcement Microsoft Defender – Endpoint & email protection CrowdStrike/equivalents – Endpoint detection & response Web proxy & email security tools Azure (beneficial) – IAM, monitoring, and security logging Why this role? Be central to shaping data governance and security operations in a dynamic SME environment Hands-on exposure to a wide range of More ❯
proxy, CrowdStrike-equivalent tools Data management : Supporting data labelling & retention projects using Purview or similar Governance support : Involved in data loss prevention, labelling, and stakeholder engagement (including DPO) Practical incidentresponse input : Advising IT on immediate steps during incidents, converting theory into quick, actionable responses Ongoing InfoSec operations : Metrics, monitoring, and security projects across applications and users Tech … tools you’ll use: Microsoft Purview – Data governance and policy enforcement Microsoft Defender – Endpoint & email protection CrowdStrike/equivalents – Endpoint detection & response Web proxy & email security tools Azure (beneficial) – IAM, monitoring, and security logging Why this role? Be central to shaping data governance and security operations in a dynamic SME environment Hands-on exposure to a wide range of More ❯
proxy, CrowdStrike-equivalent tools Data management : Supporting data labelling & retention projects using Purview or similar Governance support : Involved in data loss prevention, labelling, and stakeholder engagement (including DPO) Practical incidentresponse input : Advising IT on immediate steps during incidents, converting theory into quick, actionable responses Ongoing InfoSec operations : Metrics, monitoring, and security projects across applications and users Tech … tools you’ll use: Microsoft Purview – Data governance and policy enforcement Microsoft Defender – Endpoint & email protection CrowdStrike/equivalents – Endpoint detection & response Web proxy & email security tools Azure (beneficial) – IAM, monitoring, and security logging Why this role? Be central to shaping data governance and security operations in a dynamic SME environment Hands-on exposure to a wide range of More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
HSM health using appropriate tools Automate cryptographic processes using Python or other scripting languages SSH key and certificate lifecycle management Generate key components across IBM, Tandem, Unix platforms Support incident, change, and problem management (ITIL-aligned) Maintain accurate documentation and audit trails Collaborate with stakeholders across security, infrastructure, and operations teams Essential Skills Recent hands-on experience with HSMs … management and documentation skills Desirable Skills Experience in operational IT security roles Familiarity with SharePoint, Confluence, JIRA Unix/Windows OS knowledge Experience in change and release management Strong incidentresponse and communication skills If this role is of interest please don't hesitat to apply or get in otuch at (url removed More ❯
looking for a highly capable and technically skilled Security Analyst (Network & Endpoint) to join our cybersecurity team. This role focuses on network and endpoint security operations, threat intelligence, and incidentresponse within a Security Operations Centre (SOC) environment. The successful candidate will have hands-on experience with leading security platforms and demonstrate the ability to operate at a … level. Role Overview: Job Title: Security Analyst (Network & Endpoint) Location: England/Remote Contract Type: Contract Duration: Contract till 31st Mar 26 Sector: Healthcare . Key Responsibilities: Network Detection & Response: Administer and optimise Darktrace for network threat detection, model tuning, and behavioural analysis. Investigate anomalies and escalate incidents based on network telemetry. Endpoint Protection: Deploy and manage CrowdStrike Falcon … agents across enterprise endpoints. Maintain and update detection rules, ensuring alignment with threat intelligence. Security Operations Centre (SOC): Act as a Level 2 SOC Analyst and Incident Handler. Triage, investigate, and respond to security alerts and incidents. Collaborate with other SOC team members to ensure timely resolution and documentation. Threat Intelligence & Insider Threat Monitoring: Monitor threat feeds and manage More ❯
Looking For: ️ Proven experience as a CISO or in a senior cybersecurity leadership role ️ Extensive knowledge of information security frameworks, governance, and compliance standards ️ Strong experience in risk management, incidentresponse, and disaster recovery planning ️ Ability to communicate complex security concepts to non-technical stakeholders ️ Relevant certifications such as CISSP, CISM, CISA, or equivalent are highly preferred More ❯
Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in SOC operations, incidentresponse, and forensic analysis. Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for efficient remediation. Experience in network security More ❯
Farnborough, Hampshire, South East, United Kingdom
Stott & May Professional Search Limited
reliability standards. * Automate operational tasks and environment provisioning using Ansible, Terraform, or Python scripting. * Build and maintain monitoring and alerting solutions using Prometheus, Grafana, and related tools. * Participate in incidentresponse and conduct root cause analysis for performance-related issues. * Document performance benchmarks, testing procedures, and system configurations to support continuous improvement. Your Profile Essential Skills & Experience: * Proven More ❯
reliability standards. * Automate operational tasks and environment provisioning using Ansible, Terraform, or Python scripting. * Build and maintain monitoring and alerting solutions using Prometheus, Grafana, and related tools. * Participate in incidentresponse and conduct root cause analysis for performance-related issues. * Document performance benchmarks, testing procedures, and system configurations to support continuous improvement. Your Profile Essential Skills & Experience: * Proven More ❯
posture. Stay ahead of emerging threats, trends, and best practices. Ensure compliance with regulatory requirements and internal security policies. What we’re looking for: Strong experience in security operations, incidentresponse, or SOC roles. Hands-on knowledge of SIEM, EDR, DLP, or similar security tools. Experience with automation (Python, PowerShell, SOAR) and integrating AI tools into workflows. Understanding More ❯
posture. Stay ahead of emerging threats, trends, and best practices. Ensure compliance with regulatory requirements and internal security policies. What we’re looking for: Strong experience in security operations, incidentresponse, or SOC roles. Hands-on knowledge of SIEM, EDR, DLP, or similar security tools. Experience with automation (Python, PowerShell, SOAR) and integrating AI tools into workflows. Understanding More ❯
posture and you'll be working closely with the engineering and product teams to enable security across the company. Key Requirements: AWS - Cloud Security Vulnerability Management Tools IAM CPSM IncidentResponse/small amounts of ISO27001 This role is 5 days a week on-site , you’ll enjoy the perks of a sleek new office, including in-house More ❯
posture. Stay ahead of emerging threats, trends, and best practices. Ensure compliance with regulatory requirements and internal security policies. What we’re looking for: Strong experience in security operations, incidentresponse, or SOC roles. Hands-on knowledge of SIEM, EDR, DLP, or similar security tools. Experience with automation (Python, PowerShell, SOAR) and integrating AI tools into workflows. Understanding More ❯
posture. Stay ahead of emerging threats, trends, and best practices. Ensure compliance with regulatory requirements and internal security policies. What we’re looking for: Strong experience in security operations, incidentresponse, or SOC roles. Hands-on knowledge of SIEM, EDR, DLP, or similar security tools. Experience with automation (Python, PowerShell, SOAR) and integrating AI tools into workflows. Understanding More ❯
london (city of london), south east england, united kingdom
Radley James
posture. Stay ahead of emerging threats, trends, and best practices. Ensure compliance with regulatory requirements and internal security policies. What we’re looking for: Strong experience in security operations, incidentresponse, or SOC roles. Hands-on knowledge of SIEM, EDR, DLP, or similar security tools. Experience with automation (Python, PowerShell, SOAR) and integrating AI tools into workflows. Understanding More ❯
warrington, cheshire, north west england, united kingdom
Prism Digital
posture and you'll be working closely with the engineering and product teams to enable security across the company. Key Requirements: AWS - Cloud Security Vulnerability Management Tools IAM CPSM IncidentResponse/small amounts of ISO27001 This role is 5 days a week on-site , you’ll enjoy the perks of a sleek new office, including in-house More ❯
track record of managing SLAs, prioritising workloads, and delivering measurable service improvements * Excellent communication and stakeholder management skills * Flexibility to occasionally work outside normal hours for system updates or incidentresponse * Full UK driving licence and access to a vehicle (due to office location) What would be desirable? * ITIL 4 Foundation Certification or familiarity with ITIL frameworks * CompTIA More ❯
Stone, England, United Kingdom Hybrid / WFH Options
Meritus
ISO 27001, IEC 62443, NIS-D/NIS-R. Desirable Skills: Hands-on experience with offensive security tools and red teaming in OT environments. Exposure to Digital Forensics and IncidentResponse (DFIR) within industrial networks. Experience working with Agile project tools such as JIRA, Confluence or Microsoft Planner. Main Benefits: Negotiable salary (enquire for details) 28 days holiday More ❯
Stone, Staffordshire, England, United Kingdom Hybrid / WFH Options
Meritus Talent
ISO 27001, IEC 62443, NIS-D/NIS-R. Desirable Skills: Hands-on experience with offensive security tools and red teaming in OT environments. Exposure to Digital Forensics and IncidentResponse (DFIR) within industrial networks. Experience working with Agile project tools such as JIRA, Confluence or Microsoft Planner. Main Benefits: Negotiable salary (enquire for details) 28 days holiday More ❯
Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
ISMS. Develop Reference Architecture and all associated architecture models for Identity Management and Privileged Account Management Consult on and input into the redevelopment and regular testing of the Security IncidentResponse Plan Inputs to the strategic planning and oversight of a rolling five-year Enterprise Security plan. Provide Security Architecture consultancy into other projects and ongoing programmes of More ❯
Required Skills/Experience The ideal candidate will have the following: Cybersecurity Expertise: ? Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incidentresponse, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud. ? Broad background across information technology with the ability to communicate clearly with non-security technical More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Castlefield Recruitment
sized environments. Solid experience with Microsoft technologies including Microsoft 365, Azure, and Active Directory. Good understanding of networks, servers, storage, and virtualisation. Knowledge of cyber security principles, tooling, and incident response. Ability to troubleshoot complex technical issues across systems and services. Comfortable working both independently and collaboratively across teams. Familiarity with IT service management frameworks (e.g. ITIL) and best More ❯