and oversee the organization's comprehensive cybersecurity strategy, policies, and procedures. Conduct regular risk assessments and vulnerability assessments to identify potential threats. Manage cybersecurity incidentresponse and recovery plans. Ensure compliance with relevant industry regulations and standards. Build and maintain a strong security culture within the organization. Cybersecurity More ❯
Bexhill-On-Sea, East Sussex, South East, United Kingdom Hybrid / WFH Options
Hastings Direct
maintaining detailed documentation on security architecture, patterns, and practices, advising on critical aspects such as data protection, identity and access management, network security, and incidentresponse within Azure. Staying abreast of the latest Azure security capabilities, threats, vulnerabilities, and industry trends will be essential. You will also support More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
Engineering Professional). Other Cyber/information Security qualification (e.g. CISSP, CCSP, CCNA, SABSA) Desirable Skills Cloud, on-prem, SaaS, PaaS, IaaS environments. Security incident response. Coding skills. Experience working with Azure Sentinel. If you are interested in this role but not sure if your skills and experience are More ❯
+Linux +Networking The role: Conduct escalated triage and analysis on security events identified by Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify … and escalate critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response and adherence to service Tier objectives (SLOs). Investigate potential security incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or malicious activity. Use … Monitor the threat landscape and document findings on evolving threat vectors, sharing relevant insights with CTAC teams to enhance overall situational awareness. Follow established incidentresponse playbooks, providing feedback for enhancements and suggesting updates to streamline CTAC processes and improve threat response times. Coordinate with Tier More ❯
application and server infrastructure, ensuring high availability, reliability, and security. This role involves optimizing operational workflows, and implementing best practices for monitoring, troubleshooting, and incident response. It requires a blend of technical and business acumen, as well as a comprehensive familiarity of the platforms being supported. Responsibilities Lead incidentresponse efforts, root cause analysis, and post-incident reviews for critical system issues to help ensure production reliability. Establish escalation procedures and ensure timely resolution of system outages or performance degradation. Collaborate with development, network, security, and support teams to diagnose and resolve technical problems. Participate in … support is required. Bachelor's Degree in Computer Science or related technology discipline. Preferred Financial markets, trading and clearing systems. Experience with ServiceNow, particularly Incident, Ticket and Change modules. Reporting and analytics with Tableau, or similar such as Power BI. Proficiency with Microsoft Office Suite and the ability to More ❯
operational requirements. Provide mentorship, coaching, guidance, support to ensure team success, and fostering a culture of passion and commitment for reliability and customer service. Incident Management and Continuous Learning: Ensure that incidentresponse times are minimised, with clear processes for resolving issues rapidly and effectively. Track and … time to repair (MTTR) and mean time to detect (MTTD). Foster a culture of continuous learning, encouraging your team to learn from each incident and share these insights across our facilities operations to prevent future occurrences. This role comes with an on-call element, which will require the More ❯
from you. 🔐 What You’ll Be Doing Monitor & Detect: Identify and respond to security alerts from SIEM, IDS/IPS, EDR, and other tools. IncidentResponse: Investigate threats and escalate incidents, ensuring rapid containment and resolution. Threat Hunting: Proactively search for hidden threats and conduct forensic investigations. Lead … Lead investigations and support sensitive case handling. 🛠 What You Bring to the Role Must-Have Experience: Strong background in cyber security, protective monitoring, and incident response. Proficient in SIEM tools (e.g. LogRhythm, Splunk) and IDS systems (e.g. Snort). In-depth knowledge of network and host security. Skilled in More ❯
Portsmouth, yorkshire and the humber, United Kingdom
Franklin Fitch
from you. 🔐 What You’ll Be Doing Monitor & Detect: Identify and respond to security alerts from SIEM, IDS/IPS, EDR, and other tools. IncidentResponse: Investigate threats and escalate incidents, ensuring rapid containment and resolution. Threat Hunting: Proactively search for hidden threats and conduct forensic investigations. Lead … Lead investigations and support sensitive case handling. 🛠 What You Bring to the Role Must-Have Experience: Strong background in cyber security, protective monitoring, and incident response. Proficient in SIEM tools (e.g. LogRhythm, Splunk) and IDS systems (e.g. Snort). In-depth knowledge of network and host security. Skilled in More ❯
Analyst you will: As part of our Blue Team, you’ll use the latest intelligence and tooling to analyse information systems to ensure effective incident detection and response. Don’t worry if you don’t tick every box – we’d still love to hear from you! If you’re … during relevant cybersecurity incidents Deliver detailed threat reporting including executive briefings, and actionable recommendations to technical and non-technical stakeholders Set yourself apart: Monitoring, incidentresponse and playbook development Detection creation within SIEM tools and using GitHub Vulnerability scanning, management and reporting Core cybersecurity concepts such as network More ❯
Analyst you will: As part of our Blue Team, you’ll use the latest intelligence and tooling to analyse information systems to ensure effective incident detection and response. Don’t worry if you don’t tick every box – we’d still love to hear from you! If you’re … during relevant cybersecurity incidents Deliver detailed threat reporting including executive briefings, and actionable recommendations to technical and non-technical stakeholders Set yourself apart: Monitoring, incidentresponse and playbook development Detection creation within SIEM tools and using GitHub Vulnerability scanning, management and reporting Core cybersecurity concepts such as network More ❯
the technical implementation of ISO27001 and Cyber Essentials+ (CE+) Manage and enhance the Security Operations Center (SOC) , with one analyst reporting to you Oversee incidentresponse , manage security incidents from detection to resolution Work closely with the compliance manager on vulnerability management Architect secure solutions, validate baseline configurations More ❯
buckinghamshire, south east england, United Kingdom
McGregor Boyall
the technical implementation of ISO27001 and Cyber Essentials+ (CE+) Manage and enhance the Security Operations Center (SOC) , with one analyst reporting to you Oversee incidentresponse , manage security incidents from detection to resolution Work closely with the compliance manager on vulnerability management Architect secure solutions, validate baseline configurations More ❯
ID ○ Sentinel ○ Defender XDR ○ Tenable • Experience with cyber security compliance regulations such as ISO27001, NIST, NERC CIP, SOCI, and IEC 62443 OT • Experience supporting incidentresponse, risk management, and vulnerability remediation · Good understanding of Network Design · Experience working for a Utilities company, in Renewables, or Oil & Gas Industries More ❯
ID ○ Sentinel ○ Defender XDR ○ Tenable • Experience with cyber security compliance regulations such as ISO27001, NIST, NERC CIP, SOCI, and IEC 62443 OT • Experience supporting incidentresponse, risk management, and vulnerability remediation · Good understanding of Network Design · Experience working for a Utilities company, in Renewables, or Oil & Gas Industries More ❯
ID ○ Sentinel ○ Defender XDR ○ Tenable • Experience with cyber security compliance regulations such as ISO27001, NIST, NERC CIP, SOCI, and IEC 62443 OT • Experience supporting incidentresponse, risk management, and vulnerability remediation · Good understanding of Network Design · Experience working for a Utilities company, in Renewables, or Oil & Gas Industries More ❯
add their first EU based Security Analyst to the team. Collaborating closely with the Security team in the US, you'll be responsible for incidentresponse, vulnerability management, risk analysis and detection, with a particular focus on Europe and APAC. This is a brand new hire for a More ❯
add their first EU based Security Analyst to the team. Collaborating closely with the Security team in the US, you'll be responsible for incidentresponse, vulnerability management, risk analysis and detection, with a particular focus on Europe and APAC. This is a brand new hire for a More ❯
london (city of london), south east england, United Kingdom
Crone Corkill
add their first EU based Security Analyst to the team. Collaborating closely with the Security team in the US, you'll be responsible for incidentresponse, vulnerability management, risk analysis and detection, with a particular focus on Europe and APAC. This is a brand new hire for a More ❯
Building proof-of-concept and prototype threat hunting tools, automations, and capabilities Driving product and tooling improvements by sharing insights from threat hunting and incidentresponse with engineering teams Identifying, prioritizing, and targeting complex security issues impacting customers and driving adoption of mitigations Synthesizing research findings into mitigation More ❯
threats. Security alerts and incidents handling experience. Must have very good Knowledge of scripting languages such as Splunk, Python, Bash and PowerShell. Experienced with incidentresponse and reporting for both technical and non-technical stakeholders. Possess a broad technical understanding of Windows, Linux, Networks, VMware, etc. Excellent knowhow More ❯
effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom
Anson McCade
effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems More ❯
Oversee and maintain the security of Microsoft 365, Azure, and Sentinel environments. Conduct security assessments, vulnerability testing, and risk analysis. Monitor security events, lead incidentresponse efforts. Ensure compliance with industry standards, regulations, and best practices. Collaborate on designing and implementing security controls. Provide security training and awareness More ❯
Watford, Hertfordshire, United Kingdom Hybrid / WFH Options
Hays Technology
on a part-time basis . In this role, you'll take the lead in strengthening the organisation's security posture by driving forward incidentresponse, vulnerability management, and compliance initiatives. You'll be a key player in embedding security best practices across the business and ensuring alignment More ❯
Employment Type: Contract
Rate: £27.53 - £35.45/hour £35.45 p/h via Umbrella (Inside IR35)
Hemel Hempstead, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Sopra Steria Limited
threat intelligence. Analyse collected data to identify patterns, indicators of compromise, and emerging adversary behaviours. Produce monthly situational reports. Collaborate with the SOC and incidentresponse teams during active security incidents, providing real-time threat intelligence. Study threat actors tactics, techniques, and procedures (TTPs) using frameworks like MITRE More ❯