building our future! You will work withThis team is responsible for safeguarding the company's digital assets and ensuring robust cyber resilience. They cover various aspects of cybersecurity, including threat and exposure management, security engineering, cyber incident response, security DevOps, and insider threat. Each team has specific responsibilities and areas of focus, collaborating closely with other digital … business units to ensure a cohesive approach to cybersecurity. Let me tell you about the roleThis role works within and supports bp's cyber intelligence (CI) function under the threat and exposure management team. The CI function is essential to bp's mission to protect our company, customers, brand, and shareholder value by strengthening cyber intelligence capabilities. What you … will deliverThe cyber threat insights that will drive actions to: Identify and remediate weaknesses in bp's security controls (people, process, and technology). Improve our overall monitoring detection and response capabilities. Generate a positive shift in the organisation's cyber threat awareness and efforts to handle key threats. Map practical intelligence to the source, enabling collection insights More ❯
sunbury, south east england, united kingdom Hybrid/Remote Options
bp
our future You will work with This team is responsible for safeguarding the company's digital assets and ensuring robust cyber resilience. They cover various aspects of cybersecurity, including threat and exposure management, security engineering, cyber incident response, security DevOps, and insider threat. Each team has specific responsibilities and areas of focus, collaborating closely with other digital … units to ensure a cohesive approach to cybersecurity. Let me tell you about the role This role works within and supports bp's cyber intelligence (CI) function under the threat and exposure management team. The CI function is essential to bp's mission to protect our company, customers, brand, and shareholder value by strengthening cyber intelligence capabilities. What you … will deliver The cyber threat insights that will drive actions to: Identify and remediate weaknesses in bp's security controls (people, process, and technology). Improve our overall monitoring detection and response capabilities. Generate a positive shift in the organisation's cyber threat awareness and efforts to handle key threats. Map practical intelligence to the source, enabling collection More ❯
inconsistencies. Facilitate smooth transitions across IT and OT environments, including hypercare and process adaptations. Investigate and resolve IAM security incidents, access anomalies, and authentication issues. Review and monitor Identity Threat Detection & Response (ITDR) systems. Collaborate with SOC teams to detect privileged account misuse and insider threats. Identity & Access Management (IAM): Design, implement, and maintain IAM solutions leveraging … integration. Privileged Access Management: CyberArk – Vault administration, credential rotation, JIT access, session monitoring, compliance reporting. Security & Compliance: CAF, eCAF, NIST frameworks; IAM controls for critical infrastructure; incident response and threat detection. Preferred Certifications: Microsoft Certified: Identity and Access Administrator Associate Okta Certified Administrator/Professional SailPoint IdentityNow/IdentityIQ Engineer CyberArk Defender/Guardian CISSP or Certified Identity and More ❯
City of London, London, United Kingdom Hybrid/Remote Options
TalentHawk
inconsistencies. Facilitate smooth transitions across IT and OT environments, including hypercare and process adaptations. Investigate and resolve IAM security incidents, access anomalies, and authentication issues. Review and monitor Identity Threat Detection & Response (ITDR) systems. Collaborate with SOC teams to detect privileged account misuse and insider threats. Identity & Access Management (IAM): Design, implement, and maintain IAM solutions leveraging … integration. Privileged Access Management: CyberArk – Vault administration, credential rotation, JIT access, session monitoring, compliance reporting. Security & Compliance: CAF, eCAF, NIST frameworks; IAM controls for critical infrastructure; incident response and threat detection. Preferred Certifications: Microsoft Certified: Identity and Access Administrator Associate Okta Certified Administrator/Professional SailPoint IdentityNow/IdentityIQ Engineer CyberArk Defender/Guardian CISSP or Certified Identity and More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Bonhill Partners
cybersecurity role. Expert knowledge of Splunk (preferably Splunk Enterprise Security). Strong experience in SPL (Search Processing Language) and log analysis. Deep understanding of security monitoring, incident response, and threat detection methodologies. Familiarity with MITRE ATT&CK, cyber kill chain, and common attack vectors (phishing, malware, insiderthreats). Experience with EDR tools (e.g., CrowdStrike, SentinelOne), firewalls More ❯
cybersecurity role. Expert knowledge of Splunk (preferably Splunk Enterprise Security). Strong experience in SPL (Search Processing Language) and log analysis. Deep understanding of security monitoring, incident response, and threat detection methodologies. Familiarity with MITRE ATT&CK, cyber kill chain, and common attack vectors (phishing, malware, insiderthreats). Experience with EDR tools (e.g., CrowdStrike, SentinelOne), firewalls More ❯