a supportive, forward-thinking environment? We’re working with a fast-growing software and services company in the energy sector who are expanding their Security team. They’re looking for an Information Security Analyst who can help keep their systems, customers, and data safe — someone who’s as … comfortable investigating incidents as they are improving the day-to-day security operations. In this role, you’ll be right at the heart of the company’s security efforts. You’ll monitor internal systems and security tools to spot potential threats early, helping to investigate, manage and … learn from incidents when they happen. You’ll also support wider security projects — from helping assess suppliers and partners, to reviewing internal processes and keeping security policies up-to-date. You’ll work closely with teams across the business, offering advice and support on how to keep systems More ❯
re partnering with one of the UK’s leading organisations in the search for an Incident Response Specialist to join their dedicated CSIRT (Computer Security Incident Response Team). In this critical role, you’ll fully own the Incident Response lifecycle—from investigation and deep forensics through containment and … eradication. You'll work in an environment that invests heavily in advanced security technologies and fosters a proactive approach to cyber resilience through war-gaming, tabletop exercises, and continuous improvement initiatives. Key Responsibilities: Lead investigations into complex cyber incidents, conducting in-depth forensic analysis to determine root cause and … response capabilities. Provide real-time updates to senior leadership during and after incidents, promoting transparency and a culture of learning. Identify and address potential security gaps, staying ahead of emerging threats. Monitor threat intelligence feeds and act decisively on critical alerts. What We’re Looking For: Extensive experience managing More ❯
re partnering with one of the UK’s leading organisations in the search for an Incident Response Specialist to join their dedicated CSIRT (Computer Security Incident Response Team). In this critical role, you’ll fully own the Incident Response lifecycle—from investigation and deep forensics through containment and … eradication. You'll work in an environment that invests heavily in advanced security technologies and fosters a proactive approach to cyber resilience through war-gaming, tabletop exercises, and continuous improvement initiatives. Key Responsibilities: Lead investigations into complex cyber incidents, conducting in-depth forensic analysis to determine root cause and … response capabilities. Provide real-time updates to senior leadership during and after incidents, promoting transparency and a culture of learning. Identify and address potential security gaps, staying ahead of emerging threats. Monitor threat intelligence feeds and act decisively on critical alerts. What We’re Looking For: Extensive experience managing More ❯
SOC to ensure redefine the internal and external processes on the implementation of the SOC and help define how it will run within IT Operations and the wider business. So you must have a proven background in implementing SOC procedures, guidelines, and best practices to ensure efficient and effective … incident response. You will collaborate with internal and external stakeholders to develop and enhance protective monitoring, protective and detective controls and work with cyber security teams, if this role sounds of interest and you are available ASAP please send me your cv More ❯
Cyber Security Manager - Hertford We are seeking a Cyber Security Manager to lead operational security initiatives and support the business in maturing its security posture. You'll play a hands-on role in driving improvements across systems, processes, and awareness, working closely with stakeholders across multiple … regions. Key Responsibilities Act as a visible advocate for cyber security across business and technology teams. Identify and communicate risk-based recommendations to executive leadership. Coordinate the delivery of security improvements in line with enterprise standards. Support the detection, response, and resolution of security and privacy incidents. … What You'll Bring Broad experience across information security disciplines, including vulnerability management, identity, and incident response. Strong stakeholder engagement and change management skills. Background in hands-on technical roles such as infrastructure, software, or security operations. Relevant certifications (e.g., CISSP, CISM, CISA) are desirable. More ❯
Cyber Security Manager - Stevenage We are seeking a Cyber Security Manager to lead operational security initiatives and support the business in maturing its security posture. You'll play a hands-on role in driving improvements across systems, processes, and awareness, working closely with stakeholders across multiple … regions. Key Responsibilities Act as a visible advocate for cyber security across business and technology teams. Identify and communicate risk-based recommendations to executive leadership. Coordinate the delivery of security improvements in line with enterprise standards. Support the detection, response, and resolution of security and privacy incidents. … What You'll Bring Broad experience across information security disciplines, including vulnerability management, identity, and incident response. Strong stakeholder engagement and change management skills. Background in hands-on technical roles such as infrastructure, software, or security operations. Relevant certifications (e.g., CISSP, CISM, CISA) are desirable. More ❯
Cyber Security Manager - Tewin We are seeking a Cyber Security Manager to lead operational security initiatives and support the business in maturing its security posture. You'll play a hands-on role in driving improvements across systems, processes, and awareness, working closely with stakeholders across multiple … regions. Key Responsibilities Act as a visible advocate for cyber security across business and technology teams. Identify and communicate risk-based recommendations to executive leadership. Coordinate the delivery of security improvements in line with enterprise standards. Support the detection, response, and resolution of security and privacy incidents. … What You'll Bring Broad experience across information security disciplines, including vulnerability management, identity, and incident response. Strong stakeholder engagement and change management skills. Background in hands-on technical roles such as infrastructure, software, or security operations. Relevant certifications (e.g., CISSP, CISM, CISA) are desirable. More ❯
Cyber Security Manager - Hatfield We are seeking a Cyber Security Manager to lead operational security initiatives and support the business in maturing its security posture. You'll play a hands-on role in driving improvements across systems, processes, and awareness, working closely with stakeholders across multiple … regions. Key Responsibilities Act as a visible advocate for cyber security across business and technology teams. Identify and communicate risk-based recommendations to executive leadership. Coordinate the delivery of security improvements in line with enterprise standards. Support the detection, response, and resolution of security and privacy incidents. … What You'll Bring Broad experience across information security disciplines, including vulnerability management, identity, and incident response. Strong stakeholder engagement and change management skills. Background in hands-on technical roles such as infrastructure, software, or security operations. Relevant certifications (e.g., CISSP, CISM, CISA) are desirable. More ❯
Cyber Security Manager - Ware We are seeking a Cyber Security Manager to lead operational security initiatives and support the business in maturing its security posture. You'll play a hands-on role in driving improvements across systems, processes, and awareness, working closely with stakeholders across multiple … regions. Key Responsibilities Act as a visible advocate for cyber security across business and technology teams. Identify and communicate risk-based recommendations to executive leadership. Coordinate the delivery of security improvements in line with enterprise standards. Support the detection, response, and resolution of security and privacy incidents. … What You'll Bring Broad experience across information security disciplines, including vulnerability management, identity, and incident response. Strong stakeholder engagement and change management skills. Background in hands-on technical roles such as infrastructure, software, or security operations. Relevant certifications (e.g., CISSP, CISM, CISA) are desirable. More ❯
resolve complex issues in creative and practical ways. About Tanium Tanium delivers the industry's only true real-time cloud-based endpoint management and security offering. Its platform is real-time, seamless, and autonomous, allowing security-conscious organizations to break down silos between IT and SecurityoperationsMore ❯
Our client is seeking a Cyber Security Specialist with expertise in ManageEngine products to strengthen their IT security operations. This is a fantastic opportunity to play a key role in securing enterprise systems, managing vulnerabilities, and ensuring compliance with industry standards. Location: Bridlington, East Yorkshire (On-site … days per week Monday to Friday) Competitive, depending on experience Key Responsibilities Implement and manage ManageEngine security solutions, including Log360 (SIEM), AD360 (IAM), and Endpoint Central. Monitor and analyze security logs to detect and respond to threats. Oversee identity and access management (IAM), including Active Directory security … and privileged access management (PAM). Conduct vulnerability assessments and manage patch deployment using Vulnerability Manager Plus and Patch Manager Plus. Ensure compliance with security frameworks such as ISO 27001, GDPR, and NIST. Collaborate with IT teams to strengthen security posture and improve incident response. Key Requirements Strong More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
SOC Shift Lead Location: Hemel Hempstead (On-site, Shift-Based) Salary: Highly competitive with excellent benefit package Security Clearance Level: Must be eligible for DV Clearance . Due to the highly secure nature of this work all applicants will be required to gain UK Security Clearance to the … generous flexible benefits fund Key Requirements We are seeking a highly capable SOC Shift Lead to support critical infrastructure within the Aerospace, Defence and Security sector. You will lead from the frontmentoring analysts, managing incident triage, and driving operational improvements in a mission-critical environment. This is a shift … based position , following a rotation of 2 days (6am6pm), 2 nights (6pm6am), 4 days off . Essential Skills and Experience: Proven experience in a SecurityOperations Centre (SOC) environment Previous people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and More ❯
watford, hertfordshire, east anglia, united kingdom
Walsh Employment
SOC Shift Lead Location: Hemel Hempstead (On-site, Shift-Based) Salary: Highly competitive with excellent benefit package Security Clearance Level: Must be eligible for DV Clearance . Due to the highly secure nature of this work all applicants will be required to gain UK Security Clearance to the … generous flexible benefits fund Key Requirements We are seeking a highly capable SOC Shift Lead to support critical infrastructure within the Aerospace, Defence and Security sector. You will lead from the frontmentoring analysts, managing incident triage, and driving operational improvements in a mission-critical environment. This is a shift … based position , following a rotation of 2 days (6am6pm), 2 nights (6pm6am), 4 days off . Essential Skills and Experience: Proven experience in a SecurityOperations Centre (SOC) environment Previous people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and More ❯
SOC Shift Lead Location: Hemel Hempstead (On-site, Shift-Based) Security Clearance Level: Must be eligible for DV Clearance . Due to the highly secure nature of this work all applicants will be required to gain UK Security Clearance to the highest level. You must be a British … generous flexible benefits fund Key Requirements We are seeking a highly capable SOC Shift Lead to support critical infrastructure within the Aerospace, Defence and Security sector. You will lead from the front—mentoring analysts, managing incident triage, and driving operational improvements in a mission-critical environment. You will lead … following a rotation of 2 days (6am–6pm), 2 nights (6pm–6am), 4 days off . Essential Skills and Experience: Proven experience in a SecurityOperations Centre (SOC) environment SOC Level 2 Previous people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and More ❯
SOC Shift Lead Location: Hemel Hempstead (On-site, Shift-Based) Security Clearance Level: Must be eligible for DV Clearance . Due to the highly secure nature of this work all applicants will be required to gain UK Security Clearance to the highest level. You must be a British … generous flexible benefits fund Key Requirements We are seeking a highly capable SOC Shift Lead to support critical infrastructure within the Aerospace, Defence and Security sector. You will lead from the front—mentoring analysts, managing incident triage, and driving operational improvements in a mission-critical environment. You will lead … following a rotation of 2 days (6am–6pm), 2 nights (6pm–6am), 4 days off . Essential Skills and Experience: Proven experience in a SecurityOperations Centre (SOC) environment SOC Level 2 Previous people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and More ❯
systems Non-standard requests (new software requests, different/more powerful laptops, etc) Acquisitions of businesses - guidance on how to absorb people and systems Security system monitoring - interpreting and managing output from the SOC (securityoperations centre) Software licensing (Microsoft, Mimecast, other systems (time recording, billing, marketing … with a new time/billing system) Response to technological change (e.g. major updates to Microsoft software, introduction of AI-based systems) Accreditation for security certificates (Cyber Essentials Plus, possibly ISO 27001) Assistance with AAF and other audits Management of joiner/leaver process Business continuity plan & disaster recovery More ❯
level? We are seeking a dynamic and highly capable SOC Shift Lead to support and secure critical infrastructure within the exciting Aerospace, Defence, and Security sector. This is an exceptional opportunity to lead a team of talented analysts, manage incident triage, and drive operational excellence in a mission-critical … days off—providing an excellent work-life balance. To be considered for this role you will need to have Proven experience in a SecurityOperations Centre (SOC) environment (SOC Level 2) Previous people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk … your team through sophisticated cyber defence challenges. The Soc Shift Leader would be tasked with Monitoring, triaging, and investigating alerts across host and network security systems Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities Providing line management to SOC Analysts—developing their skills More ❯
Senior SIEM Content Developer – Detection Engineering | Cyber Security Location: Newbury - Remote Working - Outside IR35 Team: Cyber Defence Ops Experience Level: Mid–Senior The Role We’re on the hunt for a Senior SIEM Content Developer who lives and breathes detection logic. If you enjoy diving deep into attacker behaviors … you! You'll be part of a global cyber defence team building and refining detections across SIEM, EDR, and ELK stacks , and collaborating with security analysts, threat hunters, and incident responders to stop threats faster and smarter. 🔧 What You'll Be Doing Writing & tuning detection rules across SIEM/… hunting or malware behavior 📈 What You’ll Impact How quickly we detect and respond to real threats The signal-to-noise ratio of our security stack Our ability to spot emerging TTPs and adapt quickly 💬 Why Join? Work with a smart, collaborative cyber team that values creativity and curiosity More ❯
to recruit a Cyber Incident Management (CIM) and Threat and Vulnerability Management (TVM) Governance Analyst responsible for a variety of functions within the Fusion & SecurityOperations (F&SO) Governance Program at State Street. This includes gathering, analyzing, and enriching data for utilization on scorecards and related governance reporting More ❯
Public Sector • Relevant ServiceNow certifications (e.g., Certified System Administrator, Certified Implementation Specialist in relevant modules). • Experience with specific ServiceNow modules (e.g., HRSD, GRC, SecOps). • Experience with automated testing frameworks within ServiceNow. • Familiarity with Agile methodologies. InterQuest Group is acting as an employment agency for this vacancy. InterQuest Group More ❯
Cyber Threat Intelligence Analyst Location: Hemel Hempstead (Onsite) Salary: Up to £60,000 + Excellent Benefits Security Clearance: SC Cleared and eligible for DV Clearance A unique opportunity for a Cyber Threat Intelligence Analyst this pivotal role within a dynamic and rapidly expanding cyber team focused on Defence and … National Security clients. I’m on the lookout for a Cyber Threat Intelligence Analyst to strengthen our threat intelligence capability and play a key part in safeguarding country critical clients from evolving cyber threats. This Cyber Threat Intelligence Analyst role is hands-on , you’ll lead the management of … our Malware Information Sharing Platform (MISP) and provide crucial intelligence to support securityoperations in a state of the art SOC environment. Role will involve: Managing and automating threat intelligence feeds from multiple sources Monitoring OSINT, dark web activity, and internal telemetry to spot new and emerging threats More ❯
Cyber Threat Intelligence Analyst Location: Hemel Hempstead (Onsite) Salary: Up to £60,000 + Excellent Benefits Security Clearance: SC Cleared and eligible for DV Clearance A unique opportunity for a Cyber Threat Intelligence Analyst this pivotal role within a dynamic and rapidly expanding cyber team focused on Defence and … National Security clients. I’m on the lookout for a Cyber Threat Intelligence Analyst to strengthen our threat intelligence capability and play a key part in safeguarding country critical clients from evolving cyber threats. This Cyber Threat Intelligence Analyst role is hands-on , you’ll lead the management of … our Malware Information Sharing Platform (MISP) and provide crucial intelligence to support securityoperations in a state of the art SOC environment. Role will involve: Managing and automating threat intelligence feeds from multiple sources Monitoring OSINT, dark web activity, and internal telemetry to spot new and emerging threats More ❯
for State Street seeks to recruit a Key, Certificate, and Encryption Management (KCEM) Governance Analyst responsible for a variety of functions within the Fusion & SecurityOperations (F&SO) Governance Program at State Street. This includes gathering, analyzing, and enriching data for utilization on scorecards and related governance reporting … related to KCEM within the State Street environment. This role requires an individual with deep knowledge of KCEM, including key and certificate lifecycle management, security governance and compliance, and cryptography/encryption within a corporate environment. What you will be responsible for As a KCEM Governance Analyst you will … tools for change management, tracking, and reporting demonstrated through work, military, or education Strong background in cybersecurity, KCEM, including key and certificate lifecycle management, security governance and compliance, and cryptography/encryption Why this role is important to us Our technology function, Global Technology Services (GTS), is vital to More ❯
for State Street seeks to recruit a Key, Certificate, and Encryption Management (KCEM) Governance Analyst responsible for a variety of functions within the Fusion & SecurityOperations (F&SO) Governance Program at State Street. This includes gathering, analyzing, and enriching data for utilization on scorecards and related governance reporting … related to KCEM within the State Street environment. This role requires an individual with deep knowledge of KCEM, including key and certificate lifecycle management, security governance and compliance, and cryptography/encryption within a corporate environment. What you will be responsible for As a KCEM Governance Analyst you will … tools for change management, tracking, and reporting demonstrated through work, military, or education Strong background in cybersecurity, KCEM, including key and certificate lifecycle management, security governance and compliance, and cryptography/encryption Why this role is important to us Our technology function, Global Technology Services (GTS), is vital to More ❯
Reading, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
Security Analyst (2nd Line Support) Location: Reading (Hybrid – 3 days office) Salary: Up to £45,000 Type: Permanent About the Role Join a dynamic team as a Security Analyst , where you’ll play a pivotal role in safeguarding IT infrastructure and applications. This hybrid role blends hands-on … technical support with proactive security monitoring , ensuring systems are secure, resilient, and aligned with industry best practices. Key Responsibilities ✔ Security Monitoring & Incident Management : Proactively monitor and respond to security incidents across IT systems. ✔ Compliance & Hardening : Ensure systems adhere to ISO 27001, Cyber Essentials , and internal policies. ✔ User … Support : Resolve 2nd-line issues for workstations, networks, and peripherals. ✔ Disaster Recovery : Execute backup/recovery plans and respond to outages. ✔ Security Patching : Manage updates for endpoints, firewalls, and EDR tools (e.g., CrowdStrike, Microsoft Defender ). ✔ Account Management : Administer user access rights in line with security policies. Skills More ❯