and safeguarding critical systems. ?? Key Responsibilities Operate within a Security Operations Centre (SOC) or equivalent environment Monitor and respond to incidents using SIEM platforms Conduct system log analysis and threatdetection Assist in vulnerability assessments and management Support incident resolution and reporting ?? Required Skills & Experience At least 2 years' experience in a dedicated Security Analyst role Hands-on More ❯
emerging technologies to enhance operations, security, and digital transformation. Infrastructure & Security Oversight Manage core IT infrastructure including networks, cloud environments, and trading systems. Ensure best-in-class cybersecurity practices: threatdetection, endpoint protection, encryption, and compliance. Maintain and regularly test business continuity and disaster recovery plans. Operational Support & Efficiency Oversee the IT helpdesk and ensure responsive, high-quality More ❯
emerging technologies to enhance operations, security, and digital transformation. Infrastructure & Security Oversight Manage core IT infrastructure including networks, cloud environments, and trading systems. Ensure best-in-class cybersecurity practices: threatdetection, endpoint protection, encryption, and compliance. Maintain and regularly test business continuity and disaster recovery plans. Operational Support & Efficiency Oversee the IT helpdesk and ensure responsive, high-quality More ❯
and domain expert within the organization and be able to communicate security risk and concepts to both technical and non-technical audiences. Lead initiatives with Engineering teams to optimize threat models and mitigate risks. Encourage a positive security culture across the Engineering organization. Relentlessly champion for security outcomes on behalf of our customers. Work with other engineering leaders to … embed security into day-to-day development processes. Help proactively assess security risk through product deep dives, threat modeling, and design, architecture and implementation reviews Review and improve existing security processes related to product assessments, pen testing, and bug bounty findings. Develop product security controls and supervising strategies to grow our threatdetection capabilities. Seek opportunities for … tooling and automation WHAT YOU'LL BRING: 5+ years of proven experience securing enterprise applications and infrastructure, preferably in the Crypto and FinTech space. Experience with the application of threat modeling and other risk identification techniques. Strong understanding of the OWASP top 10, including details of common vulnerabilities and emerging threats. Experience with authentication and authorization standards, including OAuth More ❯
Compensation $100,000 - $115,000 depending on experience and skillset What You'll Be Doing Leading incident response and managing containment, analysis, and resolution Monitoring security systems (SIEM, EDR, threat intel) to identify and respond to threats Conducting vulnerability assessments and supporting remediation for financial systems Ensuring compliance with GLBA, PCI, FFIEC, and other regulatory frameworks Supporting risk reviews … of relevant experience Prior experience in financial services, banking, or fintech cybersecurity Expertise with SIEM, EDR, NGFW, and vulnerability management tools Familiarity with scripting (Python, PowerShell) for automation and threatdetection Experience conducting third-party risk reviews and regulatory reporting ITAC Solutions firstName lastName Email Address Phone Number Attach Resume Accepted file types: pdf, doc, docx, Max. file More ❯
month contract I am looking for an experienced Cyber Security specialist to join a busy Security Team for our client in central Glasgow. You will be enhancing their threatdetection and incident response capabilities by designing and maintaining SIEM content, build SOAR automations, and integrate security tools to streamline their SOC operations. Key responsibilities: Develop and optimise detection … Maintain and monitor SIEM/SOAR platforms for performance and stability. Essential skills: Proven background in cyber security, including SOC or incident response roles. Excellent skills and experience in detection engineering or incident response. Ability in developing SOAR automations. Strong Python scripting and query language skills (SPL, EQL, SQL). Excellent knowledge of MITRE ATT&CK, TCP/IP More ❯
NAO's digital future. We're on the lookout for passionate, curious, and collaborative security professionals across a wide range of specialisms. Whether your expertise lies in governance, engineering, threatdetection, or cloud security, you'll find real scope to make an impact-both within InfoSec and across the wider organisation. -Be part of a diverse and expanding … focussed organisation and making processes simpler. • Proactive and positive attitude towards ongoing role focussed personal development. • Understanding of key security principles, threats, controls, and risks • Detailed knowledge of key threat actors affecting the NAO. Desirable • Significant experience working within or implementing ISO 27001:2022 ISMS • Experience maintaining Cyber Essentials Plus • Hold one or more of the following industry accreditations More ❯
day-to-day operation of identity and access services, including: o Access Management o Identity Governance o Role-Based Access Control (RBAC) o Privileged Access Management (PAM) o Identity ThreatDetection and Response o Access Reviews and Certifications o Identity Data Analysis and Reporting Help ensure users only have access to the systems and data they need, working More ❯
development and day-to-day operation of identity and access services, including: o Access Managemento Identity Governanceo Role-Based Access Control (RBAC)o Privileged Access Management (PAM)o Identity ThreatDetection and Responseo Access Reviews and Certificationso Identity Data Analysis and Reporting Help ensure users only have access to the systems and data they need, working with managers More ❯
of experience selling managed services or professional services or similar IT solutions. Strong understanding of managed services or professional servcies, including Managed Security Services, Identity & Access Management, cybersecurity principles, threatdetection, and response strategies. Excellent communication, negotiation, and presentation skills. Ability to build and nurture relationships with C-level executives and other key stakeholders. Self-motivated, results-driven More ❯
work as part of a small, expert team responsible for protecting enterprise systems and data. This role offers hands-on involvement with a wide range of technologies-from endpoint detection and SIEM platforms to firewalls, MFA, and vulnerability management-providing a well-rounded foundation in enterprise security operations. You'll gain exposure to advanced security practices, assist in running … and responding to threatdetection systems, and contribute to projects that strengthen security across the organisation. Key Responsibilities Monitor and respond to security alerts and incidents (EDR, SIEM, Identity Protection, SOAR). Assist in vulnerability scanning and remediation activities. Help manage systems such as email and web security gateways, VPNs, MFA, SSO, and mobile device security. Support the More ❯
configurations and infrastructure deployments. Optimize and manage security configurations including IAM policies, network access controls, and encryption protocols . Proactively monitor and respond to security incidents using AWS-native detection and response services. Conduct periodic security assessments, audits, and reviews to align with best practices and regulatory standards. Collaborate with internal stakeholders, including engineering and operations teams, to integrate … security into cloud-native development workflows. Produce detailed documentation and reports related to threatdetection, incident response, and mitigation efforts. Provide mentorship, technical leadership, and establish best practices for cloud security implementation. Work closely with external partners or clients to understand their security needs and design tailored cloud protection strategies. More ❯
re a builder with a passion for people and AI-driven innovation, we want to talk to you. What Are The Responsibilities? Architect and implement AI-powered features for threatdetection, pattern recognition, and automated intelligence gathering Design and build scalable data pipelines that process billions of data points using AI/ML models for entity extraction and … relationship mapping Lead the integration of Large Language Models (LLMs) for natural language processing of intelligence data Develop robust APIs and microservices that handle real-time threat analysis at scale Implement computer vision systems for image and video analysis in OSINT investigations Build and optimize vector databases for semantic search across massive intelligence datasets Establish best practices for AI … Docker, Kubernetes) Experience with infrastructure as code (Terraform, CloudFormation) Expertise in building real-time streaming architectures Experience building production AI systems handling sensitive data Knowledge of AI safety, bias detection, and ethical AI practices Familiarity with computer vision and NLP techniques for OSINT Understanding of adversarial AI and security implications Proven track record of leading complex technical projects Ability More ❯
Stevenage, Hertfordshire, United Kingdom Hybrid / WFH Options
Robert Walters UK
team in maintaining the highest standards of cyber security. This remote role offers an exciting opportunity to drive cyber security strategy, mentor and manage a SOC team, and enhance threatdetection capabilities. What you bring: Proven experience as a technical/team manager Expert knowledge of Cyber Security best practices Ability to communicate effectively with both technical and More ❯
on IaaS, container security (e.g., AKS), and DevOps pipelines Evaluate Terraform scripts, advising on automation processes for secure infrastructure deployment Optimize Azure Defender and other monitoring tools to elevate threatdetection capabilities Implement Conditional Access policies, enforcing zero trust and least privilege principles Collaborate across teams to align security protocols with operational objectives Required Skills/Qualifications: Experience More ❯
Croydon, London, United Kingdom Hybrid / WFH Options
Gold Group
days per week Some of the main duties of the Cyber Security Manager will include: * Security Strategy & Implementation: Design, implement, and maintain comprehensive cybersecurity policies, procedures, and controls * ThreatDetection & Response: Continuously monitor the digital environment for potential vulnerabilities and security breaches * Incident Management : Lead incident response activities, coordinating with IT teams to mitigate risks and minimise damage. More ❯
South Croydon, Surrey, England, United Kingdom Hybrid / WFH Options
Gold Group Ltd
days per week Some of the main duties of the Cyber Security Manager will include: * Security Strategy & Implementation: Design, implement, and maintain comprehensive cybersecurity policies, procedures, and controls* ThreatDetection & Response: Continuously monitor the digital environment for potential vulnerabilities and security breaches* Incident Management : Lead incident response activities, coordinating with IT teams to mitigate risks and minimise damage. More ❯
securing application connectivity, anywhere. We are the leader in hybrid, multi-cloud cybersecurity for secure application connectivity in a hybrid world. Our AI-driven platform provides visibility, real-time threatdetection, and compliance automation for enterprise customers. With strong market traction, year on year ARR growth and profitable, we are entering a high-growth phase as we go More ❯
challenges. Serve as a technical leader, guiding teams through the implementation of solutions. Provide mentorship and knowledge transfer to team members. Implement security best practices, including access control and threatdetection, and ensure compliance with industry standards. Collaborate with cross-functional teams and effectively communicate technical concepts and solutions to non-technical stakeholders. We are developing our engineering More ❯
East London, London, United Kingdom Hybrid / WFH Options
UK Health Security Agency
challenges. Serve as a technical leader, guiding teams through the implementation of solutions. Provide mentorship and knowledge transfer to team members. Implement security best practices, including access control and threatdetection, and ensure compliance with industry standards. Collaborate with cross-functional teams and effectively communicate technical concepts and solutions to non-technical stakeholders. We are developing our engineering More ❯
Employment Type: Permanent, Part Time, Work From Home
Guildford, Surrey, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
. Additional Skills (Preferred): Experience with Microsoft Endpoint Configuration Manager (SCCM) co-management with Intune. PowerShell scripting for automation and bulk administration . Knowledge of Microsoft Sentinel for advanced threat detection. Familiarity with Microsoft Teams administration (voice, meetings, policies). Qualifications & Experience: 3+ years of hands-on experience as a Microsoft 365 Administrator or similar role. Microsoft 365 Certified More ❯
the solution that is both robust and quick to market. The suite of applications developed and maintained by the team are used to enhance the firm's information security threatdetection, compliance, entitlement management architectures and audit assurance programs. You'll have the freedom to challenge the status quo, mentor fellow engineers, and contribute to our ongoing success More ❯
Install and update software applications securely and efficiently. Cybersecurity & Compliance Help monitor and enforce endpoint security using Panda Adaptive Defence 360 and Action 1 Assist with patch management and threatdetection alerts. Support compliance processes such as Cyber Essentials Plus under direction. Documentation & Process Improvement Maintain internal IT documentation for common issues, assets, and configurations. Identify opportunities to More ❯