visibility and reporting of cloud infrastructure compliance with security standards (e.g., ISO 27001, CIS) Develop requirements, design, and implement cloud security tools, focusing on threatdetection and risks Identify, remediate, and report security vulnerabilities Report compliance with security standards Support security design and architecture reviews Work closely with … operate secure development/operations (DevOps) practices, including code scanning and Kubernetes security Implement system and device hardening policies and reporting Conduct technology-focused threat assessments to identify threats and risks Document security requirements, patterns, and processes Liaise closely with cyber security, infrastructure, and digital teams on new and More ❯
visibility and reporting of cloud infrastructure compliance with security standards (e.g., ISO 27001, CIS) Develop requirements, design, and implement cloud security tools, focusing on threatdetection and risks Identify, remediate, and report security vulnerabilities Report compliance with security standards Support security design and architecture reviews Work closely with … operate secure development/operations (DevOps) practices, including code scanning and Kubernetes security Implement system and device hardening policies and reporting Conduct technology-focused threat assessments to identify threats and risks Document security requirements, patterns, and processes Liaise closely with cyber security, infrastructure, and digital teams on new and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Context
Ability to remediate security issues from penetration testing reports * Understanding of security operations and incident response * Experience working with outsourced SOCs * Good knowledge of threatdetection, vulnerability management and compliance Initially 4 days per week onsite, 1 day WFH (potential for this to change to 3 days onsite More ❯
Skelmersdale, Lancashire, North West, United Kingdom Hybrid / WFH Options
Police Digital Services
of Police Digital Service and provides visibility and control of information risks for policing. It supports the 24x7x365 nature of police operations, providing a threatdetection and response capability for digital services before, during and after cyber-attacks, enabling stakeholders to understand and proactively manage risk across the More ❯
preston, lancashire, north west england, united kingdom Hybrid / WFH Options
Police Digital Services
of Police Digital Service and provides visibility and control of information risks for policing. It supports the 24x7x365 nature of police operations, providing a threatdetection and response capability for digital services before, during and after cyber-attacks, enabling stakeholders to understand and proactively manage risk across the More ❯
systems for enhanced performance, scalability, and reliability. eBPF Sensor Development : Design and optimize eBPF-based sensors to enhance Kubernetes cluster visibility and support proactive threat detection. Cross-Functional Collaboration : Partner with frontend, backend, and DevOps teams to deliver high-quality features and solutions. Ideal Candidate: Bachelor's degree in More ❯
engineering pipelines. Utilize big data technologies (Databricks, Spark). Develop custom security applications, APIs, AI/ML models, and advanced analytic technologies. Experience with threatdetection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly …/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and analytics in Databricks, Synapse Analytics, and large-scale data warehouses (Snowflake, Redshift, Presto). Proficiency in data visualization tools (Databricks, PowerBI) and the Python data science ecosystem (Jupyter More ❯
engineering pipelines. Utilize big data technologies (Databricks, Spark). Develop custom security applications, APIs, AI/ML models, and advanced analytic technologies. Experience with threatdetection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly …/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and analytics in Databricks, Synapse Analytics, and large-scale data warehouses (Snowflake, Redshift, Presto). Proficiency in data visualization tools (Databricks, PowerBI) and the Python data science ecosystem (Jupyter More ❯
engineering pipelines. Utilize big data technologies (Databricks, Spark). Develop custom security applications, APIs, AI/ML models, and advanced analytic technologies. Experience with threatdetection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly …/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and analytics in Databricks, Synapse Analytics, and large-scale data warehouses (Snowflake, Redshift, Presto). Proficiency in data visualization tools (Databricks, PowerBI) and the Python data science ecosystem (Jupyter More ❯
engineering pipelines. Utilize big data technologies (Databricks, Spark). Develop custom security applications, APIs, AI/ML models, and advanced analytic technologies. Experience with threatdetection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly …/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and analytics in Databricks, Synapse Analytics, and large-scale data warehouses (Snowflake, Redshift, Presto). Proficiency in data visualization tools (Databricks, PowerBI) and the Python data science ecosystem (Jupyter More ❯
the highest standards of security excellence. Key Responsibilities: Improve and implement DevSecOps processes Implement security controls in multi-account environments Implement compliance, vulnerability, and threatdetection/prevention policies across cloud environments Fine-tune and automate threat policies for workload, container, and cloud products Provide expert guidance More ❯
and implement cloud security architectures across AWS, Azure, or Google Cloud. Develop and enforce cloud security controls , including IAM policies, encryption, and network security. Threat Monitoring & Incident Response Monitor cloud environments for security threats, vulnerabilities, and misconfigurations . Lead incident response efforts related to cloud security breaches and misconfigurations. … Implement SIEM and security monitoring tools for real-time threat detection. Cloud Security Assessments & Compliance Conduct cloud security assessments, penetration testing, and risk analysis . Ensure compliance with ISO 27001, NIST, CIS Benchmarks, GDPR , and other security standards. Collaborate with DevOps teams to integrate security into CI/CD More ❯
culture of security awareness, embedding security by design principles throughout the business. Security Operations and Incident Response: Own and manage critical security processes, including threatdetection and incident response, vulnerability and patch management, security advisory and consultancy, and security testing, including the scoping and organisation of external penetration … across multiple teams. You can influence people of all grades to deliver the right outcomes. Security Management. IT management (ITILv4). Continuous Monitoring/Threat Alerts. Managing security incidents and non-conformances. Experience with Data protection duties and GDPR. Desirable (CISM) certification or CISSP desirable to have. We are More ❯
AMS Security provides 24/7 threat monitoring, investigation, and response across customer's AWS environments. AMS enhances existing security capabilities by supporting security monitoring for all native AWS services and supports vendor-agnostic detective and protective controls to provide holistic security controls for customers. This is done by … suspicious activity, and reporting issues so they can be adequately handled. You will work alongside our security engineers and partner teams to perform daily threatdetection and incident response, using the full capability of AWS technologies and services to detect and mitigate cyber threats at a massive scale … with programming languages such as Python. Knowledge of common system security vulnerabilities and remediation techniques. Understanding of the tools, tactics, and techniques used by threat actors during security events. Familiarity/experience with AWS services and security concepts. Acknowledgement of country: In the spirit of reconciliation, Amazon acknowledges the More ❯
the Principal Cyber Security Engineer in crafting the cyber strategy. Working to update and implement SIEM tools Assist with active investigations Risk Modelling and ThreatDetection Key Skills: Use of SIEM tools and infrastructure (Splunk, Sentinel) Experience with cloud technologies (Azure, AWS, OCI) Experience with Oracle - Fusion, OCI More ❯
degree in Information Security, Computer Science, or related field Additional Skills Strong hands-on network and security background Cisco networking Cisco firewalls (Firepower/ThreatDetection) Palo Alto firewalls SIEM experience (Logarithm desirable) Web proxy (Forcepoint desirable) Governance skills Policy writing/reviewing Reporting KPI monitoring Certifications like More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
TieTalent
This makes this a unique role where you will be able to utilize a broad skill set. Role Requirements Experience in cybersecurity matters (e.g., threatdetection, malware intelligence, cloud security posture management, or identity and access management systems). Understanding of the following functions: TCP/IP stack More ❯
support browser-based identity security Building scalable services to process and monitor identity signals in real time Collaborating with security experts to implement advanced threatdetection and prevention mechanisms Working on complex browser integrations and APIs Contributing to a high-performance, test-driven engineering culture Tech Stack Languages More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Gold Group Ltd
support browser-based identity security Building scalable services to process and monitor identity signals in real time Collaborating with security experts to implement advanced threatdetection and prevention mechanisms Working on complex browser integrations and APIs Contributing to a high-performance, test-driven engineering culture Tech Stack Languages More ❯
identity and access management tools. Implement Cloud Security Governance with AWS Control Tower and Security Hub. As well as associated governance controls and proactive threat detection. Design, develop and maintain Infrastructure as Code (IaC) using AWS Cloudformation and AWS CDK. Drive automation provisioning, alerting and scaling. Help optimise solutions More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Maxwell Bond
cybersecurity and strong hands-on expertise with Splunk . Key Responsibilities: Monitor and respond to security incidents using Splunk and other SIEM tools Conduct threatdetection, analysis, and incident response Support the design, implementation, and maintenance of security measures across infrastructure Work with internal teams to assess vulnerabilities More ❯
manchester, north west england, United Kingdom Hybrid / WFH Options
Maxwell Bond
cybersecurity and strong hands-on expertise with Splunk . Key Responsibilities: Monitor and respond to security incidents using Splunk and other SIEM tools Conduct threatdetection, analysis, and incident response Support the design, implementation, and maintenance of security measures across infrastructure Work with internal teams to assess vulnerabilities More ❯
Aberdeen, Scotland, United Kingdom Hybrid / WFH Options
ESK Recruitment LTD
initiatives. Organise internal audits and lead training on cybersecurity awareness and best practices. Coordinate responses to incidents and ensure timely resolution and documentation. Oversee threatdetection and vulnerability remediation processes. What We're Looking For: Previous experience in an Information Security Management or similar leadership role. Familiarity with More ❯
aberdeen, north east scotland, united kingdom Hybrid / WFH Options
ESK Recruitment LTD
initiatives. Organise internal audits and lead training on cybersecurity awareness and best practices. Coordinate responses to incidents and ensure timely resolution and documentation. Oversee threatdetection and vulnerability remediation processes. What We're Looking For: Previous experience in an Information Security Management or similar leadership role. Familiarity with More ❯
in a fast-paced, evolving industry, this could be a great fit for you. The Company: Our client is a leading, innovative, UK-based ThreatDetection and Response provider, offering protection to government bodies, mid-market and enterprise clients worldwide. Last year they doubled their sales team and More ❯