London, South East, England, United Kingdom Hybrid/Remote Options
Context Recruitment Limited
supporting risk mitigation and contributing to the continual improvement of the business's security composure. Responsibilities: * Provide expertise on application, network and infrastructure security * Monitor security solutions including SIEM, threatdetection and data security, endpoint protection, network analytics for alerts * Provide documentation for technical standards to meet corporate security policies/industry best practice * Perform security reviews, identify More ❯
shaping cybersecurity solutions for enterprise clients? Join a trusted cybersecurity specialist with a strong track record of delivering innovative security services and solutions across diverse industries. With expertise spanning threatdetection, governance, compliance, and managed security, the business has earned a reputation for protecting organisations against evolving digital risks while enabling growth and resilience. The team is hiring More ❯
of systems, networks, and infrastructure. Deploy and maintain IDS/IPS solutions (Suricata, Zeek, Snort, etc.). Configure firewalls, VPNs, and monitoring systems. Run vulnerability scans, patch management, and threat detection. Collaborate with infra teams to continually evolve the company’s security posture. 🧠 What You Bring Strong foundation in Linux administration and networking . Hands-on experience with firewalls More ❯
and domain expert within the organization and be able to communicate security risk and concepts to both technical and non-technical audiences. Lead initiatives with Engineering teams to optimize threat models and mitigate risks. Encourage a positive security culture across the Engineering organization. Relentlessly champion for security outcomes on behalf of our customers. Work with other engineering leaders to … embed security into day-to-day development processes. Help proactively assess security risk through product deep dives, threat modeling, and design, architecture and implementation reviews. Review and improve existing security processes related to product assessments, pen testing, and bug bounty findings. Develop product security controls and supervising strategies to grow our threatdetection capabilities. Seek opportunities for … tooling and automation. What You'll Bring 5+ years of proven experience securing enterprise applications and infrastructure, preferably in the Crypto and FinTech space. Experience with the application of threat modeling and other risk identification techniques. Strong understanding of the OWASP top 10, including details of common vulnerabilities and emerging threats. Experience with authentication and authorization standards, including OAuth More ❯
ll Love This Role: Tackle complex, large-scale data challenges in cybersecurity. Work with a team of experienced engineers and technical leaders. Make a real impact by enabling proactive threatdetection and risk mitigation. More ❯
support IT security projects, ensuring secure, timely, and effective project delivery. The client would like someone with NIST and Cyber Essentials. Strong knowledge of network security, endpoint protection, and threatdetection/protection. Always staying one step ahead, investigating cybersecurity tools to ensure strong, up-to-date defences across on-prem, cloud AWS and SaaS environments. The role More ❯
Strong planning, analytical, and communication skills. Degree in a relevant field (IT, Business, Engineering, or similar). Desired Skills: Experience with areas such as Identity & Access Management, Network Security, ThreatDetection, or Security Operations. Project management certification (e.g., PMP) an advantage. Experience delivering enterprise-wide or global security initiatives. Contract Details: Day Rate: £610 per day IR35: Inside More ❯
Strong planning, analytical, and communication skills. Degree in a relevant field (IT, Business, Engineering, or similar). Desired Skills: Experience with areas such as Identity & Access Management, Network Security, ThreatDetection, or Security Operations. Project management certification (e.g., PMP) an advantage. Experience delivering enterprise-wide or global security initiatives. Contract Details: Day Rate: £610 per day IR35: Inside More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Zero Plus Ltd
end users, our mission is to enable secure cloud and end-user services guided by our Zero Trust Security Model. Our teams specialise in Identity Verification, Managed Endpoints, ThreatDetection, Secure Remote Access, and Adaptive Security Policies, balancing exceptional user experience with enterprise-grade security. We operate under an ISO/IEC 27001-certified ISMS and an ITIL More ❯
end users, our mission is to enable secure cloud and end-user services guided by our Zero Trust Security Model. Our teams specialise in Identity Verification, Managed Endpoints, ThreatDetection, Secure Remote Access, and Adaptive Security Policies, balancing exceptional user experience with enterprise-grade security. We operate under an ISO/IEC 27001-certified ISMS and an ITIL More ❯
to helping organizations tackle their biggest security challenges. As a SOC Engineer, you’ll be part of a team that partners with clients to provide top-tier protection and threatdetection using Azure Sentinel and Google Chronicle. If you have expertise in configuring and troubleshooting Azure Sentinel or Google Chronicle and want to work on exciting, impactful projects More ❯
alignment with Zero Trust security principles. Provide consulting-level guidance on IAM adoption, migration from legacy platforms, and application onboarding. Drive proactive use of Microsoft Defender for Identity for threatdetection and identity-based risk management. Partner with security leadership to ensure compliance with audit, regulatory, and governance requirements. Serve as enterprise escalation point for identity-related issues More ❯
pre-sales, sales engineering, or solutions architecture within the cybersecurity domain. Strong understanding of enterprise security technologies such as network security, endpoint protection, cloud security, identity & access management, and threatdetection/response. Proven ability to build and deliver high-impact technical presentations and demonstrations. Excellent communication skills, with the ability to engage technical and executive-level stakeholders. More ❯
University Hospitals Bristol and Weston NHS Foundation Trust (UHBW)
equivalent)/CISA/CISSP/CISM Desirable Other Informatics, Cyber, Data Protection qualification Knowledge Essential Ability to guide and provide assurance over the effectiveness of security controls, including threatdetection, vulnerability management, incident response, and overall organisational cyber resilience. Desirable Mature understanding of NHS and public sector digital risk profile and audit principles and practice. Experience Essential More ❯
Windows Administration is required to automate system tasks and maintain cross-platform stability. The role also involves integrating and managing SecOps tooling , implementing and tuning EDR solutions for advanced threatdetection and response, and leveraging log aggregators to centralise and analyse system and security data. This position demands a proactive engineer who can enhance platform security, streamline operations More ❯
Cyble is revolutionizing the landscape of cybersecurity intelligence. Founded in 2019, Cyble began as a visionary college project and has quickly transformed into a leading force in proactive cyber threatdetection and mitigation, that is now globally significant, with people in 20 countries - Headquartered in Alpharetta, Georgia, and with offices in Australia, Malaysia, Singapore, Dubai, Saudi Arabia and More ❯
Cyble is revolutionizing the landscape of cybersecurity intelligence. Founded in 2019, Cyble began as a visionary college project and has quickly transformed into a leading force in proactive cyber threatdetection and mitigation, that is now globally significant, with people in 20 countries - Headquartered in Alpharetta, Georgia, and with offices in Australia, Malaysia, Singapore, Dubai, Saudi Arabia and More ❯
securing application connectivity, anywhere. We are the leader in hybrid, multi-cloud cybersecurity for secure application connectivity in a hybrid world. Our AI-driven platform provides visibility, real-time threatdetection, and compliance automation for enterprise customers. With strong market traction, year on year ARR growth and profitable, we are entering a high-growth phase as we go More ❯
looking for someone who lives and breathes Security, whilst you do not have to be highly technical, you do need to have a strong understanding of cyber security, risk, threatdetection and the infrastructure that comes with it. You ll also need to be great at building partnerships whether that be currently in a vendor alliance role, or More ❯
looking for someone who lives and breathes Security, whilst you do not have to be highly technical, you do need to have a strong understanding of cyber security, risk, threatdetection and the infrastructure that comes with it. You'll also need to be great at building partnerships whether that be currently in a vendor alliance role, or More ❯
successful Staff Security Engineer - Security Data Specialist at OVO if you Data automation and AI-enablement: Designs and implements robust automation and AI augmentation frameworks and tools (e.g. for threatdetection, security finding and incident remediation and risk operations). Automates security playbooks , policies and guardrails in workflows, CI/CD and/or the IDE. Secure development More ❯
scale environments, offering exposure to varied client infrastructures, advanced tooling, and complex security challenges. You’ll play a key part in maturing the security function—leading incident investigations, enhancing threat visibility, and mentoring the next generation of analysts—while continuously developing your skills with funded training and certification pathways. What You’ll Do Lead and investigate high-impact cyber … beyond dashboards to build detections, correlations, and meaningful insights. Experience centralising log sources and onboarding new tools and data feeds into a SIEM/SOAR platform. Strong understanding of threat hunting methodologies, vulnerability management, and incident response. Knowledge of frameworks: ISO27001, NIST CSF, SOC2, Cyber Essentials Plus. Comfortable adapting to unfamiliar tooling and integrating new technologies quickly. Why Join … at the cutting edge of security in a global MSP with enterprise clients and complex estates. Move beyond “keeping the lights on” — contribute to strategy, tooling improvement, and advanced threat detection. Career pathways into senior engineering, incident response leadership, or architecture roles. Ongoing funded training and certification investment. Opportunity to cross-train into wider InfoSec disciplines including GRC, Zero More ❯
Gloucester, England, United Kingdom Hybrid/Remote Options
Anson McCade
of the latest technologies to create large sets of data, which can be efficiently processed to provide actionable intelligence. • Candidates will be working with Big Data, innovative security and threatdetection systems in turn contributing to the system design and development decisions, which affect the integration of both future and existing systems. • The ideal software developer will be More ❯
Gloucestershire, England, United Kingdom Hybrid/Remote Options
Anson McCade
of the latest technologies to create large sets of data, which can be efficiently processed to provide actionable intelligence. • Candidates will be working with Big Data, innovative security and threatdetection systems in turn contributing to the system design and development decisions, which affect the integration of both future and existing systems. • The ideal software developer will be More ❯
Security, Compliance & Governance: Ensure compliance with corporate security and privacy policies through proactive monitoring and enforcement. Partner with cyber and ISRM teams to integrate secure access into incident response, threatdetection, and policy governance workflows. Support enforcement of access policies for third-party, BYOD, and contractor devices using secure, scalable methods. Collaboration & User Experience: Work closely with cyber More ❯