Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Cohesity
to secure, protect, manage, and derive value from data across data centers, edge, and cloud, with a focus on cybersecurity threats, immutable backups, AI threatdetection, and rapid recovery. Recognized globally for innovation, product strength, and design simplicity, Cohesity is shaping the future of data security. Join us More ❯
communication and project management skills. Demonstrable experience of commercial acumen and financial management. Familiarity with security technologies such as firewalls, SIEM, endpoint protection and threatdetection systems. Expertise in project management tools and methodologies (Agile, Waterfall). Strong understanding of cybersecurity best practices and risk management. Exceptional communication More ❯
and use APIs to automate identity processes and integrate third-party applications into the IAM ecosystem. Monitor and improve IAM performance, ensuring alignment with threatdetection and prevention goals. Contribute to the maturity of the IAM function within a growing team, with opportunities to shape its long-term More ❯
Smiths Detection, part of Smiths Group (), is a global leader in threatdetection and screening technologies. The business caters to the markets like defense, urban security, ports and borders, and aviation. We provide the solutions required to defend society from the threat and unauthorized movement of …/contracts for complex asset/equipment maintenance. Understanding of how costing and pricing translates to contractual terms and conditions. Strong IT skills. Smiths Detection product knowledge. Expertise in modelling tools. Experience of SAP systems. Proficient in all basic MS programs, including advanced MS Excel skills. Excellent written and More ❯
You’ll Bring To The Table Oversee the deployment, configuration, and management of Zscaler and CyberArk solutions to ensure secure internet access and advanced threat protection for clients. Oversee the design, implementation, and management of managed firewall solutions, ensuring robust perimeter security and effective threatdetection and More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Addition+
You’ll Bring To The Table Oversee the deployment, configuration, and management of Zscaler and CyberArk solutions to ensure secure internet access and advanced threat protection for clients. Oversee the design, implementation, and management of managed firewall solutions, ensuring robust perimeter security and effective threatdetection and More ❯
london, south east england, united kingdom Hybrid / WFH Options
Addition+
You’ll Bring To The Table Oversee the deployment, configuration, and management of Zscaler and CyberArk solutions to ensure secure internet access and advanced threat protection for clients. Oversee the design, implementation, and management of managed firewall solutions, ensuring robust perimeter security and effective threatdetection and More ❯
in a fast-paced, evolving industry, this could be a great fit for you. The Company: Our client is a leading, innovative, UK-based ThreatDetection a... More ❯
Stockport, Cheshire, United Kingdom Hybrid / WFH Options
zyncgroup.io
to secure Kubernetes clusters, enforce security best practices, automate processes with Terraform and GitOps, and ensure compliance with ISO27001 and NIS2. Your role includes threatdetection, incident response, and continuous security improvement. Requirements: Experience as a DevSecOps Engineer or Security Lead Hands-on software development team collaboration Expertise More ❯
Analytics, KQL. Desirable knowledge: Intune Security and Compliance Device Compliance Monitoring: Regularly monitor device compliance against predefined policies. Identify non-compliant devices and resolve. ThreatDetection and Response: Work closely with the security team to monitor for and respond to security threats. Data Loss Prevention (DLP) Enforcement: Ensure More ❯
Analytics, KQL. Desirable knowledge: Intune Security and Compliance Device Compliance Monitoring: Regularly monitor device compliance against predefined policies. Identify non-compliant devices and resolve. ThreatDetection and Response: Work closely with the security team to monitor for and respond to security threats. Data Loss Prevention (DLP) Enforcement: Ensure More ❯
Things (XIoT). The Claroty Platform integrates with customers' existing infrastructure to provide a full range of controls for visibility, exposure management, network protection, threatdetection, and secure access. Our solutions are deployed by over 1,000 organizations at thousands of sites across all seven continents. Claroty is More ❯
our fraud prevention strategy. Monitor and manage fraud rules and risk thresholds in real time. Work closely with fraud tool providers to ensure proactive threatdetection and mitigation. Stay up to date with emerging fraud trends and continuously evolve prevention tactics. Balance fraud prevention with user experience to More ❯
our software Optimize our internal developer experience by improving our CI/CD pipelines, test environments and developer tooling Improve our security measures, including threatdetection and regular vulnerability assessments Grow a team that aligns with the company's vision and culture Who You Are We expect a More ❯
incidents, conduct forensic investigations, and implement remediation actions to contain and mitigate risks. Maintain and optimise security monitoring tools and technologies to ensure effective detection and response capabilities. Collaborate with IT and engineering teams to implement security best practices and ensure compliance with security policies and standards. Review existing … best practices. SKILLS, KNOWLEDGE & EXPERIENCE Proven experience in a SOC or security operations role, with hands-on experience in security monitoring, incident response, and threat detection. Strong understanding of network security principles, protocols, and technologies (firewalls, IDS/IPS, SIEM, etc.). Experience with security tools such as SIEM …/SOAR platforms, endpoint detection and response (EDR) solutions, vulnerability management, detection and response/remediation (VMDR) solutions and threat intelligence platforms. Knowledge of security standards and frameworks (e.g., NIST, CIS Controls, ISO 27001) and regulatory requirements (e.g., GDPR, HIPAA). Proficiency in scripting and automation (e.g. More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
Skye Business Solutions
log integration. Research, test and advise clients on audit configuration settings for log sources, to ensure that the right logs flow into Sentinel for threat detection. Deploy data connectors and troubleshoot data ingestion, including deployment of Function Apps, customisation and enhancement of Function App code where required, and development … Rule fine-tuning, and integration of applicable changes from upstream rule repositories into our repo. Collaborate with Analysts and client cybersecurity professionals to refine detection strategies, improve detection accuracy and reduce false positives. Analyse security logs from various sources including cloud platforms services, firewalls, intrusion detection systems … Solid experience working with security logs across multiple domains - identity and access, network, system, data, application, cloud - and multiple product types, e.g. firewalls, intrusion detection systems, VPN, web application firewalls, web and email filtering, identity directories and SSO, endpoint protection and EDR, and other security tools. Strong understanding of More ❯
Senior Security Engineer, Detection and Response London, UK Please note this is for London, UK. You only need to apply to one location if there are multiple listed for the job. At Ripple, we're building a world where value moves like information does today. Through our crypto solutions … will help us achieve this mission by actively working to protect our staff, company, and the larger crypto communities we engage with. Ripple's Detection & Response team defends against internal and external threats across our company and services. To accomplish this, we are building data pipelines and detections, automating … incident response, and developing leading-edge solutions to collect and analyze data in both security incidents and investigations. As a Detection and Response Engineer, you will build and grow your career in all of these areas. WHAT YOU'LL DO: Help lead the overall detection and response strategy More ❯
architectures, ensuring compliance with security, performance, and industry standards. Develop and implement a comprehensive cloud security strategy aligned with best practices and frameworks. Conduct threat modeling and risk assessments for new projects, identifying and mitigating security risks. Define and enforce security policies for IAM, encryption, network segmentation, and threat … S3, IAM, Lambda, RDS). Proven experience in designing secure, scalable cloud architectures with a focus on security at every layer. Experience in conducting threat modeling, vulnerability assessments, and developing risk mitigation strategies. In-depth knowledge of AWS security best practices for IAM, encryption, and data protection. Familiarity with … or AWS CDK for automating security and infrastructure provisioning. Hands-on experience with AWS security services (GuardDuty, Inspector, WAF) and third-party tools for threat detection. Proficiency in scripting languages (Python, Bash, PowerShell) to automate security tasks. Experience designing incident response plans and managing security events in cloud environments. More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
tools such as Microsoft Defender for Cloud, Defender for Endpoint, and Nessus. Collaborate with our outsourced SOC team to enhance Sentinel SIEM, runbooks, and threat detection. Lead investigations into security incidents and conduct proactive threat hunting. Manage endpoint security, patching, vulnerability scanning, and system hardening. Support audits and More ❯
This initiative focuses on modernizing Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) platforms , leveraging AI/ML-driven threat detection. As a Technical Product Owner , you will drive this transformation by defining and executing the product roadmap for SMA, ensuring the solution is … s SOC modernization. What you'll do Key Responsibilities: Product Ownership & Roadmap: Define and manage the SMA product portfolio , covering SIEM, SOAR, Big Data, Threat Intelligence Platforms (TIP), and Forensics . Stakeholder Collaboration: Engage with Security Architecture, Security Design, and SOC teams to develop and enhance security capabilities. Backlog … Actions, Ansible, Terraform . Operational Monitoring & Big Data: Experience with Prometheus, Grafana, Elastic Stack, Hadoop , and scripting (Python, Shell) . Desirable Skills: Familiarity with Threat Intelligence (TIP), Kafka, Identity Management, Site Reliability Engineering (SRE), and AI/ML . Certifications (Preferred): Agile (SAFe, Scrum), Cyber Security (CISSP, CISM, or More ❯
CD) pipelines, ensuring rapid, secure, and reliable deployment of JavaScript applications. Develop and maintain automated security tools for static code analysis, penetration testing, and threat modelling. Implement real-time monitoring, alerting, and response strategies for security incidents. About You: Strong proficiency in Cloud Environment ideally in GCP services (Compute … like vulnerability scanning, encryption, authentication, and secrets management (Vault, Key Management Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat detection. You thrive when working as part of a team, are comfortable in a fast-paced environment, have excellent written and verbal English skills More ❯
This role is key to ensuring the protection of systems and public services from cyber threats. Ensuring compliance with Cyber Security standards whilst managing threat detection. This role supports digital resilience, security awareness and policy enforcement. Please note this is a hybrid role with 1 day per week required … on site in Hounslow. As a Cyber Security Engineer, you will: Ensure rapid detection and response to cybersecurity threats Reduce cybersecurity risks across the council’s IT Infrastructure Protect council data and services from 3rd party risks Maintain strong security in line with the governance framework Ensure compliance with … council remains ahead of emerging cyber threats, improved resilience and business continuity As a Cyber Security Engineer, you will have experience/knowledge of: Threat Monitoring and Incident response Vulnerability Management and Risk Assessments Third party & Supplier Chain Risk assessments Security Assurance & Compliance Security tools & System management including Sentinel More ❯
london (hounslow), south east england, united kingdom
Allen Lane
This role is key to ensuring the protection of systems and public services from cyber threats. Ensuring compliance with Cyber Security standards whilst managing threat detection. This role supports digital resilience, security awareness and policy enforcement. Please note this is a hybrid role with 1 day per week required … on site in Hounslow. As a Cyber Security Engineer, you will: Ensure rapid detection and response to cybersecurity threats Reduce cybersecurity risks across the council’s IT Infrastructure Protect council data and services from 3rd party risks Maintain strong security in line with the governance framework Ensure compliance with … council remains ahead of emerging cyber threats, improved resilience and business continuity As a Cyber Security Engineer, you will have experience/knowledge of: Threat Monitoring and Incident response Vulnerability Management and Risk Assessments Third party & Supplier Chain Risk assessments Security Assurance & Compliance Security tools & System management including Sentinel More ❯
join the Security team in Australia. You will be on a team responsible for conducting both pre and post launch testing, offensive campaigns, emergent threat testing, creating/maintaining automated threat emulation solutions, and helping security and service teams add offensive insight to their development, deployment, monitoring, and … Service teams to continuously validate security throughout the service/system lifecycle. You will be an expert across multiple domains such as cyber security; threat, vulnerability and risk assessments (TVRA), security tools (e.g. Splunk, Crowstrike, etc.), application of security frameworks (e.g. ISM, NIST, etc.) and/or implementation and … monitoring of cyber security controls (i.e. detection, protection, alerting, etc.) and will be sought out for advice on a range of technical and business related issues. Your role will help ensure that our systems and processes are secured against the latest threats and you will lead security testing of More ❯
join the Security team in Australia. You will be on a team responsible for conducting both pre and post launch testing, offensive campaigns, emergent threat testing, creating/maintaining automated threat emulation solutions, and helping security and service teams add offensive insight to their development, deployment, monitoring, and … Service teams to continuously validate security throughout the service/system lifecycle. You will be an expert across multiple domains such as cyber security; threat, vulnerability and risk assessments (TVRA), security tools (e.g. Splunk, Crowstrike, etc.), application of security frameworks (e.g. ISM, NIST, etc.) and/or implementation and … monitoring of cyber security controls (i.e. detection, protection, alerting, etc.) and will be sought out for advice on a range of technical and business related issues. Your role will help ensure that our systems and processes are secured against the latest threats and you will lead security testing of More ❯