standards-based approach to managing cyber threats and resilience. You’ll lead on incident response planning, certification and compliance, and continuous monitoring of the threat landscape. Working closely with senior leadership and technical teams, you’ll provide expert guidance and ensure that cyber security remains embedded in the organisation … Cybersecurity Framework and its practical application. Knowledge of compliance and certification standards such as PCI-DSS and Cyber Essentials Plus. Experience in risk management, threatintelligence, and incident response. Ability to communicate clearly with both technical and non-technical stakeholders. Experience managing budgets and third-party security vendors. More ❯
Skills Required Solid knowledge and extensive experience in supporting and designing SIEM/XDR platforms A deep interest and passion for Cyber Security and threat intelligence. Good knowledge and understanding of the following Key technologies/products supported to perform in-depth troubleshooting and cybersecurity investigations: Linux/Unix … weekly shop and discounts on gift/shopping vouchers. World-class training and development Keywords: 44768, LogRhythm, SIEM, EDR, SOC, NOC, Cyber Security, Cyber ThreatIntelligence, Log Management, protective monitoring, Network Security. More ❯
Employment Type: Permanent
Salary: £50000 - £65000/annum Up to 20% bonus, 10% pension
Skills Required Solid knowledge and extensive experience in supporting and designing SIEM/XDR platforms A deep interest and passion for Cyber Security and threat intelligence. Good knowledge and understanding of the following Key technologies/products supported to perform in-depth troubleshooting and cybersecurity investigations: Linux/Unix … weekly shop and discounts on gift/shopping vouchers. World-class training and development Keywords: 44768, LogRhythm, SIEM, EDR, SOC, NOC, Cyber Security, Cyber ThreatIntelligence, Log Management, protective monitoring, Network Security. More ❯
Employment Type: Permanent
Salary: £50000 - £65000/annum Up to 20% bonus, 10% pension
Linux systems. Proficient in using SIEM tools like ArcSight and Azure Sentinel; experienced with KQL and basic XDR platforms. Familiar with OSINT techniques for threatintelligence and incident investigation. Holds or is working toward relevant certifications such as CISSP, CySA+, GCIH, and CASP, with a degree/diploma More ❯
Eastleigh, Hampshire, United Kingdom Hybrid / WFH Options
Ageas
and respond to changes in legislation and accreditation standards affecting information security. Skills and experience: Solid technical understanding of security principles and technologies, including threatintelligence, security monitoring, and incident response. Oversee the maintenance of our ISO27001 certification, seek improvement and lead initiatives to expand our scope. Lead More ❯
effective solutions, controls, and security architectures. Working collaboratively across the various delivery teams to build a consistent go-to-market message including managed service, threatintelligence and MDR teams. Using your experience and gravitas to deliver at all levels, including board level, of major organisations. Helping to win More ❯
with a business-focused approach protecting what is most valuable to our clients. You ll be assessing risk across business, technology and operations, considering threatintelligence and helping to build the full security view that underpins systems resilience and client confidence. Required qualifications to be successful in this More ❯
and configuring a wide range of security technologies, including SIEM solutions, DLP solutions, firewall solutions, cloud security centers, IPS (Intrusion Prevention Systems), CTI (Cyber ThreatIntelligence) solutions, and vulnerability scanners. Proxy solutions like Zscaler are essential. At least one professional certification; CISSP, CISM, CCSP. What we offer you More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Experis UK
and our focus has always been on excellence in cyber security. We have teams that offer world class services in red teaming, penetration testing, threatintelligence, research and development, detection and response, governance, risk, and compliance, and plenty more. Our business is global and so are our clients. More ❯
draw upon Enterprise Security Architecture or Security Solutions Architecture to: Identify business objectives, user needs, risk appetite and cyber security obligations Identify vulnerabilities, perform threat modelling, undertake risk assessment, evaluate the effectiveness of security controls Verify and evidence alignment to 'Secure by Design' principles, corporate security policy/standards … of established patterns, principles and guidelines Research emerging technologies, new products and be able to position these in a coherent manner against the developing threat landscape and client risk appetite Ability to distil complex information and concepts into key discussion points that identifies a path to resolution rather than … practice within Cloud platforms (AWS and/or Microsoft Azure) In-depth knowledge of modern security concepts, common attack vectors, malware, security analytics and threat intelligence. A good understanding of security testing and vulnerability management is important (including pen testing/ITHC, CVSS/CVE) Experience working with security More ❯
This role is key to ensuring the protection of systems and public services from cyber threats. Ensuring compliance with Cyber Security standards whilst managing threat detection. This role supports digital resilience, security awareness and policy enforcement. Please note this is a hybrid role with 1 day per week required … council remains ahead of emerging cyber threats, improved resilience and business continuity As a Cyber Security Engineer, you will have experience/knowledge of: Threat Monitoring and Incident response Vulnerability Management and Risk Assessments Third party & Supplier Chain Risk assessments Security Assurance & Compliance Security tools & System management including Sentinel … standards, process & procedures – Design, Review & maintenance Key Qualifications/technical skills required CISM, CISSP, CEH or any relevant security certifications Knowledge of SIEM, SOC, ThreatIntelligence, Network/Cloud security, policies and compliance What you get in return A salary between £41,442 - £50,574 plus a range More ❯
london (hounslow), south east england, United Kingdom
Allen Lane
This role is key to ensuring the protection of systems and public services from cyber threats. Ensuring compliance with Cyber Security standards whilst managing threat detection. This role supports digital resilience, security awareness and policy enforcement. Please note this is a hybrid role with 1 day per week required … council remains ahead of emerging cyber threats, improved resilience and business continuity As a Cyber Security Engineer, you will have experience/knowledge of: Threat Monitoring and Incident response Vulnerability Management and Risk Assessments Third party & Supplier Chain Risk assessments Security Assurance & Compliance Security tools & System management including Sentinel … standards, process & procedures – Design, Review & maintenance Key Qualifications/technical skills required CISM, CISSP, CEH or any relevant security certifications Knowledge of SIEM, SOC, ThreatIntelligence, Network/Cloud security, policies and compliance What you get in return A salary between £41,442 - £50,574 plus a range More ❯
Immingham, Lincolnshire, North East, United Kingdom Hybrid / WFH Options
Rullion Limited
Responsibilities Lead cyber risk assessment activities across IT and OT environments, correlating outputs into strategic risk tracking. Manage the cyber security risk toolkit , including threat modelling, attack trees, and scenario-based exercises. Develop and implement cyber security policies, processes, and staff training aligned with Secure by Design principles. Oversee … first-line security operations , including outsourced 24/7 SOC management . Define and manage cyber threatintelligence requirements . Provide cyber risk consultancy for business development projects, ensuring regulatory compliance. Contribute to supply chain risk management , assessing supplier security risks. Act as Deputy NIS Reporting Officer (NRO More ❯
Fenix24 is an industry-leading cyber disaster recovery and restoration company. Battling threat actors as The World's First Civilian Cybersecurity Force , Fenix24 delivers cybersecurity services through its four battalions: Fenix24 for ransomware recovery and restoration; Athena7 for IT security assessments, strategy and planning; Grypho5 for ongoing security-based … ensures organizations are prepared to effectively resist and rapidly recover from a cyberattack, offering a combination of managed data and infrastructure protection, real-time threatintelligence, and ongoing hardening and breach resistance. About This Position The Lieutenant is the senior workstream leader for Fenix24 ransomware restoration events. Lieutenants More ❯
Security function? Cyber security is one of the areas which KPMG has identified for tremendous investment and growth. Our clients face a challenging cyber threat and look to us to help them understand and respond to that threat. This is an opportunity to join a high performing team that … learn, and experience within a Security Operations Centre (SOC). Understanding of SOC tools and technologies, such as SIEM, IDS/IPS, EDR and threatintelligence platforms. Proven experience of assessing maturity, managing SOC services and delivering improvements within a SOC environment. Experience bringing a technology perspective to More ❯
Security function? Cyber security is one of the areas which KPMG has identified for tremendous investment and growth. Our clients face a challenging cyber threat and look to us to help them understand and respond to that threat. This is an opportunity to join a high performing team that … learn, and experience within a Security Operations Centre (SOC). Understanding of SOC tools and technologies, such as SIEM, IDS/IPS, EDR and threatintelligence platforms. Proven experience of assessing maturity, managing SOC services and delivering improvements within a SOC environment. Experience bringing a technology perspective to More ❯
the surface, deep, and dark web. ZeroFox offers the only unified cybersecurity platform combining advanced AI analytics, digital risk and privacy protection, full-spectrum threatintelligence, and a robust portfolio of breach, incident and takedown response capabilities to protect customers from growing threats across the external attack surface. More ❯
response using automation platforms and/or programming Optimizing existing security controls to finetune the alerts & reduce false positives Gather open source and commercial threatintelligence and perform hunting across the enterprise for undetected threats. Support the legal & regulatory teams as a technical SME for cyber incidents with More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Sophos Group
cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller … organizations from phishing, ransomware, data theft, and other everyday and state-sponsored cybercrimes. The solutions are powered by historical and real-time threatintelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available More ❯
cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller … organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threatintelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is More ❯
collaborating with global teams to maintain and improve cyber resilience. Key Responsibilities: Manage and optimize key security tools, including Defender, CrowdStrike, and Zscaler Lead threatintelligence activities, IT controls, and performance dashboards Develop and run phishing simulations & cyber security awareness programs Collaborate with global teams to ensure consistent More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Entasis Partners
collaborating with global teams to maintain and improve cyber resilience. Key Responsibilities: Manage and optimize key security tools, including Defender, CrowdStrike, and Zscaler Lead threatintelligence activities, IT controls, and performance dashboards Develop and run phishing simulations & cyber security awareness programs Collaborate with global teams to ensure consistent More ❯
Provide support, advice and guidance on cyber security. An exciting, comprehensive apprenticeship which focuses on developing sound knowledge of cyber security tools, network intrusions, threatintelligence and how to identify and protect against cyber threats that face the mining industry. Key Details Vacancy Title Cyber Security Apprentice Employer More ❯