Surrey, England, United Kingdom Hybrid / WFH Options
Sanderson
business units - Act as a security advocate and guide cross-functional teams in secure practices. Lead technical initiatives - Provide hands-on leadership and mentor more junior team members. Conduct threat and vulnerability assessments - Take a proactive role in identifying potential security threats. Skills and experience required: Strong experience in risk & controls within the information security, ideally in a regulated … complex enterprise environments (e.g., multiple sites, technologies). Hands-on leadership in technical InfoSec initiatives. Strong understanding and implementation of control frameworks (NIST CSF, COBIT). Ability to run threatintelligence and vulnerability assessments. Experience collaborating with 2nd and 3rd line governance teams (e.g., audit, compliance). Strong stakeholder engagement and influencing skills. Reasonable Adjustments: Respect and equality More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Lorien
This role would be based on a hybrid working basis in Central London Experience Experience of working in Cyber Security, ideally within SOC Excellent stakeholder management skills Experience with threatintelligence platforms Active SC clearance would be required If you are an SC cleared Cyber Security Analyst looking for a new role, please apply now! Carbon60, Lorien & SRG More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Hays
Security technical assurance program. Testing and verifying the effectiveness of security controls and mitigating threats. Document outcomes of testing and assurance activity and discuss findings with key stakeholders. Undertake threatintelligence and data leakage. Reviewing, writing and updating the organisation's policies, standards and procedures. What you need to do now If you're interested in this role More ❯
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threatintelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threatintelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threatintelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threatintelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
london (city of london), south east england, united kingdom
Iceberg
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threatintelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
Cambuslang, Glasgow, Lanarkshire, Scotland, United Kingdom
QA
in order to avoid potential Cyber related issues On a day-to-day basis, be involved in the review and configuration of system logs, network logs, vulnerability notices and threatintelligence provide by external organisations, securing devices and networks, mobile data management and desktop configuration security best practices Attend all training and development activities as required, and complete More ❯
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
london, south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
slough, south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
Welwyn Garden City, Hertfordshire, United Kingdom Hybrid / WFH Options
Pontoon
What We're Looking For: To thrive in this role, you should possess the following technical skills and experience: Cyber Security Tools : Hands-on experience with SOAR platforms and ThreatIntelligence Platforms. Programming Expertise : Proficiency in Python script with a solid experience of REST APIs to develop and interact with them effectively. Framework Knowledge : Familiarity with the MITRE … ATT&CK framework or equivalent, including knowledge of emerging threat actor tactics, techniques, and procedures. Operating Systems : Experience and working knowledge of both Linux and Windows platforms. Public Cloud Experience: Familiarity with working in public cloud environments is a plus! Adecco is a disability-confident employer. It is important to us that we run an inclusive and accessible recruitment More ❯
across networks, systems, and app security Excellent communicator who thrives in client-facing roles SC clearance eligible (DV a bonus)/(OSCP bonus) Bonus Points For: R&D or threat intel experience Application testing or ISO17025 environments That hacker mindset we all love We care about passion and skill, not paper. No degree? No problem. Join us to work More ❯
Strategy and Governance • Development and execution of cyber strategy and risk posture. • Define and implement cybersecurity policies, standards, and procedures aligned to ISO27001, NIST, and OG86 frameworks. • Conduct regular threat assessments and ensure alignment of security controls with business risk appetite. • Monitor compliance with regulatory and shareholder cybersecurity obligations, including NIS2 and UK critical infrastructure laws. Responsbile for Information … Risk Management across the IT function. Operational Security Leadership • Lead cybersecurity operations including Security Operations Centre (SOC), SIEM management, and incident response coordination. • Oversee vulnerability management, patch management, and threat detection for both IT and OT systems. • Partner with IT and OT teams to embed security across network infrastructure, cloud services, and field operations. • Manage third-party security risk … CISM, or SANS GIAC. • Deep understanding of both enterprise IT and industrial control systems (ICS/SCADA) in upstream energy. • Proven experience in managing SOC operations, incident response, and threat intelligence. What We Offer • Opportunity to build a cybersecurity function in a high-impact role at a newly formed, agile energy company. • Exposure to both enterprise and operational cybersecurity More ❯
and operationalize monitoring, correlation, and alerting capabilities for Yelp's corporate network, infrastructure, and applications to detect suspicious or anomalous behavior. Improve and enhance vulnerability detection and response capabilities.Perform threat hunting, red teaming activities across business applications and infrastructure integrations. Exhibit strong communication skills to enforce rigorous security standards, while upholding Yelp's value to play well with others. … in reverse engineering/malware analysis, network flow analysis, and digital forensics, to collect and analyze evidence from compromised systems. Proficiency with SOAR and SIEM platforms. Knowledge of modern threat intel (TIP) platforms. Experience in threat modeling, threat hunting, and/or vulnerability management. Software development skills in Python, JavaScript, Objective-C, or similar. Experience building custom More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
highly skilled SOC Solutions Engineer to enhance security operations and strengthen detection & response strategies. This is a hands-on engineering role focused on IBM QRadar, playbook automation, and advanced threat modelling to deliver cutting-edge security solutions. What you'll do: SIEM Engineering & Management: Deploy, configure, and optimise QRadar. Onboard log sources from cloud/on-prem environments. Build … detection and anomaly rules. Playbook Development & Automation: Design and implement automated response playbooks (phishing, lateral movement, exfiltration) with SOAR tools (e.g., Logic Apps, XSOAR). Threat Detection & Response: Investigate alerts, enrich detection logic with threat intel, coordinate incident response. Threat Modelling & Use Case Development: Apply MITRE ATT&CK, STRIDE, and Kill Chain frameworks to build detection use … security (SOC/NOC environment preferred). Strong knowledge of log parsing, SIEM query languages (KQL, SPL, AQL), and automation with Python/PowerShell. Deep understanding of incident response, threat detection, and frameworks (MITRE, NIST, CIS). Knowledge of vulnerability scanning, penetration testing, and network traffic analysis. Familiarity with ITIL processes (Incident, Problem, Change). Excellent stakeholder communication, with More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Crimson
Head of IT Security Incident and Threat Management - Solihull Crimson and IMI have joined forces to build IMI's new security team, and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security and want to be part of a dynamic team that is shaping the future of security … within a successful global company, we want to hear from you! We are seeking a highly skilled and experienced Head of IT Security Incident and Threat Management to join our team. In this role, you will be responsible for leading the strategic efforts to safeguard the company's digital assets against potential threats and incidents. This role requires a … seasoned professional with a deep understanding of cybersecurity, incident response an threat management within a FTSE 100 environment. The salary on offer for this position is between £90,000 and £110,000 per annum plus benefits. Please note this role is based on site for the first 3 months followed by a hybrid working arrangement. Key Responsibilities Develop and More ❯
Bedford, Bedfordshire, South East, United Kingdom Hybrid / WFH Options
Total IT
clients, ensuring their IT environments are resilient against cyber threats. Act as a primary point of contact for clients, providing expert advice on cyber security measures, best practices, and threat management. Develop and maintain documentation, including best practice guides and incident reports, to educate clients and team members on security awareness. Conduct vulnerability assessments and participate in the development … members, fostering a culture of continuous learning and improvement within the security domain. Experience: Proven experience in a Security Consultant Role, with a strong background in incident response and threat intelligence. Familiarity with SIEM tools, CompTIA Security+, and other cyber security certifications are highly desirable. Collaborating with stakeholders and 3 rd parties. Creating security strategies and leading the implementation … skills, with the ability to convey complex information clearly and concisely. Demonstrated ability to manage projects, prioritize tasks, and meet deadlines in a fast-paced environment. Foundational knowledge in threat analysis, forensic investigations, and security countermeasures. The Candidate: We are seeking candidates with a comprehensive IT background, analytical problem-solving skills, and a keen understanding of cyber defence strategies. More ❯
and Nessus. Regularly scan networks, systems and applications for security vulnerabilities. Must have 3+ years cyber security experience and at least 2 yrs focusing on vulnerability management. Familiar with threat and standards such as CVSS, NIST, MITRE ATT&CK. This is an excellent opportunity working for an award winning MSP working on exciting projects. You will develop and maintain … vulnerability policies, contribute towards security architecture reviews, hardening. Classify and prioritise vulnerabilities on severity, business impact and threat intelligence. You must hold security clearance or be able to obtain security clearance and eventually DV. This is an office based role. More ❯