Operate within a global team that takes responsibility for the security monitoring of key technologies and tools across the estate Lead and manage a team of Security Analysts & the Vulnerability management team Comfortable operating in a technical capacity performing hands-on incident response and supporting/managing SOC analysts Act as a SME in matters related threat and vulnerability … and new technology initiatives Implement and maintain operating run books, operating processes and procedures Help to develop and configure use cases, and alerting rules within SIEM technologies Mange the vulnerability management programme that includes vulnerabilityscanning, security testing, threat monitoring and data loss and leakage prevention Direct on-going threat intelligence activities Mentor and develop security analysts … Skills: Prior experience working/managing a SOC Demonstrable experience and operational knowledge of SIEM, firewalls, intrusion detection and vulnerability management systems/solutions Detailed understanding of Security Monitoring, Threat Intelligence, Vulnerability management and Incident Response Experience managing security incidents within a complex environment. Strong foundation in network security and common attack methodologies Exposure to user behaviour analytical More ❯
Operate within a global team that takes responsibility for the security monitoring of key technologies and tools across the estate Lead and manage a team of Security Analysts & the Vulnerability management team Comfortable operating in a technical capacity performing hands-on incident response and supporting/managing SOC analysts Act as a SME in matters related threat and vulnerability … and new technology initiatives Implement and maintain operating run books, operating processes and procedures Help to develop and configure use cases, and alerting rules within SIEM technologies Mange the vulnerability management programme that includes vulnerabilityscanning, security testing, threat monitoring and data loss and leakage prevention Direct on-going threat intelligence activities Mentor and develop security analysts … Skills: Prior experience working/managing a SOC Demonstrable experience and operational knowledge of SIEM, firewalls, intrusion detection and vulnerability management systems/solutions Detailed understanding of Security Monitoring, Threat Intelligence, Vulnerability management and Incident Response Experience managing security incidents within a complex environment. Strong foundation in network security and common attack methodologies Exposure to user behaviour analytical More ❯
spend most of your time: • Supporting the implementation of the clients' cybersecurity strategies, policies, and procedures tailored to the specific needs of our organisation. • Conducting regular security assessments and vulnerability scans, to identify potential weaknesses and recommend appropriate remediation measures. • Monitoring and analysing security logs, events, and alerts to detect and respond to potential security incidents in a timely … promote a culture of security throughout the organisation. • Assist with compliance with relevant security frameworks, regulations, and standards, such as Cyber Essentials, CAF/Gov Assure and NCSC. • Support vulnerability management report and process • Assist with any other tasks/projects which need prioritising • Documenting of alerts and creation of playbooks Professional Skills Required: Proficiency with Microsoft Security Technologies … such as Sentinel, Entra and Defender Proven experience designing, implementing, and maintaining security controls. Experience with security assessment tools, vulnerabilityscanning, and penetration testing methodologies. Understanding of current cybersecurity threats, attack vectors, and mitigation strategies. Ability to analyse and interpret security logs, events, and alerts to detect and respond to security incidents effectively. Familiarity with security frameworks and More ❯
for consistent and repeatable cloud deployments. Build and maintain CI/CD pipelines with integrated DevSecOps tools to automate both application and infrastructure deployments. Integrate security capabilities such as vulnerabilityscanning, static code analysis, and secrets management into the development lifecycle. Work closely with development, architecture, and cybersecurity teams to ensure security and compliance are embedded into all … scale. Demonstrated experience in the banking or financial services industry, with a strong understanding of security and regulatory requirements. Strong knowledge of DevSecOps practices, including secure CI/CD, vulnerability management, and secrets management. Experience in container orchestration using AKS and containerisation with Docker. Familiarity with CI/CD tools such as Azure DevOps and GitHub Actions. Proficiency in More ❯
teams. In addition to alert triage and incident response, you will be responsible for maintaining and tuning key security solutions such as endpoint detection and response (EDR), antivirus, and vulnerability management platforms. You will also provide technical support to internal security-aligned projects and initiatives. About us Elysium Healthcare is an established, stable, and agile company with over … teams.a In addition to alert triage and incident response, you will be responsible for maintaining and tuning key security solutions such as endpoint detection and response (EDR), antivirus, and vulnerability management platforms. This role ensures these tools operate effectively, remain aligned to evolving threats, and support compliance with organisational standards and frameworks. You will also provide technical support to … false positives, and improve threat detection accuracy. Prioritise security alerts based on business impact, SLA requirements, and known threat intelligence. Maintain and tune operational security platforms (e.g. EDR, antivirus, vulnerabilityscanning). Support internal security projects with implementation, testing, and documentation. Maintain records of security incidents, response actions, and lessons learned. Collaborate with the SOC to improve alerting More ❯
London, England, United Kingdom Hybrid / WFH Options
Cyber UK
s responsibilities develop over time. In the Security Platform team, you will be working to advance our service offerings, which focus on: Providing a runtime platform for security services Vulnerability management for all platform teams Ensuring compliance of our digital assets and proving this to auditors Other exciting security domains How we work We operate on a strong belief … with different stakeholders and varying levels of technological depth. Priorities shift based on business needs, but engineers in our team typically focus on one or two of the following: Vulnerability Management and Cloud Security Posture Management Maintain and enhance our Vulnerability Management Program, ensuring effective use across platform engineering teams. Develop and maintain a Cloud Security Posture Management … projects and propose well-reasoned solutions. Basic understanding of cloud concepts and cloud resource use cases. Experience in cyber security domains or a strong interest in learning, such as: Vulnerability management Securing data at rest/in transit Risk management and compliance Programming experience (e.g., Java, Golang, Python). Ability to showcase previous projects is a plus. Familiarity with More ❯
and implementation of business continuity planning, disaster recovery management, risk assessment and mitigation to cyber, data and security threats. Having a good understanding of the cyber security landscape, horizon scanning and proactive education of latest developments. The post holder may be required to undertake any other duties at the request of the line manager which are commensurate with the … knowledge of Microsoft platforms with a focus on Intune, Microsoft Exchange Online, Office 365 support technologies, and Azure Active Directory. Strong experience configuring anti-malware, intrusion detection, firewalls and vulnerabilityscanning systems and network security. Extensive experience and working knowledge with Microsoft Azure Infrastructure as a Service platform and hybrid infrastructure; including planning, configuration, optimisation and deployment. Extensive More ❯
Partner with Cloud Engineering, DevOps, and Platform teams while being a key stakeholder in the architecture and implement secure containerised environments using platforms like Docker, and ECS. Focus on vulnerability mitigation, compliance automation, and secure orchestration practices to ensure container workloads are resilient and meet organisational security requirements. Security Policy Development & Enforcement : Develop, document, and enforce comprehensive cloud security … and QA teams to integrate security best practices into the software development lifecycle (SDLC) and CI/CD pipelines. Ensure security is prioritised through automation tools, security testing, and vulnerabilityscanning as part of the continuous delivery process. Security Assessments & Incident Response : Conduct security assessments, vulnerability scans and risk analyses to identify and address potential security weaknesses More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯