Title: Cyber Security Engineer Department: Cyber Security, Information Technology Reports To: Information and Cybersecurity Senior Manager Work Patterns: Mon-Fri 9am-5:30pm (not Inc. Bank Holidays) JOB PURPOSE SUMMARY: The Cybersecurity team, within the LLA IT department, is responsible for information and cyber … partners, such as retailers, ground handlers and airlines, as well as LLA’s suppliers, to ensure a joined-up approach to information and cyber security. We are seeking a highly skilled and motivated IT Cyber Security Engineer, with a passion for protecting digital assets against cyber … our infrastructure, systems, and networks. Expertise in information security, risk management and compliance are essential, as is a commitment to defending LLA against cyberthreats and integrating security across all layers of our IT environment to protect organizational data and technology. This role focuses on detecting, investigating, and More ❯
Company Description Trustify Cyber is a security software vendor based in Central Scotland, with a focus on developing and delivering Cyber Resilience to SMEs via the Channel. The company's co-creation model has led to the development of world-class Cyber Risk Management … every way via B2B and B2C lines of business. Trust365 is a powerful security platform that addresses every facet of the cyberthreat landscape. It is built on the key principles of keeping SMEs protected, resilient and in business. It includes Cyber Awareness training and … AI-based simulation modules for business owners and their employees to stay safe. Datasurance is revolutionizing the Cyber Risk Insurance landscape with over six years of pioneering innovation. We bridge the cybersecurity maturity gap, providing small businesses with equitable access to critical protection. Leveraging FCA approval and partnerships More ❯
As part of their dedication to protecting critical infrastructure and customer data, they are seeking an experienced Senior SOC Analyst to enhance their Cyber Incident Response Team. This is a fantastic opportunity to work with cutting-edge security tools, tackle sophisticated threats, and play a key role in … traffic, and system logs to uncover threats. Incident Response: Lead security response efforts, including containment, eradication, and recovery of cyber incidents. Forensics & Threat Hunting: Conduct forensic investigations and proactive threat hunts to detect and mitigate potential risks before they escalate. Threat Intelligence: Utilise intelligence feeds … Looking For 5+ years experience in Security Operations Centre (SOC) and Incident Response (IR). Proficiency in digital forensics, malware analysis, SIEM tools, and threat intelligence. A solid understanding of cyberthreats, particularly in regulated industries. Experience conducting security exercises and breach simulations. Excellent communication skills, with More ❯
london (hounslow), south east england, United Kingdom
Adeptis Group
As part of their dedication to protecting critical infrastructure and customer data, they are seeking an experienced Senior SOC Analyst to enhance their Cyber Incident Response Team. This is a fantastic opportunity to work with cutting-edge security tools, tackle sophisticated threats, and play a key role in … traffic, and system logs to uncover threats. Incident Response: Lead security response efforts, including containment, eradication, and recovery of cyber incidents. Forensics & Threat Hunting: Conduct forensic investigations and proactive threat hunts to detect and mitigate potential risks before they escalate. Threat Intelligence: Utilise intelligence feeds … Looking For 5+ years experience in Security Operations Centre (SOC) and Incident Response (IR). Proficiency in digital forensics, malware analysis, SIEM tools, and threat intelligence. A solid understanding of cyberthreats, particularly in regulated industries. Experience conducting security exercises and breach simulations. Excellent communication skills, with More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure … with security embedded at every stage. Cloud Security Implementation: Leverage Azure Security Centre, Microsoft Defender for Cloud, and Microsoft Sentinel for advanced security monitoring. Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion … Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured action More ❯
Employment Type: Contract, Work From Home
Rate: From £500 to £700 per day (direct contract with the client)
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure … with security embedded at every stage. Cloud Security Implementation: Leverage Azure Security Centre, Microsoft Defender for Cloud, and Microsoft Sentinel for advanced security monitoring. Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion … Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured action More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure … with security embedded at every stage. Cloud Security Implementation: Leverage Azure Security Centre, Microsoft Defender for Cloud, and Microsoft Sentinel for advanced security monitoring. Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion … Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured action More ❯
Loughton, England, United Kingdom Hybrid / WFH Options
Profile 29
part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure … with security embedded at every stage. Cloud Security Implementation: Leverage Azure Security Centre, Microsoft Defender for Cloud, and Microsoft Sentinel for advanced security monitoring. Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion … Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured action More ❯
loughton, east anglia, united kingdom Hybrid / WFH Options
Profile 29
part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure … with security embedded at every stage. Cloud Security Implementation: Leverage Azure Security Centre, Microsoft Defender for Cloud, and Microsoft Sentinel for advanced security monitoring. Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion … Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured action More ❯
chelmsford, east anglia, united kingdom Hybrid / WFH Options
Profile 29
part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure … with security embedded at every stage. Cloud Security Implementation: Leverage Azure Security Centre, Microsoft Defender for Cloud, and Microsoft Sentinel for advanced security monitoring. Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion … Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured action More ❯
Gloucester, England, United Kingdom Hybrid / WFH Options
FluidOne
Company Overview Cyber Security Associates Limited (CSA), established in 2013, provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat. CSA has built its team from a foundation of UK Government (ex … and improving clients overall security posture. The successful applicant will have a strong background in security operations, excellent customer service skills, incident response, and threat hunting, as well as experience in managing and mentoring junior team members. You should also have experience in providing exceptional service to customers and … during event and incident investigations. Assist in the Incident Response process internally and in communication with the customer. Produce high-quality alert, incident, and threat intelligence reports. Compile phishing campaign templates, run campaigns, and write reports. Serve as a security expert to customers and team members. Escalate high-priority More ❯
cheltenham, south west england, United Kingdom Hybrid / WFH Options
FluidOne
Company Overview Cyber Security Associates Limited (CSA), established in 2013, provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat. CSA has built its team from a foundation of UK Government (ex … and improving clients overall security posture. The successful applicant will have a strong background in security operations, excellent customer service skills, incident response, and threat hunting, as well as experience in managing and mentoring junior team members. You should also have experience in providing exceptional service to customers and … during event and incident investigations. Assist in the Incident Response process internally and in communication with the customer. Produce high-quality alert, incident, and threat intelligence reports. Compile phishing campaign templates, run campaigns, and write reports. Serve as a security expert to customers and team members. Escalate high-priority More ❯
glasgow, central scotland, United Kingdom Hybrid / WFH Options
Net Talent
Package 🕒 Type: Full-Time | Permanent Are you ready to take on a hands-on role protecting business-critical systems and data from evolving cyberthreats? We’re seeking a technically skilled Information Security Specialist to join our team and lead the implementation and operation of essential security controls More ❯
milton, central scotland, United Kingdom Hybrid / WFH Options
Net Talent
Package 🕒 Type: Full-Time | Permanent Are you ready to take on a hands-on role protecting business-critical systems and data from evolving cyberthreats? We’re seeking a technically skilled Information Security Specialist to join our team and lead the implementation and operation of essential security controls More ❯
paisley, central scotland, United Kingdom Hybrid / WFH Options
Net Talent
Package 🕒 Type: Full-Time | Permanent Are you ready to take on a hands-on role protecting business-critical systems and data from evolving cyberthreats? We’re seeking a technically skilled Information Security Specialist to join our team and lead the implementation and operation of essential security controls More ❯
robust security solutions across the M365 platform. This role demands deep technical proficiency in M365 security features, alongside a comprehensive understanding of contemporary cyberthreats, compliance mandates, and enterprise security architectures. Key Responsibilities: Lead the design and deployment of security controls across Microsoft 365 E5 services, including Endpoint More ❯
work alongside passionate professionals who thrive on solving complex problems, staying ahead of adversaries, and continuously improving our security posture. Whether it's analysing threat intelligence, responding to incidents, or hardening our infrastructure, your work will have a direct impact on the safety and success of our organisation. … teams to harden systems and networks Support compliance efforts (e.g., ISO 27001, NIST, GDPR) Contribute to threat intelligence and detection rule tuning Participate in red/blue team exercises and tabletop simulations For … Technical skills We'll assess you against these technical skills during the selection process: Intrusion detection and analysis Threat intelligence and threat assessment Cyber Security operations Government Security Profession career framework More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯