senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
senior stakeholders to communicate risks effectively. What We're Looking For Technical Expertise: 5+ years of experience in threat intelligence, vulnerability management, or cyber threat research. Hands-on technical incidentresponse and management experience. Strong understanding of emerging threats targeting government and CNI. Proficiency in Open-Source research, Windows/Linux operating systems, core networking concepts, and cloud More ❯
CD practices to accelerate delivery and improve consistency. Compliance and Security Controls: Implement and monitor controls to ensure infrastructure build and release processes meet regulatory and internal compliance requirements. Incident and Problem Management: Oversee incidentresponse and root cause analysis related to build and release operations, ensuring timely resolution and preventative measures. Performance Monitoring and Optimization: Monitor … application, and security teams to ensure build and release operations support broader infrastructure and business goals. Documentation and Reporting: Maintain accurate documentation of build and release procedures, configurations, and incident reports. Provide regular updates to senior management. Skills & Experience Strong leadership skills with experience managing technical teams. Proven experience managing infrastructure build and release operations in hybrid cloud and More ❯
Information Security Office Function (CISO) The Security Analyst (XDR) role is within the Security Operations pillar of the CSOC (Cyber Security Operations Centre) providing second line security analytics and incidentresponse services. The post of Security Analyst has been awarded a Recruitment and Retention Premia (RRP) in response to current labour market conditions. In recognition of this … that RRP is non contractual and subject to review. Main duties of the job As a Security Analyst (XDR) you will: Act as a Tier 2 Extended Detection and Response (XDR) analyst for the Security Operations team. Deputise for Senior Analysts in their absence. Act as an escalation point for Tier 1 Junior Analysts for incidents and investigations. Offer … title is advertised to attract the right skills needed for the role. The post of Security Advisor/Analyst has been awarded a Recruitment and Retention Premia (RRP) in response to current labour market conditions. In recognition of this, the role attracts an additional monthly RRP payment equal to 20% per annum. Please be aware that RRP is non More ❯
Shefford, Bedfordshire, South East, United Kingdom
Intercity Technology Limited
to-end support across Service Desk tiers (13). That means you will not only resolve high-level, complex technical issues but also contribute to front-line customer service, incident triage, and service request fulfilment when required. The hours of work for this role are Monday - Sunday - 4 on 4 off - 7pm - 7am. Key Responsibilities as a Cloud Operations … Engineer: Maintain and troubleshoot Azure and hybrid cloud environments. Perform proactive monitoring, incidentresponse, and root cause analysis of mission-critical systems. Configure, optimise, and secure servers, virtual machines, networking, and storage solutions. Create and maintain scripts (e.g., PowerShell) to automate operational tasks. Contribute to design and implementation of new cloud and hybrid solutions. Service Desk Element: Tier … experience in a 3rd line technical infrastructure support role Outstanding problem-solving skills with a structured and analytical mindset Experience with ITIL-aligned Service Desk processes. Ability to perform incident triage and service request fulfilment. Strong knowledge of end-user support: Windows OS, O365, Teams, Exchange Online, SharePoint. What We Offer: 33 days holiday (inclusive of bank holidays), with More ❯
and resilience. Collaborating with security analysts, engineers, and stakeholders to ensure seamless integration of tools and workflows. Leading technical discussions and providing guidance on best practices for threat detection, incidentresponse, and log management. Supporting pre-sales engagements with technical expertise and solution design input. Staying ahead of emerging threats and technologies to continuously improve SOC capabilities . … What You’ll Bring: Strong experience in designing and implementing SOC platforms (e.g., SIEM, SOAR, EDR). Deep understanding of security operations workflows, threat intelligence, and incident response. Hands-on experience with tools like Splunk, Sentinel, QRadar, or similar. Ability to engage with both technical and non-technical stakeholders. Familiarity with cloud environments (Azure, AWS, GCP) and hybrid architectures. More ❯
and resilience. Collaborating with security analysts, engineers, and stakeholders to ensure seamless integration of tools and workflows. Leading technical discussions and providing guidance on best practices for threat detection, incidentresponse, and log management. Supporting pre-sales engagements with technical expertise and solution design input. Staying ahead of emerging threats and technologies to continuously improve SOC capabilities . … What You’ll Bring: Strong experience in designing and implementing SOC platforms (e.g., SIEM, SOAR, EDR). Deep understanding of security operations workflows, threat intelligence, and incident response. Hands-on experience with tools like Splunk, Sentinel, QRadar, or similar. Ability to engage with both technical and non-technical stakeholders. Familiarity with cloud environments (Azure, AWS, GCP) and hybrid architectures. More ❯
london (city of london), south east england, united kingdom
Anson McCade
and resilience. Collaborating with security analysts, engineers, and stakeholders to ensure seamless integration of tools and workflows. Leading technical discussions and providing guidance on best practices for threat detection, incidentresponse, and log management. Supporting pre-sales engagements with technical expertise and solution design input. Staying ahead of emerging threats and technologies to continuously improve SOC capabilities . … What You’ll Bring: Strong experience in designing and implementing SOC platforms (e.g., SIEM, SOAR, EDR). Deep understanding of security operations workflows, threat intelligence, and incident response. Hands-on experience with tools like Splunk, Sentinel, QRadar, or similar. Ability to engage with both technical and non-technical stakeholders. Familiarity with cloud environments (Azure, AWS, GCP) and hybrid architectures. More ❯
Jam Management Consultancy Limited T/A JAM RECRUITMENT
the highest standards. Key Responsibilities Develop, implement, and maintain compliance with ISO , and PCI-DSS standards. Conduct risk assessments, security audits, and vulnerability testing across systems and processes. Lead incidentresponse activities, ensuring rapid and effective mitigation. Collaborate with internal stakeholders and external auditors to achieve and maintain certifications. Deliver organisation-wide security and compliance awareness training. Monitor … Auditor certification (or equivalent). Demonstrable experience managing compliance for ISO , and PCI-DSS. Strong understanding of governance, risk management, and regulatory compliance. Proficiency with security monitoring tools and incident management processes. Excellent analytical, communication, and leadership skills. Desirable Knowledge of GDPR, NIST, or other security frameworks. Experience in highly regulated industries such as, technology, finance, telecoms, and maybe More ❯
engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and alerts from observability platforms Maintain documentation of security architecture, policies, and incidentresponse procedures Required Skills & Experience: Strong hands-on experience with Kubernetes and OpenShift in secure production environments Proficiency in GitLab and secure CI/CD pipeline practices Familiarity More ❯
engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and alerts from observability platforms Maintain documentation of security architecture, policies, and incidentresponse procedures Required Skills & Experience: Strong hands-on experience with Kubernetes and OpenShift in secure production environments Proficiency in GitLab and secure CI/CD pipeline practices Familiarity More ❯