enforce information security policies, standards, and guidelines across the organisation and Monitor compliance with all information security policies, procedures, and standards. Management of tabletop/red team exercises and incidentresponse playbooks. Assist the incidentresponse process and lead investigations into information security breaches or incidents. Provide guidance and support to employees on information security matters More ❯
enforce information security policies, standards, and guidelines across the organisation and Monitor compliance with all information security policies, procedures, and standards. Management of tabletop/red team exercises and incidentresponse playbooks. Assist the incidentresponse process and lead investigations into information security breaches or incidents. Provide guidance and support to employees on information security matters More ❯
Guildford, Surrey, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
our systems. Key Responsibilities SIEM Management: Monitor and optimize Security Information and Event Management (SIEM) tools like Splunk. Firewall & Proxy Audits: Review configurations and coordinate changes with infrastructure teams. IncidentResponse: Act as part of the Cyber Security IncidentResponse Team (CSIRT) to address threats. Compliance: Ensure alignment with ISO 27001, and other security standards. Risk More ❯
Cambridge, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
REDTECH RECRUIT
Security Engineer Strong experience with Microsoft Security Tools and the wider Defender XDR suite Knowledge of cloud and on-premise environments, ideally Azure, including networking and firewalls Familiarity with incidentresponse processes, playbooks, and tools Understanding of threat intelligence and vulnerability management Experience with ISO27001 and compliance frameworks Scripting and coding skills (e.g., Python, PowerShell, Bash) Exposure to … Strong problem-solving ability with a pragmatic and collaborative approach Responsibilities for Cyber Security Engineer Enhance, manage, and optimise the company’s security tooling portfolio Review, update, and implement incidentresponse playbooks and processes Strengthen security posture in Office 365 and Azure by deploying new tools and improving detection/response capabilities Collaborate with development teams to More ❯
internal and external audits and maintaining a comprehensive set of company policies. The role involves ensuring adherence to evolving regulations, general Health & Safety tasks, managing risk assessments, and supporting incidentresponse processes. Key responsibilities include: Compliance Accreditations Overall management of Compliance areas of responsibility within our Information Security Management System (ISMS) including leading the ISO Committee, management and … including the Health and Safety Risk Register, completion of risk assessments and assisting in our monthly risk reports to the senior leadership team Assist, or own in some cases, incidentresponse proceedings in the event of an Information Security Incident or Health and Safety Incident Collaboration with internal and external teams to raise awareness of Compliance More ❯
internal and external audits and maintaining a comprehensive set of company policies. The role involves ensuring adherence to evolving regulations, general Health & Safety tasks, managing risk assessments, and supporting incidentresponse processes. Key responsibilities include: Compliance Accreditations Overall management of Compliance areas of responsibility within our Information Security Management System (ISMS) including leading the ISO Committee, management and … including the Health and Safety Risk Register, completion of risk assessments and assisting in our monthly risk reports to the senior leadership team Assist, or own in some cases, incidentresponse proceedings in the event of an Information Security Incident or Health and Safety Incident Collaboration with internal and external teams to raise awareness of Compliance More ❯
data, we’d love to hear from you. Key Responsibilities: Proactively monitor security alerts from SIEM, EDR, and other tools Investigate incidents, analyse logs, and perform threat detection and response Conduct assessments of systems, vendors, and third parties for security risk Support incidentresponse including forensic data gathering and documentation Collaborate across internal and external teams to … Previous experience in a cyber security or similar role in a regulated environment Strong knowledge of Firewalls, IDS, network security, and cloud security Familiarity with vulnerability management tools and incidentresponse Ability to clearly communicate technical security issues to all audiences Strong analytical, problem-solving, and relationship-building skills Relevant certifications (CISSP, CISM, CISA, ISO27001) preferred Degree in More ❯
enforce information security policies, standards, and guidelines across the organisation and Monitor compliance with all information security policies, procedures, and standards. Management of tabletop/red team exercises and incidentresponse playbooks. Assist the incidentresponse process and lead investigations into information security breaches or incidents. More ❯
. Lead the strategic integration of security practices into client delivery, embedding security controls and governance into account management workflows. Oversee the implementation and optimisation of security services, including incidentresponse, threat intelligence, and compliance management. Establish client review boards and governance checkpoints to validate that client engagements meet defined security requirements and service levels. Drive continuous improvement … KPIs) Client Satisfaction Rate : Measured through regular client feedback and satisfaction surveys. Delivery Compliance Rate : Percentage of client engagements that meet defined delivery standards and pass governance review gates. IncidentResponse Effectiveness : Success rate in managing and resolving client incidents within predefined response windows. Service Utilisation Rate : Adoption and effective use of security services across client accounts More ❯
an exciting opportunity to play a key role in shaping the transformation journey of enterprise clients. The role will suit professionals with a strong background in SOC service delivery , incidentresponse coordination , and vulnerability management . Key Responsibilities: Act as the primary liaison between clients and internal operational delivery teams, ensuring seamless communication and service excellence. Serve as … the key escalation point for clients, managing security incidents from detection to resolution. Lead coordination efforts across Security Operations Centre (SOC), IncidentResponse, and technical teams during major incidents. Identify impacted systems, users, and business functions, and ensure timely stakeholder communication. Oversee remediation and containment activities and coordinate post-incident investigations and reporting. Ensure all service delivery … stakeholders. Manage and maintain IDS and IPS signature updates for client security gateways and firewalls. What You'll Bring: The ideal candidate will bring extensive experience in security operations , incident management , and service delivery in high-stakes environments. Key qualifications and experience include: Minimum of 10 years' experience providing technical support and advisory services within a Security Operations Centre. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Adecco
Threat Modeling & Risk Assessment: Strong knowledge of security risk management. Cloud & Container Security: Expertise in AWS, Azure, GCP, Docker, and Kubernetes. Security Governance: Experience developing and enforcing security standards. IncidentResponse Leadership: Skilled in leading incidentresponse and root cause analysis. Training & Mentorship: Ability to upskill teams on DevSecOps best practices. Please apply with your updated More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
teams to ensure security best practices and secure-by-design principles. Identify and mitigate security risks in solution architectures. Create security documentation (e.g., RMADS, Security Assurance Documents). Support incidentresponse and remediation efforts for security breaches. Provide security guidance and training to teams across the organization. Key Skills & Experience: Strong knowledge of security frameworks (ISO 27001, NIST … modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incidentresponse and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Certifications such as CISSP More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
teams to ensure security best practices and secure-by-design principles. Identify and mitigate security risks in solution architectures. Create security documentation (e.g., RMADS, Security Assurance Documents). Support incidentresponse and remediation efforts for security breaches. Provide security guidance and training to teams across the organization. Key Skills & Experience: Strong knowledge of security frameworks (ISO 27001, NIST … modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incidentresponse and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Certifications such as CISSP More ❯
on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems … scenarios, ensuring high-fidelity alerts and minimal false positives. Threat Intelligence Integration Integrate threat intelligence feeds into Sentinel to enhance detection capabilities and contextualize alerts within the OT landscape. IncidentResponse Automation Design and implement playbooks using Logic Apps to automate incidentresponse workflows for common OT security events. Execution of the use cases on SIEM More ❯
on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems … scenarios, ensuring high-fidelity alerts and minimal false positives. Threat Intelligence Integration Integrate threat intelligence feeds into Sentinel to enhance detection capabilities and contextualize alerts within the OT landscape. IncidentResponse Automation Design and implement playbooks using Logic Apps to automate incidentresponse workflows for common OT security events. Execution of the use cases on SIEM More ❯
on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems … scenarios, ensuring high-fidelity alerts and minimal false positives. Threat Intelligence Integration Integrate threat intelligence feeds into Sentinel to enhance detection capabilities and contextualize alerts within the OT landscape. IncidentResponse Automation Design and implement playbooks using Logic Apps to automate incidentresponse workflows for common OT security events. Execution of the use cases on SIEM More ❯
on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems … scenarios, ensuring high-fidelity alerts and minimal false positives. Threat Intelligence Integration Integrate threat intelligence feeds into Sentinel to enhance detection capabilities and contextualize alerts within the OT landscape. IncidentResponse Automation Design and implement playbooks using Logic Apps to automate incidentresponse workflows for common OT security events. Execution of the use cases on SIEM More ❯
on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems … scenarios, ensuring high-fidelity alerts and minimal false positives. Threat Intelligence Integration Integrate threat intelligence feeds into Sentinel to enhance detection capabilities and contextualize alerts within the OT landscape. IncidentResponse Automation Design and implement playbooks using Logic Apps to automate incidentresponse workflows for common OT security events. Execution of the use cases on SIEM More ❯
on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems … scenarios, ensuring high-fidelity alerts and minimal false positives. Threat Intelligence Integration Integrate threat intelligence feeds into Sentinel to enhance detection capabilities and contextualize alerts within the OT landscape. IncidentResponse Automation Design and implement playbooks using Logic Apps to automate incidentresponse workflows for common OT security events. Execution of the use cases on SIEM More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
is a hands-on role where youll play a key part in strengthening the organisations cyber defence posture by collecting, analysing, and disseminating actionable intelligence. Youll work closely with incidentresponse, security operations, vulnerability management, and leadership teams to anticipate threats, mitigate risks, and improve resilience. Key Responsibilities: Collect and analyse intelligence to address high-priority security requirements. … Produce and share actionable threat intelligence with stakeholders across security operations, incidentresponse, and fraud prevention. Conduct dark web investigations and OSINT gathering to support requests for intelligence. Proactively identify internal and external threats, including insider threats, and escalate as appropriate. Support the running of a threat intelligence platform to structure and standardise cyber threat data. Write and … edge global security team. Your Profile: Strong background in technical investigations, OSINT, and dark web intelligence. At least 2 years of security experience, ideally with exposure to threat intelligence, incident detection, or response. Solid understanding of the threat intelligence lifecycle and common cyber threat groups. Strong analytical skills with the ability to turn complex data into actionable insights. Self More ❯
Rickmansworth, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Senior plc
and experience: An experienced threat intelligence lead (or similar). Expert in cybersecurity, with a focus on threat management and defensive security in regulated environments. Proficient in threat management, incidentresponse and remediation tools. Strategic development in cyber threat intelligence research, process automation, knowledge sharing and team training. Skilled in using threat frameworks (e.g. MITRE ATT&CK, Cyber … Kill chain). Experienced in using OSINT and security analysis tools (e.g. Shodan, Censys, Qualys, Virus Total, EDR, AV). Experience supporting incidentresponse or vulnerability management programs. Professional certifications in Cyber and Information Security (e.g. OCSP, GREM, CEH). Strong analytical and problem-solving abilities, translating complex technical issues into actionable recommendations. An excellent communicator with the More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Found Talent Limited
Leadership, leading key initiatives to protect systems, data and users while helping shape the organisations security posture. What youll be doing: Managing day-to-day information security operations, including incidentresponse and risk assessments Leading the development and implementation of security policies, standards, and controls Driving continuous improvement initiatives to strengthen cyber resilience Developing and supporting security roadmaps … to Cyber Essentials, ISO27001 or similar What youll need: Proven experience managing IT security or information security functions Strong technical knowledge of Microsoft environments and security controls Experience with incidentresponse, vulnerability management, and security risk mitigation Confident working with both technical teams and business stakeholders Solid understanding of security frameworks and compliance standards Ability to lead projects More ❯
policies across IT and OT environments. Conduct risk assessments and implement proactive threat mitigation measures. Oversee Microsoft 365 security, endpoint protection, email security, and other key cybersecurity tools. Manage incidentresponse plans and investigations, coordinating with internal teams and external partners. Ensure compliance with standards like ISO 27001, GDPR, and NIST frameworks. Promote security awareness and training across … stakeholder engagement. Strong knowledge of cybersecurity frameworks, ICS/OT security, and risk management. Hands-on experience with Microsoft 365 security tools, EDR, and related technologies. Demonstrated leadership in incidentresponse and cross-functional security initiatives. More ❯
london (city of london), south east england, united kingdom
ConSol Partners
policies across IT and OT environments. Conduct risk assessments and implement proactive threat mitigation measures. Oversee Microsoft 365 security, endpoint protection, email security, and other key cybersecurity tools. Manage incidentresponse plans and investigations, coordinating with internal teams and external partners. Ensure compliance with standards like ISO 27001, GDPR, and NIST frameworks. Promote security awareness and training across … stakeholder engagement. Strong knowledge of cybersecurity frameworks, ICS/OT security, and risk management. Hands-on experience with Microsoft 365 security tools, EDR, and related technologies. Demonstrated leadership in incidentresponse and cross-functional security initiatives. More ❯
policies across IT and OT environments. Conduct risk assessments and implement proactive threat mitigation measures. Oversee Microsoft 365 security, endpoint protection, email security, and other key cybersecurity tools. Manage incidentresponse plans and investigations, coordinating with internal teams and external partners. Ensure compliance with standards like ISO 27001, GDPR, and NIST frameworks. Promote security awareness and training across … stakeholder engagement. Strong knowledge of cybersecurity frameworks, ICS/OT security, and risk management. Hands-on experience with Microsoft 365 security tools, EDR, and related technologies. Demonstrated leadership in incidentresponse and cross-functional security initiatives. More ❯