growing Cyber team. What they’re looking for in you as their Security Operations Analyst: Commitment to continuous professional learning and development through ongoing threatanalysis and being up to date with the future threat landscape. Working with security tools such as; Sentinel, Defender and Azure Incident … response planning for different Cyber Threats Monitoring of IT Security systems, providing trend analysis Implementing and maintaining firewall configurations What's in it for you? Competitive salary up to £55,000 25 Days holiday which can increase to 30+ days Pension Scheme Private medical Security Operations Analyst – Up to more »
Ashby-De-La-Zouch, Leicestershire, East Midlands, United Kingdom
CMR & Life Sciences
Implementing secure network protocols such as SSL/TLS, HTTPS, SSH, SFTP, and secure industrial protocols for PRISMIC control systems. Conducting and maintaining ongoing threatanalysis and risk assessment processes to proactively identify and mitigate potential security risks for PRISMIC systems. Ensuring high standards of software quality control more »
london (city of london), south east england, United Kingdom
OpticoreIT
extend. You’ll also be expected to come into the office three days a week. What you’ll be doing: System improvements Vulnerability management Threat management Threatanalysis Reporting Process/Documentation writing, aligning to Azure benchmarking, aligning to CIS benchmarking Improvements to AppSec (including SAST, DAST … improvements Incident/investigation and resolution. What you’ll bring: Experience in Microsoft Azure and Defender Engineering. Application security experience including DAST & SAST. Microsoft threatanalysis experience and EASM tools. Strong security testing experience including penetration testing. Strong security baseline knowledge In-depth vulnerability management, resolution, and patching more »
southampton, south east england, United Kingdom Hybrid / WFH Options
LexisNexis Risk Solutions
analyze security events for anomalous activity Be able to identify emerging security threats and develop/implement security programs Able to conduct vulnerability assessments, threatanalysis, and reporting. Experience/understanding of Cloud PlatformsAWS/GCP and Firewalls Possess a related credential for ethical hacking and security risk more »
Belfast, County Antrim, Northern Ireland, United Kingdom
Johnson Controls
solutions and functional prototypes to demonstrate proof of concept and to enable rapid confirmation of design ideas. Follow secure development processes including contributing to threatanalysis, participating in design reviews, and in code reviews. Resolve complex technical issues through research and investigation. Required profile: What we look for more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
mitigate risks. Incident Lifecycle Management: Overseeing incidents from the moment of detection, through the containment and eradication stages, to the final resolution. Post-Incident Analysis: Conducting detailed investigations post-incident to understand the root cause and to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on … the organization's security systems to detect any suspicious activities early. ThreatAnalysis: Evaluating potential threats and vulnerabilities to ensure that the organization is prepared to defend against them. Strategic Defense Implementation: Putting in place robust security measures to protect the organization's information assets. Cross-Team Coordination … unified security strategy. This role demands a proactive mindset, deep technical expertise, and strong leadership skills to navigate the complex and ever-evolving cyber threat landscape. It's about being always prepared, constantly learning, and effectively communicating to maintain and enhance the organization's security posture. Tasks & Responsibilities Evaluate more »