Operations Centre runs.As SOC Shift Leader, you’ll work across three rotating teams of Tier 1 and Tier 2 analysts, keeping everything running smoothly, ensuring the highest standards in threatdetection, and making sure every shift hands over cleanly to the next. You’ll still be hands-on with alerts, triage, and tooling, but you’ll also be … processes, updating SOPs, and helping the SOC evolve. You’ll be the SOC Shift Leader who bridges the gap between the analysts on the floor and the SOC Manager, Threat Intelligence, and Incident Response teams making sure communication is clear and everyone is aligned.To secure this SOC Shift Leader role you will have: Strong cyber security background across network More ❯
and safeguarding critical systems. ?? Key Responsibilities Operate within a Security Operations Centre (SOC) or equivalent environment Monitor and respond to incidents using SIEM platforms Conduct system log analysis and threatdetection Assist in vulnerability assessments and management Support incident resolution and reporting ?? Required Skills & Experience At least 2 years' experience in a dedicated Security Analyst role Hands-on More ❯
Compensation $100,000 - $115,000 depending on experience and skillset What You'll Be Doing Leading incident response and managing containment, analysis, and resolution Monitoring security systems (SIEM, EDR, threat intel) to identify and respond to threats Conducting vulnerability assessments and supporting remediation for financial systems Ensuring compliance with GLBA, PCI, FFIEC, and other regulatory frameworks Supporting risk reviews … of relevant experience Prior experience in financial services, banking, or fintech cybersecurity Expertise with SIEM, EDR, NGFW, and vulnerability management tools Familiarity with scripting (Python, PowerShell) for automation and threatdetection Experience conducting third-party risk reviews and regulatory reporting ITAC Solutions firstName lastName Email Address Phone Number Attach Resume Accepted file types: pdf, doc, docx, Max. file More ❯
month contract I am looking for an experienced Cyber Security specialist to join a busy Security Team for our client in central Glasgow. You will be enhancing their threatdetection and incident response capabilities by designing and maintaining SIEM content, build SOAR automations, and integrate security tools to streamline their SOC operations. Key responsibilities: Develop and optimise detection … Maintain and monitor SIEM/SOAR platforms for performance and stability. Essential skills: Proven background in cyber security, including SOC or incident response roles. Excellent skills and experience in detection engineering or incident response. Ability in developing SOAR automations. Strong Python scripting and query language skills (SPL, EQL, SQL). Excellent knowledge of MITRE ATT&CK, TCP/IP More ❯
re a builder with a passion for people and AI-driven innovation, we want to talk to you. What Are The Responsibilities? Architect and implement AI-powered features for threatdetection, pattern recognition, and automated intelligence gathering Design and build scalable data pipelines that process billions of data points using AI/ML models for entity extraction and … relationship mapping Lead the integration of Large Language Models (LLMs) for natural language processing of intelligence data Develop robust APIs and microservices that handle real-time threat analysis at scale Implement computer vision systems for image and video analysis in OSINT investigations Build and optimize vector databases for semantic search across massive intelligence datasets Establish best practices for AI … Docker, Kubernetes) Experience with infrastructure as code (Terraform, CloudFormation) Expertise in building real-time streaming architectures Experience building production AI systems handling sensitive data Knowledge of AI safety, bias detection, and ethical AI practices Familiarity with computer vision and NLP techniques for OSINT Understanding of adversarial AI and security implications Proven track record of leading complex technical projects Ability More ❯
and maintain risk registers Configure secure network topologies and controls tailored to utilities and power-system environments Deploy and tune remote monitoring, logging, and alerting solutions for Real Time threatdetection and performance insights Requirements: Strong grounding in secure software/product development, vulnerability analysis, and mitigation techniques Hands-on experience with CI/CD tools, containerization, and More ❯
South Croydon, Surrey, England, United Kingdom Hybrid / WFH Options
Gold Group Ltd
days per week Some of the main duties of the Cyber Security Manager will include: * Security Strategy & Implementation: Design, implement, and maintain comprehensive cybersecurity policies, procedures, and controls* ThreatDetection & Response: Continuously monitor the digital environment for potential vulnerabilities and security breaches* Incident Management : Lead incident response activities, coordinating with IT teams to mitigate risks and minimise damage. More ❯
Guildford, Surrey, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
. Additional Skills (Preferred): Experience with Microsoft Endpoint Configuration Manager (SCCM) co-management with Intune. PowerShell scripting for automation and bulk administration . Knowledge of Microsoft Sentinel for advanced threat detection. Familiarity with Microsoft Teams administration (voice, meetings, policies). Qualifications & Experience: 3+ years of hands-on experience as a Microsoft 365 Administrator or similar role. Microsoft 365 Certified More ❯
Install and update software applications securely and efficiently. Cybersecurity & Compliance Help monitor and enforce endpoint security using Panda Adaptive Defence 360 and Action 1 Assist with patch management and threatdetection alerts. Support compliance processes such as Cyber Essentials Plus under direction. Documentation & Process Improvement Maintain internal IT documentation for common issues, assets, and configurations. Identify opportunities to More ❯
Altrincham, Trafford, Greater Manchester, United Kingdom
Mech Electrics Limited
Install and update software applications securely and efficiently. Cybersecurity & Compliance Help monitor and enforce endpoint security using Panda Adaptive Defence 360 and Action 1 Assist with patch management and threatdetection alerts. Support compliance processes such as Cyber Essentials Plus under direction. Documentation & Process Improvement Maintain internal IT documentation for common issues, assets, and configurations. Identify opportunities to More ❯
Skelmersdale, Lancashire, North West, United Kingdom Hybrid / WFH Options
Police Digital Services
national programme delivery. The National Management Centre will provide visibility and control of information risks for Policing. It will support the 24x7x365 nature of the police operations, providing a threatdetection and response capability for digital services before, during and after cyber attacks, enabling stakeholders to understand and proactively manage risk across the technology estate at both the More ❯
Company Description I am working closely with a Cyber Security and IT services provider that operates on a global scale, offering a wide range of services, including testing, threatdetection, risk management, and network security. As part of the gaming industry, they offer exciting positions and never-ending learning opportunities. Standing out because of their extensive expertise, this More ❯
out best practice and innovative ideas/approaches, both internally and externally, and manage their implementation in the given business area Oversee the Security Operations Centre (SOC) and manage threatdetection, monitoring, and response Technical Skills & Experience Considerable experience of operating Information Technology Information Library (ITIL) and Cyber Security Incident Response Team (CSIRT) processes and standards. Extensive working More ❯
and draw out an improvement plan based on findings. Address known/newly identified configuration weaknesses within out WAF/F5 deployment that may impact the effectiveness of our threatdetection and mitigation controls e.g, several recommended protection policies need to be reviewed due to complex nature of our deployment web application estate. We need a robust solution More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Jisc
position is key to shaping the strategic direction of the wider Cybersecurity division and directly impacts Jisc's overall service delivery. You will take responsibility for the continuous monitoring, threatdetection, reporting, and analysis of critical infrastructure and its associated services, ensuring resilience, reliability, and security across the organisation. Responsibilities will include: Maintenance and development of platforms and More ❯
Hemel Hempstead, Hertfordshire, United Kingdom Hybrid / WFH Options
Techwaka
My client is a world leader in its field, and part of a globally successful UK-based business. They design, manufacture, sell and support a range of highly advanced threatdetection and security products for global markets in commercial, aviation, defence and security sectors. The products range from small hand-held devices through to large systems, and are More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Onyx-Conseil
architecture and infrastructure. Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identity and access management, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure provisioning, deployment, and management using Infrastructure as Code (IaC) tools. Perform … VPC, IAM, CloudFormation, and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identity and access management, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in scripting languages such as Python, Bash, or PowerShell. Familiarity with Infrastructure More ❯