Welwyn Garden City, Hertfordshire, United Kingdom Hybrid / WFH Options
Pontoon
What We're Looking For: To thrive in this role, you should possess the following technical skills and experience: Cyber Security Tools : Hands-on experience with SOAR platforms and ThreatIntelligence Platforms. Programming Expertise : Proficiency in Python script with a solid experience of REST APIs to develop and interact with them effectively. Framework Knowledge : Familiarity with the MITRE … ATT&CK framework or equivalent, including knowledge of emerging threat actor tactics, techniques, and procedures. Operating Systems : Experience and working knowledge of both Linux and Windows platforms. Public Cloud Experience: Familiarity with working in public cloud environments is a plus! Adecco is a disability-confident employer. It is important to us that we run an inclusive and accessible recruitment More ❯
welwyn garden city, east anglia, united kingdom Hybrid / WFH Options
Adecco
What We’re Looking For: To thrive in this role, you should possess the following technical skills and experience: Cyber Security Tools : Hands-on experience with SOAR platforms and ThreatIntelligence Platforms. Programming Expertise : Proficiency in Python script with a solid experience of REST APIs to develop and interact with them effectively. Framework Knowledge : Familiarity with the MITRE … ATT&CK framework or equivalent, including knowledge of emerging threat actor tactics, techniques, and procedures. Operating Systems : Experience and working knowledge of both Linux and Windows platforms. Public Cloud Experience: Familiarity with working in public cloud environments is a plus! Adecco is a disability-confident employer. It is important to us that we run an inclusive and accessible recruitment More ❯
watford, hertfordshire, east anglia, united kingdom Hybrid / WFH Options
Adecco
What We’re Looking For: To thrive in this role, you should possess the following technical skills and experience: Cyber Security Tools : Hands-on experience with SOAR platforms and ThreatIntelligence Platforms. Programming Expertise : Proficiency in Python script with a solid experience of REST APIs to develop and interact with them effectively. Framework Knowledge : Familiarity with the MITRE … ATT&CK framework or equivalent, including knowledge of emerging threat actor tactics, techniques, and procedures. Operating Systems : Experience and working knowledge of both Linux and Windows platforms. Public Cloud Experience: Familiarity with working in public cloud environments is a plus! Adecco is a disability-confident employer. It is important to us that we run an inclusive and accessible recruitment More ❯
Apple to name but a few. By combining highly accurate IP geolocation data with robust VPN and proxy detection, they help companies identify malicious activity, strengthen authentication, and enhance threatintelligence and digital privacy. The Role Lead Sales Project Management: Drive deal progression by developing action plans, tracking outstanding items, and proactively removing obstacles to closure. Own Late More ❯
Apple to name but a few. By combining highly accurate IP geolocation data with robust VPN and proxy detection, they help companies identify malicious activity, strengthen authentication, and enhance threatintelligence and digital privacy. The Role Lead Sales Project Management: Drive deal progression by developing action plans, tracking outstanding items, and proactively removing obstacles to closure. Own Late More ❯
london (city of london), south east england, united kingdom
YOUSEEK
Apple to name but a few. By combining highly accurate IP geolocation data with robust VPN and proxy detection, they help companies identify malicious activity, strengthen authentication, and enhance threatintelligence and digital privacy. The Role Lead Sales Project Management: Drive deal progression by developing action plans, tracking outstanding items, and proactively removing obstacles to closure. Own Late More ❯
Apple to name but a few. By combining highly accurate IP geolocation data with robust VPN and proxy detection, they help companies identify malicious activity, strengthen authentication, and enhance threatintelligence and digital privacy. The Role Mange the full sales cycle from identifying prospective clients that align with our ideal customer profile to closing to achieve/surpass More ❯
Apple to name but a few. By combining highly accurate IP geolocation data with robust VPN and proxy detection, they help companies identify malicious activity, strengthen authentication, and enhance threatintelligence and digital privacy. The Role Mange the full sales cycle from identifying prospective clients that align with our ideal customer profile to closing to achieve/surpass More ❯
london (city of london), south east england, united kingdom
YOUSEEK
Apple to name but a few. By combining highly accurate IP geolocation data with robust VPN and proxy detection, they help companies identify malicious activity, strengthen authentication, and enhance threatintelligence and digital privacy. The Role Mange the full sales cycle from identifying prospective clients that align with our ideal customer profile to closing to achieve/surpass More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Autocab GPC Computer Software Ltd
we continue to evolve. We also aim to be highly secure and you will be part of the never ending endeavours to understand and remediate any vulnerabilities that our threatintelligence tools expose to stay ahead of the bad guys. REQUIRED SKILLS, KNOWLEDGE & EXPERIENCE ESSENTIAL 3 years or more commercial Azure IaaS and PaaS experience Strong network skills More ❯
Apple to name but a few. By combining highly accurate IP geolocation data with robust VPN and proxy detection, they help companies identify malicious activity, strengthen authentication, and enhance threatintelligence and digital privacy. The Role We’re looking for a driven Product Director to take full ownership of our client's solutions and shape the future of More ❯
Apple to name but a few. By combining highly accurate IP geolocation data with robust VPN and proxy detection, they help companies identify malicious activity, strengthen authentication, and enhance threatintelligence and digital privacy. The Role We’re looking for a driven Product Director to take full ownership of our client's solutions and shape the future of More ❯
london (city of london), south east england, united kingdom
YOUSEEK
Apple to name but a few. By combining highly accurate IP geolocation data with robust VPN and proxy detection, they help companies identify malicious activity, strengthen authentication, and enhance threatintelligence and digital privacy. The Role We’re looking for a driven Product Director to take full ownership of our client's solutions and shape the future of More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Yorkshire Water
technical wizardry with real-world vigilance to keep our systems safe. We have a varied range of skillsets in our team including Security Operations, intrusion detection, vulnerability scanning, advanced threat protection, Operational Technology, Physical Security and Governance Risk and Compliance specialists to name but a few. We cover every angle of digital defence. Whether you're decoding threat … following security breaches or identified vulnerabilities. Contribute to the selection and deployment of vulnerability assessment tools and techniques. Oversee adherence to security operations procedures, including cloud security and automated threat responses. Investigate and resolve actual or potential security breaches and vulnerabilities. Ensure integrity and completeness of security records and timely support. Ensure effective implementation of security measures and monitor More ❯
security management plans, code of connection. Security incident review in conjunction with Information Security Operations, effectively prioritise and escalate incidents, including process violations, virus alerts, SOC tickets and other threat intelligence. Assessment and validation of new technology solutions with regard to security and risk. In liaison with Company SME's and/or Contractors to ensure all vulnerabilities of … assessments together with remediation instruction. Promote the Information Security requirements and regimes within the Company and work to improve security outcomes. Assist in activities to maintain compliance within Digital Intelligence policies, BAE Systems plc and ISO standards. In addition, adherence to customer mandated Cyber and Government frameworks and compliance with associated legal and regulatory controls. Your skills and experiences More ❯
West Malling, Kent, United Kingdom Hybrid / WFH Options
Lumina Energy
threats are evolving, and our team is at the heart of protecting critical infrastructure and data. As a Cyber Security Engineer, you'll help lead our proactive efforts in threat detection, response, and mitigation. This role is vital to safeguarding the confidentiality, integrity, and availability of systems and services. What you'll be doing Act on security alerts, incidents … ensure timely responses. Diagnose and investigate security incidents following agreed procedures. Escalate and document unresolved incidents and support recovery efforts. Operate within our enterprise-level SOC and collaborate on threat intelligence. Utilise tools like Microsoft E5, Sentinel, and Darktrace to monitor and prevent threats. Analyse malware and respond to high-priority incidents. Support vulnerability management and threat analysis … equivalent function. Proficiency with Microsoft Security Suite (including Sentinel) and Darktrace or similar. Must have an understanding of cyber threats including malware, ransomware, DDoS, insider threats. Strong knowledge of threat modelling, security monitoring, and cloud environments. Familiarity with GDPR, data protection, and privacy impact assessments. Excellent communication and collaboration skills with a proactive mindset. Industry certifications (e.g., CISSP, CEH More ❯
Bedford, Bedfordshire, South East, United Kingdom Hybrid / WFH Options
Total IT
clients, ensuring their IT environments are resilient against cyber threats. Act as a primary point of contact for clients, providing expert advice on cyber security measures, best practices, and threat management. Develop and maintain documentation, including best practice guides and incident reports, to educate clients and team members on security awareness. Conduct vulnerability assessments and participate in the development … members, fostering a culture of continuous learning and improvement within the security domain. Experience: Proven experience in a Security Consultant Role, with a strong background in incident response and threat intelligence. Familiarity with SIEM tools, CompTIA Security+, and other cyber security certifications are highly desirable. Collaborating with stakeholders and 3 rd parties. Creating security strategies and leading the implementation … skills, with the ability to convey complex information clearly and concisely. Demonstrated ability to manage projects, prioritize tasks, and meet deadlines in a fast-paced environment. Foundational knowledge in threat analysis, forensic investigations, and security countermeasures. The Candidate: We are seeking candidates with a comprehensive IT background, analytical problem-solving skills, and a keen understanding of cyber defence strategies. More ❯
Customer Communications - You provide timely incident updates and lead bridging calls with customers during high-priority incidents, ensuring that communications are clear, evidence-led, and aligned to customer expectations. • Threat Hunting Oversight - You lead and coordinate proactive threat hunting across customer environments, using hypothesis-based approaches to identify undetected threats and validate detection coverage. Essential Duties • Advanced Investigation … all available tooling. o Reconstruct attack chains and identify root causes using MITRE ATT&CK. o Recommend and coordinate response actions to mitigate impact during active incidents. • IOC and Threat Analysis o Investigate indicators of compromise using commercial and open-source threat intelligence. o Validate alerts and determine their relevance to customer environments, providing context on adversary behaviour … and recommending follow-up actions when threats are confirmed. • Threat Hunting o Lead and participate in threat hunts using hypothesis-driven approaches mapped to TTPs and MITRE ATT&CK. o Leverage telemetry and queries in tooling to identify suspicious indicators not surfaced through existing detection logic. o Document hunting activities, findings, and detection coverage gaps to support tuning More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Yorkshire Water
technical wizardry with real-world vigilance to keep our systems safe. We have a varied range of skillsets in our team including Security Operations, intrusion detection, vulnerability scanning, advanced threat protection, Operational Technology, Physical Security and Governance Risk and Compliance specialists to name but a few. We cover every angle of digital defence. Whether you're decoding threatMore ❯
Compensation $100,000 - $115,000 depending on experience and skillset What You'll Be Doing Leading incident response and managing containment, analysis, and resolution Monitoring security systems (SIEM, EDR, threat intel) to identify and respond to threats Conducting vulnerability assessments and supporting remediation for financial systems Ensuring compliance with GLBA, PCI, FFIEC, and other regulatory frameworks Supporting risk reviews … of relevant experience Prior experience in financial services, banking, or fintech cybersecurity Expertise with SIEM, EDR, NGFW, and vulnerability management tools Familiarity with scripting (Python, PowerShell) for automation and threat detection Experience conducting third-party risk reviews and regulatory reporting ITAC Solutions firstName lastName Email Address Phone Number Attach Resume Accepted file types: pdf, doc, docx, Max. file size More ❯