Thatcham, Berkshire, United Kingdom Hybrid / WFH Options
Cyberfort Group
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Sophos Group
cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller … organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threatintelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is … similar role. Demonstrable experience of securing services primarily built on AWS and Azure A pragmatic approach to securing products leveraging different technologies, facing different threat profiles. Strong knowledge of application security and common web application vulnerabilities (e.g., OWASP Top 10) and have experience with secure coding practices. A background More ❯
and reporting on risks with precision. Key Responsibilities Lead Incident Investigations – Take ownership of high-severity security incidents, ensuring complete and accurate triage Advanced Threat Analysis – Perform deep-dive analysis to uncover root causes, residual risks, and stealthy attack vectors Mentor and Guide – Support junior analysts with expertise and … source) to detect and analyse modern threats Fine-Tuning & Reporting – Tune SIEM and SOAR systems for accuracy, and deliver clear, actionable incident reports Technical ThreatIntelligence – Stay ahead of emerging attack vectors, especially those identified via EDR; apply this insight to investigations and tuning efforts What You’ll More ❯
and reporting on risks with precision. Key Responsibilities Lead Incident Investigations – Take ownership of high-severity security incidents, ensuring complete and accurate triage Advanced Threat Analysis – Perform deep-dive analysis to uncover root causes, residual risks, and stealthy attack vectors Mentor and Guide – Support junior analysts with expertise and … source) to detect and analyse modern threats Fine-Tuning & Reporting – Tune SIEM and SOAR systems for accuracy, and deliver clear, actionable incident reports Technical ThreatIntelligence – Stay ahead of emerging attack vectors, especially those identified via EDR; apply this insight to investigations and tuning efforts What You’ll More ❯
and reporting on risks with precision. Key Responsibilities Lead Incident Investigations – Take ownership of high-severity security incidents, ensuring complete and accurate triage Advanced Threat Analysis – Perform deep-dive analysis to uncover root causes, residual risks, and stealthy attack vectors Mentor and Guide – Support junior analysts with expertise and … source) to detect and analyse modern threats Fine-Tuning & Reporting – Tune SIEM and SOAR systems for accuracy, and deliver clear, actionable incident reports Technical ThreatIntelligence – Stay ahead of emerging attack vectors, especially those identified via EDR; apply this insight to investigations and tuning efforts What You’ll More ❯
and reporting on risks with precision. Key Responsibilities Lead Incident Investigations – Take ownership of high-severity security incidents, ensuring complete and accurate triage Advanced Threat Analysis – Perform deep-dive analysis to uncover root causes, residual risks, and stealthy attack vectors Mentor and Guide – Support junior analysts with expertise and … source) to detect and analyse modern threats Fine-Tuning & Reporting – Tune SIEM and SOAR systems for accuracy, and deliver clear, actionable incident reports Technical ThreatIntelligence – Stay ahead of emerging attack vectors, especially those identified via EDR; apply this insight to investigations and tuning efforts What You’ll More ❯
standards-based approach to managing cyber threats and resilience. You’ll lead on incident response planning, certification and compliance, and continuous monitoring of the threat landscape. Working closely with senior leadership and technical teams, you’ll provide expert guidance and ensure that cyber security remains embedded in the organisation … Cybersecurity Framework and its practical application. Knowledge of compliance and certification standards such as PCI-DSS and Cyber Essentials Plus. Experience in risk management, threatintelligence, and incident response. Ability to communicate clearly with both technical and non-technical stakeholders. Experience managing budgets and third-party security vendors. More ❯
standards-based approach to managing cyber threats and resilience. You’ll lead on incident response planning, certification and compliance, and continuous monitoring of the threat landscape. Working closely with senior leadership and technical teams, you’ll provide expert guidance and ensure that cyber security remains embedded in the organisation … Cybersecurity Framework and its practical application. Knowledge of compliance and certification standards such as PCI-DSS and Cyber Essentials Plus. Experience in risk management, threatintelligence, and incident response. Ability to communicate clearly with both technical and non-technical stakeholders. Experience managing budgets and third-party security vendors. More ❯
standards-based approach to managing cyber threats and resilience. You’ll lead on incident response planning, certification and compliance, and continuous monitoring of the threat landscape. Working closely with senior leadership and technical teams, you’ll provide expert guidance and ensure that cyber security remains embedded in the organisation … Cybersecurity Framework and its practical application. Knowledge of compliance and certification standards such as PCI-DSS and Cyber Essentials Plus. Experience in risk management, threatintelligence, and incident response. Ability to communicate clearly with both technical and non-technical stakeholders. Experience managing budgets and third-party security vendors. More ❯
Skills Required Solid knowledge and extensive experience in supporting and designing SIEM/XDR platforms A deep interest and passion for Cyber Security and threat intelligence. Good knowledge and understanding of the following Key technologies/products supported to perform in-depth troubleshooting and cybersecurity investigations: Linux/Unix … weekly shop and discounts on gift/shopping vouchers. World-class training and development Keywords: 44768, LogRhythm, SIEM, EDR, SOC, NOC, Cyber Security, Cyber ThreatIntelligence, Log Management, protective monitoring, Network Security. More ❯
Employment Type: Permanent
Salary: £50000 - £65000/annum Up to 20% bonus, 10% pension
Skills Required Solid knowledge and extensive experience in supporting and designing SIEM/XDR platforms A deep interest and passion for Cyber Security and threat intelligence. Good knowledge and understanding of the following Key technologies/products supported to perform in-depth troubleshooting and cybersecurity investigations: Linux/Unix … weekly shop and discounts on gift/shopping vouchers. World-class training and development Keywords: 44768, LogRhythm, SIEM, EDR, SOC, NOC, Cyber Security, Cyber ThreatIntelligence, Log Management, protective monitoring, Network Security. More ❯
Employment Type: Permanent
Salary: £50000 - £65000/annum Up to 20% bonus, 10% pension
Linux systems. Proficient in using SIEM tools like ArcSight and Azure Sentinel; experienced with KQL and basic XDR platforms. Familiar with OSINT techniques for threatintelligence and incident investigation. Holds or is working toward relevant certifications such as CISSP, CySA+, GCIH, and CASP, with a degree/diploma More ❯
draw upon Enterprise Security Architecture or Security Solutions Architecture to: Identify business objectives, user needs, risk appetite and cyber security obligations Identify vulnerabilities, perform threat modelling, undertake risk assessment, evaluate the effectiveness of security controls Verify and evidence alignment to 'Secure by Design' principles, corporate security policy/standards … of established patterns, principles and guidelines Research emerging technologies, new products and be able to position these in a coherent manner against the developing threat landscape and client risk appetite Ability to distil complex information and concepts into key discussion points that identifies a path to resolution rather than … practice within Cloud platforms (AWS and/or Microsoft Azure) In-depth knowledge of modern security concepts, common attack vectors, malware, security analytics and threat intelligence. A good understanding of security testing and vulnerability management is important (including pen testing/ITHC, CVSS/CVE) Experience working with security More ❯
The Role Deploy, configure, and maintain Microsoft Sentinel for real-time threat monitoring and response. Create and fine-tune analytics rules, workbooks and playbooks in Sentinel. Integrate various data sources into Sentinel (e.g. Azure logs, on-prem logs, third-party tools). Manage incident response workflows and automate responses … using SOAR capabilities. Conduct regular threat hunting and proactively identify indicators of compromise (IOCs). Work with security analysts to investigate and respond to alerts and incidents. Develop dashboards and reports for stakeholders. Ensure compliance with regulatory and organisational security policies. Skills Proven experience with Microsoft Sentinel and Azure … of SIEM/SOAR principles and security operations. Familiarity with Microsoft Defender XDR, Azure Monitor and Azure Security Center. Experience with incident response and threatintelligence tools. Excellent communication and documentation skills. Security certifications are a plus (e.g. SC-200, AZ-500, CISSP, CEH). **Some time will More ❯
Immingham, Lincolnshire, North East, United Kingdom Hybrid / WFH Options
Rullion Limited
Responsibilities Lead cyber risk assessment activities across IT and OT environments, correlating outputs into strategic risk tracking. Manage the cyber security risk toolkit , including threat modelling, attack trees, and scenario-based exercises. Develop and implement cyber security policies, processes, and staff training aligned with Secure by Design principles. Oversee … first-line security operations , including outsourced 24/7 SOC management . Define and manage cyber threatintelligence requirements . Provide cyber risk consultancy for business development projects, ensuring regulatory compliance. Contribute to supply chain risk management , assessing supplier security risks. Act as Deputy NIS Reporting Officer (NRO More ❯
Security function? Cyber security is one of the areas which KPMG has identified for tremendous investment and growth. Our clients face a challenging cyber threat and look to us to help them understand and respond to that threat. This is an opportunity to join a high performing team that … learn, and experience within a Security Operations Centre (SOC). Understanding of SOC tools and technologies, such as SIEM, IDS/IPS, EDR and threatintelligence platforms. Proven experience of assessing maturity, managing SOC services and delivering improvements within a SOC environment. Experience bringing a technology perspective to More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Sophos Group
cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller … organizations worldwide from phishing, ransomware, data theft, other everyday and state-sponsored cybercrimes. The solutions are powered by historical and real-time threatintelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Sophos Group
cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller … organizations from phishing, ransomware, data theft, and other everyday and state-sponsored cybercrimes. The solutions are powered by historical and real-time threatintelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Entasis Partners
collaborating with global teams to maintain and improve cyber resilience. Key Responsibilities: Manage and optimize key security tools, including Defender, CrowdStrike, and Zscaler Lead threatintelligence activities, IT controls, and performance dashboards Develop and run phishing simulations & cyber security awareness programs Collaborate with global teams to ensure consistent More ❯
Provide support, advice and guidance on cyber security. An exciting, comprehensive apprenticeship which focuses on developing sound knowledge of cyber security tools, network intrusions, threatintelligence and how to identify and protect against cyber threats that face the mining industry. Key Details Vacancy Title Cyber Security Apprentice Employer More ❯
Bournemouth, Dorset, United Kingdom Hybrid / WFH Options
LV=
assets and ensure compliance with regulatory requirements •Operational Excellence: Oversee a high-performing team of security professionals, manage security operations, and lead incident response, threatintelligence, and vulnerability management efforts •Innovative Environment: Collaborate with various departments, including marketing, IT, and customer service, to integrate security measures seamlessly into More ❯