Andover, Hampshire, United Kingdom Hybrid / WFH Options
Deloitte - Recruitment
SOC SIEM tool. Focus on insider threat and Data Loss Prevention use case to demonstrate the process used by SOC analysts. Cyber Security Incident Management Plan (SIMP) - Develop the Cyber Incident Response Plan in line with NIST and SANS guidance and incorporating the wider teams. Create supporting documentation and … Review existing documentation for the SOC BCDR and develop process/plan that feeds into the wider process. Cyber Incident Investigation/Escalation - Reviewing vulnerability event channels and identifying issues for escalation to different teams. Training and development - Mentor existing SOC team and develop playbooks and training and development … and potential future requirements for this requirement: Strong knowledge of Cyber Security, with a focus on operational security, such as security monitoring and alerting, vulnerabilitymanagement and incident response. Producing supporting security documentation in coordination with stakeholders. A good all-round knowledge of IT systems and Networking. Experienced More ❯
the organisation's security. Key accountabilities: Assurance and Testing: Develop and improve security policies and guidance related to security assurance testing. Coordinate and manage vulnerability assessments, penetration testing, and other technical evaluations. Collaborate with technology teams to implement robust security controls and provide guidance on remediation. Perform third-party … vendor risk assessments and report findings to relevant stakeholders. Risk Management: Conduct regular risk assessments to identify vulnerabilities and associated risks. Develop and implement risk mitigation strategies. Define and report key risk metrics for security assurance. Maintain a comprehensive risk register. Attack Surface Management: Collaborate on assurance initiatives … to identify, monitor, and reduce exposed vulnerabilities. Monitor the external threat landscape and integrate attack surface management capabilities. Security Governance and Compliance: Develop and maintain information security policies, standards, and procedures. Ensure compliance with legal, regulatory, and contractual obligations. Act as the primary liaison for assurance audits and external More ❯
A proactive mindset, with a drive to identify, own, and solve security challenges end-to-end. Strong technical skills across areas like threat detection, vulnerabilitymanagement, identity and access control, and incident response. Familiarity with a range of security tools and platformssuch as SIEM, EDR, firewalls, and cloud More ❯
Security Consultant you will work with the wider IT Security Team to support and maintain enterprise wide solutions. The Responsibilities Assist with security incident management and response activities General day-to-day support on managing and responding to security alerts from systems and end users Perform daily, weekly, and … standards including Cyber Essentials, ISO 27001, 27002 etc. Data Protection Act and the General Data Protection Regulation Microsoft O365 Security solutions; Networking; Security operations; VulnerabilityManagement Security Auditing Good understanding of security testing principles, including experience of vulnerability scanning, identifying, resolving, and reporting risks Experience of formal More ❯
York, England, United Kingdom Hybrid / WFH Options
Investigo
phishing emails and other security events. Use Endpoint Detection and Response (EDR) tools to examine endpoint and respond to cyber threats and malware. Undertake vulnerabilitymanagement including identifying and risk assessing vulnerabilities on any IT infrastructure. Reporting and tracking vulnerabilities through to mitigation. Conduct security administrator activities across … the Microsoft 365 stack including but not limited to configuration and change management of security tools. Be responsible for managing changes to security tools adhering to Persimmon IT change management policy. Conduct reviews of existing IT Infrastructure such as firewall ruleset reviews advising on where risks might exist. More ❯
overview: This is an opportunity to lead global Security Operations focused on safeguarding Arm's digital environment through exemplary threat detection, incident response, and vulnerabilitymanagement capabilities. This senior role, reporting directly into the CISO, is accountable for driving the strategic direction of Arm's Detect & Response function … delivering outstanding performance and ensuring we are resilient against an evolving threat landscape! In addition to operations, you will lead cyber crisis management, C-Suite level stress testing, team development, and top-level cybersecurity thought leadership. Responsibilities: Own and deliver the strategic roadmap for cyber incident and vulnerability … how they can be used as a force multiplier for a technology business strategy, with the ability to influence at all levels. Extensive people management experience, fostering a culture focused on mentoring, wellbeing, and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant More ❯
ISO 27001:2022. Ensure that any business changes, acquisitions, or transformations are accounted for within the scope of certification, through proactive risk identification and management with IT assets owners. Development and championing all Information Security Policies, Procedures and relevant standards, and produce supporting documentation and training material to ensure … across the organization. Experience working in a global, multi-business environment is a plus. Technical/Professional Qualification requirements: Proven experience in Information Security Management and IT risk management. In-depth knowledge of ISO27001 to Lead Auditor standard. Knowledge of relevant regulations (Data Protection, DORA, NIS2). Knowledge of … Three Lines of Defence Model and its application. Knowledge of vulnerabilitymanagement and Identity and Access management. A recognised IS qualification (e.g. CISA, CISM, CISSP, ISO 27001 Lead Auditor). Our Values: • We care about the safety of everyone. • We respect each other and the wider communities we More ❯
Supporting the implementation of the clients' cybersecurity strategies, policies, and procedures tailored to the specific needs of our organisation.* Conducting regular security assessments and vulnerability scans, to identify potential weaknesses and recommend appropriate remediation measures.* Monitoring and analysing security logs, events, and alerts to detect and respond to potential … throughout the organisation.* Assist with compliance with relevant security frameworks, regulations, and standards, such as Cyber Essentials, CAF/Gov Assure and NCSC.* Support vulnerabilitymanagement report and process* Assist with any other tasks/projects which need prioritising* Documenting of alerts and creation of playbooks Professional Skills … Proficiency with Microsoft Security Technologies, such as Sentinel, Entra and Defender Proven experience designing, implementing, and maintaining security controls. Experience with security assessment tools, vulnerability scanning, and penetration testing methodologies. Understanding of current cybersecurity threats, attack vectors, and mitigation strategies. Ability to analyse and interpret security logs, events, and More ❯
london (battersea), south east england, United Kingdom
Databarracks
can make a genuine impact on customers’ data security and business continuity, then keep reading. The Role: What You’ll Do Here: - Azure Infrastructure Management: Design, deploy, and manage scalable Azure-based infrastructure services including IaaS, PaaS, networking, and security components. - Virtualisation VMware & Hyper-v. Management of environments … Compliance: Implement and maintain infrastructure security policies and controls aligned with industry standards (e.g., ISO 27001, NIST, CIS). Collaborate with InfoSec teams on vulnerabilitymanagement and risk mitigation. - Infrastructure Automation & Optimization: Automate infrastructure deployment and configuration using tools such as PowerShell, ARM templates, or Terraform. Drive continuous More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
SCADA networks from evolving cyber threats. Key Responsibilities: Monitor and assess OT cybersecurity systems, ensuring effective threat detection and response. Conduct threat analysis and vulnerability assessments to support incident response activities. Develop and implement incident response plans tailored to OT environments. Support vulnerabilitymanagement initiatives and penetration … influence and collaborate across functions. Comfortable working autonomously and leading small projects. Desirable: Background in cyber investigations or law enforcement protocols. Familiarity with project management principles. Ability to deliver awareness campaigns and contribute to continuous improvement. This is a unique opportunity to make a tangible impact on the UK More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Totum Partners
from a legal or financial environment. Hands-on technical skills in the following; MS Defender, Azure Security Centre, Intune, Entra ID, CrowdStrike, Azure, M365, VulnerabilityManagement, PowerShell, SIEM Solutions & an understanding of ISO27001. Any Azure or Security certification would be desirable. This role offers hybrid working - 2 days More ❯
Peterborough, Cambridgeshire, United Kingdom Hybrid / WFH Options
AB Agri Ltd
systems and data across the business Advising on and reviewing the implementation of Information Security Policies, Standards and Controls across projects and operations Coordinating vulnerabilitymanagement activities across IT, OT, and cloud environments Providing guidance on security best practices, supporting compliance with internal policy and external regulations Supporting … the development and rollout of the third-party risk management framework Participating in internal forums and external security events, bringing fresh insights to shape future security initiatives Maintaining awareness of business systems, data flows, and architecture to inform security recommendations Collaborating with stakeholders to ensure secure design and implementation … and improvement Knowledge or experience of working within an Information Security, Risk or Compliance function Familiarity with cyber security principles, governance frameworks, and risk management practices Understanding of cloud environments, particularly Microsoft Azure, and their associated security considerations A relevant degree (e.g. Computer Science or similar) and/or More ❯
Bournemouth, Dorset, United Kingdom Hybrid / WFH Options
LV=
compliance with regulatory requirements •Operational Excellence: Oversee a high-performing team of security professionals, manage security operations, and lead incident response, threat intelligence, and vulnerabilitymanagement efforts •Innovative Environment: Collaborate with various departments, including marketing, IT, and customer service, to integrate security measures seamlessly into our business processes … Science, or a related field (or equivalent experience) •Professional certifications such as CISSP, CISM, or equivalent (or equivalent experience) •Extensive experience in information security management, including strategy development and operational oversight •Strong understanding of regulatory requirements and compliance standards •Proven leadership skills with the ability to manage and mentor … a diverse team •Excellent communication and stakeholder management skills Rewards & Benefits This role is a Band C in the LV= Structure. At LV= Life and Pensions, you'll go above and beyond to do the right thing for our customers. We'll reward your hard work with an attractive More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Proftech Talent
Threat Intelligence . Provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. Vulnerability Assessment. Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. Risk Management . Ability to identify … Working Hours : Full time Monday - Friday Location : Birmingham/Hybrid Duration : Permanent Role of Senior IT Security Officer: Support in the management of the Security Operations, establishing and delivering methods and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability … where necessary. Support monitoring on external security environment, gathering information on emerging threats to the business and presenting them to leaders where required. Plan vulnerability assessment and penetration testing activities within IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. Contribute to More ❯
all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerabilitymanagement (tenable is tool used) and patching More ❯
to support the organisational objectives The experience and skills you need Proficiency in security domains, tools and technologies such as DLP, SIEM, SOAR and VulnerabilityManagement Good working knowledge of network security, firewalls, threat management, endpoint detection and response Ability to identify, assess, and mitigate security risks More ❯
to security events across a complex, multi-departmental IT environment. You'll maintain and use key security tools such as SIEM, IDS, EDR, and vulnerabilitymanagement platforms. You will work closely with system owners and users to assess configurations, analyse logs, and improve security controls and procedures. In … career experience in a relative field Hands-on experience with security monitoring and incident response technologies such as SIEM, IDS and EDR. Experience with vulnerability assessment including practical assessments for risk analysis. A strong working knowledge of at least one major operating system (Windows, Linux, or MacOS). An More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
Randstad Technologies Recruitment
guidance. Run scheduled audits and follow through with actionable improvements. Roll out and stress-test our business continuity approach. Turn data into insights with management reports that track compliance trends. Partner with teams across the globe to design, implement, and test security tools and controls. Lead the journey to … standards. A solid foundation in enterprise-level Information Security practices. Strong analytical skills and a calm approach under competing demands. Familiarity with threat landscapes, vulnerabilitymanagement, and risk frameworks. Willingness to travel within the UK and potentially abroad when needed-UK driving license required Why You'll Love More ❯
systems. This role requires you to have detailed knowledge of some but preferably all the following: Microsoft Security Products and Cyber Security best practice. Vulnerabilitymanagement and log auditing tools. Enterprise infrastructure including Windows operating systems, Active Directory, Group Policy, Azure, Networks and Firewalls. This is an exciting … To this end, NHS Dumfries and Galloway welcomes applicants from all sections of the community. PUBLIC PROTECTION Public protection practice encompasses the recognition and management of risk in order to prevent or reduce harm to children, (including unborn babies), young people and adults. All public protection legislation, and NHS More ❯
Key Requirements: Previous experience in a SOC Analyst or similar cybersecurity role Strong expertise in Splunk or similar SIEM tools Familiarity with Flexera for vulnerabilitymanagement Understanding of firewalls, network protocols, intrusion detection/prevention systems Relevant certifications (e.g., CISSP, CEH, Splunk) advantageous Must be eligible for Developed More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Maxwell Bond
across the company, including training and best practices Work closely with engineering to embed security into the SDLC and product roadmap Manage incident response, vulnerabilitymanagement, and third-party risk processes Act as a key stakeholder in board-level and customer-facing security discussions 👤 What We’re Looking More ❯
experience as a SOC/Security Engineer within a cloud environment Strong CrowdStrike experience is needed Experience with a range of SIEM, SOAR and vulnerabilitymanagement tools Experience advising on security best practices and developing SOC playbooks Networking and infrastructure experience, including with Firewalls and IDS/IPS More ❯
experience as a SOC/Security Engineer within a cloud environment Strong CrowdStrike experience is needed Experience with a range of SIEM, SOAR and vulnerabilitymanagement tools Experience advising on security best practices and developing SOC playbooks Networking and infrastructure experience, including with Firewalls and IDS/IPS More ❯