Chelmsford, Essex, United Kingdom Hybrid / WFH Options
Anson Mccade
threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection … incident response, and the cyber kill chain. Familiarity with frameworks including MITRE ATT&CK, NIST, and CIS. Strong communication, analytical, and presentation skills. Solid understanding of network traffic flows, vulnerabilitymanagement, and penetration testing principles. Knowledge of ITIL processes (Incident, Problem, Change Management). Ability to work independently and thrive in a 24/7 on-call More ❯
threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection … incident response, and the cyber kill chain. Familiarity with frameworks including MITRE ATT&CK, NIST, and CIS. Strong communication, analytical, and presentation skills. Solid understanding of network traffic flows, vulnerabilitymanagement, and penetration testing principles. Knowledge of ITIL processes (Incident, Problem, Change Management). Ability to work independently and thrive in a 24/7 on-call More ❯
Wakefield, Yorkshire, United Kingdom Hybrid / WFH Options
Anson Mccade
threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection … incident response, and the cyber kill chain. Familiarity with frameworks including MITRE ATT&CK, NIST, and CIS. Strong communication, analytical, and presentation skills. Solid understanding of network traffic flows, vulnerabilitymanagement, and penetration testing principles. Knowledge of ITIL processes (Incident, Problem, Change Management). Ability to work independently and thrive in a 24/7 on-call More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Anson Mccade
threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection … incident response, and the cyber kill chain. Familiarity with frameworks including MITRE ATT&CK, NIST, and CIS. Strong communication, analytical, and presentation skills. Solid understanding of network traffic flows, vulnerabilitymanagement, and penetration testing principles. Knowledge of ITIL processes (Incident, Problem, Change Management). Ability to work independently and thrive in a 24/7 on-call More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Anson Mccade
threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection … incident response, and the cyber kill chain. Familiarity with frameworks including MITRE ATT&CK, NIST, and CIS. Strong communication, analytical, and presentation skills. Solid understanding of network traffic flows, vulnerabilitymanagement, and penetration testing principles. Knowledge of ITIL processes (Incident, Problem, Change Management). Ability to work independently and thrive in a 24/7 on-call More ❯
Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
Anson Mccade
threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection … incident response, and the cyber kill chain. Familiarity with frameworks including MITRE ATT&CK, NIST, and CIS. Strong communication, analytical, and presentation skills. Solid understanding of network traffic flows, vulnerabilitymanagement, and penetration testing principles. Knowledge of ITIL processes (Incident, Problem, Change Management). Ability to work independently and thrive in a 24/7 on-call More ❯
Hemel Hempstead, Hertfordshire, United Kingdom Hybrid / WFH Options
Anson Mccade
threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection … incident response, and the cyber kill chain. Familiarity with frameworks including MITRE ATT&CK, NIST, and CIS. Strong communication, analytical, and presentation skills. Solid understanding of network traffic flows, vulnerabilitymanagement, and penetration testing principles. Knowledge of ITIL processes (Incident, Problem, Change Management). Ability to work independently and thrive in a 24/7 on-call More ❯
High Wycombe, Buckinghamshire, United Kingdom Hybrid / WFH Options
Anson Mccade
threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection … incident response, and the cyber kill chain. Familiarity with frameworks including MITRE ATT&CK, NIST, and CIS. Strong communication, analytical, and presentation skills. Solid understanding of network traffic flows, vulnerabilitymanagement, and penetration testing principles. Knowledge of ITIL processes (Incident, Problem, Change Management). Ability to work independently and thrive in a 24/7 on-call More ❯
Stoke-on-trent, Staffordshire, United Kingdom Hybrid / WFH Options
Anson Mccade
threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection … incident response, and the cyber kill chain. Familiarity with frameworks including MITRE ATT&CK, NIST, and CIS. Strong communication, analytical, and presentation skills. Solid understanding of network traffic flows, vulnerabilitymanagement, and penetration testing principles. Knowledge of ITIL processes (Incident, Problem, Change Management). Ability to work independently and thrive in a 24/7 on-call More ❯
respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on … Qualifications:**- Bachelor's degree in Information Security, Computer Science, or a related field.- Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor.- Proven experience in information security management and conducting security audits.- Strong knowledge of information security frameworks and standards.- Excellent analytical and problem-solving skills.- Strong communication and interpersonal skills.**Preferred Qualifications:**- Experience with regulatory compliance … MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA/CCNP Experience with security tools and technologies such as intrusion detection systems, SIEM, and vulnerabilitymanagement tools. Familiarity with regulatory requirements and industry standards related to IT security. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business More ❯
initiatives What you'll be doing You'll join a collaborative Cyber Security Operations team and get involved with: Handling Tier II-IV incidents and troubleshooting Change and configuration management Policy optimisation and risk reduction Patch, OS and capacity management Event monitoring and vulnerabilitymanagement Security incident response and project support What we're looking for More ❯
initiatives What you'll be doing You'll join a collaborative Cyber Security Operations team and get involved with: Handling Tier II-IV incidents and troubleshooting Change and configuration management Policy optimisation and risk reduction Patch, OS and capacity management Event monitoring and vulnerabilitymanagement Security incident response and project support What we're looking for More ❯
changing needs of our customers and business. Roles and Responsibilities In the 12-month placement in Digital Technology (DT) you'll gain hands-on experience in IT operations, project management, data analytics, and software development. You'll work on exciting projects to improve business processes, support IT systems, and drive digital transformation. We have different types of roles in … of MES Software at manufacturing sites. Digital Technology at Dowty , you'll gain invaluable skills and experience, providing support to the business on all IT support services (Operations, Project Management & Data Analytics). Cyber Security at Cheltenham . Across the year you will experience five key areas within Cyber. These are Intelligence, Enterprise VulnerabilityManagement, Insider Threat … fibre outer layers. If you are passionate about Digital Technology, we would love to hear from you. Qualifications/Requirements Currently studying an Information Technology, Computer Science, Business Information Management, IT Project Management, Cyber Security, ICT or Digital Technology B achelor's or integrated Master's degree Passionate about Digital Technology On course to achieve a More ❯
cyber security leadership role within complex, high-security environments. In-depth understanding of the current security landscape and cyber security consulting principles. Strong experience managing cyber security strategy, risk management, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity management and federation, firewalls, SIEM, vulnerability scanning … and cryptography. Experience overseeing incident response, vulnerabilitymanagement, and security service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable guidance for stakeholders at all levels. Skilled in relationship management, with the confidence to challenge and influence suppliers to ensure security outcomes are realistic, achievable, and deliver value for money. This More ❯
Contract Northwood, United Kingdom NATO Project) We are seeking a Cybersecurity & Risk Engineer to support mission-critical NATO operations. This is a hands-on cybersecurity position that combines technical vulnerability analysis with security accreditation, compliance, and risk assessment for deployable communications and information systems (CIS). What You ll Do Conduct vulnerability scanning using tools such as Tenable … teams Ensure systems meet NATO operational and cybersecurity requirements Deploy occasionally in support of NATO operations (fitness and readiness required) What We re Looking For Proven experience in cybersecurity vulnerability assessment and risk management Strong knowledge of security frameworks (NIST RMF, ISO 27001, DoD RMF, ITIL) Hands-on experience with vulnerabilitymanagement tools Certifications such as More ❯
Contract – [Northwood, United Kingdom] – NATO Project) We are seeking a Cybersecurity & Risk Engineer to support mission-critical NATO operations. This is a hands-on cybersecurity position that combines technical vulnerability analysis with security accreditation, compliance, and risk assessment for deployable communications and information systems (CIS). What You’ll Do Conduct vulnerability scanning using tools such as Tenable … teams Ensure systems meet NATO operational and cybersecurity requirements Deploy occasionally in support of NATO operations (fitness and readiness required) What We’re Looking For Proven experience in cybersecurity vulnerability assessment and risk management Strong knowledge of security frameworks (NIST RMF, ISO 27001, DoD RMF, ITIL) Hands-on experience with vulnerabilitymanagement tools Certifications such as More ❯
Contract – [Northwood, United Kingdom] – NATO Project) We are seeking a Cybersecurity & Risk Engineer to support mission-critical NATO operations. This is a hands-on cybersecurity position that combines technical vulnerability analysis with security accreditation, compliance, and risk assessment for deployable communications and information systems (CIS). What You’ll Do Conduct vulnerability scanning using tools such as Tenable … teams Ensure systems meet NATO operational and cybersecurity requirements Deploy occasionally in support of NATO operations (fitness and readiness required) What We’re Looking For Proven experience in cybersecurity vulnerability assessment and risk management Strong knowledge of security frameworks (NIST RMF, ISO 27001, DoD RMF, ITIL) Hands-on experience with vulnerabilitymanagement tools Certifications such as More ❯
ll support the delivery of their Cyber Security Sub Strategy in line with the Cyber Assessment Framework, and contribute to the design and operation of threat intelligence, incident response, vulnerabilitymanagement, and ethical hacking capabilities. You'll work closely with internal stakeholders and external partners to ensure compliance with ISO27001, Cyber Essentials+, and other regulatory frameworks. This role … Microsoft security tools (Defender, Sentinel, Intune, Autopilot). Strong understanding of cyber security frameworks including ISO27001, Cyber Essentials+, and the Cyber Assessment Framework. Proven experience in identity and access management, end-user device management, and working with external SOCs. Ability to deliver against cyber security roadmaps, respond to incidents, and remediate vulnerabilities. Experience in building Power BI dashboards More ❯
Epsom, Surrey, England, United Kingdom Hybrid / WFH Options
Sanderson
Support, first line (some 2nd line) Ensure all incidents and service requests are successfully logged and accurately identified, categorised, prioritised, diagnosed and managed in the Service Desk IT service management tool Keep detailed, accurate and consistent records for the teams' calls to ensure they are updated regularly, and that the customer is kept informed. Work with third parties and … colleagues to investigate, accurately diagnose, analyse & resolve issues and service interruptions Customer Care/Collaboration/Communication Knowledge Management/Asset Management/Reporting & Regulatory Create and maintain all documentation (Customer facing and internal technical documentation) ensuring it is completed to a professional quality, checked for accuracy of grammar and spelling and reviewed prior to distribution. Ensure that … all IT equipment the Service Desk manage is asset tagged and maintained accurately and consistently. VulnerabilityManagement Complete daily reports (when assigned) to ensure all active attacks and vulnerabilities are resolved and removed from the vulnerability report. Liaise with 3rd level teams where appropriate. This applies to client and mobile devices. Microsoft Power Apps: Work with other More ❯
You'll be instrumental in designing and implementing advanced detection and response strategies, working closely with cross-functional teams and contributing to continual service improvement. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain IBM QRadar SIEM platform Onboard and normalize diverse log sources across hybrid environments Develop and tune analytical rules for threat detection and behavioural analysis Playbook … automation and enrichment Deep knowledge of threat detection, incident response, and cyber kill chain Familiarity with MITRE ATT&CK, NIST, and CIS frameworks Understanding of network traffic flows and vulnerabilitymanagement Exposure to ethical hacking and penetration testing Knowledge of ITIL disciplines (Incident, Problem, Change Management) Experience with ServiceNow Security Suite Cloud experience (AWS and/or More ❯
Chesterfield, Derbyshire, East Midlands, United Kingdom Hybrid / WFH Options
Hays
in developing and implementing information security strategies, policies, and procedures to safeguard the organisation's digital assets and mitigating potential risks. You will oversee information security, compliance, and risk management practices based on industry-accepted information security and risk management frameworks, whilst establishing and maintaining an incident response plan, including incident detection, response, investigation, and resolution, to minimise … incidents. What you'll need to succeed Demonstrable experience of implementing and maintaining information security frameworks e.g. ISO27001 within a medium/large sized public sector organisation Solid stakeholder management and mentoring skills Information Security,Cyber Security, Assurance and vulnerabilitymanagement would be ideal Comprehensive knowledge of Information Security Management Systems with the ability to scope … design, and implement such systems Strong ICT infrastructure, application, and cloud technical skills would be advantageous Evidenced knowledge and understanding of ISO270001, ITIL, and Prince 2 management practices Ability to lead the workforce, increasing their skills and knowledge in relation to information security What you'll get in return This exciting position is paying between £50,000 and More ❯
procedures for use across multiple information systems or support compliance with them. Apply routine security procedures appropriate to the role, such as patching, managing access rights, malware protection, or vulnerability testing with autonomy. Develop and test rules for detecting violations of security operating procedures with autonomy. Lead small teams managing Cyber Security operations within an organisation. Champion secure design … build tooling to support pre-commit, Continuous Integration, Continuous Deployment through to production. They have experience of operating systems, Networking, PKI and Cloud Security tools. They build Secure Configuration Management using Infrastructure as Code Role Criteria Essential Criteria Demonstrable experience in design, delivery and operation of cloud native vulnerabilitymanagement, security monitoring and cyber incident managementMore ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Anson McCade
Environments Strong experience with SIEM - IBM QRadar . Experience with log parsing, KQL/SPL/AQL, and scripting (Python, PowerShell). Solid understanding of threat detection, incident response, vulnerabilitymanagement, and penetration testing . Familiarity with frameworks such as MITRE ATT&CK, NIST, and CIS . Strong communication and presentation skills, with the ability to work across More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Anson McCade
ideally SOC or incident response Strong experience with Splunk and/or QRadar (other SIEMs considered) Good understanding of incident response, DFIR, malware analysis Knowledge of network traffic flows, vulnerabilitymanagement, penetration testing Familiarity with ITIL disciplines (incident, problem, change management) Able to work with minimal supervision and lead response activity SC clearance (or eligibility to obtain More ❯
We're Looking For: Previous experience in a cyber security or similar role in a regulated environment Strong knowledge of Firewalls, IDS, network security, and cloud security Familiarity with vulnerabilitymanagement tools and incident response Ability to clearly communicate technical security issues to all audiences Strong analytical, problem-solving, and relationship-building skills Relevant certifications (CISSP, CISM, CISA More ❯