Location(s): UK, Europe & Africa : UK : Leeds BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. CyberThreatIntelligence and Vulnerability Lead Job Title: CyberThreatIntelligence and Vulnerability Lead Requisition ID: 121483 Location: Leeds (this is a 100% office based role due to the nature of the project) Grade: GG10 - GG11 Referral Bonus: £5,000 Role Description BAE Systems have been contracted to undertake the day to day operation of (and incremental … environments that must be protected. The customer is committed to development of this improved SOC to be a benchmark of best practice and excellence in reflection of the significant threat that the protected systems are subject to. This role requires a minimum of DV clearance. This role reports to the Service Delivery Manager. The Role You will be: Accountable More ❯
high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best … making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements … and guidance to existing SOC team on areas of improvement and include experience of working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable More ❯
high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best … making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements … and guidance to existing SOC team on areas of improvement and include experience of working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable More ❯
Wakefield, West Yorkshire, UK Hybrid / WFH Options
Logiq
high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best … making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements … and guidance to existing SOC team on areas of improvement and include experience of working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable More ❯
security incidents swiftly and effectively. Security Monitoring – Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts – Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness – Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management – Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery – Test and … refine disaster recovery plans to enhance business resilience. Compliance & Policy Development – Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development – Create and deliver security training to staff across the organisation. Bid Support – Assist in completing security questionnaires and contributing to bid processes. What We’re Looking For: An experienced Information Security Consultant with a … strong background in IT security operations. Expertise in Microsoft O365 Security Solutions – including threatintelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerability scanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. More ❯
security incidents swiftly and effectively. Security Monitoring Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and … refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development Create and deliver security training to staff across the organisation. Bid Support Assist in completing security questionnaires and contributing to bid processes. What Were Looking For: An experienced Information Security Consultant with a strong … background in IT security operations. Expertise in Microsoft O365 Security Solutions including threatintelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerability scanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role More ❯
to identify compliance against security standards, including ISO 27001, NIST, COBIT, etc. Develop and enhance security policies, processes, procedures, and technical controls to strengthen security capabilities and resilience to cyber threats. Maintain and manage the IT Risk Register to ensure that IT risks are regularly reviewed, correctly identified, assessed, reported, and mitigated in line with recommended best practices. Identify … least 13 years educational background. Excellent working knowledge of security and governance, risk, and compliance within an enterprise environment. Hands-on experience of enterprise information security and standards including Cyber Essentials, ISO 27001, 27002, Data Protection Act, and the General Data Protection Regulation. Experience with Microsoft O365 Security solutions, Networking, Security operations, Vulnerability Management, Security Auditing. Experience of formal … document creation, such as the creation of reports or procedures. Experience of carrying out risk reviews, technology audits, or other similar work. Detailed knowledge of: ThreatIntelligence analysis and best practice. Security Incident Response processes, procedures, and best practices. Disaster Recovery and Business Continuity principles and testing methodologies. Risk analysis and data management methodologies. Event and log analysis. More ❯
Location(s): UK, Europe & Africa: UK: Gloucester BAE Systems Digital Intelligence is home to 4,500 digital, cyber, and intelligence experts. We work across 10 countries to collect, connect, and analyze complex data, enabling governments, armed forces, and businesses to achieve digital advantages in demanding environments. Job Title: Threat Hunter Requisition ID: 121789 Location: Leeds - hybrid … members and share knowledge proactively. Contribute to the SOC Knowledge Repository by creating and updating documentation independently. Build relationships externally with other SOCs and cybersecurity researchers to identify analytics, threatintelligence, and tradecraft that benefit the Blue Team. Communicate funding and prioritization suggestions and lead implementation when needed. Develop complex, anomaly-based KQL analytics and playbooks for detection … vulnerabilities, produce proof-of-concept exploits, and emulate adversary TTPs for training and detection evaluation. Review red team and pentest findings to improve detection rules. Provide forensic support and threat emulation to improve alert triage and accuracy. Identify gaps in SOC processes, data collection, and analysis, demonstrating the need for improvements through scenarios and red teaming. Perform complex threatMore ❯
across a multi-region infrastructure consisting of 6,100+ staff and 90+ sites. As a member of the Information Security team, you will review aspects of the Information and Cyber Security and its components. You will be required to proactively improve and provide advice and guidance on information security matters. This position also entails support and development of the … company's IT policies and security solutions. Principal Duties, Responsibilities & Accountabilities: Responsibilities will include: Maintaining and improving the Cyber Essentials Plus Security Standard. Assist and report on the technical aspects of security management. Fully participate in internal governance activities relating to Information Security. Propose changes to existing policies and procedures to ensure operating efficiency and regulatory compliance. Co-ordinate … information security hardware or software and analyze its impact on the existing environment. Manage security projects and provide expert guidance on security matters for other IT projects. Perform daily threatintelligence checks. Duties will vary and be revised due to the nature of the IT Support environment (the above is a guide and not a comprehensive list of More ❯
of the following security awareness then this would be a major advantage: Develop and enhance security policies, processes, procedures and technical controls to strengthen security capabilities and resilience to cyber threats Take a proactive role in identifying security risks, mitigations and opportunities to strengthen resilience to cyber-attacks and security incidents Participate in the design and implementation of … and issues of non-compliance Employ previous experience and industry best practices to monitor, enhance and report on security posture, including dashboard reports and management information Gather and use cyberthreatintelligence to provide greater insight into cyber threats, to enable a faster, more targeted response and to identify new risks, along with proactive, best practice More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
role Demonstrate strong technical knowledge of forensic investigations and incident response Ideally have consulting expertise Posses expertise in mitigating threats, implementing proactive measures, and dealing with a range of cyber incidents such as but not limited to DDoS Attacks with an understanding of threatintelligence Open-source tooling experience is a massive plus Right to work within More ❯