Albuquerque, New Mexico, United States Hybrid / WFH Options
Lockheed Martin
the client/server/storage/network devices - Patch and harden Linux RedHat OS and works with Security personnel to protect against CyberThreats - This assignment will be an expat assignment for a duration of 6-12 months and require a TS/SCI to start. WHO More ❯
risk-related data and trends. Working knowledge of antifraud solutions/risk systems/device fingerprinting and CRM/case management tools. Knowledge about cyberthreats (e.g., malware, ransomware, botnets, exploit rootkits). Knowledge of machine learning model validation, swap population review, deployment. Any of the below will be an advantage More ❯
York, England, United Kingdom Hybrid / WFH Options
Investigo
SOC Analyst York - Hybrid Working Permanent Reporting to the Cyber Security Operations Manager, the Cyber Security Operations Engineer is a key member of the cyber security operations team delivering effective cyber security services and controls including all regional operating companies, construction and … sales sites. The role holder is required to continuously monitor and respond to alerts from cyber security systems such as SIEM and EDR. Categorise, prioritise and triage and respond to cyber security incidents in a timely and effective manner and inline with agreed SLAs, policies, processes … posture. KEY RESPONSIBILITIES Personal Development Takes personal responsibility for own personal development including clear objective setting and performance management. Provide feedback to the Cyber Security Operations Manager to further their own and teams’ development. Undertakes relevant training for new and existing technologies and services. This may include some More ❯
Livonia, Michigan, United States Hybrid / WFH Options
STACK Cybersecurity
and after service requests Event Log Monitoring and Investigation: Monitor and investigate event logs for suspected activities. Identify potential security incidents and respond promptly. Threat and Vulnerability Analysis: Conduct threat and vulnerability analysis to assess risks. Propose mitigation strategies based on findings. Security Incident Handling: Investigate, document, and … report any information security issues. Collaborate with relevant teams to address incidents effectively. Understanding of CyberThreats: Familiarity with prevalent … cyberthreats, including malware, phishing attacks, DDoS attacks, BEC, lay-and-wait, and man-in-the-middle attacks. Stay updated on evolving threat landscape. SIEM Proficiency: Use and understand Security Information and Event Management (SIEM) solutions. Leverage SIEM data for threat detection and incident response. Knowledge More ❯
Aberdeen, Aberdeenshire, United Kingdom Hybrid / WFH Options
Cammach Bryant
cover mainly the operational dimension of CPEL Cybersecurity. The role will collaborate with the Managed Cybersecurity Service Provider MSSP to protect the organization. The threat landscape is increasing with the global geopolitical instability. The UK government is increasing the regulatory pressure on companies to ensure they are resilient against … and meet our regulatory compliance requirements. RESPONSIBILITIES The role involves continuously monitoring the organisation's network and systems for potential security breaches while conducting threat analysis, risk assessments, and vulnerability assessments. By identifying security risks, the position requires providing recommendations and implementing measures to remediate vulnerabilities and strengthen cyber … REQUIREMENTS You should hold a degree in Computer Science, Cybersecurity, or a related field and have a proven track record in cybersecurity operations and threat analysis. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Advanced Security Practitioner (CASP+) are highly desirable. More ❯
Aberdeen, City of Aberdeen, United Kingdom Hybrid / WFH Options
Cammach Bryant
cover mainly the operational dimension of CPEL Cybersecurity. The role will collaborate with the Managed Cybersecurity Service Provider [MSSP] to protect the organization. The threat landscape is increasing with the global geopolitical instability. The UK government is increasing the regulatory pressure on companies to ensure they are resilient against … and meet our regulatory compliance requirements. RESPONSIBILITIES The role involves continuously monitoring the organisation's network and systems for potential security breaches while conducting threat analysis, risk assessments, and vulnerability assessments. By identifying security risks, the position requires providing recommendations and implementing measures to remediate vulnerabilities and strengthen cyber … REQUIREMENTS You should hold a degree in Computer Science, Cybersecurity, or a related field and have a proven track record in cybersecurity operations and threat analysis. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Advanced Security Practitioner (CASP+) are highly desirable. More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
ENGINEERINGUK
Clearwater Court - RG1 8DB Salary: Offering between £50,000 and £58,000 per annum depending on experience Closing date: 1 May 2025 The Cyber Resilience Analyst will report directly to the Cyber Incident Management Lead, forming part of the Information Security Team, which is at the … forefront of protecting Critical National Infrastructure from evolving cyber threats. You will be driving integration of cyber security into every aspect of operations, from governance to recovery planning, and continuously improving our ability to prevent, detect, respond to, and recover from cyber incidents which … could disrupt critical water and waste services, or compromise information/data. What you'll be doing as a Cyber Resilience Analyst: Support the development, testing, and refinement of cyber incident response planning. Ensuring the delivery of best practices for responding to cyber incidents. More ❯
Cyber and Information Security Analyst | Financial Services | IT | London | (Hybrid) 3 days a week in the office per week | Permanent | £57k pa | Our London based client is seeking a Cyber & Security Analyst to assist in protecting their IT infrastructure, networks, and data from cyber threats. This hybrid role will cover both Information Security and Cyber Security. You will assess security risks, implement proactive measures, monitor systems for security breaches and respond to cyber incidents. Essential Experience: Experience of one or more SEIM solutions, including Azure Sentinel Experience of More ❯
Cyber and Information Security Analyst | Financial Services | IT | London | (Hybrid) 2 days a week in the office per week | Permanent | £58,500 pa | Our London based client is seeking a Cyber & Security Analyst to assist in protecting their IT infrastructure, networks, and data from cyber threats. This hybrid role will cover both Information Security and Cyber Security. You will assess security risks, implement proactive measures, monitor systems for security breaches and respond to cyber incidents. Essential Experience: Experience of one or more SEIM solutions, including Azure Sentinel Experience of More ❯
Detroit, Michigan, United States Hybrid / WFH Options
OpTech
Great opportunity for a Sr. Cyber Security Manager NO C2C, No sponsorships Location: Detroit, MI Salary Range: $120-150k with excellent employee benefits REQUIRED EDUCATION AND EXPERIENCE: • Relevant Bachelor's degree in Computer Science/Information Technology or equivalent education or work experience with an emphasis on … Cyber Security. • 5+ years of prior relevant experience in Cyber Security management • Knowledge of various anti-virus software tools including Microsoft Defender, Sophos End Point (Defender is a MUST) • Knowledge of various operating systems such as Windows 11 OVERVIEW; Cyber security managers are responsible … for managing the cyber security of an organization. They oversee a team of IT professionals who work to protect the company from cyberthreats and attacks. Cyber security managers may also be tasked with developing and implementing policies that help ensure the safety of More ❯
to security threats and incidents. Your role will involve working with cutting-edge security tools and technologies to protect the IT infrastructure from cyber threats. You will collaborate with various teams to ensure a robust security posture and contribute to the continuous improvement of our security operations. Essential … eradication, and recovery. Perform forensic analysis. Develop trusting relationships with critical third-party security providers. Prepare reports on security incidents and recommend improvements. Develop threat intelligence relevant to the business. Conduct threat hunting, vulnerability analysis, and penetration testing to identify risks. Continually assess security systems, suggesting appropriate tools … threats, and technologies. Qualifications Relevant certifications (e.g., CompTIA Security+, CEH, CISSP) are desirable. Technical Proficiency Strong understanding of IT security tools (SIEM, EDR, XDR), threat detection, and log analysis. Familiarity with scripting (Python, PowerShell, KQL) for automation. Benefits Competitive salary with annual reviews. 25 days holiday + option to More ❯
this role, you will lead the daily operations of our cybersecurity team, oversee the Security Operations Center (SOC), and ensure robust incident response and threat detection processes. Your mission will be to safeguard the organization's digital infrastructure through proactive risk mitigation and continuous improvement of our security posture. … evaluation. Develop and implement a strategic roadmap for cybersecurity operations aligned with the company's broader IT and business goals. Oversee SOC activities including threat monitoring, log analysis, detection, and incident response. Coordinate the full lifecycle of security incidents-detection, triage, analysis, response, remediation, and reporting. Ensure effective vulnerability … management, threat hunting, and penetration testing initiatives. Maintain and optimize the use of security technologies (e.g., SIEM, EDR, IDS/IPS, vulnerability scanners). Regularly report KPIs, threat intelligence, and incident impact summaries to executive stakeholders. Collaborate with cross-functional teams to embed security best practices across the More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
Intaso
to security controls and processes. Collaborate with internal and external teams to support incident response and remediation activities. Stay updated on the latest cyberthreats, attack techniques, and security trends to enhance the effectiveness of SOC operations. Create and maintain SOC documentation, including runbooks, incident reports, and workflows. … Microsoft-focused environment. Strong knowledge and hands-on experience with Microsoft Sentinel, Defender for Endpoint, Defender for Identity, and Azure Security features. Familiarity with threat detection, hunting, and analysis in cloud environments. Understanding of common attack frameworks (e.g., MITRE ATT&CK) and incident response methodologies. Excellent analytical and problem More ❯
Bracknell, Berkshire, United Kingdom Hybrid / WFH Options
ENGINEERINGUK
the John Lewis Partnership's Information Security Engineering team and play a crucial role in protecting our customers, Partners, and business from evolving cyber threats. The John Lewis Partnership's Information Security strategy is bold and ambitious. We provide a collection of security services, delivered through people, processes … collaboratively, these services ensure that customers can shop with us efficiently, safely, and securely, every single day. A key component of this is the Threat Defence team, a group of Partners (employees) who play a vital role in defending our systems and data from cyber attacks. This … Engineering Lead to oversee the delivery of new security capabilities and ensure our Security Operations Centre remains equipped to defend against the latest cyber threats. This role offers the opportunity to work hands-on with market-leading next-generation cybersecurity tools and to lead and innovate within a More ❯
Cannock, Staffordshire, United Kingdom Hybrid / WFH Options
Veolia
and contribute to our inclusive culture. Are you an experienced IT professional with a passion for cybersecurity? If you're naturally curious about cyberthreats and eager to build robust security solutions, this role offers an exciting pathway into Cybersecurity Architecture and we'd love to hear from … AWS, GCP, or enterprise storage. A natural problem solver with an understanding of complex systems and the ability to identify issues. Interest in cyber security and motivation to learn about risks, controls, and security frameworks. Eagerness to expand your skillset and transition into a highly sought-after career … in cyber security architecture. This is your opportunity to leverage your valuable expertise and transition into a rewarding career, in a dynamic and critical field.We'll help you to thrive in a role where you can make a tangible impact on the security and resilience of our organisation. More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Motability Operations
Security Engineer is responsible for designing, implementing, and maintaining MO's data security frameworks to safeguard sensitive information against unauthorised access, breaches and cyber threats. This role focuses on identifying vulnerabilities, establishing robust security protocols and ensuring compliance with industry standards and regulatory requirements. The Data Security Engineer … explaining technical concepts to non-technical stakeholders, ensuring alignment across teams. Collaborative and adaptable you enjoy staying current with emerging technologies and evolving cyber threats. Integrity, resourcefulness and a commitment to continuous improvement define your approach to ensuring data security and organisational resilience. Qualifications Minimum Criteria You'll … need all of these. Experience in a hands-on Cyber Security focused role, primarily in the data security domain. A strong & demonstratable knowledge of security frameworks, standards and regulations (NIST, GDPR for example). Familiarity with cloud security principles and experience working with cloud platforms such as AWS More ❯
Employment Type: Permanent, Part Time, Work From Home
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Motability Operations
Security Engineer is responsible for designing, implementing, and maintaining MO's data security frameworks to safeguard sensitive information against unauthorised access, breaches and cyber threats. This role focuses on identifying vulnerabilities, establishing robust security protocols and ensuring compliance with industry standards and regulatory requirements. The Data Security Engineer … explaining technical concepts to non-technical stakeholders, ensuring alignment across teams. Collaborative and adaptable you enjoy staying current with emerging technologies and evolving cyber threats. Integrity, resourcefulness and a commitment to continuous improvement define your approach to ensuring data security and organisational resilience. Qualifications Minimum Criteria You'll … need all of these. Experience in a hands-on Cyber Security focused role, primarily in the data security domain. A strong & demonstratable knowledge of security frameworks, standards and regulations (NIST, GDPR for example). Familiarity with cloud security principles and experience working with cloud platforms such as AWS More ❯
Employment Type: Permanent, Part Time, Work From Home
North Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Net Talent
Package 🕒 Type: Full-Time | Permanent Are you ready to take on a hands-on role protecting business-critical systems and data from evolving cyberthreats? We’re seeking a skilled Information Security Analyst to join our client and lead the implementation and operation of essential security controls that … group and cross-functional teams—including Architecture and Security Operations—is key to aligning local and global security standards. You'll also drive cyber awareness and training initiatives for commercial teams, support regulatory compliance (e.g., ISO 27001, NIST SP 800-53, GDPR), and handle incident response, triage, and … A mindset focused on continuous improvement and business alignment Experience in managing Vendor Security Familiarity with phishing simulations and awareness training to enhance cyber maturity 🌍 What We Offer Hybrid working Salary of up to £55k and benefits including pension, bonus, and professional development support The opportunity to work More ❯
pipeline using agile DevSecOps practices, conduct application security scans, and work closely with development teams. Stay updated on emerging cyberthreats, lead threat modelling exercises, support managed security services, and assist in developing strategies to mitigate cyber risks. Foster strong team relationships, contribute to knowledge More ❯
london, south east england, united kingdom Hybrid / WFH Options
psd group
pipeline using agile DevSecOps practices, conduct application security scans, and work closely with development teams. Stay updated on emerging cyberthreats, lead threat modelling exercises, support managed security services, and assist in developing strategies to mitigate cyber risks. Foster strong team relationships, contribute to knowledge More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Gold Group Limited
to security threats and incidents. Your role will involve working with cutting-edge security tools and technologies to protect the IT infrastructure from cyber threats. You will collaborate with various teams to ensure a robust security posture and contribute to the continuous improvement of our security operations. Essential … eradication, and recovery. Perform forensic analysis. Develop trusting relationships with critical third-party security providers. Prepare reports on security incidents and recommend improvements. Develop threat intelligence relevant to the business. Conduct threat hunting, vulnerability analysis, and penetration testing to identify risks. Continually assess security systems, suggesting appropriate tools … and assessments. Stay updated with the latest cybersecurity trends, threats, and technologies. Qualifications Technical Proficiency Strong understanding of IT security tools (SIEM, EDR, XDR), threat detection, and log analysis. Familiarity with scripting (Python, PowerShell, KQL) for automation. Benefits Competitive salary with annual reviews. 25 days holiday + option to More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Eden Scott
refine their processes, enhance readiness, and build resilience. Provide clear, concise briefings and reports to senior leadership, offering insight into incidents, risks, and ongoing threat landscapes. 💡 Your background: Proven experience leading incident response operations and cybersecurity investigations. Deep understanding of cyber attack vectors, threat actors, and … with the ability to influence and engage at all levels. Expertise in Cyber Security Incident Response best practices. Background in security operations, threat detection, and digital forensics. Comfortable with flexible hours and on-call responsibilities. ⭐ Desirable Certifications: CISSP, CISM, CEH, GIAC Familiarity with ITIL processes and service … You'll be a crucial part of the team that ensures the organisations stays safe, secure, and always one step ahead in an evolving threat landscape. They’re investing in cutting-edge tech, building strong teams, and shaping a future where cybersecurity is a core business enabler. This role More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Context
CISSP Certified Cyber Security Consultant A renowned Managed Security Service Provider (MSSP) committed to delivering top-tier cyber security solutions are looking for a CISSP certified security professional to join as a Cyber Security Consultant. You'll work collaboratively with their established 24/… Security Operations team to develop and implement Cyber Security strategies for their broad range of clients in both Private and Public Sector markets. Our team is composed of industry experts who are passionate about safeguarding digital assets and ensuring the highest levels of security for our clients. As … a CISSP Certified Cyber Security Consultant, you will play a crucial role in our organization. You will be responsible for: Conducting comprehensive security assessments and audits. Developing and implementing robust security strategies and policies. Providing expert guidance on risk management and mitigation. Collaborating with clients to understand their More ❯
We are seeking experienced IT and Cyber Risk Management Professionals to support organizations in the financial sector, in strengthening their IT security posture. As a key part of the second line of defense, you will oversee risk management processes and provide independent validation and assurance to ensure that … the first line is adhering to IT and cybersecurity standards. This role is pivotal in ensuring the business's resilience against evolving cyberthreats and regulatory requirements and is specifically focused on providing long-term assignments on maximum 1 or 2 clients, offering deep engagement with the client More ❯
Quantico, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
All Source Analyst (Cyber Systems) Location: Quantico, VA Work Type: Onsite Remote Work: No Job Description Gridiron IT is seeking an All-Source Analyst (Cyber Systems). Responsibilities Conduct all-source analysis to evaluate foreign military systems and technologies. Conduct research, create intelligence products, create intelligence … of intelligence products submitted for internal coordination and external intelligence community coordination. Provide portfolio specific analysis, expertise, and intelligence production as specified below. Conduct Threat Steering Groups with members across USMC Combat Development & Integration to identify key factors and significant risk drivers for potential materiel solutions that may inform … lifecycle cost, performance, schedule, and other acquisition decision making. Produce and deliver Validated Online Lifecycle Threat Reports (VOLTs), Critical Intelligence Parameters (CIPs), and Capability Development Threat Summaries to support Marine Corps Acquisition Programs across the Joint Capabilities Integration and Development System (JCIDS) process, to support the Defense Acquisition More ❯