implement remediation plans, drive remediation efforts and identify improvements in the vulnerability management program. Monitor and track the status of identified vulnerabilities and ensure timely resolution. Security Monitoring and IncidentResponse Leverage Microsoft Defender EDR/XDR and other security tools to monitor, analyse, and respond to security threats. Investigate suspicious activity and determine if incidents have occurred. … Contain and mitigate security incidents to prevent further impact. Develop, implement, and optimise security automation processes to improve detection, response, and mitigation efforts Security Compliance & Governance Ensure security configurations align with compliance frameworks such as ISO 27001, Cyber Essentials Plus, and regulatory requirements Skills and experience Essential 3yrs+ with current IT Security Analyst experience. Proven experience with M365 security More ❯
SIEM, antivirus, EDR, XDR and IDPS concepts. Experience of security monitoring, alerting, use case development, detecting and responding to cyber threats and incidents. Data source You should have good incidentresponse skills, and the ability to follow predefined playbooks. Critical Thinking - Able to evaluate multiple factors to investigate security incidents Attention to Detail - The ability to spot subtle … React swiftly to evolving threats and changing situations. Clear Communication - Convey risks and technical information to both technical and non-technical audiences. Report Writing - Create clear, actionable, and comprehensive incident or assessment reports when required. Certifications or degree in Cyber/Information Security or Computer Science are of advantage but not essential Certifications such as CySA+, Security+, Network+, AWS More ❯
the ISMS, ensuring compliance with regulations (e.g., GDPR, HIPAA, ISO 27001) and alignment with the Quality Management System for product development. Conduct risk assessments, address security threats, and lead incidentresponse planning. Stay current with cybersecurity best practices; deliver training and awareness programs. Select and oversee security technologies to support secure software development. Maintain and secure Medis' internal More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
the firms cybersecurity lawyers. The global team have experience advising clients on hundreds of incidents. Leveraging this experience, they feedback practical lessons learned into clients cyber risk management and incidentresponse programmes. What you will do The Identity and Access Senior Architect will be part of the Digital Trust team, and will be responsible for maintaining the identity More ❯
threats and technologies to keep the organisation secure. Key Responsibilities: Lead and develop the IT security strategy. Manage and mentor a team of IT security professionals. Oversee security operations, incidentresponse and threat intelligence. Collaborate with cross-functional teams to ensure security best practices. Stay updated with the latest IT security trends and technologies. Key Requirements: A relevant … Possession of industry-recognised certifications such as CISSP, CISM, CISA, CRISC, or CGEIT. Proven experience in leading IT cyber security teams, with a strong emphasis on operational security and incident response. Extensive knowledge of IT risk management, threat intelligence, IAM and vulnerability management. Familiarity with key regulatory and compliance frameworks, including ISO 27001, GDPR, NIST, and CyberEssentials. Ability to More ❯
threats and technologies to keep the organisation secure. Key Responsibilities: Lead and develop the IT security strategy. Manage and mentor a team of IT security professionals. Oversee security operations, incidentresponse and threat intelligence. Collaborate with cross-functional teams to ensure security best practices. Stay updated with the latest IT security trends and technologies. Key Requirements: A relevant … Possession of industry-recognised certifications such as CISSP, CISM, CISA, CRISC, or CGEIT. Proven experience in leading IT cyber security teams, with a strong emphasis on operational security and incident response. Extensive knowledge of IT risk management, threat intelligence, IAM and vulnerability management. Familiarity with key regulatory and compliance frameworks, including ISO 27001, GDPR, NIST, and CyberEssentials. Ability to More ❯
Yorkshire and the Humber, United Kingdom Hybrid / WFH Options
Harvey Nash
threats and technologies to keep the organisation secure. Key Responsibilities: Lead and develop the IT security strategy. Manage and mentor a team of IT security professionals. Oversee security operations, incidentresponse and threat intelligence. Collaborate with cross-functional teams to ensure security best practices. Stay updated with the latest IT security trends and technologies. Key Requirements: A relevant … Possession of industry-recognised certifications such as CISSP, CISM, CISA, CRISC, or CGEIT. Proven experience in leading IT cyber security teams, with a strong emphasis on operational security and incident response. Extensive knowledge of IT risk management, threat intelligence, IAM and vulnerability management. Familiarity with key regulatory and compliance frameworks, including ISO 27001, GDPR, NIST, and CyberEssentials. Ability to More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
InstaVolt
Establish and enforce IT policies, standards, and procedures to ensure high availability, performance, and security. Lead a 24 7 support model for internal platforms and services, including service desk, incident management, access control, and remote support. Ensure high-quality internal service delivery through ITIL-aligned practices, KPIs, and SLAs. Drive automation and self-service capabilities for common support tasks … and technology partners to ensure cost-effective and reliable service delivery. Collaborate with InfoSec and Legal teams to ensure compliance with relevant regulations (e.g., ISO 27001, GDPR). Lead incidentresponse and disaster recovery planning/testing for internal platforms and operational IT. Requirements Needed: Bachelor's degree in information technology, Computer Science, or related experience. 10+ years More ❯
role in deploying Microsoft security solutions and supporting client audits, assessments, and vulnerability remediation efforts. Responsibilities include: Delivering Microsoft security technologies including Defender XDR, Sentinel, and Endpoint Detection andamp; Response Supporting Cyber Essentials and Cyber Essentials Plus audits and assessments Acting as an escalation point for cyber incidents, security alerts, and engineering tasks Conducting vulnerability remediation and assessments (infrastructure … tools (e.g., Mimecast, Egress) Understanding of Azure Firewall and Defender for Cloud/Cloud Apps Experience conducting offensive security/web application assessments Strong understanding of threat detection and incidentresponse Certifications (any of the following highly desirable): SC-200: Microsoft Certified - Security Operations Analyst Associate SC-300: Microsoft Certified - Identity and Access Administrator Associate AZ-500: Microsoft More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Searchability
key role in deploying Microsoft security solutions and supporting client audits, assessments, and vulnerability remediation efforts. Responsibilities include: Delivering Microsoft security technologies including Defender XDR, Sentinel, and Endpoint Detection & Response Supporting Cyber Essentials and Cyber Essentials Plus audits and assessments Acting as an escalation point for cyber incidents, security alerts, and engineering tasks Conducting vulnerability remediation and assessments (infrastructure … tools (e.g., Mimecast, Egress) Understanding of Azure Firewall and Defender for Cloud/Cloud Apps Experience conducting offensive security/web application assessments Strong understanding of threat detection and incidentresponse Certifications (any of the following highly desirable): SC-200: Microsoft Certified - Security Operations Analyst Associate SC-300: Microsoft Certified - Identity and Access Administrator Associate AZ-500: Microsoft More ❯
Bexhill-On-Sea, East Sussex, South East, United Kingdom Hybrid / WFH Options
Hastings Direct
strategies. Your responsibilities will include maintaining detailed documentation on security architecture, patterns, and practices, advising on critical aspects such as data protection, identity and access management, network security, and incidentresponse within Azure. Staying abreast of the latest Azure security capabilities, threats, vulnerabilities, and industry trends will be essential. You will also support audit, compliance, and regulatory requirements More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
Skillcast
ISO 27001, and Cyber Essentials audits - including documentation, evidence management, gap analysis, and communication with auditors - Administer and enhance Azure Sentinel SIEM - including data source configuration, detection rule creation, incident triage, and reporting - Oversee vulnerability scanning, prioritisation, stakeholder coordination, and remediation tracking - Implement and manage security controls across Azure and Kubernetes environments, ensuring scalable and secure architecture - Work closely … CI/CD pipelines and infrastructure-as-code processes - Enforce security policies, standards, and procedures aligned with frameworks like ISO 27001 and NIST - Monitor and report on risk posture, incident trends, and compliance status to inform leadership decisions - Guide and support junior cybersecurity professionals and interns through technical coaching and feedback You: - Bachelor’s degree in Cybersecurity, Computer Science … roles - Hands-on experience with Azure, Kubernetes/Docker, and CI/CD security practices - Proficient in SIEM platforms (especially Azure Sentinel) and vulnerability management tools - Strong knowledge of incidentresponse, infrastructure hardening, and cloud security controls - Familiarity with SOC 2, ISO 27001, Cyber Essentials, and NIST frameworks - Experience with core security technologies: firewalls, EDR, IAM, DLP, encryption More ❯
EC3A, Tower, Greater London, United Kingdom Hybrid / WFH Options
Skillcast
ISO 27001, and Cyber Essentials audits – including documentation, evidence management, gap analysis, and communication with auditors - Administer and enhance Azure Sentinel SIEM – including data source configuration, detection rule creation, incident triage, and reporting - Oversee vulnerability scanning, prioritisation, stakeholder coordination, and remediation tracking - Implement and manage security controls across Azure and Kubernetes environments, ensuring scalable and secure architecture - Work closely … CI/CD pipelines and infrastructure-as-code processes - Enforce security policies, standards, and procedures aligned with frameworks like ISO 27001 and NIST - Monitor and report on risk posture, incident trends, and compliance status to inform leadership decisions - Guide and support junior cybersecurity professionals and interns through technical coaching and feedback You: - Bachelor’s degree in Cybersecurity, Computer Science … roles - Hands-on experience with Azure, Kubernetes/Docker, and CI/CD security practices - Proficient in SIEM platforms (especially Azure Sentinel) and vulnerability management tools - Strong knowledge of incidentresponse, infrastructure hardening, and cloud security controls - Familiarity with SOC 2, ISO 27001, Cyber Essentials, and NIST frameworks - Experience with core security technologies: firewalls, EDR, IAM, DLP, encryption More ❯
strategy across the business, aligned to wider Group objectives Lead and manage the internal team, and manage relationships with 3rd party vendors including the SOC providers Build and embed incidentresponse plans, playbooks, and operational standards for the function Drive maturity across SIEM, SOAR and security tooling, ensuring alignment with the latest threat landscape Provide cyber security leadership … across new and existing technology programmes Lead response to major incidents, and provide guidance to executive leadership Define KPIs, SLAs and manage the security operations budget Stay current on global cyber threats, compliance requirements (including PCI-DSS), and evolving tech trends Key Responsibilities of the Senior Security Operations Manager: Extensive experience in cyber security leadership roles (10–15 years More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
VIQU Limited
strategy across the business, aligned to wider Group objectives Lead and manage the internal team, and manage relationships with 3rd party vendors including the SOC providers Build and embed incidentresponse plans, playbooks, and operational standards for the function Drive maturity across SIEM, SOAR and security tooling, ensuring alignment with the latest threat landscape Provide cyber security leadership … across new and existing technology programmes Lead response to major incidents, and provide guidance to executive leadership Define KPIs, SLAs and manage the security operations budget Stay current on global cyber threats, compliance requirements (including PCI-DSS), and evolving tech trends Key Responsibilities of the Senior Security Operations Manager: Extensive experience in cyber security leadership roles (10–15 years More ❯
We are partnered with a leading cybersecurity provider. They offer a comprehensive suite of solutions, including Managed Detection and Response (MDR), vulnerability management, and incidentresponse, to help businesses across the UK and Ireland protect themselves from evolving cyber threats. They are now seeking an experienced SC Cleared Senior Technical Architect for an initial 3-month contract More ❯
Remote Job type: Contract Position Overview: Rapidly growing FinTech company seeking an accomplished Cybersecurity Operations View job & apply Location: Greater London Job type: Permanent Financial Service firm seeks an IncidentResponse Manager to join their CIRT team. This role plays View job & apply Location: Frankfurt Salary: 120,000 + Benefits Job type: Permanent Sector: Banking, Asset Management & Funds … Bank's Vulnerability Management controls and providing security input for vulnerabilities which threaten the organisation. Experience Understanding of vulnerability lifecycles, standards and ratings Risk assessing findings to determine appropriate response with a proactive approach to recording, management and escalation of risks Increasing the quality of vulnerability reporting automation to reduce manual effort Advanced analytical and problem-solving techniques with More ❯
Crewe, Cheshire, England, United Kingdom Hybrid / WFH Options
DCS Recruitment
What you'll be doing Drive improvements to cyber security posture across internal and customer-facing platforms Design and secure cloud-based infrastructure and customer applications Perform threat detection, incidentresponse , and vulnerability remediation Maintain security architecture documentation and collaborate with third-party vendors Conduct threat intelligence research and recommend ongoing improvements What you'll need Strong technical More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
the firms cybersecurity lawyers. The global team have experience advising clients on hundreds of incidents. Leveraging this experience, they feedback practical lessons learned into clients cyber risk management and incidentresponse programmes. What you will do Security Architecture Strategy & Governance Orchestrate the Security Architecture team in the development and maintenance of a comprehensive security architecture strategy across the More ❯
firm's cybersecurity lawyers. The global team have experience advising clients on hundreds of incidents. Leveraging this experience, they feedback practical lessons learned into clients' cyber risk management and incidentresponse programmes. What you will do Security Architecture Strategy & Governance Orchestrate the Security Architecture team in the development and maintenance of a comprehensive security architecture strategy across the More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Gordons
our Information Security team and exposure to our wider IT teams. You will build knowledge in the following areas: Risk Management, Policy and Compliance, Security Certifications,Supplier Due Diligence, IncidentResponse and Awareness, and Security Awareness, as well as working on ongoing projects. WHAT IS THE SCOPE OF THE ROLE? The following list is not exhaustive but gives More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Tussell Limited
our Information Security team and exposure to our wider IT teams. You will build knowledge in the following areas: Risk Management, Policy and Compliance, Security Certifications, Supplier Due Diligence, IncidentResponse and Awareness, and Security Awareness, as well as working on ongoing projects. What is the scope of the role? The following list is not exhaustive but gives More ❯
Mc Lean, Virginia, United States Hybrid / WFH Options
ANISTAR Technologies
intrusion detection/prevention systems, antivirus software, encryption tools, and access controls. Ensure that security measures are effectively integrated into the architecture and operation of IT systems. Collaborate with incidentresponse teams to investigate security breaches, malware infections, and other cyber incidents. Conduct digital forensics analysis to determine the root cause of incidents and recommend remediation measures to … Security Relevant industry certifications such as CompTIA Security+, CISSP, CEH, or GIAC. 3-5 years of experience in cybersecurity roles, with hands-on experience in security assessment, monitoring, and incident response. Proficiency in security tools and technologies, including SIEM, IDS/IPS, endpoint protection, and network security appliances. Strong understanding of networking protocols, operating systems, and cloud computing environments. More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Softcat plc
an enthusiastic, passionate,and collaborative team? Join our Risk & Assurance Team As Softcat's business continues to grow and evolve, so have the risks and the regulatory landscape. In response, Softcat Plc has recognised the need to further strengthen its Risk Management and Internal Controls and has created a second line Risk and Assurance function to strengthen the overall … current, comprehensive, and aligned with industry standards and audit expectations. Reviewing effectiveness of first line functions in testing and validation of key IT controls (e.g., access management, change control, incidentresponse, vulnerability management), ensuring effectiveness and consistency. Leading in the review and enhancement of IT and infosec risk and control frameworks (e.g., ISO 27001, ITIL, ISO2 2301, NIST More ❯
industry regulations and standards (e.g., GDPR, ISO 27001). Manage security systems, including firewalls, intrusion detection/prevention systems, and antivirus software, in collaboration with GT. Develop and test incidentresponse plans and coordinate responses to security incidents and breaches. Raise cybersecurity awareness among bank employees through annual training/workshops. Other Duties Maintain professional and technical knowledge More ❯