SR2 | Socially Responsible Recruitment | Certified B Corporation™
has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST, SOC … governance controls. Security Strategy: Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threatdetection, incident response, vulnerability management, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance More ❯
South East London, England, United Kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST, SOC … governance controls. Security Strategy: Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threatdetection, incident response, vulnerability management, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance More ❯
Gosport, Hampshire, South East, United Kingdom Hybrid / WFH Options
Walsh Employment
plan, life assurance, pension scheme, and a generous flexible benefits fund Key Requirements We are seeking an experienced Senior SOC Analyst who brings a strong background in security operations , threatdetection, and incident response. This is a critical role that supports the defence of national infrastructure through proactive monitoring, analysis, and improvement of cybersecurity postures. Essential Skills and … on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att&ck framework and advanced threatdetection techniques Excellent analytical and problem-solving capabilities Able to provide mentorship and leadership within a … SOC team Desirable (Nice-to-Have): Industry-recognised cybersecurity certifications such as CRT or OSCP Previous experience handling SC or DV cleared environments Demonstrated ability to fine-tune detection logic and improve SOC processes Active engagement with the cybersecurity community and awareness of emerging trends Role & Responsibilities As a Senior SOC Analyst , you will be at the forefront of More ❯
San Antonio, Texas, United States Hybrid / WFH Options
BridgePhase, LLC
Force's Unified Platform Software Factory in San Antonio. In this role, you will lead the design, development, and deployment of AI/ML models and tools that improve threatdetection, automate analysis, and support cyber defense workflows. You will collaborate closely with cyber operators, software engineers, and data scientists to build AI-driven solutions that accelerate decision … of a hybrid schedule. In this position, you can expect to: Lead the design and implementation of AI and ML models tailored to cyber operations challenges such as anomaly detection, threat classification, and predictive analytics. Develop and maintain scalable data pipelines and MLOps workflows using modern tools and frameworks (e.g., TensorFlow, PyTorch, scikit-learn). Integrate AI capabilities … for performance, accuracy, and operational efficiency in cloud and containerized environments. Provide SME guidance on AI best practices, explainability, and ethical AI considerations within mission contexts. Support automation of threatdetection, incident response, and cyber situational awareness through AI-driven tools. Document AI workflows, models, and system integration points to support knowledge sharing and continuous improvement. As the More ❯
each other accountable and always have each other's back! About the role: Intermedia's Information Security team is seeking a Senior Security Engineer with a strong passion for threatdetection, incident response, and security engineering. The ideal candidate thrives in digging through data to find anomalies, identifying root causes, uncovering malicious activity, recommending corrective actions, and working … concerns. Security Engineering & Tooling Assist with security reviews related to infrastructure and system changes. Build, enhance, and maintain internal security tooling and scripting repositories. Contribute to the development of detection content, alert tuning, and automation pipelines. Strategic & Team Contributions Drive annual security team goals and cross-functional initiatives. Author and maintain clear, actionable documentation and knowledge bases. Mentor junior … technologies and associated security controls. Demonstrated experience in at least one of the following: Penetration Testing : Offensive security and exploitation techniques. Digital Forensics : Host, network, or memory-based investigation. Threat Hunting : Detection engineering and hypothesis-driven threat investigation. Knowledge of modern security tooling (SIEM, EDR, vulnerability management, SOAR). Strong documentation and communication skills; fluent in written More ❯
on your shift, while also delivering advanced security operations services to clients across a range of industries. As a Senior SOC Analyst , you will be central to incident response, threat hunting , and real-time defence management , guiding and mentoring two junior SOC analysts. The SOC team is deeply committed to leveraging the latest in automation and artificial intelligence, including … and investigating incidents, fostering a culture of collaboration and continuous learning. Client Relationship Management: Act as a point of contact, managing ongoing communications and ensuring technical needs are met ThreatDetection & Analysis: Triage and analyse alerts across multiple SIEM platforms (e.g., Microsoft Sentinel, custom ELK stacks). Log & Threat Intelligence Analysis: Perform detailed log analysis and threat intelligence research to uncover root causes and bolster security defences. Technical Reporting: Deliver clear, client-focused reports on incidents, alerts, and threat activity. Escalation Handling: Manage critical escalations with precision and provide comprehensive, well-documented resolutions. SOC Innovation: Work with leadership to enhance operational efficiency and integrate emerging technologies. Incident Management: Lead security incident investigations and responses, offering More ❯
Gloucester, England, United Kingdom Hybrid / WFH Options
55 Exec Search
on your shift, while also delivering advanced security operations services to clients across a range of industries. As a Senior SOC Analyst , you will be central to incident response, threat hunting , and real-time defence management , guiding and mentoring two junior SOC analysts. The SOC team is deeply committed to leveraging the latest in automation and artificial intelligence, including … and investigating incidents, fostering a culture of collaboration and continuous learning. Client Relationship Management: Act as a point of contact, managing ongoing communications and ensuring technical needs are met ThreatDetection & Analysis: Triage and analyse alerts across multiple SIEM platforms (e.g., Microsoft Sentinel, custom ELK stacks). Log & Threat Intelligence Analysis: Perform detailed log analysis and threat intelligence research to uncover root causes and bolster security defences. Technical Reporting: Deliver clear, client-focused reports on incidents, alerts, and threat activity. Escalation Handling: Manage critical escalations with precision and provide comprehensive, well-documented resolutions. SOC Innovation: Work with leadership to enhance operational efficiency and integrate emerging technologies. Incident Management: Lead security incident investigations and responses, offering More ❯
City of London, London, United Kingdom Hybrid / WFH Options
55 Exec Search
on your shift, while also delivering advanced security operations services to clients across a range of industries. As a Senior SOC Analyst , you will be central to incident response, threat hunting , and real-time defence management , guiding and mentoring two junior SOC analysts. The SOC team is deeply committed to leveraging the latest in automation and artificial intelligence, including … and investigating incidents, fostering a culture of collaboration and continuous learning. Client Relationship Management: Act as a point of contact, managing ongoing communications and ensuring technical needs are met ThreatDetection & Analysis: Triage and analyse alerts across multiple SIEM platforms (e.g., Microsoft Sentinel, custom ELK stacks). Log & Threat Intelligence Analysis: Perform detailed log analysis and threat intelligence research to uncover root causes and bolster security defences. Technical Reporting: Deliver clear, client-focused reports on incidents, alerts, and threat activity. Escalation Handling: Manage critical escalations with precision and provide comprehensive, well-documented resolutions. SOC Innovation: Work with leadership to enhance operational efficiency and integrate emerging technologies. Incident Management: Lead security incident investigations and responses, offering More ❯
Lenexa, Kansas, United States Hybrid / WFH Options
Covenant Consulting
hybrid) Location: hybrid role located in Lenexa, KS Summary: Responsible for designing, executing, and managing security and compliance programs across Managed Services environments. This role will lead AI-powered threat protection, drive 24/7 monitoring capabilities, and ensure adherence to regulatory frameworks including HIPAA, NIST, and CMMC. The ideal candidate brings deep MSP experience, a proactive mindset, and … technology partner committed to delivering innovation, reliability, and support. Responsibilities: Cybersecurity Strategy & Leadership Lead cybersecurity initiatives across client MSP environments, aligning protection strategies with business and regulatory needs. Establish threatdetection and incident response processes utilizing AI-driven security tools. Manage endpoint protection, SIEM systems, and identity-based access control. Compliance Management Ensure ongoing compliance with HIPAA, NIST … month ago Information Security Specialist (Bilingual) Information Systems Security Officer (ISSO) Kansas City, KS $92,213.33-$125,146.66 1 month ago Kansas City Metropolitan Area 2 weeks ago Sr. Threat Analyst- 3rd Shift Remote, USA FBI Special Agent: Systems Integration & Network Security Expertise Kansas City, MO $99,461.00-$128,329. hours ago Overland Park, KS $97,000.00-$136,000.00 More ❯
from any location. Security Tooling & Integration: Evaluate, select, and onboard security solutions (e.g., endpoint protection, SIEM, vulnerability scanners). Integrate security tools with existing systems and workflows, ensuring effective threatdetection and response. Automation & Scripting: Develop and maintain scripts and automation tools to streamline IT operations and enhance security. Automate security tasks, such as patch management, vulnerability scanning … the specific risks and challenges of a distributed workforce. Requirements: Proven experience as an IT Administrator, ideally in a startup environment with a globally distributed workforce. Strong understanding of threat models in blockchain environment. Proactive application of security principles, including Zero Trust architecture, and their application in a remote work context. Experience with MDM solutions, Google Workspace, SSO, and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
ZenTech Talent
a cyber security role (ideally within an MSP or multi-client setting) Security certifications like Security+, CySA+, or equivalent (working toward CISSP or equivalent a bonus) Strong understanding of threatdetection, risk analysis, and incident response Excellent communication and documentation skills Why Join? Broad exposure across industries and technologies Supportive, close-knit team environment Clear progression paths into More ❯
a cyber security role (ideally within an MSP or multi-client setting) Security certifications like Security+, CySA+, or equivalent (working toward CISSP or equivalent a bonus) Strong understanding of threatdetection, risk analysis, and incident response Excellent communication and documentation skills Why Join? Broad exposure across industries and technologies Supportive, close-knit team environment Clear progression paths into More ❯
South East London, England, United Kingdom Hybrid / WFH Options
ZenTech Talent
a cyber security role (ideally within an MSP or multi-client setting) Security certifications like Security+, CySA+, or equivalent (working toward CISSP or equivalent a bonus) Strong understanding of threatdetection, risk analysis, and incident response Excellent communication and documentation skills Why Join? Broad exposure across industries and technologies Supportive, close-knit team environment Clear progression paths into More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
This position requires a deep understanding of SecOps concepts, technologies, and best practices, specifically across IT and OT environments. You will be tasked with ensuring robust incident management, proactive threatdetection, and continuous improvement of our security posture. Strong communication and collaboration skills are essential as you will work closely with cross-functional teams to mitigate risks and … investigate and resolve incidents. Proactive Risk Remediation: • Identify, analyse, and evaluate security risks, applying a risk-based approach to implement appropriate and proportionate controls. • Perform proactive activities such as threat hunting to uncover vulnerabilities and ensure continuous risk reduction. • Provide tangible metrics to demonstrate risk reduction and reduced technical debt. Incident Readiness & Response: • Lead the incident triage and response More ❯
emerging technologies to enhance operations, security, and digital transformation. Infrastructure & Security Oversight Manage core IT infrastructure including networks, cloud environments, and trading systems. Ensure best-in-class cybersecurity practices: threatdetection, endpoint protection, encryption, and compliance. Maintain and regularly test business continuity and disaster recovery plans. Operational Support & Efficiency Oversee the IT helpdesk and ensure responsive, high-quality More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
OSAAVA Services
Position Overview: We are seeking a skilled Cyber Threat Intelligence (CTI) Analyst with a focus on adversary Tactics, Techniques, and Procedures (TTPs) to support cyber defense operations in a mission-critical DoD environment. This position requires strong analytical abilities to assess and track cyber adversaries, identify trends and attack patterns, and provide actionable intelligence for both defensive and proactive … cyber operations. As a member of a multidisciplinary threat intelligence team, you will work closely with cyber defenders, incident responders, and stakeholders to enrich detection capabilities and enhance the organization's overall cybersecurity posture. Key Responsibilities: Analyze, document, and track adversary TTPs using frameworks like MITRE ATT&CK, and integrate findings into threatdetection strategies. Produce … detailed cyber threat intelligence reports, briefings, and technical advisories for internal and external stakeholders. Fuse data from multiple sources (e.g., open-source intel, classified feeds, threat hunting) to provide a holistic threat picture. Collaborate with SOC and Incident Response teams to inform detections and investigations based on threat intelligence findings. Monitor and report on nation-state More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
OSAAVA Services
Position Overview: We are seeking a skilled Cyber Threat Intelligence (CTI) Analyst with a focus on adversary Tactics, Techniques, and Procedures (TTPs) to support cyber defense operations in a mission-critical DoD environment. This position requires strong analytical abilities to assess and track cyber adversaries, identify trends and attack patterns, and provide actionable intelligence for both defensive and proactive … cyber operations. As a member of a multidisciplinary threat intelligence team, you will work closely with cyber defenders, incident responders, and stakeholders to enrich detection capabilities and enhance the organization's overall cybersecurity posture. Key Responsibilities: Analyze, document, and track adversary TTPs using frameworks like MITRE ATT&CK, and integrate findings into threatdetection strategies. Produce … detailed cyber threat intelligence reports, briefings, and technical advisories for internal and external stakeholders. Fuse data from multiple sources (e.g., open-source intel, classified feeds, threat hunting) to provide a holistic threat picture. Collaborate with SOC and Incident Response teams to inform detections and investigations based on threat intelligence findings. Monitor and report on nation-state More ❯
Coventry, Warwickshire, United Kingdom Hybrid / WFH Options
Cadent Gas
our IT and Operational Technology (OT) environments. This is a hands-on, technically rich role where you will work with a wide range of security tools and collaborate with threat intelligence, vulnerability management, and incident response teams. You will engineer solutions to mitigate threats, automate detection and response, and ensure our systems remain secure, resilient, and compliant. Why … a dynamic and impactful role that offers technical depth, cross-functional collaboration, and the chance to shape Cadent's cyber resilience. Technical Challenge - Work with advanced SIEM, SOAR, and threatdetection tools across IT and OT environments. Strategic Contribution - Influence the development of new controls and support the delivery of Cadent's cyber security strategy. Cross-Team Collaboration … Partner with threat intelligence, vulnerability analysts, and incident responders to enhance our defences. Continuous Improvement - Engineer solutions for unpatchable vulnerabilities and automate detection and response processes. National Impact - Help protect the systems that keep gas flowing to millions of homes and businesses. What you'll bring: You are a technically skilled and security-focused professional with a strong More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
BT Group
play a critical role in designing, developing, and maintaining our security information and event management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threatdetection, incident response, and overall security posture. This role is hybrid (3 days in office) and can be based in one of the following offices: Birmingham, Manchester, Ipswich … you'll be doing SIEM Solution Development: Collaborate with security analysts and architects to design and implement SIEM solutions using Elasticsearch. Optimize SIEM rules, alerts, and dashboards for efficient threat detection. Collaborate effectively with others to drive forward key security objectives Presentation and documentation writing (to both technical and business audiences) Query Optimization and Performance Tuning: Write efficient Elasticsearch … informed about emerging threats and security best practices. Data Ingestion and Enrichment: Configure Elasticsearch pipelines for data ingestion from various sources, primarily from Kafka Enhance data enrichment by integrating threat intelligence feeds and contextual information. Keep abreast of relevant technologies in the area Reading, attending briefings and talks. Contribute to the running of your team. Knowledge-sharing, In team More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Morgan Hunt
and identity systems Qualifications Degree or relevant professional IT/security qualification Recognised certification from a security or identity vendor Knowledge Solid understanding of tools like SIEM, EDR, and threatdetection methods Knowledge of vulnerability management and threat intelligence Familiarity with network security (firewalls, segmentation, IDS/IPS, etc.) Understanding of operating systems (Windows, Mac, Linux) and More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
from various systems (Windows, Linux, network appliances, cloud services) to ensure full visibility and compliance. Develop advanced dashboards, reports, alerts, and custom visualizations to support SOC operations and cyber threat detection. Optimize Splunk indexing, search performance, and storage utilization. Collaborate with cybersecurity analysts, engineers, and program stakeholders to drive continuous improvement of monitoring capabilities. Ensure Splunk implementation aligns with More ❯
West London, London, United Kingdom Hybrid / WFH Options
Circle Group
clients during active incidents and helping them to prepare through compromise assessments, readiness exercises, and defensive content. You'll also be part of our escalation rota, supporting our Managed Detection and Response (MDR) service - sometimes leading incidents, other times mentoring junior SOC/Blue Team analysts. We are ideally looking for someone who can work hybrid , attending an office … actionable defensive security content. Communicate clearly and confidently with clients - both in writing and verbally - during high-pressure situations. Work alongside the team to continually improve incident response and detection capability. About You We're not looking for a technical wizard, but someone with a solid grounding and the confidence to roll up their sleeves and figure things out … Desirable: Experience delivering compromise assessments or tabletop exercises. Knowledge of security operations across a range of industries. Prior client-facing experience. Interest in creating or contributing to high-quality threatdetection and IR content. Why This Role? We invest heavily in the development of our people. Many of those we've supported have gone on to become Technical More ❯
projects aligned with industry frameworks and compliance requirements, such as NIST800-53, ISO27001, NIST CSF, NIS 2, DORA. Leverage emerging technologies such as AI, IoT, cloud solutions, and advanced threatdetection systems. Advise on their application, assess their suitability for specific environments, and determine optimal implementation timing and approach. Manage large-scale programmatic engagements, including stakeholder engagement, scoping … and issue escalation. Business development: Identify and originate cyber risk management and technology resilience opportunities. Manage key client relationships, supported by account, sales, and marketing plans. Position our cyber threat intelligence, assurance, and incident response practices. Provide energetic consulting leadership in KSA, promoting Control Risks as a trusted advisor on cyber and technology risk, leading to increased long-term More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
MealSuite
security initiatives with business goals. SaaS Product Security & Risk Management Implement application and cloud security best practices (e.g., DevSecOps, CI/CD security, secure coding). Deploy and monitor threatdetection, logging, and incident response programs for our cloud infrastructure. Conduct security risk assessments and work with development teams to remediate vulnerabilities. Internal IT Security & Risk Management Establish … internal IT security policies and access controls. Oversee endpoint security and identity & access management (IAM). Implement and maintain security team tools, such as SIEM, vulnerability scanning, and endpoint detection solutions. Training & Awareness Develop and run organization-wide security training programs to foster a strong security culture company-wide. Educate employees on phishing, data protection, secure development, and compliance More ❯