Portsmouth, yorkshire and the humber, United Kingdom
Franklin Fitch
guiding investigations, and helping shape the future of our security strategy. If you’re passionate about cyber security and thrive in a fast-paced, threat-driven environment, we want to hear from you. 🔐 What You’ll Be Doing Monitor & Detect: Identify and respond to security alerts from SIEM, IDS …/IPS, EDR, and other tools. Incident Response: Investigate threats and escalate incidents, ensuring rapid containment and resolution. Threat Hunting: Proactively search for hidden threats and conduct forensic investigations. Lead & Mentor: Manage SOC analysts and support their technical and professional growth. Tool Optimisation: Oversee and fine-tune security platforms … innovation and stay ahead of emerging threats, tactics, and techniques. External Engagement: Work with partners to strengthen the defensive posture and maintain compliance. Insider Threat Management: Lead investigations and support sensitive case handling. 🛠 What You Bring to the Role Must-Have Experience: Strong background in cyber security, protective monitoring More ❯
wakefield, yorkshire and the humber, United Kingdom Hybrid / WFH Options
Logiq
help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model … We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP More ❯
york, yorkshire and the humber, United Kingdom Hybrid / WFH Options
Logiq
help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model … We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP More ❯
bradford, yorkshire and the humber, United Kingdom Hybrid / WFH Options
Logiq
help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model … We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP More ❯
doncaster, yorkshire and the humber, United Kingdom Hybrid / WFH Options
Logiq
help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model … We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP More ❯
sheffield, south yorkshire, yorkshire and the humber, United Kingdom Hybrid / WFH Options
Logiq
help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model … We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom Hybrid / WFH Options
Logiq
help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model … We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP More ❯
kingston upon hull, east yorkshire, yorkshire and the humber, United Kingdom Hybrid / WFH Options
Logiq
help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model … We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP More ❯
principles, including experience of vulnerability scanning, identifying, resolving, and reporting risks Experience of formal document creation, such as the creation of reports or procedures ThreatIntelligence analysis and best practice Security Incident Response processes, procedures, and best practices Disaster Recovery and Business Continuity principles Event and log analysis More ❯
Portsmouth, yorkshire and the humber, United Kingdom
Franklin Fitch
Provider (MSP), we deliver innovative Infrastructure Management, AI, Modern Workplace, and Managed Security Services. Our modern Security Operations Centre (SOC) provides 24/7 threat detection, monitoring, and incident response, empowering organisations across various industries to protect their digital assets with confidence. We’re looking for a strategic, hands … help shape the future of our security services. 🧠 What You'll Do Lead and manage day-to-day SOC operations, ensuring 24/7 threat monitoring and effective incident response. Oversee security alert triage, investigation, and escalation workflows. Drive continuous improvement across SOC processes, detection logic, and response capabilities. … service excellence. Collaborate with engineering teams to improve tools, security automation, and detection logic. Stay on top of emerging threats, attack vectors, and evolving threat actor tactics. Act as a trusted point of contact for clients regarding incidents, reports, and security posture. Help shape and execute the SOC’s More ❯
Provide support, advice and guidance on cyber security. An exciting, comprehensive apprenticeship which focuses on developing sound knowledge of cyber security tools, network intrusions, threatintelligence and how to identify and protect against cyber threats that face the mining industry. Key Details Vacancy Title Cyber Security Apprentice Employer More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Hays
practices such as ITIL Experience of identity and access management, and end user device management Experience of delivering against cyber security roadmaps Experience building threatintelligence and horizon scanning tools Strong communication skills This post requires a basic DBS to be passed What you'll get in return More ❯
wakefield, yorkshire and the humber, United Kingdom
Iceberg
a focus on realism and impact Creating or modifying tools, exploits, and payloads as needed — not relying solely on off-the-shelf frameworks Supporting threat-led testing programs and integrating threatintelligence into operations Maintaining strict operational security and professional discipline in all activities What we’re More ❯
a focus on realism and impact Creating or modifying tools, exploits, and payloads as needed — not relying solely on off-the-shelf frameworks Supporting threat-led testing programs and integrating threatintelligence into operations Maintaining strict operational security and professional discipline in all activities What we’re More ❯
doncaster, yorkshire and the humber, United Kingdom
Iceberg
a focus on realism and impact Creating or modifying tools, exploits, and payloads as needed — not relying solely on off-the-shelf frameworks Supporting threat-led testing programs and integrating threatintelligence into operations Maintaining strict operational security and professional discipline in all activities What we’re More ❯
bradford, yorkshire and the humber, United Kingdom
Iceberg
a focus on realism and impact Creating or modifying tools, exploits, and payloads as needed — not relying solely on off-the-shelf frameworks Supporting threat-led testing programs and integrating threatintelligence into operations Maintaining strict operational security and professional discipline in all activities What we’re More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom
Iceberg
a focus on realism and impact Creating or modifying tools, exploits, and payloads as needed — not relying solely on off-the-shelf frameworks Supporting threat-led testing programs and integrating threatintelligence into operations Maintaining strict operational security and professional discipline in all activities What we’re More ❯
sheffield, south yorkshire, yorkshire and the humber, United Kingdom
Iceberg
a focus on realism and impact Creating or modifying tools, exploits, and payloads as needed — not relying solely on off-the-shelf frameworks Supporting threat-led testing programs and integrating threatintelligence into operations Maintaining strict operational security and professional discipline in all activities What we’re More ❯
kingston upon hull, east yorkshire, yorkshire and the humber, United Kingdom
Iceberg
a focus on realism and impact Creating or modifying tools, exploits, and payloads as needed — not relying solely on off-the-shelf frameworks Supporting threat-led testing programs and integrating threatintelligence into operations Maintaining strict operational security and professional discipline in all activities What we’re More ❯