aspects of IT operations. Gain hands-on experience with cloud platforms and services. Learn and implement best practices to fortify their systems against cyber threats. Assist in managing and optimising their network infrastructure. Proactively work to ensure all systems are up-to-date and secure. Install, build, and more »
Royston, England, United Kingdom Hybrid / WFH Options
Johnson Matthey Plc
your engineering team thrive in managing the platforms effectively. Keep Things Secure: Implement and uphold strong security measures to protect our platforms from cyberthreats and data breaches, ensuring they run smoothly and securely. Design for Success: Lead the design, implementation, and upkeep of platform services, focusing on more »
Cyber Security Consultant (Penetration Testing) Stripe OLT has a position for a cyber security consultant who is looking to progress their career and gain a deeper understanding of offensive security services and operations. The position mandates an individual possessing robust technical proficiency and up-to-date … awareness of prevailing cyberthreats, who can adeptly integrate and implement these technical tenets within a corporate environment. Consequently, the candidate should possess the capacity to translate technical understanding into pertinent cyber risk. This role presents the chance to collaborate with a range of prominent entities … encompassing both public and private sector establishments. Hence, it necessitates an individual capable of providing guidance regarding organisational cyber threats. Essentials • Strong interpersonal abilities (in both written and spoken communication) with a consultative demeanour. • Proven technical expertise in various offensive security services. • Capability to offer targeted technical solutions more »
on Azure. Proficiency in object-oriented programming and developing automated solutions through code. Passion for secure network design and protecting organizations from evolving cyber threats. Knowledge of configuration management systems like Ansible. Collaborative and able to communicate effectively and asynchronously. Excellent Stakeholder management skills. If you're excited more »
London, England, United Kingdom Hybrid / WFH Options
Control Risks
In this role you will be responsible for conducting desktop research into cyber and online threats, to enrich our CyberThreat Intelligence reporting. This role will primarily involve contributing regular reporting for Control Risks' clients that subscribe to our intelligence platform, as well as supporting … information and develop capabilities to collect and analyse information in support of the team. Demonstrate strong investigation skills relating to specific cyberthreat incidents, data breaches and other cyber security incidents. Build knowledge of collection tools to support bespoke investigative projects and Cyber … which support other service lines, notably Global Risk Analysis, Compliance Forensics and Investigations, and Response. Develop knowledge of principal cyber and online threat actors through research on open source, social media, deep and dark web sites and Control Risks internal intelligence systems. Contribute continuous research for inclusion more »
of the organization in the area of datacenter consolidation, hybrid cloud transformation, public cloud migration, modern workplace transformation, software defined networks, cyberthreat analytics and next generation SRE operations. Candidate should demonstrate a practitioner articulation of industry trends in these areas, key tenets and metrics that will … tools in order to recommend frameworks like datacenter consolidation, hybrid cloud transformation, public cloud migration, modern workplace transformation, software defined networks, cyberthreat analytics and next generation SRE operations that can be used for solution creation. Experience in transition, transformation program management and organization change management methodologies more »
Engineer to help build out and fine-tune their internal Cyber Defence capability, ensuring they are protected from both internal and external threat actors. Experience working within a financial markets (trading, hedge fund, asset manager, etc) or similar organization where the majority of the software infrastructure is … elite Algo-Trading firm. Key Responsibilities Build out and fine-tune internal security infrastructure to protect against both internal and external cyberthreat actors. Building, developing and deploying large scale security solutions. Working with wider engineering and technology teams to ensure security is incorporated at all stages more »
About this Role Role Title: Threat & Vulnerability Lead Location: UK- London La Fosse Associates are working with a global Insurance business who are looking to add a Threat & Vulnerability Lead to their strong internal security function. You will report directly into the BISO and be a senior individual … within their existing team. You will be joining the UK entity of their Security team to lead on vulnerability scanning and threat intelligence reporting. They are a large organisation with a huge amount of vulnerabilities and need somebody who understands how to approach on this scale. You will be … Qualys around ingesting the data then prioritsing and guding the patching team on what to tackle first. There will also be additional projects around threat-led penetration testing and various PenTest frameworks. In this role you will: Prioritise and coordinate remediation of vulnerabilities Work alongside senior stakeholders in the more »
CyberThreat & Vulnerability Analyst - Reading 2 days PW, to £50k Are you ready to dive into the world of cyber security and protect critical digital landscapes? We are looking for a passionate and skilled CyberThreat & Vulnerability Analyst to join a great … Love This Role: Play a pivotal role in our digital transformation journey. Collaborate with a dynamic team to enhance security measures. Engage in proactive threat hunting and vulnerability management. Key Responsibilities: Support enterprise-wide vulnerability management, ensuring effective identification, categorization, and mitigation. Develop and maintain threat assessment and … security vulnerabilities. Coordinate with stakeholders on cyber security patching and vulnerability management. Participate in major incident response when necessary. Perform proactive threat hunting for emerging cyber threats. Maintain and optimize TVM tool performance and dashboards. Ensure compliance with industry standards, such as GDPR, NIS more »
Corsham, Wiltshire, United Kingdom Hybrid / WFH Options
Experis IT
of innovation to address the entire breadth of opportunities in the evolving world of cloud, digital and platforms. Role purpose/summary The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring … on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management … investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system security according to latest threat intelligence and evolving trends. Participate in root cause analysis of incidents in conjunction with engineers across the enterprise. Provide Subject Matter Expertise (SME) on more »
Corsham, Wiltshire, United Kingdom Hybrid / WFH Options
Lorien
per week - Corsham, Portsmouth or Northallerton Duration: 6 months Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring … on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Your role: . Develop and integrate security event monitoring and incident … methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. . Maintain a baseline of system security according to latest threat intelligence and evolving trends. . Participate in root cause analysis of incidents in conjunction with engineers across the enterprise. . Provide Subject Matter Expertise more »
Corsham, Wiltshire, United Kingdom Hybrid / WFH Options
fortice
/5 days in either Warwick, Farnborough or Corsham. Role Description : Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring … on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management … investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system security according to latest threat intelligence and evolving trends. Participate in root cause analysis of incidents in conjunction with engineers across the enterprise. Provide Subject Matter Expertise (SME) on more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
class talents, Eviden expands the possibilities of data and technology, now and for generations to come. The opportunity We are looking for motivated Cyber Security Architects to join our team. If you are a forward-thinking person, who loves working with clients to identify their needs, build relationships … obtain a security clearance to SC level. Location: Home based (Travelling to client sites when needed) Role and responsibilities: Understanding client requirements for cyber security solutions and translating these into technology-based solutions using several suitable portfolio offerings Providing advice to clients on technical and operational security measures … A depth of information technology and information security experience Experience in design and deployment of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access Management SIEM and MDR VA Vulnerability Analysis and mitigation DLP Data loss more »
Royston, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Johnson Matthey Plc
your engineering team thrive in managing the platforms effectively. Keep Things Secure: Implement and uphold strong security measures to protect our platforms from cyberthreats and data breaches, ensuring they run smoothly and securely. Design for Success: Lead the design, implementation, and upkeep of platform services, focusing on more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown Asset Management Limited
ahead and apply. We'd love to hear from you! About the role Hargreaves Lansdown is seeking a talented and experienced CyberThreat Intelligence Lead to join our dynamic Cyber Defence team. As our CTI Lead, you will play a critical role in protecting our … organisation from cyberthreats by proactively identifying, analysing, contextualising, and escalating potential risks. We operate a threat-centric cyber defence posture and CTI is at the heart of this. If you are passionate about cyber security, have a keen eye for detail, and … apply for this position. What you'll be doing Responsible for the strategic direction and day-to-day running of the CyberThreat Intelligence (CTI) function Build strong working relationships with key stakeholders, such as Cyber Defence Management, CISO 'Heads of' and Digital/Technology more »
Employment Type: Permanent, Part Time, Work From Home
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
class talents, Eviden expands the possibilities of data and technology, now and for generations to come. The opportunity We are looking for motivated Cyber Security Architects to join our team. If you are a forward-thinking person, who loves working with clients to identify their needs, build relationships … obtain a security clearance to SC level. Location: Home based (Travelling to client sites when needed) Role and responsibilities: Understanding client requirements for cyber security solutions and translating these into technology-based solutions using several suitable portfolio offerings Providing advice to clients on technical and operational security measures … A depth of information technology and information security experience Experience in design and deployment of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access Management SIEM and MDR VA Vulnerability Analysis and mitigation DLP Data loss more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
business, to achieve measurable and sustainable improvements. You'll play a vital part in contributing to this transformation, helping to shape information and cyber security at Tunstall globally. This role could work on a hybrid basis from any of our main hubs - Manchester city centre, Malmo, or Madrid. … all-important customers. You will be responsible for driving security change and transformation across Tunstall, by helping to create and build a comprehensive cyber security and information security strategy that aligns with business objectives and play a pivotal role in ensuring the security of our SaaS products . … and information security strategy that aligns with business objectives, Lead, mentor, and oversee a small global team responsible for security operations, incident response, and threat detection, fostering a culture of continuous improvement, innovation, and excellence, Collaborate with the Group IT team to ensure the organisation is protected against cybermore »
aspects of IT operations. Gain hands-on experience with cloud platforms and services. Learn and implement best practices to fortify their systems against cyber threats. Assist in managing and optimising their network infrastructure. Proactively work to ensure all systems are up-to-date and secure. Install, build, and more »
Merseyside, North West, United Kingdom Hybrid / WFH Options
Everpool Recruitment
Configure and administrate of the Network Attached Storage (NAS) data appliances. Perform system backups and recovery Implement network security measures to safeguard against cyber threats. Monitor network performance and troubleshoot issues to ensure maximum uptime. Working closely across all divisions, help desk, sales, and provisions to implement new more »
Merseyside, North West, United Kingdom Hybrid / WFH Options
Everpool Recruitment
Configure and administrate of the Network Attached Storage (NAS) data appliances. Perform system backups and recovery Implement network security measures to safeguard against cyber threats. Monitor network performance and troubleshoot issues to ensure maximum uptime. Working closely across all divisions, help desk, sales, and provisions to implement new more »
including high-level designs, detailed designs, architecture diagrams, and data flow diagrams. Execute comprehensive security solutions to safeguard client systems and data against cyber threats. SKILLS & EXPERTISE Microsoft Server & Enterprise App Services, including: * Windows Server 2022, 2019, 2016, 2012R2 and previous versions * Microsoft Active Directory * Microsoft Hyper V more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating potential threats and vulnerabilities to ensure that the organization is prepared to defend against them. Strategic Defense Implementation: Putting in place robust … strategy. This role demands a proactive mindset, deep technical expertise, and strong leadership skills to navigate the complex and ever-evolving cyberthreat landscape. It's about being always prepared, constantly learning, and effectively communicating to maintain and enhance the organization's security posture. Tasks & Responsibilities Evaluate … the containment and resolution process in line with established protocols to reduce risks. Enhance security procedures to improve the organization's monitoring, detection, and threat mitigation capabilities. Support the development and deployment of systems for threat detection and response, ensuring optimal performance. Synthesize and prioritize data from logs more »
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Hays
of cyber security protocols. You will have the opportunity to lead a Cyber Security team in safeguarding systems by managing threat protection infrastructure and ensuring compliance. Analyse and report on cyberthreats, advising on risk mitigation and legal adherence to enhance security measures. … security, and future technological developments. Handle IT service requests and maintain customer service excellence. What you'll need to succeed Strong experience of cyber security Extensive practical experience in managing Microsoft server systems, NGAV, Amazon Cloud services, AD, ADFS, M365, security, public clouds, Azure services, SIEM, vulnerability assessment … systems and applications within a large enterprise networked environment. (Educational background is a plus) Operational experience with Voice and Wireless LAN standards. Developing Cyber Security Incident Plan (CIRP) with forensic readiness. Strong experience in Data Networking Protocols (TCP/IP, OSPF, DHCP, DNS). Proven track record in more »
Swadlincote, Derbyshire, East Midlands, United Kingdom
Bloor Homes - Sales & Marketing
website, and providing technical support to users as needed. Website Security: Liaising with IT to implement security measures to protect the website from cyberthreats, such as malware, hacking, and data breaches. Compliance and Standards: Ensuring the website complies with relevant laws, regulations, and industry standards, including data more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
class talents, Eviden expands the possibilities of data and technology, now and for generations to come. The opportunity We are looking for motivated Cyber Security Architects to join our team. If you are a forward-thinking person, who loves working with clients to identify their needs, build relationships … obtain a security clearance to SC level. Location: Home based (Travelling to client sites when needed) Role and responsibilities: Understanding client requirements for cyber security solutions and translating these into technology-based solutions using several suitable portfolio offerings Providing advice to clients on technical and operational security measures … A depth of information technology and information security experience Experience in design and deployment of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access Management SIEM and MDR VA Vulnerability Analysis and mitigation DLP Data loss more »