and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. Responsibilities Job Duties and Responsibilities: The Systems Administrator 2 is responsible for the day-to-day management, maintenance, and support of the organization's IT infrastructure, including servers, virtualization More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
Entry-Level Cybersecurity Analyst Location: London, UK - Flexible Working Options Available About the Company: Our client is a leading organization specializing in digital security solutions. Based in London, they are committed to protecting critical digital assets and ensuring the safety of sensitive information. They are looking for an Entry-Level Cybersecurity Analyst to join their team, offering an excellent opportunity … to begin a career in one of the most in-demand industries. Role Overview: As an Entry-Level Cybersecurity Analyst, you will support the team in identifying and addressing potential security threats. This role is ideal for recent graduates or those with foundational knowledge of cybersecurity who are eager to develop their skills in a collaborative and fast-paced environment. … protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and recommendations for stakeholders. •Participate in training programs to stay updated on cybersecurity trends and best practices. Qualifications: •Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field. •Basic knowledge of cybersecurity principles, including threat detection, risk management, and incident More ❯
About the Role: We are seeking a highly motivated and detail-oriented SOC Analyst to join our on-site team in Wiltshire. This is a critical role within our cybersecurity operations, responsible for monitoring, detecting, and responding to security incidents, ensuring compliance, and maintaining the integrity of our systems and networks. Key Responsibilities: Monitor and analyse security events using … Collaborate with internal teams to enhance security posture Document incidents, findings, and recommendations clearly and accurately Stay current with emerging threats and vulnerabilities Demonstrate an understanding of the wider cybersecurity landscape and risks Essential Skills & Experience: Minimum of 2 years' experience in a SOC or cybersecurity role Strong understanding of SIEM technologies and incident response processes Solid knowledge … in or basic understanding of cyber threat intelligence, including how attackers operate and how to spot signs of compromise (e.g., suspicious files, unusual behaviour, or known attack patterns) Relevant cybersecurity or networking certifications (e.g., CompTIA Security+, CEH, Cisco, etc.) Qualifications & Clearance: Must be a sole British national SC cleared and eligible for DV clearance (or already DV cleared) What More ❯
security posture and respond to incidents, problems and change requests from a security operations perspective. Essential skills- Practical experience working within a SOC (Security Operations Centre) or in a cybersecurity focused role - Ideally 1- 2 years working as an engineer. Knowledge of security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud … Security etc.) Knowledge of CyberSecurity domains (e.g., Identity and access Management, Network Security, Incident Response etc) Desirable skills Ideally you will come from an Infrastructure engineering background. Relevant industry qualifications and certifications (CompTIA Security+, CEH, GCIH, GCIA CISSP etc) Experience with Microsoft O365 Security solutions and network security operations. Knowledge of Security best practices and regulatory compliance frameworks (e.g. More ❯
findings and provide recommendation for remediation. • Assist, participate and enhance patching and upgrade procedures. • Identifying potential weaknesses in security procedures and recommend remediations. • Keeping up to date with emerging cybersecurity threats and ways to manage them using the latest security and technology developments • Testing and evaluating security products • Making recommendations for enhancing and improving security processes and tools • Leading … the delivery of cybersecurity awareness training and testing for colleagues • Reviewing incident management processes to be followed in the event of any security breaches. • Planning and testing disaster recovery processes • Liaising with stakeholders in relation to security issues and risks • Generating reports for both technical and non-technical staff and stakeholders • Assisting with the maintenance of the risk register … and assist with internal and external audits relating to information security. • Contribution to overall performance of the ICT team. Desirable Experience/Skills: • A passion for cybersecurity and risk minded approach • Excellent IT skills, including knowledge of computer networks, Microsoft products including Windows operating systems, and applications, hardware and security. • Knowledge of various security technologies such as network and More ❯
defense strategies, including firewall architecture, intrusion detection/prevention systems (IDS/IPS), and other boundary protection technologies. This role requires a deep understanding of enterprise network infrastructure and cybersecurity best practices, along with strong leadership and communication skills. You'll work closely with IT, cybersecurity, and operations teams to protect the organization's critical information and ensure compliance with … secure connectivity across multiple networks, including classified and unclassified environments. • Develop and maintain network segmentation strategies to minimize risk. Governance & Compliance: • Ensure all boundary defense activities align with DoD cybersecurity requirements and frameworks (e.g., RMF, NIST 800-53). • Maintain security documentation and ensure compliance with audit and inspection requirements. • Collaborate with compliance officers to support accreditation and ATO efforts. … Collaboration & Integration: • Work closely with network, cybersecurity, and application teams to ensure seamless integration of boundary controls. • Act as a liaison with external partners, vendors, and government stakeholders. • Provide technical guidance to cross-functional teams on best practices for boundary protection. Monitoring & Incident Response: • Manage boundary monitoring tools and respond to security events and incidents. • Conduct regular assessments and updates More ❯
to help Claranet meet its vision Duties and Responsibilities All Security Consultants • Perform consultancy and audit/assessment activities during delivery of customer projects across the range of the CyberSecurity GRC services, in line with both employee capabilities and business need• Interact professionally with customers across a variety of channels, ensuring timely progression of projects and the ongoing development … audit/assessment calls, Q&A (question and answer) calls to support audit/assessments, perform remote assessment activities• As necessary, create and maintain documentation supporting the delivery of CyberSecurity GRC services• Where appropriate, provide mentoring and/or coaching to GRC colleagues of the same level or below• Keep up with industry trends, emerging threats, and technological advancements … to effectively address new challenges and technologies• Perform QA (Quality Assurance) reviews of reports produced by the CyberSecurity function’s GRC Team• Where necessary, assist with the development and growth of the CyberSecurity function’s such as, product/service improvement or creating cutting-edge training material for internal and external delivery• Fulfil any re-certification requirements and More ❯
high-tech sectors. As our Group Chief Information Security Officer (CISO), you will shape and secure the future of our information landscape. You will design and drive a holistic cybersecurity strategy across Exosens Group, ensuring that our information assets, technologies, and people are protected against evolving threats. GROUP CHIEF INFORMATION SECURITY (CISO) The position: Craft and implement a comprehensive information … heart of our defense-related projects, ensuring alignment with sensitive national and European regulations (GDPR, NIS2, ISO/IEC 27001, national military standards). Act as the voice of cybersecurity at the executive table-providing insight, risk assessments, and clear actions to safeguard our operations and clients. Lead risk management programs, identify and mitigate threats, and ensure full compliance across … encryption and secure communications. Steer the continuous evolution of our incident response and threat detection capabilities, working with internal teams and external SOC partners. Build and inspire a multidisciplinary cybersecurity team, fostering a culture of vigilance and secure-by-design thinking. Drive awareness initiatives that empower every Exosens employee to be a guardian of our data and reputation. Our ideal More ❯
and ensure smooth adoption of automated workflows. Compliance Alignment: Ensure that automation efforts align with compliance, audit, and organizational policies. Required Skills & Qualifications Bachelor's degree in Computer Science, Cybersecurity, or related discipline, or equivalent hands-on experience. 2-5 years of experience in security operations or security engineering. Hands-on experience with SOAR platforms (e.g., Cortex XSOAR, Splunk SOAR … Familiarity with other SOC tools (e.g., ServiceNow, Jira, Splunk, Elastic, SentinelOne). Security certifications such as: SOAR-specific certifications (e.g., Cortex XSOAR Certified Engineer) CrowdStrike Certified Falcon Responder Google Cybersecurity Certificate General security certs (e.g., CySA+, GCIH, CISSP More ❯
EDR), including theirfunction and placement in an enterprise network. Knowledgeof intrusion detection systems and signature development. Knowledge of front-endcollection systems, including network traffic collection, filtering, andselection. Knowledge of cybersecurity threats,vulnerabilities, and privacy principles. Working knowledge inconfigurating collection sensors for enterprise networks. Knowledgeof system administration concepts for operating systems such as but not limitedto Linux, Android, and Windows …/coach). DesirableQualifications/Certifications Red Hat SystemAdministration I & II (RH124/RH134). Knowledge of virtualisation technologiessuch as VMWare and HyperV. Proventrack record and experience in developing cybersecurity policies andprocedures, as well as successfully producing deliverables to meetorganisational objectives. Abilityto work calmly and effectively under pressure and have a can-do attitude. Broadcyber certifications or equivalent such More ❯
protect the bank from potential cyber-attacks and respond to threats. Accountabilities: * Management of security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cybersecurity incidents, and provide a prompt response to restore normal operations with minimised system damage. * Identification of emerging cybersecurity threats, attack techniques and technologies to detect/prevent incidents … security logs, events and alerts/potential threats. * Triage of data loss prevention alerts to identify and prevent sensitive data for being exfiltrated from the banks network. * Management of cybersecurity incidents including remediation & driving to closure. Assistant Vice President Expectations * To advise and influence decision making, contribute to policy development and take responsibility for operational effectiveness. Collaborate closely with More ❯
ICAM Engineer Department: Information Technology/Cybersecurity Location: Washington, DC - Onsite Role Type: Contract Current Public Trust clearance required About Our Client Our client supports a large government agency program within a federal division responsible for enforcing federal laws and promoting fair practices in the marketplace. This critical role supports the agency's mission by implementing and managing advanced identity … and business units to implement IAM solutions. Document configurations, processes, and procedures for ongoing maintenance and compliance. Required Experience/Skills Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field. 5+ years of experience in Identity and Access Management (IAM). At least 3 years of hands-on experience specifically with Okta. In-depth knowledge of Okta … cloud security practices and experience securing cloud-based applications using Okta and related tools. Previous experience working with government agencies. Education Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field required. Clearance Requirements Current Public Trust clearance required. Cannot begin assignment until clearance is granted. Join Our Identity Management Team! If you're an experienced ICAM engineer More ❯
to perform self-sustaining and work with little to no oversight. Lead IT ops team on day-to-day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes. Manage COTS & GOTS products to collect, display and remediate a variety … Manage and operate monitoring tools/capabilities with the enterprise Security Information and Event Management (SIEM) and create/tailor complex event alarms/rules and summary reports. Execute cybersecurity operations procedures for day-to-day network management, operations and maintenance. Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk. Assist in analyzing technical … risk, upon request, of emerging cybersecurity tools and processes. Work as part of a security incident response team as needed. Assist ISSM/ISSO/ISSE with the Integration/Development of new techniques to improve. Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels. Advanced technical competency in one or more of the following supported More ❯
to perform self-sustaining and work with little to no oversight Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes Manage COTS & GOTS products to collect, display and remediate a variety … Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports Execute cybersecurity operations procedures for day to day network management, operations and maintenance Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk Assist in analyzing technical … risk, upon request, of emerging cybersecurity tools and processes Work as part of a security incident response team as needed Assist ISSM/ISSO/ISSE with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels Advanced technical competency in one or more of the following supported platforms More ❯
to perform self-sustaining and work with little to no oversight Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes Manage COTS & GOTS products to collect, display and remediate a variety … Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports Execute cybersecurity operations procedures for day to day network management, operations and maintenance Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk Assist in analyzing technical … risk, upon request, of emerging cybersecurity tools and processes Work as part of a security incident response team as needed Assist ISSM/ISSO/ISSE with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels Advanced technical competency in one or more of the following supported platforms More ❯
network engineers, fostering a culture of technical excellence. • Monitor network performance, proactively identifying and resolving bottlenecks and security risks. • Stay up to date on emerging networking technologies and DoD cybersecurity policies to enhance the network infrastructure. Required Qualifications: • Active DoD TS/SCI security clearance with the ability to maintain it in valid status. • Bachelor's degree in Computer Science … SDN) solutions. • Understanding of DoD security frameworks, including STIGs, RMF, and NIST guidelines. • Experience with network automation and scripting (Python, Ansible, etc.). Preferred Qualifications: • Master's degree in Cybersecurity, IT, or related field. • Experience working in government or defense environments. • Familiarity with firewalls, IDS/IPS, VPNs, and network segmentation strategies. • Experience with cloud networking architectures (AWS, Azure, GovCloud More ❯
Familiarity with identity and access management (IAM) concepts and tools. • Experience with encryption techniques and cryptographic protocols. • Understanding of containerization technologies like Docker and Kubernetes. • In-depth understanding of cybersecurity principles, best practices, and common attack vectors. • Knowledge of security compliance frameworks and regulations such as GDPR, HIPAA, PCI DSS, and SOC 2. • Ability to conduct risk assessments, vulnerability assessments More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Oscar Associates (UK) Limited
global consultancy is looking for an experienced Security Architecht to lead the design and governance of secure solutions across a major programme of work. You will act as primary cybersecurity SME, delivering Microsoft-focused architecture and risk management. Key responsibilities: Deliver end-to-end solution designs aligned with Microsoft security capabilities Conduct capability assesments across Microsoft security tools (i.e Defender More ❯
our office. Purpose of the Role Primark Technology is on a transformation journey supporting the business strategy which includes modernising our operating model as well as technology architecture and CyberSecurity and Risk posture. This role is key in building and improving Primark's CyberSecurity posture. Duties & Responsibilities Actively progress and improve Primark's cybersecurity posture with the … Finding ways to translate that into business opportunities. Be able to take people along with you, empowering new ways of working and successfully executing on those opportunities. Have extensive cybersecurity delivery and programme/project management experience, Retail experience would be beneficial. Be technically strong across a range of IT disciplines and systems, including cloud and network security. Have … existing markets Deliver more memorable in-store experiences every day Further deliver on our Primark Cares sustainability strategy Create operational excellence to support and empower our customer-facing teams CyberSecurity &Technology will be at the heart of this growth and transformation agenda We want to use the latest technologies to do things smarter, better and faster to continue to More ❯
ability to see the bigger picture Excellent communication skills with the ability to influence multiple stakeholders Willingness to learn and adapt to new technologies coupled with a passion for cybersecurity Ability to self-motivate and define priorities to meet deadlines Good team-oriented interpersonal skills, with the ability to interface effectively with a broad range of people and roles More ❯
effectively to non-technical stakeholders. Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. 4+ Years of experience in networking administration. Security+ certification or equivalent cybersecurity certification. Proven experience in Linux and Windows system administration. Strong scripting skills in Bash, Python, or PowerShell. Familiarity with virtualization technologies (VMware, Hyper-V). Knowledge of network protocols, firewalls More ❯
inspire teams to prioritise information security in an ever-evolving digital landscape? The Role: Oxfam GB is seeking a Head of Information Security and Data Protection to lead the Cybersecurity, Data Protection, and Information Governance teams. This role involves managing risks across these areas, ensuring compliance with relevant regulations and control frameworks, and coordinating information security efforts across the wider More ❯
Agile, Scrum, SAFe or other modern software development methods/practices. • Experience supporting USAF or USA software development projects. • Knowledge of DESMF. • (ISC)2 CISSP, CompTIA CASP, or other cybersecurity certification preferred. Clearance: • U.S. Citizen with Active TS/SCI security clearance. More ❯
to correct deficiencies and maintain more effective data handling, conversion, input/output requirements, and storage. We are seeking a skilled Palo Alto XSOAR Automation Engineer to join our cybersecurity team. The ideal candidate will have strong expertise in scripting, programming, and hands-on experience with Palo Alto Cortex XDR and SOAR platforms. Candidate will be responsible for designing, developing … and maintaining xSOAR playbooks, automating security workflows, and administering the xSOAR environment to enhance our threat detection and response capabilities. Required: Bachelor's degree in computer science, Cybersecurity, or a related field (or equivalent experience). 3+ years of experience in cybersecurity, with a focus on automation and orchestration. Proven experience with Palo Alto XSOAR administration and playbook development. Hands … and programming skills in Python, PowerShell, or JavaScript. Familiarity with integrating XSOAR with APIs and third-party security tools (e.g., SIEM, ticketing systems, threat intelligence platforms). Understanding of cybersecurity concepts, including incident response, threat hunting, and security operations. Excellent problem-solving skills and ability to work in a fast-paced environment. Strong communication skills to collaborate with technical and More ❯
About the role: Shape the Future of CyberSecurity at Holland & Barrett At Holland & Barrett, we're not just a leading health and wellness retailer—we're a digital-first business that places customer trust at the heart of everything we do. We're looking for a Senior Security Operations Engineer to join our growing CyberSecurity team and help More ❯