We’re looking for an experienced CybersecurityAnalyst to join our growing Cybersecurity Company This new and exciting opportunity is open ended for someone with initiative, ideas and enthusiasm for change and continuous improvement. Help us challenge the status quo within our client organisations by using … to ensure compliance with the government scheme Conducting reviews of current security measures and recommending suitable enhancements Identifying areas of weakness relating to clients cybersecurity posture Providing clear and concise advice and guidance on information security Occasional pre sales support when technical explanations are required Conducting cyber essentials assessments … and delivering accreditations (once qualified) The Candidate: A broad range of cybersecurity knowledge and skills covering security, standards, and compliance Draw on their own technical expertise to deliver cybersecurity guidance and advice to our clients The ability to review the effectiveness of existing security controls and propose proportionate more »
Glasgow, City of Glasgow, United Kingdom Hybrid / WFH Options
Hays Technology
within their technology function, this is an exciting time to join the team and help drive the business forward. Your new role As a cybersecurityanalyst, your role encompasses several critical responsibilities. You will stay informed about the latest security and technology developments, ensuring you remain up more »
Employment Type: Permanent
Salary: £50000 - £55000/annum £50,000-£55,000 per annum
to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary Responsibilities Provide analysis of architectures, technologies, DOD policy & information and critical data Develop cybersecurity and risk assessment methodologies and procedures to support prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies. Prepare and perform briefings appropriate for … senior leadership (i.e., general officer or flag officer) Conduct analysis of enterprise cybersecurity defensive strategies in order to enable operational effectives, defense, and command and control. Analyze network infrastructure in order to recommend methods and strategies that reduce and/or manage adverse impacts. Develop standards, metrics and measures … to support assessments, process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/ more »
to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary Responsibilities Provide analysis of architectures, technologies, DOD policy & information and critical data Develop cybersecurity and risk assessment methodologies and procedures to support prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies. Prepare and perform briefings appropriate for … senior leadership (i.e., general officer or flag officer) Conduct analysis of enterprise cybersecurity defensive strategies in order to enable operational effectives, defense, and command and control. Analyze network infrastructure in order to recommend methods and strategies that reduce and/or manage adverse impacts. Develop standards, metrics and measures … to support assessments, process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/ more »
to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary Responsibilities Provide analysis of architectures, technologies, DOD policy & information and critical data Develop cybersecurity and risk assessment methodologies and procedures to support prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies. Prepare and perform briefings appropriate for … senior leadership (i.e., general officer or flag officer) Conduct analysis of enterprise cybersecurity defensive strategies in order to enable operational effectives, defense, and command and control. Analyze network infrastructure in order to recommend methods and strategies that reduce and/or manage adverse impacts. Develop standards, metrics and measures … to support assessments, process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/ more »
to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary Responsibilities Provide analysis of architectures, technologies, DOD policy & information and critical data Develop cybersecurity and risk assessment methodologies and procedures to support prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies. Prepare and perform briefings appropriate for … senior leadership (i.e., general officer or flag officer) Conduct analysis of enterprise cybersecurity defensive strategies in order to enable operational effectives, defense, and command and control. Analyze network infrastructure in order to recommend methods and strategies that reduce and/or manage adverse impacts. Develop standards, metrics and measures … to support assessments, process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/ more »
to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary Responsibilities Provide analysis of architectures, technologies, DOD policy & information and critical data Develop cybersecurity and risk assessment methodologies and procedures to support prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies. Prepare and perform briefings appropriate for … senior leadership (i.e., general officer or flag officer) Conduct analysis of enterprise cybersecurity defensive strategies in order to enable operational effectives, defense, and command and control. Analyze network infrastructure in order to recommend methods and strategies that reduce and/or manage adverse impacts. Develop standards, metrics and measures … to support assessments, process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/ more »
to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary Responsibilities Provide analysis of architectures, technologies, DOD policy & information and critical data Develop cybersecurity and risk assessment methodologies and procedures to support prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies. Prepare and perform briefings appropriate for … senior leadership (i.e., general officer or flag officer) Conduct analysis of enterprise cybersecurity defensive strategies in order to enable operational effectives, defense, and command and control. Analyze network infrastructure in order to recommend methods and strategies that reduce and/or manage adverse impacts. Develop standards, metrics and measures … to support assessments, process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/ more »
to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary Responsibilities Provide analysis of architectures, technologies, DOD policy & information and critical data Develop cybersecurity and risk assessment methodologies and procedures to support prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies. Prepare and perform briefings appropriate for … senior leadership (i.e., general officer or flag officer) Conduct analysis of enterprise cybersecurity defensive strategies in order to enable operational effectives, defense, and command and control. Analyze network infrastructure in order to recommend methods and strategies that reduce and/or manage adverse impacts. Develop standards, metrics and measures … to support assessments, process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/ more »
to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary Responsibilities Provide analysis of architectures, technologies, DOD policy & information and critical data Develop cybersecurity and risk assessment methodologies and procedures to support prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies. Prepare and perform briefings appropriate for … senior leadership (i.e., general officer or flag officer) Conduct analysis of enterprise cybersecurity defensive strategies in order to enable operational effectives, defense, and command and control. Analyze network infrastructure in order to recommend methods and strategies that reduce and/or manage adverse impacts. Develop standards, metrics and measures … to support assessments, process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/ more »
to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary Responsibilities Provide analysis of architectures, technologies, DOD policy & information and critical data Develop cybersecurity and risk assessment methodologies and procedures to support prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies. Prepare and perform briefings appropriate for … senior leadership (i.e., general officer or flag officer) Conduct analysis of enterprise cybersecurity defensive strategies in order to enable operational effectives, defense, and command and control. Analyze network infrastructure in order to recommend methods and strategies that reduce and/or manage adverse impacts. Develop standards, metrics and measures … to support assessments, process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/ more »
to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary Responsibilities Provide analysis of architectures, technologies, DOD policy & information and critical data Develop cybersecurity and risk assessment methodologies and procedures to support prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies. Prepare and perform briefings appropriate for … senior leadership (i.e., general officer or flag officer) Conduct analysis of enterprise cybersecurity defensive strategies in order to enable operational effectives, defense, and command and control. Analyze network infrastructure in order to recommend methods and strategies that reduce and/or manage adverse impacts. Develop standards, metrics and measures … to support assessments, process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/ more »
to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary Responsibilities Provide analysis of architectures, technologies, DOD policy & information and critical data Develop cybersecurity and risk assessment methodologies and procedures to support prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies. Prepare and perform briefings appropriate for … senior leadership (i.e., general officer or flag officer) Conduct analysis of enterprise cybersecurity defensive strategies in order to enable operational effectives, defense, and command and control. Analyze network infrastructure in order to recommend methods and strategies that reduce and/or manage adverse impacts. Develop standards, metrics and measures … to support assessments, process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/ more »
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Lorien
££- Via Umbrella 6 months with potential extensions (or to go perm) Hybrid working - onsite in Edinburgh Office Variable shift patterns – (4 days on 4 days off/Day and Night shifts) With one of Lorien's top banking clients What more »
Role Overview This is a golden chance to demonstrate your technical skills and establish yourself within a leading Microsoft Gold Partner. They have been helping big names secure their businesses efficiently since the turn of the century, and now they more »
Join us on an 24 month programme which includes sponsorship to study for an industry recognised Level 4 CyberSecurity Technologist qualification, whilst building your business acumen. Role Develop your skills in all aspects of information and data security Work more »
together to minimise risk and shorten delivery times. Our team consists of highly-skilled cross-functional consultants, analysts, and support staff. ROLE: CyberSecurityAnalyst LOCATION: Northallerton, Hereford, Portsmouth, Corsham (On-Site) CLEARANCE: Must be DV Cleared As a Cyber Defence Analyst at Amber Labs, you … will be an integral part of our expanding security team tasked with designing, implementing, and maintaining operational cybersecurity measures. Your responsibilities will include proactive risk assessment, protective monitoring of priority C4IS/networks, and swift response to internal and external cyber threats and attacks. This role demands a diverse … in writing Defence/Government documentation. Desirable Qualifications: Broad Spectrum Cyber Course (SANS SEC401 or SEC501 or equivalent). SIEM Design, Architecture, and Analyst Course (SANS SEC455 or SEC555 or equivalent). Advanced Analyst Course (SANS SEC503 or equivalent). Benefits: Join a rapidly expanding startup more »
Senior CyberSecurityAnalyst Salary: Up to £55,000 Glasgow Hybrid: 2 Days a Week in the Office In this role will be responsible for implementing, developing, and executing security operations to protect users, infrastructure, and data from various threats. This role involves monitoring networks and systems, detecting more »
Senior CyberSecurityAnalyst Salary: Up to £55,000 Glasgow Hybrid: 2 Days a Week in the Office In this role will be responsible for implementing, developing, and executing security operations to protect users, infrastructure, and data from various threats. This role involves monitoring networks and systems, detecting more »
Senior CyberSecurityAnalyst – Salary circa £55,000 Are you someone who is passionate about CyberSecurity and looking for an excellent opportunity to use and expand your skills within a dedicated security advisory team? This role exists within Aviva’s CISO team and is responsible for carrying more »
Senior CyberSecurityAnalyst A leading finance company is looking to hire a Senior CyberSecurity Analyst. You would be responsible for; - Mentoring a team of cybersecurity analysts, ensuring optimal performance and productivity. - Collaborating with cross-fucntional teams to identify potential security risks and threats and implement … Back up and Recovery - Strong experience with Microsoft security products such as Defender and Sentinel. - Experience mentoring teams or leading teams. Senior CyberSecurityAnalystmore »
IT CyberSecurityAnalyst & Team Leader - CISSP or CySA+ or MSc Information Security Weymouth, Dorset, or London, South East UK or Stoke on Trent, Staffordshire £50,000pa + Hybrid & Flexi-Working & Training & Certifications Available Weymouth, Dorset, or London, South East UK, or Staffordshire + Hybrid and Flexible Working … as Standard The Client: Are a well-known High St and Online retailer who are seeking a Senior IT CyberSecurityAnalyst who specialises in Microsoft/Wintel Servers and Virtualisation supporting a UK wide infrastructure. Objective: You will Lead 2 x CyberSecurity Analysts, giving support to more »
companies worldwide, we are following our mission of revolutionizing the way IT is deployed around the globe. Job Overview The Senior CyberSecurityAnalyst supports and manages day-to-day SOC, personnel, projects and issues. This person is responsible for coaching and offering feedback to Analysts, as well more »
Helensburgh, Scotland, United Kingdom Hybrid / WFH Options
Lockheed Martin
Join our dynamic team as a CyberSecurityAnalyst (Change Control) based in Faslane, Helensburgh. Enjoy the flexibility of our 4xFlex working pattern, with a condensed 4-day workweek (Monday to Thursday) and the option for hybrid working, typically spending 2 days onsite. Key responsibilities: Streamline and enhance … SC). For further information, please visit UK Security Vetting Clearance Levels Required skills, qualifications and experience Proven track record as a CyberSecurityAnalyst, Change Control Analyst, or related role. Preferred certification: Certified Information Systems Security Professional (CISSP). Experience in Government/Ministry of more »
threats and issues are dealt with effectively. The role is hybrid and will require some onsite work across two sites. As our CyberSecurityAnalyst you will: Provide security and risk assessment consultancy on projects and other formal workgroups and committees, making appropriate recommendations for risk mitigation to more »