malicious behavior, suspicious activities, or known attack patterns. Implement proactive measures to detect and prevent malware, ransomware, phishing attempts, and other types of cyberthreats from compromising endpoints. Configure security policies and rules to enforce access controls, encryption, and other security measures to protect sensitive data on endpoints. Incident more »
organization. Collaborate with senior management to establish product cyber security goals, policies, and procedures aligned with business objectives. Stay current with evolving cyberthreats and industry best practices to ensure the organization's readiness and resilience. Team Leadership: Matrix management of a diverse team of product cybermore »
will be instrumental in providing Cyber Security services globally, focusing on driving the Cyber Assurance programme to reduce the bank’s cyberthreat landscape and ensure robust "Business As Usual" cyber assurance processes. Key Responsibilities: Cyber Test and Validation Management: Oversee the Cyber Test more »
by CEO, Jim Rosenthal, BlueVoyant’s highly skilled team includes former government cyber officials with extensive frontline experience in responding to advanced cyberthreats on behalf of the National Security Agency, Federal Bureau of Investigation, Unit 8200, and GCHQ, together with private sector experts. BlueVoyant services utilize large more »
role as this vendor looks to expand their offerings across the UK and Central Europe. We are looking for someone with experience in cyberthreat intelligence sales who has taken ownership of the entire sales process, from cradle to grave. We are looking to speak with problem solvers and more »
the operational technology (OT) aspects of our nuclear projects. This role focuses on safeguarding the Instrumentation & Control (I&C) systems at HPC from cyberthreats during storage, installation, and commissioning phases. Key Responsibilities: Implement and lead the OT Commissioning Security Plan according to I&C Site Security Arrangements Guidance. … for SC Clearance (Non-UKResidents cannot be considered) Degree in a related field or substantial relevant experience. Strong knowledge of OT risk management, cyberthreats, and I&C systems operations. Expertise in information security standards like ISO27000, NCSC, GDPR, and ICS standards such as IEC 62443, NIST SP. Ability more »
monitoring, threat monitoring and response activities. You'll also provide guidance in the event of escalations to help ensure Legal and General’s cyberthreats are monitored and managed effectively. If you're looking for an exciting new step in your career where you'll be supported in your … IDs/IPS and SIEM tools You'll also be well versed in security concepts such as threat vectors, event and incident management, cyberthreats and attacks etc. Experience with security device management and SIEM solutions Experience in global delivery operations support model (e.g. 24-7/ more »
Greater London, England, United Kingdom Hybrid / WFH Options
itecopeople
Head of Information Security About the client . Join a prestigious institution in the heart of London, recognised for its commitment to excellence and innovative research. Their Information Technology Services (ITS) department is an integral part of their Professional Services more »
Neogen are excited to be working with one of Scotlands largest companies who are in the process of building a new Cyber Security division. Role Description Integrated into an active and ambitious global cyber security function, contributing to more »
Cloud Engineering Manager Join a leading financial services firm in the City embarking on a Cloud First transformation programme. As the Cloud Engineering Manager you will play a key role in delivering fully automated and scalable solutions. Key Responsibilities: Automate more »
Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyberthreats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN … targeting the customer agency and organize threat hunts around ATT&CK techniques and sub-techniques. Responsible for maintaining a comprehensive understanding of the cyberthreat landscape, including identifying and analyzing cyberthreats actors and/or activities to enhance cybersecurity posture of the organization's IT operating environment. … Will conduct cyberthreat analysis, identifying mitigation and/or remediation courses of action; developing actionable intelligence used to protect organizational IT assets; and trending cyberthreat metrics for leadership situational awareness. Analyze host, network, and application logs in addition to malware and code. Will be responsible for more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
detection, fostering a culture of continuous improvement, innovation, and excellence, Collaborate with the Group IT team to ensure the organisation is protected against cyberthreats and maintain an effective incident response plan, Play a pivotal role in ensuring the security of Tunstall's SaaS products, Identify, review, select, and more »
problems for our clients. Join our engineering teams that build massively scalable software and systems, architect low latency infrastructure solutions, proactively guard against cyberthreats, and leverage machine learning alongside financial engineering to continuously turn data into action. Create new businesses, transform finance, and explore a world of opportunity more »
understanding of offensive security services and operations. The position mandates an individual possessing robust technical proficiency and up-to-date awareness of prevailing cyberthreats, who can adeptly integrate and implement these technical tenets within a corporate environment. Consequently, the candidate should possess the capacity to translate technical understanding more »
About this Role Role Title: Threat & Vulnerability Lead Location: UK- London La Fosse Associates are working with a global Insurance business who are looking to add a Threat & Vulnerability Lead to their strong internal security function. You will report directly more »
handling methodologies and best practices. Familiarity with network security monitoring tools, intrusion detection/prevention systems, and forensic analysis tools. Knowledge of common cyberthreats and attack vectors, including malware, phishing, and ransomware. Relevant certifications such as GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), or more »
Work on securing electronics and hardware systems from cyberthreats An exciting opportunity to join a high-calibre team of scientists and engineers working to meet the challenges to national security presented by modern cyber threats. This is a position that will utilise your knowledge and practical skills more »
a genuinely elite Algo-Trading firm. Key Responsibilities Build out and fine-tune internal security infrastructure to protect against both internal and external cyberthreat actors. Building, developing and deploying large scale security solutions. Working with wider engineering and technology teams to ensure security is incorporated at all stages more »
London, England, United Kingdom Hybrid / WFH Options
Control Risks
In this role you will be responsible for conducting desktop research into cyber and online threats, to enrich our CyberThreat Intelligence reporting. This role will primarily involve contributing regular reporting for Control Risks' clients that subscribe to our intelligence platform, as well as supporting on and eventually … sources of information and develop capabilities to collect and analyse information in support of the team. Demonstrate strong investigation skills relating to specific cyberthreat incidents, data breaches and other cyber security incidents. Build knowledge of collection tools to support bespoke investigative projects and Cyber Incident Response … security principals e.g. MITRE ATT&CK, the unified kill chain, the intelligence life cycle Be alert to the political implications of developments among cyberthreat groups and bring these to the attention of other service lines. Contribute analysis for subscription updates. Marketing and Business Development Support business development by more »
My new Higher Education Client is seeking a talented and experienced Cyber Security Manager to lead our cyber security team and safeguard our organization's digital assets. As a Cyber Security Manager, you will play a critical more »
and IP of the organization in the area of datacenter consolidation, hybrid cloud transformation, public cloud migration, modern workplace transformation, software defined networks, cyberthreat analytics and next generation SRE operations. Candidate should demonstrate a practitioner articulation of industry trends in these areas, key tenets and metrics that will … technologies and tools in order to recommend frameworks like datacenter consolidation, hybrid cloud transformation, public cloud migration, modern workplace transformation, software defined networks, cyberthreat analytics and next generation SRE operations that can be used for solution creation. Experience in transition, transformation program management and organization change management methodologies more »
Azure Platform Engineer Location: London City Reference: NRPE Azure Platform Engineer Join a leading financial services firm in the City embarking on a Cloud transformation programme. As an Azure Platform Engineer, you'll play a key role in delivering fully more »
Work on securing electronics and hardware systems from cyberthreats An exciting opportunity to join a high-calibre team of scientists and engineers working to meet the challenges to national security presented by modern cyber threats. This is a position that will utilise your knowledge and practical skills more »
Preston, Lancashire, North West Hybrid / WFH Options
BAE Systems
skills using Microsoft KQL language Leading, including line management of a new team to help safeguard BAE Systems UK enterprise IT infrastructure against cyberthreats through the configuration, installation and maintenance of Cyber Security Technical Control Software solutions and compensating controls To proactively install, manage and update hardware more »
delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised more »