IT systems, applications and infrastructure, ensuring that compensating security controls and countermeasures are embedded in order to enhance security posture and resilience against cyberthreats, and provision of timely communication of key findings and recommendations to stakeholders. ● Enablement of DevSecOps (and shift left), by providing engagement channels for customers more »
with the NIST Cyber Security Framework (CSF). Conduct comprehensive risk assessments using the NIST CSF. Use risk management techniques to identify cyberthreats, risks and issues in a timely manner. Support, develop and conduct third-party vendor security assurance activities. Collaborate with cross-functional teams to develop more »
us: Innovative Work Environment : At Red Helix, innovation is in our DNA. We harness cutting-edge technology and forward-thinking approaches to tackle cyberthreats, ensuring that you are always equipped with the tools you need to excel. Our dynamic work environment encourages creativity and empowers you to explore … tangible impact on cybersecurity, helping businesses stay secure in an ever-evolving threat landscape. Adaptability and Agility : We thrive on adaptability and resilience. Cyberthreats are constantly evolving, and we rise to the challenge by staying agile and proactive. Join us in our mission to stay ahead of the … cybersecurity and build a brighter, more secure future. Apply now and embark on a transformative career journey with Red Helix! THE ROLE: The CyberThreat Analyst plays a vital role in proactively hunting for and analysing cyberthreats before they can harm our customers. You will be responsible more »
Ipswich. You will develop the security systems and policies within the organisation and will ensure that data, network, and systems are protected from cyberthreats and will comply with the relevant standards and regulations. You will develop security standards, best practices, and guidelines to support the cyber security more »
expectations are met Document meeting minutes Track and manage action logs, with actions completed within the required timeframe Stay current with the latest cyberthreats, security developments, and technologies to ensure our security operations continue to be effective and cutting-edge Experience required: Previous experience within a Service Delivery more »
within a Cyber Security Analyst Team as part of the SOC Service Desk. The SOC will triage, assess, and respond to potential cyberthreats through to resolution for customers. Participating in shifts for a 24hr service coverage rota including overnight & weekend hours. You will be monitoring and responding more »
Reigate, England, United Kingdom Hybrid / WFH Options
esure Group
a DevSecOps Engineer to join our team. You will be responsibility for protecting esure's information systems and networks from security breaches and cyberthreats by responding to security events, conducting improvements and assessments. What will my role entail? Key member of a multi-disciplined, high performing DevSecOps team more »
Cheltenham, Gloucestershire, South West, United Kingdom
Henderson Scott
position Gloucester/Cheltenham based - Mixture of Hybrid or On-site positions Excellent progression opportunities What You'll Do: Detect and respond to cyberthreats Implement cutting-edge security measures Conduct vulnerability assessments Work on secure government projects Required Experience In Some Of The Following: Strong knowledge of network more »
Directors). Digital forensics of relevant incident data (disk, volatile memory, network packets, log files). Maintaining a current view of the cyberthreat and being able to advise clients on the threat landscape and attacks which may be relevant to them. Manage the development of the firms in more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Smart DCC
knowledge of both AWS an Azure security controls and be able to design and implement all security controls In-depth understanding of the cyberthreat landscape and advances adversary tactics The role requires an expert knowledge and experience of Linux, Windows, Azure, AWS, Elastic Search, Vulnerability management and Mitre more »
security support for digital projects, ensuring robust technical controls and policy implementation. Conduct security assessments, manage risk, and advise on compliance to mitigate cyberthreats and reduce business impact. Champion best practices in both internal processes and external frameworks (e.g., GDPR, ISO 27001, PCI DSS, etc.) to enhance the more »
Greater London, England, United Kingdom Hybrid / WFH Options
Saepio Information Security
users. We help them to protect their employees, data, users, applications, and systems from being the victims of cyber-attack. As the cyberthreat landscape continues to evolve, Saepio is growing rapidly to meet the increasing demand for top-notch cybersecurity solutions. To support our growth, we are more »
Leeds, England, United Kingdom Hybrid / WFH Options
BlueVoyant
by CEO, Jim Rosenthal, BlueVoyant’s highly skilled team includes former government cyber officials with extensive frontline experience in responding to advanced cyberthreats on behalf of the National Security Agency, Federal Bureau of Investigation, Unit 8200, and GCHQ, together with private sector experts. BlueVoyant services utilize large more »
The role involves developing and implementing strategies to enhance the resilience of IT infrastructure, applications, and data against potential disruptions, including natural disaster, cyberthreats and hardware failures. From a capacity perspective, the role involves planning, analysing and optimising the utilisation of IT resourced to ensure optimal performance, scalability more »
standards, and procedures. Work with the Information Security team and CISO to assess and manage risks related to information security, including data breaches, cyberthreats, and system vulnerabilities. Reporting and Documentation Prepare risk assessment reports and presentations for senior management and the Board of Directors. Document risk management processes more »
Buckinghamshire, England, United Kingdom Hybrid / WFH Options
Chapman Tate Associates
with customers and the wider internal team on SOC analysis. Communicate incidents and findings clearly and concisely Stay up to date on emerging cyberthreats, vulnerabilities and trends. Learn and understand various tools and platforms - e.g. MS Defender, ExtraHop and Sentinel. This is a newly formed team which will more »
implementation of secure systems for both on-premises and cloud environments. Comprehensive understanding of security practices, including encryption, access controls, and incident management. Cyberthreat analysis and vulnerability management, with expertise in identifying potential attack vectors and implementing risk mitigation strategies. Security framework and compliance knowledge, such as ISO more »
month engagement to help safeguard the organization from emerging cyber threats. Key Responsibilities: Analyze intelligence from various sources Stay updated on cyberthreat trends Perform threat modeling Create threat intelligence briefings Disseminate actionable intelligence Qualifications: Proficient in intelligence analysis Skilled in crafting security alerts Versed in Security Operations more »
continuously improving our cybersecurity infrastructure and solutions. You will play a crucial role in protecting our organisation's networks, systems, and data from cyberthreats by developing and delivering a robust cyber defence strategy. You will have line management responsibility for 1 individual so previous management/team more »
continuously improving our cybersecurity infrastructure and solutions. You will play a crucial role in protecting our organisation's networks, systems, and data from cyberthreats by developing and delivering a robust cyber defence strategy. You will have line management responsibility for 1 individual so previous management/team more »
Greater Cardiff Area, United Kingdom Hybrid / WFH Options
Yolk Recruitment Ltd
prevent phishing and malware, and assist with DMARC compliance. Streamline operations by removing unnecessary processes, leveraging automation, and optimizing workflows. Stay updated on cyberthreats, vulnerabilities, and new technologies, and implement security measures to enhance the organization's capabilities. The experience you’ll bring to the team: Deep understanding more »
Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
yolk recruitment
prevent phishing and malware, and assist with DMARC compliance. Streamline operations by removing unnecessary processes, leveraging automation, and optimizing workflows. Stay updated on cyberthreats, vulnerabilities, and new technologies, and implement security measures to enhance the organization's capabilities. The experience you'll bring to the team: Deep understanding more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Smart DCC
knowledge of both AWS an Azure security controls and be able to design and implement all security controls In-depth understanding of the cyberthreat landscape and advances adversary tactics The role requires an expert knowledge and experience of Linux, Windows, Azure, AWS, Elastic Search, Vulnerability management and Mitre more »
implementation of secure systems for both on-premises and cloud environments. Comprehensive understanding of security practices, including encryption, access controls, and incident management. Cyberthreat analysis and vulnerability management, with expertise in identifying potential attack vectors and implementing risk mitigation strategies. Security framework and compliance knowledge, such as ISO more »
and incident response services received from all partner organisations with a focus on our Managed Security Service relationship (MSS).Manage the search for cyberthreats that may go undetected in our environment that have evaded our automated security tools and defences.Accountable for Cyber Security incident response management including more »