Chesterfield, England, United Kingdom Hybrid / WFH Options
Logiq
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM More ❯
Wakefield, England, United Kingdom Hybrid / WFH Options
Logiq
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM More ❯
Telford, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Chester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Basildon, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Lincoln, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Wolverhampton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Ipswich, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Worcester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Peterborough, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Shrewsbury, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Luton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Swindon, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Bolton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Hounslow, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
London, England, United Kingdom Hybrid / WFH Options
MUFG
global Information Security Standards and Procedures (ISSP) requirements and local security requirements. The department deploys, supports and monitors security solutions such as virus protection, vulnerability management, compliance monitoring and threat/incident management activities to reduce risk. NUMBER OF DIRECT REPORTS 1-2 MAIN PURPOSE OF THE ROLE To manage the technical delivery of various cybersecurity projects and contribute … Demonstrable proficiency in a wide range of information IT security technologies and embedded security; at the minimum knowledge must cover key cybersecurity domains such as Identity and Access Management, ThreatIntelligence, Risk Evaluation, Security Assessment/Testing, Incidence Management and Vendor/Cloud products assessment Possessing high level of analytical ability where problems are typically unusual and difficult More ❯
practices. Solid technical knowledge and experience on security technologies (like Endpoint protection, Mobile Security, Data Protection, Cloud Security, etc.) and on cyber security capabilities (SIEM, SOC, CERT, Vulnerability Management, Threatintelligence etc.) Strong knowledge of main Information Security standards and frameworks (ISO27001, ISO22301, ISF, NIST, COBIT.) Good background in information management, with clear understanding of the challenges of More ❯
Stone, Staffordshire, England, United Kingdom Hybrid / WFH Options
Oscar Technology
and triage security alerts from SIEM and EDR platforms. Investigate potential security incidents and escalate as needed. Analyse logs from various systems including firewalls, endpoints, and cloud environments. Support threatintelligence efforts by identifying indicators of compromise (IOCs). Document triage actions, observations, and escalations clearly and accurately. Assist in fine-tuning detection rules to reduce false positives More ❯
deliver solutions to gain visibility of security events within our environment. Build new or develop existing event correlation, reporting and remediation capabilities based on advanced monitoring use cases, external threatintelligence, and known traffic patterns. Regularly review Audit Logs to recognise both normal and abnormal activity. Responsibilities: Develop and enhance security policies, processes, procedures and technical controls to More ❯
Crawley, England, United Kingdom Hybrid / WFH Options
Thales
Response and Recovery Planning: Oversee incident response strategies, including the establishment of playbooks, workflows, and escalation procedures to improve response times and overall effectiveness. Collaborate with clients to enhance threat detection, response, and reporting mechanisms, ensuring they are equipped to mitigate evolving cybersecurity risks. Provide guidance on managing and recovering from cybersecurity incidents to minimize downtime and operational impact. … on knowledge of SIEM platforms and technologies, such as Splunk, QRadar, Google, LogRhythm and SolarWinds. Solid understanding of EDR, MDR and XDR technologies and processes. Extensive experience of integrating ThreatIntelligence, Automation tools and AI capability into SOC environments. Strong analytical skills with the ability to evaluate complex technical issues and devise effective solutions. Excellent communication and presentation More ❯
London, England, United Kingdom Hybrid / WFH Options
Police Digital Service
remediation of identified vulnerabilities. Lead the security working group for specified national capabilities. Apply and implement Secure by Design principles. Monitor systems for anomalies or unusual events, and use threatintelligence sources to identify security incidents and coordinate with relevant stakeholders for a swift resolution. Enhance the security culture within the national Policing services by promoting best practices More ❯