Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Michael Page
Ensure security controls are in-place based on ISO27001 and NIST As the regional security representative in the global Security/Technology project Lead/execute phishing campaign Conduct vulnerability assessments and implement measures to mitigate potential risks. Involve in global security operations process, analysis and escalate security alerts/tickets from global SOC team Maintain and update security More ❯
Cheshire, England, United Kingdom Hybrid / WFH Options
Morgan Law
IT Security Manager, wider IT team, and third-party partners to ensure security best practices are maintained across their cloud and on-premise environments. Key Responsibilities Conduct threat and vulnerability assessments and recommend remediation steps Support the investigation of security incidents and policy violations Assist with risk assessments and security audits Implement and maintain security standards, and guidelines Work More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
knowledge of cybersecurity who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and More ❯
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
tools such as Wiz, Prisma Cloud, Ermetic, and CrowdStrike for continuous security posture monitoring. Implement RBAC, MFA, and Zero Trust principles to strengthen identity and access control mechanisms. Conduct vulnerability assessments and remediation using tools like Nessus, Tenable, Qualys, and Trivy. Ensure compliance with industry frameworks and regulations (ISO 27001, NIST 800-53, PCI DSS, HIPAA, FedRAMP, CJIS). More ❯
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Tate Milton Keynes
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
Employment Type: Full-Time
Salary: £50,000 - £60,000 per annum, Negotiable, Inc benefits, OTE
Network architecture, including firewalls, VPNs, and segmentation. Identity and Access Management (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments, penetration tests, and threat modelling. Review and approve technical designs and solution architectures from a security standpoint. Assurance, Compliance, and Audit Develop and maintain the IT Security Assurance More ❯
Network architecture, including firewalls, VPNs, and segmentation. Identity and Access Management (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments, penetration tests, and threat modelling. Review and approve technical designs and solution architectures from a security standpoint. Assurance, Compliance, and Audit Develop and maintain the IT Security Assurance More ❯
Knutsford, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
environments Manage secure configurations, access controls, and CI/CD workflows in GitLab Integrate and protect telemetry tools such as Cribl, Elastic, Splunk, Fluentd, and Syslog Perform threat modelling, vulnerability assessments, and risk analysis for the pipeline Partner with DevOps to embed security into infrastructure-as-code and deployment processes Monitor and respond to security events, maintaining clear documentation More ❯
Cyber Security Engineer to join their Service and Support team. The role involves designing and securing OT networks across various critical industries, conducting advanced threat analysis, penetration testing, and vulnerability assessments. The engineer will develop and implement cybersecurity solutions, lead risk mitigation efforts, mentor junior team members, and support project management and business development activities. The position requires travel More ❯
Configure and maintain routers, switches, wireless systems, and firewalls. Deploy scalable, high-performance network solutions with minimal downtime. Conduct regular network maintenance, updates, and upgrades. Perform security audits and vulnerability assessments. Respond to and mitigate network security incidents. Automate network tasks and processes using scripting tools. Maintain comprehensive network documentation and diagrams. Collaborate with IT teams and third-party More ❯
Configure and maintain routers, switches, wireless systems, and firewalls. Deploy scalable, high-performance network solutions with minimal downtime. Conduct regular network maintenance, updates, and upgrades. Perform security audits and vulnerability assessments. Respond to and mitigate network security incidents. Automate network tasks and processes using scripting tools. Maintain comprehensive network documentation and diagrams. Collaborate with IT teams and third-party More ❯
behaviour or policy violations Investigate and manage security incidents, carrying out root cause analysis and reporting Deploy, configure, and maintain key security platforms used by the analyst team Conduct vulnerability assessments and coordinate remediation activities Support patch management and compliance reporting Perform regular reviews and health checks on security controls Create and enhance measures to demonstrate the effectiveness of More ❯
behaviour or policy violations * Investigate and manage security incidents, carrying out root cause analysis and reporting * Deploy, configure, and maintain key security platforms used by the analyst team * Conduct vulnerability assessments and coordinate remediation activities * Support patch management and compliance reporting * Perform regular reviews and health checks on security controls * Create and enhance measures to demonstrate the effectiveness of More ❯
Cloud platform, providing stability and policies and procedures. Support the development and delivery of a comprehensive ISP for the entire organization. Perform periodic and on-demand system audits and vulnerability assessments of systems, internal applications and Cloud services to identify security vulnerabilities. Monitor compliance with the organization's information security policies and procedures among employees, contractors and third parties. More ❯
Lead efforts in developing, enforcing, and reviewing information security policies and procedures Monitor network traffic for unusual activity using SIEM tools and respond to security alerts and incidents Conduct vulnerability assessments and coordinate remediation efforts across relevant platforms Help deploy network hardware and software with a security-first approach Stay current on emerging threats, vulnerabilities, and industry trends; recommend More ❯
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
london (city of london), south east england, united kingdom
RiverSafe
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯