in a SOC or NOC environment. Strong hands-on experience with SIEM tools, specifically QRadar Solid understanding of incident response methodologies and DFIR principles. Knowledge of network traffic analysis, vulnerabilitymanagement, penetration testing, and malware reverse engineering. Familiarity with ITIL processes (Incident, Problem, Change). Strong written and verbal communication, with the ability to produce clear technical documentation More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Aberdeen
positive difference to the lives of our clients, customers, colleagues, shareholders and society. We are focused on growing our direct and advised wealth platforms and repositioning our specialist asset management business to meet client demand. We are committed to providing excellent client service, supported by leading technology and talent. Aberdeen comprises three businesses, interactive investor (ii), Investments and Adviser … others. Proactive strategic leadership, demonstrable skills in the design, communication and delivery of end user technologies. Ability to engage and communicate at all levels from technical SMEs to Executive Management Experience working in partnership with a Tier 1 Systems Integrator, in a blended model. Ability to quickly learn, implement and utilize new technologies. Technical Skills The candidate is expected … Enterprise Applications Solid understanding of Identity Governance & Administration within the context of a highly regulated environment. Azure Virtual Desktop Administration (inc Azure Networking) Experiencing working with Endpoint Configuration/Management & Application Delivery technologies such as Intune & MEM. Experience implementing IaC/DSC via Terraform to manage M365 & EntraID. Azure Virtual Desktop (inc Networking) Defender for Endpoint experience with vulnerabilityMore ❯
San Antonio, Texas, United States Hybrid / WFH Options
Novacoast Federal
strong foundation in cloud security. Proficiency in Python Scripting is highly preferred. Minimum of 3 years experience in spearheading security solutions in large-scale environments. A comprehensive grasp of vulnerabilitymanagement and various compliance standards. Adeptness with API-based security and compliance standards is highly valued. Knowledgeable in cloud networking, network security, virtualization, and cloud computing basics. Skillful … presenting solutions to leadership and customers. Preferred Experience: Hands-on experience with Palo Alto Prisma Cloud: 2+ years (Highly preferred) Strong Python scripting skills (Highly preferred) API configuration and management: 3+ years (Highly preferred) Cloud Security expertise: 3+ years Experience with Kubernetes: 3+ years Experience with other Cloud Security Posture Management (CSPM) tools: (Significant plus) Code Security knowledge More ❯
emerging attack techniques. Manage and optimise SIEM tools (Splunk, QRadar, Microsoft Sentinel). Develop SOC use cases, runbooks, and playbooks to improve response capability. Collaborate with IT, legal, and management teams during incident response. Support pre-sales, client demonstrations, and solution scoping for new opportunities. Contribute to continual service improvement and security tool enhancements Skills & Experience Strong background in … incident response, SOC operations, and security investigations. Hands-on expertise with SIEM tools (Splunk, QRadar, Microsoft Sentinel). Deep understanding of network traffic analysis, vulnerabilitymanagement, and penetration testing. Knowledge of DFIR principles, malware reverse engineering, and digital forensics. Familiarity with ITIL processes (Incident, Problem, Change). Experience with cloud platforms (AWS and/or Azure). More ❯
Chelmsford, Essex, South East, United Kingdom Hybrid / WFH Options
Keystream Group Limited
of ECCs information and cyber security strategy, ensuring alignment with their overall risk appetite and transformation goals. Oversee governance, risk, compliance, and security operations including incident response, threat intelligence, vulnerabilitymanagement, and penetration testing. Direct the selection, deployment, and maintenance of appropriate security technologies and processes to protect ECCs data and assets. You will be responsible for designing … effectively at senior and political levels. Experience in similarly complex environments, with an understanding of public sector culture and challenges. Deep expertise in cyber security governance, compliance, and risk management within complex organisations. A track record of developing and implementing enterprise-wide cyber and information security strategies aligned with business goals. Extensive knowledge of relevant legal, regulatory, and technical More ❯
you will: Secure CI/CD pipelines and infrastructure-as-code (IaC) deployments across Azure. Lead container, API, and web application security initiatives, including code reviews. Support threat modelling, vulnerabilitymanagement, and penetration testing activities. Drive logging integration with SIEM tools, enabling SOC monitoring and incident response. Coach engineering teams on cloud security principles and manage audit-related More ❯
is adequately designed, effectively operated (risk is managed)• Write up finding in a templated Word document, plus evidence (screenshots, URLs, )• Update the Excel test plan tracker with results• Notify management and the control representative of the test outcome Controls to be tested The following control domains are to be tested• Perimeter - Secure Networks and Devices; Threat monitoring and response … Malware protection; Physical security.• IBS/Critical apps - Change management; Secure Development; User Access Management.• Resilience/Preparedness - Service Continuity & Recovery Planning; Crisis Response; VulnerabilityManagement; Physical operational resilience.• Data - Rest and Transit Protection, Loss Prevention, Access, Accuracy and Completeness, Retention and Disposal.• Financial Control Framework (FCF) - User Access Management (non-IBS apps); other ITGC areas More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Lorien
responsible for managing and remediating security incidents, tuning SIEM alerts, supporting endpoint detection and response tooling, and contributing to post-incident investigations.You'll also play a key role in vulnerabilitymanagement, security reporting, and supporting the deployment and maintenance of security tooling across the estate. Working closely with the IT Security & Compliance Manager, you'll help shape the … support or working within a SOC/Security team Strong understanding of Microsoft O365/Azure Security, endpoint and email security tooling Familiarity with SIEM tools and IT Service Management platforms Knowledge of current and emerging cyber threats and security technologies Experience with vulnerability identification and remediation The Benefits: Salary up to £50,000 + bonus Hybrid working More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
Job overview: This is an opportunity to lead global Security Operations focused on safeguarding Arm's digital environment through exemplary threat detection, incident response, and vulnerabilitymanagement capabilities. This senior role, reporting directly into the CISO is accountable for driving the strategic direction of Arm's Detect & Response function, delivering outstanding performance and ensuring we are resilient against … an evolving threat landscape! In addition to operations, you will lead cyber crisis management, C-Suite level stress testing, team development, and top-level cybersecurity thought leadership. Responsibilities: Own and deliver the strategic roadmap for cyber incident and vulnerability detection & response in line with Arm's threat profile and business objectives. You will guide and develop a high … of enterprise security domains and how they can be used as a force multiplier for a technology business strategy, with the ability to influence at all levels. Extensive people management experience, fostering a culture focused on mentoring, wellbeing and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant security-related subject. Certifications such More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Found Talent Limited
experience managing IT security operations and driving improvements across infrastructure and processes? This Manchester based organisation is looking for a Security Manager to take ownership of information security, risk management and ongoing security enhancement activities. Youll work closely with Senior Leadership, leading key initiatives to protect systems, data and users while helping shape the organisations security posture. What youll … Essentials, ISO27001 or similar What youll need: Proven experience managing IT security or information security functions Strong technical knowledge of Microsoft environments and security controls Experience with incident response, vulnerabilitymanagement, and security risk mitigation Confident working with both technical teams and business stakeholders Solid understanding of security frameworks and compliance standards Ability to lead projects and drive … security improvements proactively Whats in it for you: A key management role focused on shaping and improving security within a collaborative IT leadership team Hybrid working Annual bonus and regular salary reviews Company pension scheme More ❯
of ITIL framework Demonstrable troubleshooting and problem resolution skills Strong experience of Microsoft Windows 11 support and installation Strong Microsoft Office and Office 365 skills Client patching and collection management using SCCM Active Directory and other account administration experience Strong documentation skills Experience working to Service Level Agreement targets Ability to use remote control tools and provide effective telephone … Windows 11 Microsoft AD Admin tools Palo Alto Global Protect Microsoft Office 365 Admin & Support SharePoint Microsoft Teams Collaboration Tools MFD s SAP Concur ePDQ Crowdstrike ED&R Qualys VulnerabilityManagement Microsoft System Center Configuration Manager 2016 InTune Mobile Device Management Banking systems including CitiDirect, Barclays.Net, ING Bespoke CRM and POS systems Windows Server Contact Centre as … person, team or service provider whilst ensuring the customer is communicated to effectively. Escalate Major Incidents or complaints as appropriate. Identify and report recurring incidents to BTS Service Desk Management team to prevent problems. Attend bi-weekly problem management meeting where required to represent the Service Desk, and Weekly CAB where required to present and represent Service Desk More ❯
Epsom, Great Burgh, Surrey, United Kingdom Hybrid / WFH Options
Dynamite Recruitment
of ITIL framework Demonstrable troubleshooting and problem resolution skills Strong experience of Microsoft Windows 11 support and installation Strong Microsoft Office and Office 365 skills Client patching and collection management using SCCM Active Directory and other account administration experience Strong documentation skills Experience working to Service Level Agreement targets Ability to use remote control tools and provide effective telephone … Windows 11 Microsoft AD Admin tools Palo Alto Global Protect Microsoft Office 365 Admin & Support SharePoint Microsoft Teams Collaboration Tools MFD’s SAP Concur ePDQ Crowdstrike ED&R Qualys VulnerabilityManagement Microsoft System Center Configuration Manager 2016 InTune Mobile Device Management Banking systems including CitiDirect, Barclays.Net, ING Bespoke CRM and POS systems Windows Server Contact Centre as … person, team or service provider whilst ensuring the customer is communicated to effectively. Escalate Major Incidents or complaints as appropriate. Identify and report recurring incidents to BTS Service Desk Management team to prevent problems. Attend bi-weekly problem management meeting where required to represent the Service Desk, and Weekly CAB where required to present and represent Service Desk More ❯
West London, London, England, United Kingdom Hybrid / WFH Options
Ashdown Group
genuine opportunity for progression A large West London based company is looking for an experienced Cyber Analyst/Engineer to join its IT function. Duties will include: - BAU cyber vulnerabilitymanagement and incident response - Cyber security projects and working with the wider group/external vendors to deliver security requirements - Focus on delivering Cyber Essentials Plus and ISO27001 … Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Support ongoing improvements to internal defence - Oversee policies and procedures - Audits To be considered suitable you will need the following skills and experience: - Experience in either a Cyber Analyst or Cyber Engineer role - SC Cleared/Clearance - Experience in network audits and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ashdown Group
genuine opportunity for progression A large West London based company is looking for an experienced Cyber Analyst/Engineer to join its IT function. Duties will include: - BAU cyber vulnerabilitymanagement and incident response - Cyber security projects and working with the wider group/external vendors to deliver security requirements - Focus on delivering Cyber Essentials Plus and ISO27001 … Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Support ongoing improvements to internal defence - Oversee policies and procedures - Audits To be considered suitable you will need the following skills and experience: - Experience in either a Cyber Analyst or Cyber Engineer role - SC Cleared/Clearance - Experience in network audits and More ❯
Newport, Gwent, United Kingdom Hybrid / WFH Options
Yolk Recruitment Ltd
into asset security while managing a small team of technical analysts and overseeing supplier relationships to drive successful outcomes. What You'll Bring: Proven experience in IT asset and vulnerabilitymanagement In-depth knowledge of asset discovery tools, vulnerability scanning and remediation techniques Solid understanding of the differences between IT and operational technology environments Awareness of attacker More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Exertis
our security policies, procedures and controls. As part of the team, youll: Oversee the implementation and enforcement of security policies, standards and tools including endpoint protection, SIEM, SOC and vulnerabilitymanagement systems. Conduct risk assessments and threat modelling, maintaining the IT risk register and supporting the deployment of security controls, aligned with regulatory and business requirements. Lead incident … such as SIEM, IDS/IPS, endpoint protection and encryption is desirable. Experience with auditing A natural ability to build rapport with clients and colleagues. Strong communication and relationship management skills. Your Rewards and Benefits: We recognise and celebrate hard work at Exertis. When you join us, youll enjoy: 25 days of annual leave, with the option to purchase More ❯
translate them into technical controls, policies and run books. Audit & pen test lead - Coordinate external auditors, manage evidence collection, track remediation tickets and present technical posture to stakeholders. Threat & vulnerabilitymanagement - Run container image scanning (Snyk), dependency SBOM generation and orchestrate patch cycles across clusters. Incident readiness - Own on call playbooks, drill tabletop exercises, ensure logs/metrics … deep dive of existing CI/CD, Terraform and security policies. Shadow DPO on open compliance items to build context. Within three months, you will Lead the next quarterly vulnerability scan and deliver remediation plan. Introduce SBOM + container image scanning gates to GitHub Actions. Publish updated incident response runbook and run a tabletop drill. Within six months, you More ❯
translate them into technical controls, policies and run books. Audit & pen test lead - Coordinate external auditors, manage evidence collection, track remediation tickets and present technical posture to stakeholders. Threat & vulnerabilitymanagement - Run container image scanning (Snyk), dependency SBOM generation and orchestrate patch cycles across clusters. Incident readiness - Own on call playbooks, drill tabletop exercises, ensure logs/metrics … deep dive of existing CI/CD, Terraform and security policies. Shadow DPO on open compliance items to build context. Within three months, you will Lead the next quarterly vulnerability scan and deliver remediation plan. Introduce SBOM + container image scanning gates to GitHub Actions. Publish updated incident response runbook and run a tabletop drill. Within six months, you More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
of experience in application security or secure software development. Strong knowledge of OWASP Top 10, secure coding principles, and threat modelling. Hands-on experience with SAST, DAST, SCA, and vulnerabilitymanagement tools. Familiarity with cloud platforms (Azure or AWS), CI/CD pipelines, and DevOps processes. Strong communication skills and the ability to collaborate effectively across teams. Understanding More ❯
Washington, Washington DC, United States Hybrid / WFH Options
OMW Consulting
Administer and optimize cloud environments (AWS), ensuring scalability and high availability. Manage containerized applications with Docker, Kubernetes, and EKS. Develop and maintain automation scripts and tools using Python. Perform vulnerabilitymanagement, security assessments, and incident response. Collaborate with software engineering teams to integrate security throughout the SDLC. Conduct compliance reviews, audits, and continuous monitoring. Provide technical guidance and More ❯
s ecurity controls mapping and c ompliance checking automation MoD Cyber Operations: SOC tool evaluation support, SIEM use case development, Metrics and reporting frameworks, and Technology integration assessment. Cyber Vulnerability Investigations Identity & Access: IAM architecture reviews, p rivileged access solutions, authentication technology assessment, and Zero Trust implementation planning OT Security OT Risk Assessment/Assurance and OT VulnerabilityManagement Key Strengths Detail-oriented with a strong focus on quality Well-organised and committed to developing customer service skills Enthusiastic about working in a team environment while developing individual capabilities 25 days of Annual leave + an option to purchase more through our Flexible Benefits Flex benefits system - exciting opportunity to choose your own benefits Pension - matching More ❯
implementation, and maintenance of IAM solutions, including integration with other systems and applications. Support the development and enforcement of IAM policies and procedures. Participate in access control and identity management activities. Supporting the monitoring and analysis of access management systems, including investigation and resolution of issues. Participating in IAM-related audits and compliance activities. Supporting the documentation of … looking for team members who are at the early stages of their career who also want to grow and learn more. We will provide further training in Cloud Security, VulnerabilityManagement, Agile Security methodology and more, so you gain hands-on experience in areas you are not yet experienced in in a safe environment with empathetic and supportive More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
implementation, and maintenance of IAM solutions, including integration with other systems and applications. Support the development and enforcement of IAM policies and procedures. Participate in access control and identity management activities. Supporting the monitoring and analysis of access management systems, including investigation and resolution of issues. Participating in IAM-related audits and compliance activities. Supporting the documentation of … looking for team members who are at the early stages of their career who also want to grow and learn more. We will provide further training in Cloud Security, VulnerabilityManagement, Agile Security methodology and more, so you gain hands-on experience in areas you are not yet experienced in in a safe environment with empathetic and supportive More ❯