Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Swindon, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Luton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Bolton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Hounslow, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
London, England, United Kingdom Hybrid / WFH Options
S-RM
role in maintaining and evolving S-RM's information security. Key Responsibilities: Improve and implement development pipeline security features, such as SAST and DAST Manage, monitor and improve compliance, vulnerabilitymanagement, threat intelligence, detection/prevention tools across a multi-cloud environment. Provide expert security design and engineering guidance on complex cloud security challenges and risks. Defining the … experience of the Software Development Life Cycle and Agile frameworks. Fostering a positive culture of security with end users, engineers, developers, product managers. Excellent communication, teamwork, presentation and stakeholder management skills. The successful candidate must have permission to work in London by the start of their employment. Our benefits We offer thoughtful, balanced rewards and support to help our More ❯
at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetration testing and vulnerabilitymanagement Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why Join? Be at More ❯
City of London, London, United Kingdom Hybrid / WFH Options
FIND | Creating Futures
at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetration testing and vulnerabilitymanagement Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why Join? Be at More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Smart DCC
share information, coordinate responses, and improve inter-team relationships. Previous experience within a Security Operations role. Exposure to key security technologies, such as IDS, Web content filters, AV, SIEM, VulnerabilityManagement, Firewalls, and awareness of their purpose in a layered security approach alongside analysing their outputs for security anomaly detection. In-depth understanding of the cyber threat landscape … applications such as AWS, Azure, Office 365, & Defender. Must have the ability to gain and hold HMG Security Clearance at “Security Check” (SC) level. 3 years plus security incident management experience. About the DCC: At the DCC, we believe in making Britain more connected, so we can all lead smarter, greener lives. That desire to make a difference is More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
BAE Systems
them, and triaging results independently. Having knowledge of attacker TTPs and APT groups, conducting in-depth research. Verifying and refining Threat Hunt queries based on results. Incident Response and Management experience. Ensuring high-quality Threat Hunt Reports and effective documentation. Providing analysis, context, and predictions in deliverables. Assessing and improving the client's threat maturity, developing and delivering improvements. … source research skills. High-level knowledge of Windows, Azure, networking, and cloud platforms. Non-Technical: Bachelor’s in Cybersecurity, Computer Science, or equivalent. Experience in SOC, Threat Intelligence, or Vulnerability Management. Strong communication skills for technical and non-technical audiences. Team player, self-motivated, and capable of mentoring. Desirable Qualifications: Degree in Cyber Security or related. SANS, CySA+, CREST More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
American Systems Corporation
team. As a Junior Cyber Operations Analyst, you will gain hands-on experience across the full spectrum of enterprise Cyber Operations-including incident response, log monitoring and analysis, and vulnerability management. This position is hybrid. Responsibilities Collaborate with experienced engineers, work with cutting-edge cloud security technologies, and actively contribute to strengthening our organization's security posture. Monitor and … triage security alerts in a Security Operations Center (SOC) environment. Endpoint Detection & Response (EDR): Investigate and respond to endpoint alerts. Sandbox Detonation: Analyze suspicious files for potential malware. Vulnerability Scanning: Run scans, review results, and coordinate patching with relevant teams. Email Advanced Threat Protection: Investigate and respond to email security incidents. Information Protection: Support implementation and monitoring of data More ❯
London, England, United Kingdom Hybrid / WFH Options
NCC Group
Position Title: Vulnerability Analyst Location: Manchester/London/Cheltenham/Hybrid Role Purpose: This is an exciting opportunity to join a dynamic security solutions team in which you will be responsible for the management and delivery of client security programs. As part of a passionate delivery team, you should have a strong passion for IT security and … a customer-centric approach to providing high-quality service to our clients. Solid experience of running Vulnerability Exposure Management programs is essential. Summary: This is an opportunity to work in a fun and challenging environment, using market leading security testing tools and platforms to provide security testing services to our large client base. You will play a key … department as well as assist with the development of new service lines offered by the company. Client Security Programs: Design and set up security programs tailored to client requirements. Vulnerability Scans: Conduct network and application vulnerability scans. Validation: Manually verify vulnerabilities identified in scans. Reporting: Write and deliver comprehensive client reports. Client Support: Work directly with clients on More ❯
Epsom, England, United Kingdom Hybrid / WFH Options
Toyota Financial Services, KINTO and KINTO JOIN
the necessary technology, applications, and services), Guide (assist the business through change using expertise), and Guard (protect the business). What you’ll be doing: Supporting IT Services (Incident Management/Request Fulfilment): Ensure all incidents and service requests are logged, accurately identified, categorized, prioritized, diagnosed, and managed using the Service Desk IT service management tool, with clear … closure. Maintain detailed, accurate, and consistent records of calls and keep customers informed. Collaborate with third parties and colleagues to investigate, diagnose, analyze, and resolve issues promptly, following incident management procedures. Refer unresolved requests to appropriate teams or service providers, ensuring effective communication with the customer. Escalate Major Incidents or complaints as necessary. Change Management/Problem Management/Project Management: Identify and report recurring incidents to prevent future problems. Participate in bi-weekly problem management meetings and weekly CAB meetings to represent the Service Desk, communicate changes, and obtain stakeholder approval. Utilize project management methodologies and agile practices to improve communication and planning for service developments or changes. Act as a Service Desk More ❯
Epsom, England, United Kingdom Hybrid / WFH Options
Toyota Financial Services (UK) PLC
services it needs), Guide (guiding the business through change using expertise and experience) and Guard (always protect the business). What you'll be doing: Supporting IT Services (Incident Management/Request Fulfilment): Ensure all incidents and service requests are successfully logged and accurately identified, categorised, prioritised, diagnosed and managed in the Service Desk IT service management tool … Work with third parties and colleagues to investigate, accurately diagnose, analyse & resolve issues and service interruptions and to resume normal service as soon as possible, following the approved incident management process Refer all requests that cannot be directly resolved at Service Desk level to the appropriate person, team or service provider whilst ensuring the customer is communicated to effectively … Escalate Major Incidents or complaints as appropriate Change Management/Problem Management/Project Management: Identify and report recurring incidents to BTS Service Desk Management team to prevent problems Attend bi-weekly problem management meeting where required to represent the Service Desk Attend Weekly CAB where required to present and represent Service Desk changes whilst More ❯
London, England, United Kingdom Hybrid / WFH Options
Pioneer Search
cloud environment. Your primary focus will involve two key projects around the generational cloud migration to Azure based services, as well as driving best practice I Identity and Access Management and defining the organisations cloud security policies. While there is some direct leadership, hands on ability to take ownership of a global infrastructure estate that spans cloud, on-prem … to move faster, smarter, and with confidence. Responsibilities: Lead the shift to a secure, cloud-first infrastructure Owning the security strategy: zero-trust, Oversee global IT operations and lifecycle management Strengthen security controls and ensure regulatory compliance Manage vendor performance and service delivery Drive continuous improvement across platforms and processes Technical Skills: Security frameworks: ISO 27001, NIST, CIS SIEM … endpoint protection, vulnerabilitymanagement ITIL-based service management and automation Leadership Skills Proven ability to lead IT operations and transformation projects Strong vendor and budget management experience Resilience in high-pressure environments with a security-first mindset Excellent communication across technical and non-technical audiences Why this is a great opportunity: Lead a team through a More ❯
Central London, London, England, United Kingdom Hybrid / WFH Options
GreatFind Recruitment
goals, and ensure robust governance across information security and operational practices. Key Responsibilities: Develop and implement a comprehensive GRC framework across the group Conduct regular risk assessments and support vulnerabilitymanagement Maintain and evolve security controls, policies, and standards Ensure compliance with GDPR, CIS18, PCI DSS, and ISO27001 Lead on third-party audits and provide documentation and evidence … of risk awareness through training and communication Monitor changes in regulation and adapt the GRC framework accordingly Ideal Candidate Profile: Minimum 5 years' experience in GRC, compliance, or risk management Solid understanding of regulatory frameworks and industry standards Hands-on experience with risk assessments and compliance auditing Strong communication and stakeholder engagement skills Professional certifications such as CISSP, CISM More ❯
Marlow, England, United Kingdom Hybrid / WFH Options
Softcat Plc
Softcat's business continues to grow and evolve, so have the risks and the regulatory landscape. In response, Softcat Plc has recognised the need to further strengthen its Risk Management and Internal Controls and has created a second line Risk and Assurance function to strengthen the overall three lines model and improve the way in which risks are identified … managing and enhancing the IT and Information Security risk landscape. Reporting directly to the Head of Risk and Assurance, you will play a key role in embedding effective risk management practices across Softcat's technology and cybersecurity domains. As a Risk & Assurance Manager, you'll be responsible for: Partnering with senior IT, Security, and business leaders to embed risk … management practices into operational processes and strategic initiatives. Owning and maintaining IT Risk and Control Matrices (RCMs) , ensuring they remain current, comprehensive, and aligned with industry standards and audit expectations. Reviewing effectiveness of first line functions in testing and validation of key IT controls (e.g., access management, change control, incident response, vulnerabilitymanagement), ensuring effectiveness and More ❯
London, England, United Kingdom Hybrid / WFH Options
MUFG Americas
rewarded. OVERVIEW OF THE DEPARTMENT/SECTION IT Risk, Security & Control department covers cyber security strategy maintenance and tactical planning and operations to provide IT Security protection, governance, risk management and reporting. This includes promoting the global Information Security Standards and Procedures (ISSP) requirements and local security requirements. The department deploys, supports and monitors security solutions such as virus … protection, vulnerabilitymanagement, compliance monitoring and threat/incident management activities to reduce risk. NUMBER OF DIRECT REPORTS 1-2 MAIN PURPOSE OF THE ROLE To manage the technical delivery of various cybersecurity projects and contribute to the overall success of the Cybersecurity programme function by: Ensuring that projects are delivered according to scope, on time and … etc. Demonstrable proficiency in a wide range of information IT security technologies and embedded security; at the minimum knowledge must cover key cybersecurity domains such as Identity and Access Management, Threat Intelligence, Risk Evaluation, Security Assessment/Testing, Incidence Management and Vendor/Cloud products assessment. Possessing high level of analytical ability where problems are typically unusual and More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
BT Group
with expertise in Elasticsearch to join our dynamic team. As a SIEM engineer, you will play a critical role in designing, developing, and maintaining our security information and event management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threat detection, incident response, and overall security posture. This role is hybrid (3 days in … Logstash: Design, develop, and maintain data pipelines using Logstash, part of the Elastic Stack. Automate data ingestion, transformation, and loading tasks. Beats for Data Collection: Agent and Agent Policy Management: Proficiency in configuring and managing agents, including setting up agent policies for various operation systems. Ensure seamless data flow from endpoints to the Elastic Stack. Data Cleaning and Enrichment … Collaborate with data analysts to create meaningful search experiences. Database Architecture and Scaling with Elasticsearch: Optimize data storage and retrieval mechanisms within Elasticsearch clusters. Implement sharding, replication, and index management strategies. End-to-End Solution Delivery: Expertise in taking ownership of a requirement from start to finish, including gathering detailed requirements, designing, and implementing robust, innovative solutions. Experience Required More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Nigel Frank
candidates across the UK, with travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerabilitymanagement and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security assessments and maintain compliance. Requirements More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing Ltd
months, Inside IR35 £400-£450 per day Edinburgh Financial Services A small Edinburgh Financial Services organisation is currently seeking an experienced Information Security Analyst with a strong background in vulnerabilitymanagement , to join their team on an initial 6 month Contract & working from their office based in Edinburgh (hybrid). The Contract will involve assessing vulnerability reports … and collaborating with cross-functional teams to ensure timely mitigation & to be successful, key knowledge & experience should include: Recent experience working as an Information Security Analyst, Security Engineer or Vulnerability Analyst with strong experience with complex information security projects . In-depth knowledge & expertise of Information Security standards, technologies & methodologies etc (e.g., ISO27001 ). Strong grasp of security best … practices , risk management , and compliance . Particular focus on VulnerabilityManagement utilising SAST/DAST tools , especially Tenable . Familiarity with Azure DevOps for tracking work items. Ability to work independently and in agile teams. Excellent communication and stakeholder management skills are a must as always. Any formal certifications like CISA, CISM , or ISO27001 Lead Implementer More ❯
Reading, England, United Kingdom Hybrid / WFH Options
THAMES WATER UTILITIES LIMITED
As a Senior Security Penetration Tester , you will be responsible for supporting the design, implementation, and maintenance of TVM (Threat & VulnerabilityManagement) solutions, controls and processes across the organisation. You will be liaising with Digital teams to ensure appropriate mitigation and remediation of vulnerabilities detected across our IT estate. This role requires an understanding of TVM concepts, technologies … Tester Help support and develop an internal penetration testing function. Conduct network, application penetration testing, code and security reviews. Identify and exploit vulnerabilities through proof-of-concept testing. Support vulnerabilitymanagement across the enterprise, ensuring that a framework for identification, categorisation and mitigation exists and is implemented and maintained. Responsible for supporting the creation of the operating model … for vulnerabilitymanagement, that it is shared, agreed and operates effectively across the business. Develop and maintain penetration testing documentation, policies, and procedures. Integrate cybersecurity solutions (e.g. vulnerability scanning tools) with existing systems, applications, and infrastructure. Evaluate and recommend technologies, tools, and vendors to meet business needs. Investigate newly identified cybersecurity vulnerabilities and provide appropriate mitigation actions. More ❯
Leatherhead, England, United Kingdom Hybrid / WFH Options
Hyundai Motor UK
adherence to policies, processes and standards related to organisational and technical security. Being a SPOC for all aspects of cybersecurity within HMUK and leading incidents resolution. Risk Assessment and Management - Assess and identify potential security threats, vulnerabilities and developing strategies to mitigate these risks. Establish a vulnerabilitymanagement process aligned with headquarters guidelines. Policy Development and Enforcement … have access to HMUK data/systems and any other activities that will require security measures review and approval Be a key member of Data Breach Task force , Disaster management team , Business continuity team etc to manage and resolve all issues related to cybersecurity aspects of the incident. Maintain an up-to-date understanding of regulatory requirements, industry changes … and standards related to organisational and technical security. Being a SPOC for all aspects of cybersecurity within HMUK and leading incidents resolution. We Want You To: Risk Assessment and Management - Assess and identify potential security threats, vulnerabilities and developing strategies to mitigate these risks. Establish a vulnerabilitymanagement process aligned with headquarters guidelines. Policy Development and Enforcement More ❯
London, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
Security Consultant is a senior leader specialising in designing, implementing and managing advanced security solutions. With expertise in SOC engineering tools and one of either Cloud Security, and Access Management (IAM) or Threat Modelling, this role focuses on enhancing the security posture of organisations. The consultant will lead strategic security initiatives, collaborate with clients or stakeholders to solve complex … feeds. Skills Extensive experience in Cyber Security, with a significant portion in a leadership role. A background in SOC engineering tools combined with expertise in either cloud security, & Access Management or threat modelling. Proficiency in cloud platforms and services (AWS, Azure, GCP) with deep knowledge of security tools. Hands-on experience designing and implementing SIEM solutions in enterprise environments. … Skilled in scripting and automation (e.g., Python, PowerShell) for security processes. Familiarity with tools for threat modelling, vulnerabilitymanagement, and incident response. SIEM-specific certifications like Splunk Certified Architect, Sentinel Expert, or equivalent. IAM certifications (e.g., Okta Certified Consultant, SailPoint IdentityNow, or CyberArk Defender) are highly desirable. #J-18808-Ljbffr More ❯
London, England, United Kingdom Hybrid / WFH Options
ITRS Group
for the departments and liaising with all staff and clients to implement appropriate IT infrastructure balanced against regulation requirements, risks, and cost. As part of the IT global senior management team, you will lead a global team of Infrastructure Technicians, ensuring that efficient and high-quality IT services and projects are delivered to support the continued growth of our … you’ll ensure they are available and fit for purpose to meet our needs as we scale our business. As a Global IT Infrastructure Manager, you will: Provide line management for the Global infrastructure staff. Lead the strategy, scalability, innovation, and best practices for local and global infrastructure solutions with service improvement reviews and guide improving and tuning infrastructure … services delivered. Directly contribute to ITRS Group’s goal for achieving and maintaining ISO 27001 accreditation across the group. Be responsible for Problem management and helping in finding solutions. Integrate future acquisitions into the existing ITRS Group Infrastructure, systems, and processes Identity and Access Management (IAM) for infrastructure. Monitor and Event management for infrastructure Ensure the compliance More ❯