Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
CET Structures Limited
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … service quality Essential Skills Proven 3rd Line Support Experience with strong focus on Microsoft 365 stack Strong knowledge of managing Azure AD, conditional access, virtual networks, MFA, SSO, Identity management and subscription governance. In-depth experience administering Exchange Online, SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider … Risk Management, Defender for Cloud, Defender for Endpoint, Defender VulnerabilityManagement, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … service quality Essential Skills Proven 3rd Line Support Experience with strong focus on Microsoft 365 stack Strong knowledge of managing Azure AD, conditional access, virtual networks, MFA, SSO, Identity management and subscription governance. In-depth experience administering Exchange Online, SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider … Risk Management, Defender for Cloud, Defender for Endpoint, Defender VulnerabilityManagement, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and More ❯
This position also entails support and development of the company's IT policies and security solutions. Essential Skills: Comprehensive experience including in-depth knowledge, in a security or risk management role. An excellent understanding of enterprise information security and in-depth knowledge of standards including Cyber Essentials, ISO 27001, 27002 etc., Data Protection Act and the General Data Protection … software and analyse its impact on the existing environment; provide technical and managerial expertise for the administration of security tools. Manage the day-to-day activities of threat and vulnerabilitymanagement, identify risk tolerances, recommend treatment plans and communicate information about residual risk. Manage security projects and provide expert guidance on security matters for other IT projects. Ensure … other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements. Experience Requirements Skills Experienced information security risk and compliance function. Experience of technical vulnerabilitymanagement processing and reporting. Ability to engage with projects and provide information security awareness and to raise compliance requirements within projects and operational teams. Proven track record as More ❯
CrowdStrike Falcon EDR and NextGen SIEM platforms. Build and manage a high-performing security team , fostering a culture of agility, innovation, and accountability. Oversee threat detection, incident response, and vulnerabilitymanagement . Collaborate with IT, operations, and executive leadership to align security initiatives with business goals. Ensure compliance with local and international cybersecurity regulations and standards. Conduct regular … and endpoint protection . Experience in critical infrastructure or construction industry is a plus. Relevant certifications (e.g., CISSP, CISM, CEH, GIAC) are highly desirable. Excellent communication, leadership, and stakeholder management skills. More ❯
Walsall, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … to improve service quality Proven 3rd Line Support Experience with strong focus on Microsoft 365 stack Strong knowledge of managing Azure AD, conditional access, virtual networks, MFA, SSO, Identity management and subscription governance. In-depth experience administering Exchange Online, SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider … Risk Management, Defender for Cloud, Defender for Endpoint, Defender VulnerabilityManagement, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and More ❯
Dudley, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … to improve service quality Proven 3rd Line Support Experience with strong focus on Microsoft 365 stack Strong knowledge of managing Azure AD, conditional access, virtual networks, MFA, SSO, Identity management and subscription governance. In-depth experience administering Exchange Online, SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider … Risk Management, Defender for Cloud, Defender for Endpoint, Defender VulnerabilityManagement, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and More ❯
Leicester, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … to improve service quality Proven 3rd Line Support Experience with strong focus on Microsoft 365 stack Strong knowledge of managing Azure AD, conditional access, virtual networks, MFA, SSO, Identity management and subscription governance. In-depth experience administering Exchange Online, SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider … Risk Management, Defender for Cloud, Defender for Endpoint, Defender VulnerabilityManagement, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and More ❯
Nottingham, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … to improve service quality Proven 3rd Line Support Experience with strong focus on Microsoft 365 stack Strong knowledge of managing Azure AD, conditional access, virtual networks, MFA, SSO, Identity management and subscription governance. In-depth experience administering Exchange Online, SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider … Risk Management, Defender for Cloud, Defender for Endpoint, Defender VulnerabilityManagement, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and More ❯
Preston, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … to improve service quality Proven 3rd Line Support Experience with strong focus on Microsoft 365 stack Strong knowledge of managing Azure AD, conditional access, virtual networks, MFA, SSO, Identity management and subscription governance. In-depth experience administering Exchange Online, SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider … Risk Management, Defender for Cloud, Defender for Endpoint, Defender VulnerabilityManagement, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and More ❯
Stratford-upon-Avon, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … to improve service quality Proven 3rd Line Support Experience with strong focus on Microsoft 365 stack Strong knowledge of managing Azure AD, conditional access, virtual networks, MFA, SSO, Identity management and subscription governance. In-depth experience administering Exchange Online, SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider … Risk Management, Defender for Cloud, Defender for Endpoint, Defender VulnerabilityManagement, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and More ❯
IoCs) and anomalous activity. Play the lead role of Identity and Access Management. Support the delivery of systems to protect the Confidentiality, Integrity, and Availability of Randox networks. Perform vulnerability scans and advise relevant teams for mitigation steps. Monitor security alerts and events to identify potential security incidents. Use security information and event management (SIEM) tools to analyze … threats. Essential criteria: Be qualified to degree level or have a minimum of 3 years working in a similar role. Previous experience with security detection technologies such as SIEMs, vulnerabilitymanagement or endpoint management. Broad understanding & familiarity with networking concepts & protocols (TCP/IP, UDP, DNS, DHCP, HTTP etc). Experience of working in cross-functional teams. Experience More ❯
Wolverhampton, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … to improve service quality Proven 3rd Line Support Experience with strong focus on Microsoft 365 stack Strong knowledge of managing Azure AD, conditional access, virtual networks, MFA, SSO, Identity management and subscription governance. In-depth experience administering Exchange Online, SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider … Risk Management, Defender for Cloud, Defender for Endpoint, Defender VulnerabilityManagement, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and More ❯
Coventry, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … to improve service quality Proven 3rd Line Support Experience with strong focus on Microsoft 365 stack Strong knowledge of managing Azure AD, conditional access, virtual networks, MFA, SSO, Identity management and subscription governance. In-depth experience administering Exchange Online, SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider … Risk Management, Defender for Cloud, Defender for Endpoint, Defender VulnerabilityManagement, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and More ❯
SWIFT CSP into technical security controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procedures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements, including due diligence, contract oversight … in processes or documentation. Maintain the enterprise risk register, prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerabilitymanagement, endpoint security (EDR/XDR), and cloud compliance. Good understanding on IAM (Identity and Access Management) strategies, including role-based access control (RBAC) and privileged access … management (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are looking for: Experience: 5+ years in GRC roles; financial services or banking experience is a strong plus. Understanding of GDPR, DORA, PCI DSS, and outsourcing/third-party risk requirements. Hands-on experience More ❯
closely with cross-functional teams to resolve security issues efficiently. Beyond day-to-day operations, you will drive improvements by refining security workflows, optimising automation, and enhancing vendor risk management processes. Your contributions will directly strengthen our security posture, allowing teams across the company to work with confidence in a resilient and well-protected environment. What you will do … Collaborate with the ML, Tech and Drug Discovery teams to integrate security best practices into daily operations. Actively engage in security incident management by supporting containment, remediation, forensic investigation, and root cause analysis. Conduct vendor security assessments, evaluate third-party risk exposure, and perform periodic security audits to ensure compliance. Implement and continuously refine security operational procedures to enhance … efficiency and ensure adherence to best practices. Perform risk assessment and vulnerabilitymanagement activities, coordinating with relevant teams to ensure timely remediation of security findings. Investigate alerts from security monitoring platforms, ensuring efficient response, escalation, and resolution of potential threats. Conduct periodic log reviews, health checks and compliance audits, proactively identifying and addressing security gaps. Contribute to security More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
BAE
and triaging results Knowledgeable about attacker TTPs and APT groups, with in-depth research skills Able to verify and refine Threat Hunt queries independently Experienced in Incident Response and Management Ensuring high-quality Threat Hunt Reports and effective documentation Providing analysis, context, and predictions in deliverables Assessing and improving the threat intelligence function within the client Point of contact … forensics, and incident response queries Developing new analytics and playbooks for detection rules Requirements Technical 3+ years in Cyber Threat Intelligence, research, and investigation Experience in incident response and management Understanding of threats related to government and CNI Strong open-source research skills Knowledge of Windows OS, Azure, networking, and cloud platforms Non-Technical Bachelor’s Degree in Cybersecurity … Computer Science, or similar Experience in SOC, Threat Intelligence, or VulnerabilityManagement Excellent communication skills for technical and non-technical audiences Team player, self-motivated, capable of mentoring Desirable Qualifications Advanced degrees or certifications such as SANS, CREST, Azure, AWS Certified Ethical Hacker or equivalent Life at BAE Systems Digital Intelligence We embrace Hybrid Working for flexibility and More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Simmons & Simmons LLP
security threats and vulnerabilities and ownership of resulting tickets until resolution. Liaising with technology and business teams to define and champion effective security controls, practices and processes. Maintaining the vulnerabilitymanagement and security testing programmes. Maintaining relationships with 3rd party security vendors and service providers. Provide management reporting of security metrics. To develop and continuously improve existing … with the business to achieve its goals. Broad experience of technologies including, but not limited to; Firewalls, IPS & IDS, SIEM, DLP, WAF, Modern Operating systems, AD/AAD, Microsoft management tools, Cloud Service Providers, Vulnerabilitymanagement, Anti-virus, email and Web filtering. An understanding of core application development principles. Experience in developing people-centric security controls with More ❯
of company IT assets and A/V equipment. 🛡 Cyber Security & Compliance Help enforce and evolve best-practice security protocols (MFA, anti-virus, mail filtering, etc.). Participate in vulnerabilitymanagement, incident response, and system audits. Maintain accurate documentation for assets, systems, and compliance records. Support initiatives aligned with PCI and GDPR requirements. 🚀 Project Delivery & System Upgrades Assist … device management. Knowledge of ERP systems (Microsoft Dynamics 365 Business Central is a bonus). Comfortable configuring, supporting, and documenting IT and AV hardware. Strong communication, documentation, and stakeholder management skills. Relevant Microsoft or security certifications are a plus (e.g. MS-100, SC-900, AZ-900). More ❯
of company IT assets and A/V equipment. 🛡 Cyber Security & Compliance Help enforce and evolve best-practice security protocols (MFA, anti-virus, mail filtering, etc.). Participate in vulnerabilitymanagement, incident response, and system audits. Maintain accurate documentation for assets, systems, and compliance records. Support initiatives aligned with PCI and GDPR requirements. 🚀 Project Delivery & System Upgrades Assist … device management. Knowledge of ERP systems (Microsoft Dynamics 365 Business Central is a bonus). Comfortable configuring, supporting, and documenting IT and AV hardware. Strong communication, documentation, and stakeholder management skills. Relevant Microsoft or security certifications are a plus (e.g. MS-100, SC-900, AZ-900). More ❯
proficient in automation and orchestration tools (e.g., SOAR platforms, scripting languages like Python, PowerShell, KQL) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment. Key Skills and Experience Experience contributing to large-scale, sprint-based, security automation and detection engineering projects in a SOC/Cyber Defense or similar … Operation’s efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve operational efficiency. Collaborate with Threat Intelligence, Incident Response, and Attack Surface ManagementMore ❯
Digital Media Agency in the Nordics and driving group-wide cybersecurity initiatives. Key Responsibilities: Strategic Cyber Security Execution: Lead the development and execution of our cybersecurity strategy. Information Security Management: Implement and maintain an information security management system in line with ISO27001 standards. Cybersecurity Escalation Point: Serve as the go-to person for cybersecurity matters requiring escalation. Continuous … Learning: Stay updated with the latest IT trends, best practices, and cybersecurity threats. VulnerabilityManagement: Monitor and remediate vulnerabilities across corporate assets. Risk Reduction: Identify, manage, and deploy tools to minimize cybersecurity risks. Incident Oversight & Resolution: Oversee and resolve cybersecurity incidents efficiently. End User Training: Provide technical training and awareness to end users. Policy & Framework Development: Develop and … for new products and solutions. Stakeholder Engagement: Collaborate with stakeholders to ensure compliance and operational best practices. Flexibility: Ability to work out of hours when required. Must-Have Requirements: Management Experience: Proven experience in IT management. Team Collaboration: Strong team player with influential skills. Commercial Acumen: Commercial awareness with a solution-oriented mindset. ISO27001 Experience: Familiarity with ISO27001 standards. More ❯
security risks. Develop and maintain security frameworks, policies, and procedures aligned with industry standards and regulations. Lead third-party risk assessments and security audits. Collaborate with technical teams on vulnerabilitymanagement and remediation. Contribute to the secure design and architecture of new systems. Monitor and improve security tools and incident response processes. Promote security awareness and education throughout … and technical roles. Strong knowledge of ISO 27001, NIST, or similar frameworks. Excellent communication skills, able to explain technical issues to non-technical stakeholders. Proven leadership and proactive risk management abilities. Experience influencing across various business units. The company offers a supportive, inclusive environment emphasizing personal development and employee wellbeing, with benefits including: 25 days holiday plus bank holidays More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Suits Me Limited
and external audits by providing evidence of controls and contributing to audit readiness activities. Collaborate with the compliance and risk teams to ensure IT operations meet regulatory obligations. Support vulnerabilitymanagement efforts, including patching and system hardening. Assist in maintaining secure and efficient identity and access management practices, including integration with M365 and Azure AD. Contribute to … skills and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also Have More ❯
and external audits by providing evidence of controls and contributing to audit readiness activities. Collaborate with the compliance and risk teams to ensure IT operations meet regulatory obligations. Support vulnerabilitymanagement efforts, including patching and system hardening. Assist in maintaining secure and efficient identity and access management practices, including integration with M365 and Azure AD. Contribute to … skills and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also... Have More ❯
tooling is optimised Provide advice and support to business units on security best practice and control implementation What We’re Looking For Hands-on experience with security tooling (EDR, vulnerability scanning, access control) Familiarity with Security frameworks such as NIST, PCI-DSS, and GDPR Experience working with Microsoft environments (O365, Azure) Clear communicator, able to engage with both IT … role, and wants to take on broader responsibilities Has been the security point-person in an IT team, leading on patching or endpoint protection Has hands-on experience with vulnerabilitymanagement tools like Tenable, and is ready to play a bigger role in shaping how security tools are implemented and optimised across the business. This is a chance More ❯