tooling is optimised Provide advice and support to business units on security best practice and control implementation What We’re Looking For Hands-on experience with security tooling (EDR, vulnerability scanning, access control) Familiarity with Security frameworks such as NIST, PCI-DSS, and GDPR Experience working with Microsoft environments (O365, Azure) Clear communicator, able to engage with both IT … role, and wants to take on broader responsibilities Has been the security point-person in an IT team, leading on patching or endpoint protection Has hands-on experience with vulnerabilitymanagement tools like Tenable, and is ready to play a bigger role in shaping how security tools are implemented and optimised across the business. This is a chance More ❯
London, England, United Kingdom Hybrid / WFH Options
Nest pensions
at Nest pensions Role Overview We're looking for a pragmatic, risk focussed Information Security Manager to work within Nest and maintain our ISO 27001 certified corporation Information Security Management System (ISMS). We sit in the second line of defence and advise the business on security risks, incidents, audits, assurance and the implementation and monitoring of security controls … that protects Nest. You'll have a solid background in information security management systems, technology and love communicating technical concepts to non-technical people. Please note the minimum criteria for this role is: Practical experience of operating certified ISMS using ISO 27001/2, NIST CSF and other security standards in the design and management of information security … to audit and evidence compliance with security policies, standards etc. Understanding and experience of various Information Security domains including Security Architecture, Information Security Governance, Network Security, Data Protection, Risk Management, Identity & Access Management, VulnerabilityManagement, Anti-Malware, Mobile Device Management and Cloud Security We are open to discussing working patterns. We welcome all internal applicants More ❯
Cambridge, Cambridgeshire, England, United Kingdom
Hays Specialist Recruitment Limited
proficient in automation and orchestration tools (e.g., SOAR platforms, scripting languages like Python, PowerShell, KQL) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment. Key Skills and Experience Experience contributing to large-scale, sprint-based, security automation and detection engineering projects in a SOC/Cyber Defense or similar … Defence Operation's efficiency, scalability, and incident response capabilities.Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management.Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve operational efficiency.Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management to build More ❯
Functional Domain Responsibility: Previous work experience managing below three or more Cybersecurity delivery engagements o Audit principles and associated compensating controls o Enterprise Security architecture o Cloud Security o VulnerabilityManagement o E-Mail security o Web Application Firewall o Cyber Incident Management (CERT) Delivery Operations & Excellence: Manage & maintain steady state global delivery operations (Green) Manage Operational … Service Quality Review governance Provides leadership & direction to Delivery team in complex problems and creates innovative solutions Facilitates Business Continuity for the account during regional/location outages Team Management Responsible for Performance Appraisal for direct reports Support Delivery Head to manage team functions viz. resource selection, allocation, availability planning, effort estimation, utilization & attrition management Tracking individual and …/weekly basis and continually improve them efficiently and effectively Ensure that the productivity goals for the team are met, including service level, utilization, and customer satisfaction Customer Relationship Management Acts as a trusted security advisor to the clients Interlock with Management to define operations strategy and action plan based on Customer feedback & CSAT result Analyzing customer requirements More ❯
world. We work with the companies that are Britain's economic engine - ambitious, entrepreneurially-spirited and high growth businesses that fuel the economy - and directly advise the owners and management teams that lead them. We'll broaden your horizons To ensure our services and applications are fit for the modern market, our IT team collaborates with every department. They … Lead Software Security Engineer to join our team. You will have a strong background in software development, security, and operations. This role is required to support the Digital Product Management team in embedding security requirements and best practices into new Digital Products and Services. You will work closely with the Digital Product Management and IT Security teams to … such as Powershell, YAML, JASON, etc. Collaborate with development teams to integrate security best practices into the secure software development lifecycle (SDLC) and ensure products are built securely Oversee vulnerabilitymanagement and remediation efforts, including leading responses to pen test findings and security assessments Experience conducting risk assessments and threat modelling for software development and advise where necessary More ❯
security data. Drive training and awareness, leading phishing simulations and crafting internal communications to build security culture. Leverage threat intelligence to conduct proactive threat hunting and surface risks. Manage vulnerability and configuration scanning tools, prioritising findings and collaborating with technical teams for remediation. Conduct regular access control reviews to identify and report excessive permissions. Investigate and troubleshoot complex security … strong experience preferred) Strong analytical and troubleshooting ability — comfortable solving problems from first principles. Proven operational cyber security experience at enterprise scale. Hands-on expertise in cyber incident response, vulnerabilitymanagement, and threat detection. A self-starter with excellent communication skills and a proactive approach to continuous improvement. Desirable Qualifications: Security certifications (SANS, vendor-based) ITIL certification This More ❯
continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role Monitor security alerts and events using Splunk and other SIEM (Security Information and Event Management) tools. Analyse security incidents to determine their impact and severity and conduct thorough investigations of security breaches and incidents. Develop and implement incident response plans and procedures. Collaborate with … other IT and security teams to resolve security issues. Maintain and update security documentation and incident reports and perform regular security assessments and vulnerability scans. You can bring your whole self to work. At Capgemini building an inclusive future is part of everyday life and will be part of your working reality. We have built a representative and welcoming … environment, for everyone. Your Skills And Experience Proven experience as a SOC Analyst in a similar cybersecurity role. Experience with Flexera for vulnerabilitymanagement Strong knowledge of Splunk or other industry standard SIEM tool for security monitoring and analysis. Familiarity with security technologies and understanding of network protocols, firewalls, and intrusion detection/prevention systems. Knowledge of Threat More ❯
and static/dynamic security testing (SAST/DAST). Security Tooling And Automation Implement and maintain security tools used in the development and deployment processes (e.g., scanning tools, vulnerabilitymanagement systems, SAST, DAST, ASPM). Automate security processes to streamline secure development and operational workflows. Incident Detection And Response Work with engineering and platform teams to detect … Expertise Deep understanding of identifying, assessing, and mitigating security risks in application designs, code, and deployed products. Experience managing and using security testing tools such as SAST, DAST, and vulnerability scanning solutions. Strong grasp of secure coding practices and proficiency in integrating security into the Software Development Lifecycle (SDLC). Technical Knowledge And Implementation Experience Direct experience with threat … Demonstrated ability to seamlessly integrate secure development practices into SDLC/SSDLC workflows. Skilled in implementing technical security controls and driving security automation within CI/CD pipelines. Risk Management And Compliance Knowledge Experience with identifying and managing security risks, including conducting risk assessments. Working knowledge of regulatory compliance standards and frameworks. More Information Enjoy fantastic perks like private More ❯
for your skills but encouraged to build upon them and empowered to do your absolute best. Our CISO function is created by Cyber Defence Centre, Business Resilience, Privacy & Information Management, Strategy & Operating Office and Security Design, Innovation & Enablement. What we look for We are looking for a Security Engineer who will provide security-related technical and functional support for … for securing DLG's environments in line with compliance commitments. Ensure security technical platforms are configured to optimise the overall security offered to DLG. Improve Security Information and Event Management (SIEM) coverage of DLG's overall environment. Make sure that all changes to the production environment have been reviewed and approved. Communicate and build relationships at various levels with … routing, TCP/IP, Internet protocols, and network security management. Security Technologies : Expertise in Web Application & Network Firewalls, IDS/IPS, File Integrity Monitoring, SIEM, Advanced Endpoint Protection. Security Management : Advanced skills in vulnerabilitymanagement, event management, application security, incident response, forensics, and encryption. Technical Proficiency : Strong foundation in algorithms, data structures, databases, networks, and tool More ❯
knowledge of the UK Telecoms Security Act would be advantageous to your application. You will develop and maintain the cyber security architecture and will have proven experience with compliance, vulnerabilitymanagement, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform More ❯
Wakefield, England, United Kingdom Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
critical financial infrastructure, the protection of Euroclear information and assets is fundamental to the company’s business. Security is at the core of our services, firmly embedded in the management systems and processes of the company. You will be joining our CISO division in charge of putting in place the required controls to adequately and effectively protect our information … assets. You will join the Offensive Security Center who manage and coordinate: Penetration testing Red team Exercises Purple team Exercises Static Code Analysis VulnerabilityManagement As a member of the Red Team, you will play a crucial role in safeguarding our organization's digital assets by simulating real-world cyber-attacks and identifying vulnerabilities in our systems. This More ❯
Gemini Industries Inc. provides technical, management and operations services to support National Security projects. We provide rapid response to the critical needs of our customers and those they serve. We perform analyses and develop operations plans to anticipate and prepare for the future. And we deliver advanced technology to improve our customer's success in executing its mission. Gemini … but are not limited to: •Assist with coordination of cybersecurity related processes and activities for AAZ Information Systems and related interfaces. The processes include: bare not limited to, Risk Management Framework (RMF) and system authorization, Cyber Incident Handling, System Life Cycle Management Processes (e.g. Engineering Change and Configuration Management), VulnerabilityManagement, Malware Protection, Security Assessments … cybersecurity assessments, security impact analysis and system authorization of AAZ information Systems per ISSM guidance. •Assist with maintaining an Information Assurance Program and ensure compliance with DODO 8510.01 - Risk Management Framework (RMF) for DOD IT. • Develop system security and information assurance documentation consistent with the standards above to support system assessment and authorization, as well as interim authority and More ❯
the CSOC team, they will develop and improve operationally relevant KPIs and KRIs and associated reporting mechanisms that are suitable to evidence performance to the CCoE and NSS DaS management team, and that demonstrate value to our stakeholders. During an active incident, the post holder is required to provide level-headed and hands-on response actions alongside the CSOC …/7, 365 days a year Delivering and operating IT infrastructure (networks, servers, desktop, cloud, etc.) Working on or leading security operations functions, including: Cyber Security Incident Response and Management; Monitoring & Alerting; VulnerabilityManagement; Threat Intelligence; Security Architecture Acting as a significant technical authority within the information and cyber security specialist area Developing, designing, and implementing new More ❯
Chelmsford, Essex, South East, United Kingdom Hybrid / WFH Options
Keystream Group Limited
leadership and over 9,000 users - working collaboratively across internal teams and over 100 partners and suppliers. Oversee governance, risk, compliance, and security operations including incident response, threat intelligence, vulnerabilitymanagement, and penetration testing. Direct the selection, deployment, and maintenance of appropriate security technologies and processes to protect ECCs data and assets. You will be responsible for designing … a team of approximately 15, including six direct reports, fostering a culture of professionalism, learning, and service excellence. Experience Needed: Deep expertise in cyber security governance, compliance, and risk management within complex organisations. Strong strategic leadership experience across large scale organisations, with the ability to influence and communicate effectively at senior and political levels. A track record of developing More ❯
Basildon, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Chesterfield, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Telford, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Shrewsbury, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Ipswich, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Worcester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Chester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Lincoln, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯