integration opportunities (where feasible). -You will be undertaking internal pen testing and creation of external penetration testing scopes. -You will be enhancing security detection and incident response efforts/playbooks. -You will be monitoring, remediating, and reporting on security events. -You will be Security incident Manager (SIM). … with PCI DSS, ISO/IEC 27001, SOC & HIPAA & IRAP controls. -You have an in-depth knowledge of security principles, technologies, and best practices, threatdetection and mitigation strategies. -Strong understanding of network protocols & practices, firewalls, intrusion detection/prevention systems and WAFs. -Mature understanding/experience more »
Greater London, England, United Kingdom Hybrid / WFH Options
Anson McCade
create large sets of data, which can be efficiently processed to provide actionable intelligence. • Candidates will be working with Big Data, innovative security and threatdetection systems in turn contributing to the system design and development decisions, which affect the integration of both future and existing systems. • The more »
and utilize expertise to map the attack chain across complex environments, encompassing cloud, identity, email, network, and endpoint. In-depth understanding of the cyber threat landscape, particularly in the aviation sector. Demonstrated ability to translate threat knowledge into proactive threat detection. Proficient in analyzing and researching new … or trending attacks, threat actors, malware samples, and tactics, techniques, and procedures (TTPs) Excellent English language skills in reading, writing, and speaking, with the capability to articulate security insights effectively, both in creating and interpreting security metrics, and in presenting them clearly to all levels of hierarchy, including senior … leadership. Experience: Minimum of 5 years of experience in endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse engineering, or digital forensics. Familiarity with AWS cloud infrastructure, with hands-on experience monitoring associated logs, including GuardDuty, CloudTrail, and VPC Flow. Proven experience with Akamai security tools such more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
and information security strategy that aligns with business objectives, Lead, mentor, and oversee a small global team responsible for security operations, incident response, and threatdetection, fostering a culture of continuous improvement, innovation, and excellence, Collaborate with the Group IT team to ensure the organisation is protected against more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
McGregor Boyall Associates Limited
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
Our client within the public sector requires a Senior Cyber Security Specialist to work alongside and lead the Cyber Defence team delivering cyber threat intelligence, threatdetection, incident response, and vulnerability management capabilities for the organisation.you will be leading the defence function, by providing strategic direction and … coordinating day-to-day delivery of threat intelligence, threatdetection, incident response, vulnerability management and ethical hacking capabilities identify and deliver opportunities for continual improvement of the cyber defence function brief senior stakeholders on the cyber threat to the organisation take a leadership role in the … cyber security team, the organisation, and the government security and risk management communitiesSkills and experience you should have a breadth of experience across cyber threat intelligence, detection, and response experience investigating, managing, and coordinating the response to, major cyber incidents have an in-depth understanding of the tools more »
office 2 – 3 days per week. This role will revolve around keeping on top of their security risk with efforts to manage their prevention, detection, analysis, and remediation work. You will be maintaining and providing advice on the organisation’s security operations tooling and procedures. Responsibilities: Evaluate, respond and … resolve security incidents Threat Analysis, threatdetection, threat response and threat remediation Support the information security strategy through developing the operational systems Maintain, support and develop their security procedures and tooling Assist and support the wider security teams including Architecture, Audits, Vulnerability Management, Project Management more »
Key Responsibilities : Endpoint Protection Deployment and Management: Install, configure, and maintain endpoint protection solutions such as antivirus software, anti-malware tools, host-based intrusion detection/prevention systems (HIDS/HIPS), and endpoint detection and response (EDR) platforms. Ensure that endpoint protection software is up-to-date with … the latest definitions, patches, and security updates to defend against emerging threats. ThreatDetection and Prevention: Monitor endpoint activities and network traffic for signs of malicious behavior, suspicious activities, or known attack patterns. Implement proactive measures to detect and prevent malware, ransomware, phishing attempts, and other types of … sensitive data on endpoints. Incident Response and Remediation: Respond to security alerts and incidents detected on endpoints by investigating the root cause, containing the threat, and initiating remediation actions. Isolate infected endpoints from the network, quarantine malicious files, and remove malware infections to prevent further spread across the organization. more »
and cloud-native applications. Implement and manage IAM policies, ensuring least privilege principles are maintained. Evaluate and deploy security tools and technologies to enhance threatdetection and response capabilities. Provide guidance and mentorship to junior security engineers, fostering a culture of continuous learning and improvement. Stay current with … security engineering. Strong expertise in securing cloud environments such as AWS, Azure, or GCP. Proficiency in security technologies and tools such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability management. Experience with IaC tools like Terraform, CloudFormation, or ARM templates. Deep understanding of IAM, encryption, network security more »
and cloud-native applications. Implement and manage IAM policies, ensuring least privilege principles are maintained. Evaluate and deploy security tools and technologies to enhance threatdetection and response capabilities. Provide guidance and mentorship to junior security engineers, fostering a culture of continuous learning and improvement. Stay current with … security engineering. Strong expertise in securing cloud environments such as AWS, Azure, or GCP. Proficiency in security technologies and tools such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability management. Experience with IaC tools like Terraform, CloudFormation, or ARM templates. Deep understanding of IAM, encryption, network security more »
Monitor and respond to security incidents and alerts within the Azure environment. Microsoft Defender: Configure and manage Microsoft Defender for Endpoint. Develop and implement threatdetection and response strategies. Analyze and respond to security threats and incidents. Required Skills and Qualifications: In-depth knowledge of MDM solutions such … of Microsoft Azure security features and best practices. Experience with Microsoft Defender for Endpoint or similar security tools. Familiarity with network security, encryption, and threat detection. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills. Preferred Qualifications: Relevant certifications such as CISSP, CISM, CEH, or Microsoft Certified more »
Warrington, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
team and customer. Collaborate with teams to design and implement Sentinel for specific client needs. Configure and optimise Sentinel for advanced security monitoring and threat detection. Conduct regular assessments and audits to ensure Sentinel effectiveness. Troubleshoot and resolve technical issues related to Sentinel deployments. Your Profile: Strong understanding of more »
drive value for the organization. The suite of applications developed and maintained by the team are used to enhance the firm’s information security threatdetection, compliance, entitlement management architectures and audit assurance programs. Key Responsibilities: Analysing requirements from the business and understanding their processes. Documenting requirements in more »
Central (DACH, Cz, Pl etc.) Europe. This individual will be working within an established Telco sector Cybersecurity company whom are experts in Network Traffic, ThreatDetection and Telco Network centric cybersecurity solutions. This is a new position and whilst we would love to find someone with Telco Sector more »
as Key Account Manager for one such interesting customer, for whom we significantly contribute to designing and developing conceptual models into the future of threatdetection and countermeasures, influencing the EW domain. Whilst our main hubs of engineering activity are at our Cambridgeshire and Lincolnshire HQs, this role more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
the Job Leading the Response: Acting swiftly and decisively during security incidents to mitigate risks. Incident Lifecycle Management: Overseeing incidents from the moment of detection, through the containment and eradication stages, to the final resolution. Post-Incident Analysis: Conducting detailed investigations post-incident to understand the root cause and … to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating potential threats and vulnerabilities to ensure that the organization is prepared to defend against them. Strategic Defense Implementation: Putting in place robust … unified security strategy. This role demands a proactive mindset, deep technical expertise, and strong leadership skills to navigate the complex and ever-evolving cyber threat landscape. It's about being always prepared, constantly learning, and effectively communicating to maintain and enhance the organization's security posture. Tasks & Responsibilities Evaluate more »
assess, and respond to security incidents. Lead the team in conducting thorough investigations and root cause analysis of incidents.Security Monitoring: Oversee security monitoring and threatdetection processes, leveraging security information and event management (SIEM) and other security tools to proactively identify and address potential security threats.Vulnerability Management: Coordinate … security policies, standards, and procedures in line with industry best practices and compliance requirements.Security Incident Reporting: Provide timely and accurate reports on security incidents, threat trends, and the effectiveness of security measures to senior management.Security Awareness Training: Collaborate with the training team to conduct security awareness programs for employees … security operations management and cybersecurity, with a track record of successful incident response and security incident management.Strong knowledge of security technologies, including SIEM, intrusion detection/prevention systems, endpoint protection, and security analytics tools.Experience with vulnerability assessment tools and vulnerability management processes.Understanding of security best practices, standards, and frameworks.Knowledge more »
CEH, ECSA, LPT, OSCP, AWS certified security, or equivalent are highly desirable.You have an in-depth knowledge of security principles, technologies, and best practices, threatdetection and mitigation strategies.Mature understanding/experience with cloud security architecture (AWS, Azure) with a proven track record and work ethic that covers … make sure the organization is compliant with PCI DSS, ISO/IEC 27001, SOC & HIPAA & IRAP controls.Strong understanding of network protocols & practices, firewalls, intrusion detection/prevention systems and WAFs.Knowledge of security compliance standards relevant to the SaaS industry, such as PCI, GDPR, ISO 27001, SOC2, NIST.Experience undertaking internal more »
Stockport, England, United Kingdom Hybrid / WFH Options
Chapman Tate Associates
of Azure resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identity management, and threatdetection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell more »
opportunities for training and technical development. Day to day responsibilities will include: Incident triage and investigation. Analysis of all suspicious email activity. Participating in threat hunt and offensive security exercises. Analysis of all SIEM logs, and the opportunity to get involved in some threat detection. Working with technical … incidents Demonstrable business facing skills Experience of working with a SIEM platform – Splunk, QRadar, Elastic Security certifications highly desirable Experience of scripting/automation, threat hunting and offensive security highly desirable Please send your CV for immediate consideration. more »
office 2 3 days per week. This role will revolve around keeping on top of their security risk with efforts to manage their prevention, detection, analysis, and remediation work. You will be maintaining and providing advice on the organisation's security operations tooling and procedures. Responsibilities: Evaluate, respond and … resolve security incidents Threat Analysis, threatdetection, threat response and threat remediation Support the information security strategy through developing the operational systems Maintain, support and develop their security procedures and tooling Assist and support the wider security teams including Architecture, Audits, Vulnerability Management, Project Management more »
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
McGregor Boyall Associates Limited
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
the Security Engineer will design and implement security solutions in the Microsoft Security stack. The ideal candidate will come from a Security Operations or Threat Hunting background. Being the Liaison between SOC teams and clients, you will need strong expertise in cloud security concepts (ideally within Azure), and be … able to perform security assessments and scan for vulnerabilities. If you have prior experience with Microsoft Defender, Azure Sentinel, threatdetection and are able to accurately consult clients about their needs, whilst implementing effective security solutions, I strongly recommend applying. An excellent opportunity to upskill and develop your more »
their test case writing ability. The suite of applications developed and maintained by the team are used to enhance the firm’s information security threatdetection, compliance, entitlement management architectures and audit assurance programs. You'll have the freedom to challenge the status quo, mentor fellow engineers, and more »