Our client within the public sector requires a Senior Cyber Security Specialist to work alongside and lead the Cyber Defence team delivering cyber threat intelligence, threatdetection, incident response, and vulnerability management capabilities for the organisation.you will be leading the defence function, by providing strategic direction and … coordinating day-to-day delivery of threat intelligence, threatdetection, incident response, vulnerability management and ethical hacking capabilities identify and deliver opportunities for continual improvement of the cyber defence function brief senior stakeholders on the cyber threat to the organisation take a leadership role in the … cyber security team, the organisation, and the government security and risk management communitiesSkills and experience you should have a breadth of experience across cyber threat intelligence, detection, and response experience investigating, managing, and coordinating the response to, major cyber incidents have an in-depth understanding of the tools more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Experian Ltd
a Site Reliability Engineering Manager, you will lead a global team of talented SREs in the development, deployment, and continuous improvement of our Cyber ThreatDetection Pipeline. Your leadership will ensure the delivery of a scalable, efficient, and highly reliable ThreatDetection Engineering platform. Key Responsibilities … Security , Exabeam Advanced Analytics (UEBA), Security Data Lakes (e.g., Data Bricks or Snowflake), and Cribl for log ingestion. Drive the adoption and implementation of Detection as Code principles. Leveraging CI/CD pipelines to automate the deployment and management of detection rules and platform configurations, ensuring fast, reliable … great deal of SRE technical and managerial skills in a large enterprise environment, such as: A great background in theSRE field supporting a Cyber ThreatDetection function, with demonstrable experience in a leadership or managerial role overseeing a team. Scripting and Automation Proficiency: Demonstrated expertise in scripting and more »
office 2 – 3 days per week. This role will revolve around keeping on top of their security risk with efforts to manage their prevention, detection, analysis, and remediation work. You will be maintaining and providing advice on the organisation’s security operations tooling and procedures. Responsibilities: Evaluate, respond and … resolve security incidents Threat Analysis, threatdetection, threat response and threat remediation Support the information security strategy through developing the operational systems Maintain, support and develop their security procedures and tooling Assist and support the wider security teams including Architecture, Audits, Vulnerability Management, Project Management more »
office 2 3 days per week. This role will revolve around keeping on top of their security risk with efforts to manage their prevention, detection, analysis, and remediation work. You will be maintaining and providing advice on the organisation's security operations tooling and procedures. Responsibilities: Evaluate, respond and … resolve security incidents Threat Analysis, threatdetection, threat response and threat remediation Support the information security strategy through developing the operational systems Maintain, support and develop their security procedures and tooling Assist and support the wider security teams including Architecture, Audits, Vulnerability Management, Project Management more »
Wigan, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Police Digital Services
Join Police Digital Service in a NMC Cyber Threat Intelligence (CTI) role (Hybrid/Lancashire) Police Digital Service are looking to hire CTI roles at the following levels: Cyber Threat Intelligence Specialist - Mid-Tier Threat Intelligence Role; Recommended for those with experience in cyber threat intelligence … or associated fields. Veterans with an intelligence background and an interest in cyber are encouraged to apply Senior Cyber Threat Intelligence Specialist - Senior Threat Intelligence Role; Recommended for those with significant cyber threat intelligence experience As a member of the Threat Intelligence team, you'll be … involved with: Developing awareness for the policing community of the cyber risks to critical services by continually assessing the threat landscape and informing stakeholders. Reporting cyber risks to service, executive, and operational stakeholders for mitigation decisions. Limiting the impact of known cyber risks by engaging forces in pre-incident more »
Wrexham, Wales, United Kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
a key part in the Cyber/Information Security function. You will drive and enhance their current operational processes and contribute across Security Assurance, ThreatDetection, Risk Management, CPSM & Threat Intelligence. Skills required: Control Frameworks & Industry Standards (ISO27001, 27002, GDPR, NIST) Security Operations Performance Tracking Data Security … Malware Detection, Threat & Incident response For the right person this is a huge opportunity - considering the sustained growth that they're going through, this role has a dotted line to management or C suite positions. This is a 2 stage process - initial 30 minute chat and 60 minute more »
Job title: Security Engineer (Threat/Vulnerability) Client: Fintech Salary: £90,000 - £160,000 + Market leading bonus Location: London Experience level : 5+ years My client is looking for a world class Security Engineer to bolster their high grade threatdetection team. This individual will be given … computer systems. Role: Perform periodic and on-demand system audits and vulnerability assessments of systems, internal applications and Cloud services to identify security vulnerabilities. Threatdetection - Analyse/monitor security infrastructure and detect potential threats Analyse cyber threat intelligence and mitigate threats/improve security posture. End … to end incident management, including investigation Develop and deploy detections/rules to prevent threats Threat hunting Stakeholder management Requirements: Experience with data analysis Proficiency in Python or PowerShell Extensive knowledge of security engineering concepts Exposure to cloud technologies (AWS/AZURE/GCP) hands on creating detections hands more »
we are seeking expressions of interest for passionate cybersecurity professionals to join our dynamic team. Initially we will be seeking experience with Managed Extended Detection and Response (MXDR) services. At Sekuro we leverage cutting-edge technologies and strategic partnerships to provide top-tier security solutions to our global clientele. … Responsibilities: Design and Implementation: Architect and deploy advanced MXDR solutions using CrowdStrike and AWS to protect client environments. Monitoring and Response: Conduct continuous monitoring, threat hunting, and incident response activities to identify and mitigate security threats. Integration: Integrate MXDR solutions with clients’ existing security infrastructure and workflows. Automation: Develop … and implement automation scripts and tools to enhance threatdetection and response capabilities. Client Support: Provide expert-level support and guidance to clients, including conducting security assessments and providing recommendations. Collaboration: Work closely with other cybersecurity experts, analysts, and engineers within Sekuro to continuously improve our MXDR offerings. more »
Skelmersdale, Lancashire, North West, United Kingdom Hybrid / WFH Options
Police Digital Services
Join Police Digital Service in a NMC Senior Cyber Threat Intelligence Specialist role (Hybrid/Lancashire) £55,000-£60,000 Police Digital Service are looking to hire a Senior Cyber Threat Intelligence (CTI) Specialist. This role is recommended for those with significant cyber threat intelligence experience As … a member of the Threat Intelligence team, you'll be involved with: Developing awareness for the policing community of the cyber risks to critical services by continually assessing the threat landscape and informing stakeholders. Reporting cyber risks to service, executive, and operational stakeholders for mitigation decisions. Limiting the … impact of known cyber risks by engaging forces in pre-incident planning and preparatory activities. Constraining attack surfaces through proactive threat intelligence working directly alongside the threat hunting and malware service. About Police Digital Service We exist to harness the power of digital, data and technology to enable more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
the Job Leading the Response: Acting swiftly and decisively during security incidents to mitigate risks. Incident Lifecycle Management: Overseeing incidents from the moment of detection, through the containment and eradication stages, to the final resolution. Post-Incident Analysis: Conducting detailed investigations post-incident to understand the root cause and … to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating potential threats and vulnerabilities to ensure that the organization is prepared to defend against them. Strategic Defense Implementation: Putting in place robust … unified security strategy. This role demands a proactive mindset, deep technical expertise, and strong leadership skills to navigate the complex and ever-evolving cyber threat landscape. It's about being always prepared, constantly learning, and effectively communicating to maintain and enhance the organization's security posture. Tasks & Responsibilities Evaluate more »
Intelligence & Operations Team. This is a hands-on role that involves responding to cyber threats and incidents, performing digital forensics and investigations, and automating threat response playbooks. As a member of the team, you will have the opportunity to work on complex security challenges and work with engineers across … cyber threats, alerts and incidentsDrive end-to-end incident response investigationsPerform host and network based log analysis in a cloud first environmentDevelop and codify threat response processes and playbooksPerform digital forensic investigations to include analysis, collection, and preservation of evidenceBuild security tools to automate threat response tasksDevelop detailed … post incident and investigation reportsCollaborate with detection engineers to identify threatdetection use cases Work with engineering stakeholders to improve security posture post investigationsWe’d love to hear from you if you have:2+ years of hands-on security operations experience in cloud-native environmentsExperience in triaging more »
Key Responsibilities : Endpoint Protection Deployment and Management: Install, configure, and maintain endpoint protection solutions such as antivirus software, anti-malware tools, host-based intrusion detection/prevention systems (HIDS/HIPS), and endpoint detection and response (EDR) platforms. Ensure that endpoint protection software is up-to-date with … the latest definitions, patches, and security updates to defend against emerging threats. ThreatDetection and Prevention: Monitor endpoint activities and network traffic for signs of malicious behavior, suspicious activities, or known attack patterns. Implement proactive measures to detect and prevent malware, ransomware, phishing attempts, and other types of … sensitive data on endpoints. Incident Response and Remediation: Respond to security alerts and incidents detected on endpoints by investigating the root cause, containing the threat, and initiating remediation actions. Isolate infected endpoints from the network, quarantine malicious files, and remove malware infections to prevent further spread across the organization. more »
SMITHS DETECTION MAKING THE WORLD A SAFER PLACE Every minute of every day, in nearly every country across the globe, Smiths Detection people and technology make the world a safer place. We safeguard people, business and infrastructure with the latest innovations and screening technology for aviation, ports, borders … systems every day with sites in 17 countries and six centers of research excellence. From pioneering to powering life-changing innovation, we’re delivering threatdetection and screening solutions to safeguard the world from threatDigital growth: A key part of our capability is the integration of digital technology … computer science, and AIMLInternational environment: With some projects, work requires global collaboration and the potential to travel and grow with the businessJob Description Smiths Detection is a global authority on the application, management and manufacture of world class detection and screening technology. Every minute of every day, our more »
the Security Operations Center (SOC) team. Your role will involve managing both external and internal SOC personnel, overseeing security monitoring and analysis, incident response, threat intelligence, and vulnerability management activities. Key Responsibilities: Act as the subject matter expert on SOC matters for the organization. Manage the external SOC team … SOC team and ensure compliance with requirements. Set clear goals and objectives for the SOC team, providing guidance, support, and training as needed. Oversee detection, analysis, and response to security incidents and breaches, coordinating incident response efforts. Conduct post-incident reviews and implement corrective actions to prevent recurrence. Stay … abreast of cybersecurity threats, vulnerabilities, and trends, implementing and maintaining threat intelligence feeds and tools. Develop and refine SOC procedures and playbooks based on emerging threats and attack patterns. Evaluate new security solutions and technologies to enhance threatdetection and response capabilities. Collaborate with IT and security more »
and Compliance to improve the functionality of SIEM solutions provided to customers Taking ownership of security incidents and breaches through to resolution Proactive monitoring, threat hunting and threat intelligence Drive the use of SIEM automation to enable seamless threatdetection and remediation What you need... Demonstrable more »
DescriptionAnomali, a world-renowned platform leader in Security Operations, supercharges SecOps by fusing Lightspeed Security Analytics, Industry-Leading Cyberthreat Intelligence (CTI), AI-based automated threat hunting, alert orchestration, automated threatdetection and incident response (TDIR) blocking, community intelligence sharing, exposure management, and dark web protection. Transforming CISOs … into superheroes and analysts into SOC terminators. Anomali's Platform offers: “Match” Next-Gen SIEM, “Lens” AI Threat Hunter, “ThreatStream” TIP, Anomali Integrator, Anomali ISAC, Anomali Attack Surface Management, and Anomali Digital Risk Protection, infused with Anomali AI. Anomali bridges the gap between point solutions (EDR, NDR, SSE, RMM … CAASM, etc.) and replaces legacy SIEMs at 50% the cost, giving analysts easy-to-use tools that enable lightspeed detection & response. Anomali addresses the global shortage in cyber talent by empowering analysts to contain, eradicate, and block threats in seconds without complex SIEM queries, manual blocks, or long investigations. more »
assess, and respond to security incidents. Lead the team in conducting thorough investigations and root cause analysis of incidents.Security Monitoring: Oversee security monitoring and threatdetection processes, leveraging security information and event management (SIEM) and other security tools to proactively identify and address potential security threats.Vulnerability Management: Coordinate … security policies, standards, and procedures in line with industry best practices and compliance requirements.Security Incident Reporting: Provide timely and accurate reports on security incidents, threat trends, and the effectiveness of security measures to senior management.Security Awareness Training: Collaborate with the training team to conduct security awareness programs for employees … security operations management and cybersecurity, with a track record of successful incident response and security incident management.Strong knowledge of security technologies, including SIEM, intrusion detection/prevention systems, endpoint protection, and security analytics tools.Experience with vulnerability assessment tools and vulnerability management processes.Understanding of security best practices, standards, and frameworks.Knowledge more »
integration opportunities (where feasible). -You will be undertaking internal pen testing and creation of external penetration testing scopes. -You will be enhancing security detection and incident response efforts/playbooks. -You will be monitoring, remediating, and reporting on security events. -You will be Security incident Manager (SIM). … with PCI DSS, ISO/IEC 27001, SOC & HIPAA & IRAP controls. -You have an in-depth knowledge of security principles, technologies, and best practices, threatdetection and mitigation strategies. -Strong understanding of network protocols & practices, firewalls, intrusion detection/prevention systems and WAFs. -Mature understanding/experience more »
CEH, ECSA, LPT, OSCP, AWS certified security, or equivalent are highly desirable.You have an in-depth knowledge of security principles, technologies, and best practices, threatdetection and mitigation strategies.Mature understanding/experience with cloud security architecture (AWS, Azure) with a proven track record and work ethic that covers … make sure the organization is compliant with PCI DSS, ISO/IEC 27001, SOC & HIPAA & IRAP controls.Strong understanding of network protocols & practices, firewalls, intrusion detection/prevention systems and WAFs.Knowledge of security compliance standards relevant to the SaaS industry, such as PCI, GDPR, ISO 27001, SOC2, NIST.Experience undertaking internal more »
CD pipelines and cloud-native applications.Implement and manage IAM policies, ensuring least privilege principles are maintained.Evaluate and deploy security tools and technologies to enhance threatdetection and response capabilities.Provide guidance and mentorship to junior security engineers, fostering a culture of continuous learning and improvement.Stay current with emerging cloud … in cloud security engineering.Strong expertise in securing cloud environments such as AWS, Azure, or GCP.Proficiency in security technologies and tools such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability management.Experience with IaC tools like Terraform, CloudFormation, or ARM templates.Deep understanding of IAM, encryption, network security, and data more »
and cloud-native applications. Implement and manage IAM policies, ensuring least privilege principles are maintained. Evaluate and deploy security tools and technologies to enhance threatdetection and response capabilities. Provide guidance and mentorship to junior security engineers, fostering a culture of continuous learning and improvement. Stay current with … security engineering. Strong expertise in securing cloud environments such as AWS, Azure, or GCP. Proficiency in security technologies and tools such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability management. Experience with IaC tools like Terraform, CloudFormation, or ARM templates. Deep understanding of IAM, encryption, network security more »
and cloud-native applications. Implement and manage IAM policies, ensuring least privilege principles are maintained. Evaluate and deploy security tools and technologies to enhance threatdetection and response capabilities. Provide guidance and mentorship to junior security engineers, fostering a culture of continuous learning and improvement. Stay current with … security engineering. Strong expertise in securing cloud environments such as AWS, Azure, or GCP. Proficiency in security technologies and tools such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability management. Experience with IaC tools like Terraform, CloudFormation, or ARM templates. Deep understanding of IAM, encryption, network security more »
the first line of defence for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threatdetection, incident assessment and vulnerability management the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. … work collaboratively with our customer base across the business and project teams as assigned. Key Behaviours Tenacity Ethical Curious Integrity Tasks/Responsibilities Operational Threat Monitoring: Continuously monitor security events and alerts within the organization’s network and systems. Identify suspicious activities, anomalies, and potential security incidents. Incident Triage … Skills & Experience Skills Technical Skills: Basic understanding of networking and security principles. Familiarity with security tools and technologies (e.g., Sentinel, Defender suite, firewalls, intrusion detection systems). Proficiency in log analysis and query languages (e.g., KQL, shell scripting, Snort rules). Analytical Skills: Ability to analyse and interpret security more »
correct vetting procedures and the security management of visitors and contractors to meet HMG, UKSV and IPSA requirements. Review and manage security risk and threat assessments including regular practical exercises to assure effectiveness of measures to meet FSC and IPSA requirements, proactively managing threatdetection and vulnerability more »
audit requirements. Contribute to the development of a Cybersecurity Operations Resource and Capacity planner managed through BDO's Azure DevOps environment. Oversee incident response, threatdetection, and mitigation efforts You'll be someone with: A good understanding of monitoring frameworks eg MITRE ATT&CK and SIEM technologies eg more »