nutshell The principal purpose of the role is to identify, contain, eradicate, and recover from information security incidents. Assisting the Information and Cyber Security Management team in implementing improvement initiatives that increase our maturity across our ThreatManagement capabilities. The role will require extensive Incident Response experience … including developing threat hunting capabilities, security use cases and playbooks. Day to day Development of the tools and processes to establish and improve the threat hunting program. Keeping an up-to-date understanding of the cyber threat landscape through threat intelligence and industry research. Define and … design new security use cases and alerts to identify evolving attack scenarios. Participate in industry-based Threat Intelligence sharing groups. Produce reports based on threat activity, trends and reported industry incidents. Leading security incident response processes with support from the principal analyst. Integrating and analysing threat intelligence More ❯
nutshell The principal purpose of the role is to identify, contain, eradicate, and recover from information security incidents. Assisting the Information and Cyber Security Management team in implementing improvement initiatives that increase our maturity across our ThreatManagement capabilities. The role will require extensive Incident Response experience … including developing threat hunting capabilities, security use cases and playbooks. Day to day Development of the tools and processes to establish and improve the threat hunting program. Keeping an up-to-date understanding of the cyber threat landscape through threat intelligence and industry research. Define and … design new security use cases and alerts to identify evolving attack scenarios. Participate in industry-based Threat Intelligence sharing groups. Produce reports based on threat activity, trends and reported industry incidents. Leading security incident response processes with support from the principal analyst. Integrating and analysing threat intelligence More ❯
nutshell The principal purpose of the role is to identify, contain, eradicate, and recover from information security incidents. Assisting the Information and Cyber Security Management team in implementing improvement initiatives that increase our maturity across our ThreatManagement capabilities. The role will require extensive Incident Response experience … including developing threat hunting capabilities, security use cases and playbooks. Day to day Development of the tools and processes to establish and improve the threat hunting program. Keeping an up-to-date understanding of the cyber threat landscape through threat intelligence and industry research. Define and … design new security use cases and alerts to identify evolving attack scenarios. Participate in industry-based Threat Intelligence sharing groups. Produce reports based on threat activity, trends and reported industry incidents. Leading security incident response processes with support from the principal analyst. Integrating and analysing threat intelligence More ❯
and executing a cybersecurity roadmap to establish a robust security posture and support the company's long-term objectives. Position - The role: The cybersecurity management system plays a pivotal role in safeguarding the organization's business assets and maintaining its resilience through proactive risk management, compliance adherence, and … and the board of directors Monitor and report IT-Security Key Performance Indicators (KPIs) to track effectiveness and identify areas for improvement Team & Budget Management Manage the company's Cyber Security team across 7 countries, providing them with strategic direction and leadership Manage the budget for the information security … function, monitoring and reporting discrepancies Risk Management, Security Architecture & Security Operations Identify, assess, and mitigate cybersecurity risks associated with company operations, data assets, and technologies, including intellectual property protection and regulatory compliance Conduct regular security audits and handle any breaches or security incidents that arise. Lead incident response efforts More ❯
multi-tool environments (e.g QRadar, Sentinel, Datadog, Chronicle SIEM, XDR). The role requires advanced strategic engagement with client stakeholders at senior levels, proactive threatmanagement, governance, risk and compliance advisory, and advanced multi-cloud security knowledge. Extensive customer-facing experience in cybersecurity consulting or managed services is … Datadog, Chronicle). Advanced knowledge and practical experience with multi-cloud security (AWS, Azure, GCP) in managed services environments. Proven capability in incident handling, threat intelligence, and strategic security consulting. Training and Certifications: EC-Council C-CISO or equivalent executive cybersecurity certification CREST CPTIA (Practitioner Threat Intelligence Analyst … Chronicle SIEM Certification Advanced Multi-cloud Security Certification (AWS/Azure/GCP) CISM, CISSP or CRISC – or equivalent Soft Skills: Thought Leadership Stakeholder Management Strategic Negotiation Advanced Conflict Resolution Programme or Large Project Management experience Mentoring and Coaching Unfortunately for this role the client is not offering More ❯
london, south east england, united kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
gap analysis What We’re Looking For 5+ years in Pre-Sales or similar role within an MSP/Reseller organisation. Endpoint detection and threatmanagement products Experience with the following vendors would be advantageous – Microsoft, Crowdstrike, Sophos, SentinelOne, ESET, Fortinet, Palo Alto and Zscaler Relevant security certifications More ❯
High Wycombe, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Dreams Ltd
retail/multi-site/FMCG space. - Understanding IT Security concepts used in dispersed organisations, such as Firewalls, Web Filtering, Virus Protection, encryption and Threat Management. - Understanding the needs of secure IT environments, backup and patch processes and change control process. - Awareness of ITIL principles and best practice and More ❯