Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Banco Santander SA
Cyber Threat Intelligence Analyst S2 CISOCountry: Vereinigtes Königreich Interested in part-time, job-share or flexible working? We want to talk to you! Join our community. The Cyber Threat Intelligence Analyst is a high tempo, dynamic, operational role that sits within the ThreatManagement team who … are responsible for the timely and accurate production, analysis, and dissemination of cyber threat intelligence relevant to the business or sector. The Cyber Threat Intelligence Analyst will provide further detailed information regarding the capability and intent of cyber threat actors and their methods when conducting cyber-attacks … in order to protect Santander UK customers. In ThreatManagement we work with internal stakeholders at all levels as well as industry peers within the subject matter. The difference you'll make: Producing accurate intelligence reports and briefs suitable for tactical, operational, and strategic customers Investigating and detecting More ❯
nutshell The principal purpose of the role is to identify, contain, eradicate, and recover from information security incidents. Assisting the Information and Cyber Security Management team in implementing improvement initiatives that increase our maturity across our ThreatManagement capabilities. The role will require extensive Incident Response experience … including developing threat hunting capabilities, security use cases and playbooks. Day to day Development of the tools and processes to establish and improve the threat hunting program. Keeping an up-to-date understanding of the cyber threat landscape through threat intelligence and industry research. Define and … design new security use cases and alerts to identify evolving attack scenarios. Participate in industry-based Threat Intelligence sharing groups. Produce reports based on threat activity, trends and reported industry incidents. Leading security incident response processes with support from the principal analyst. Integrating and analysing threat intelligence More ❯
nutshell The principal purpose of the role is to identify, contain, eradicate, and recover from information security incidents. Assisting the Information and Cyber Security Management team in implementing improvement initiatives that increase our maturity across our ThreatManagement capabilities. The role will require extensive Incident Response experience … including developing threat hunting capabilities, security use cases and playbooks. Day to day Development of the tools and processes to establish and improve the threat hunting program. Keeping an up-to-date understanding of the cyber threat landscape through threat intelligence and industry research. Define and … design new security use cases and alerts to identify evolving attack scenarios. Participate in industry-based Threat Intelligence sharing groups. Produce reports based on threat activity, trends and reported industry incidents. Leading security incident response processes with support from the principal analyst. Integrating and analysing threat intelligence More ❯
nutshell The principal purpose of the role is to identify, contain, eradicate, and recover from information security incidents. Assisting the Information and Cyber Security Management team in implementing improvement initiatives that increase our maturity across our ThreatManagement capabilities. The role will require extensive Incident Response experience … including developing threat hunting capabilities, security use cases and playbooks. Day to day Development of the tools and processes to establish and improve the threat hunting program. Keeping an up-to-date understanding of the cyber threat landscape through threat intelligence and industry research. Define and … design new security use cases and alerts to identify evolving attack scenarios. Participate in industry-based Threat Intelligence sharing groups. Produce reports based on threat activity, trends and reported industry incidents. Leading security incident response processes with support from the principal analyst. Integrating and analysing threat intelligence More ❯
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … in cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threatmanagement, vulnerability management, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. More ❯
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You’ll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … in cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threatmanagement, vulnerability management, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. More ❯
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You’ll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … in cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threatmanagement, vulnerability management, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. More ❯
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You’ll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … in cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threatmanagement, vulnerability management, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … in cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threatmanagement, vulnerability management, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … in cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threatmanagement, vulnerability management, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. More ❯
Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
Deloitte LLP
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … in cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threatmanagement, vulnerability management, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. More ❯
and executing a cybersecurity roadmap to establish a robust security posture and support the company's long-term objectives. Position - The role: The cybersecurity management system plays a pivotal role in safeguarding the organization's business assets and maintaining its resilience through proactive risk management, compliance adherence, and … and the board of directors Monitor and report IT-Security Key Performance Indicators (KPIs) to track effectiveness and identify areas for improvement Team & Budget Management Manage the company's Cyber Security team across 7 countries, providing them with strategic direction and leadership Manage the budget for the information security … function, monitoring and reporting discrepancies Risk Management, Security Architecture & Security Operations Identify, assess, and mitigate cybersecurity risks associated with company operations, data assets, and technologies, including intellectual property protection and regulatory compliance Conduct regular security audits and handle any breaches or security incidents that arise. Lead incident response efforts More ❯
great opportunity for anyone looking to progress their career in a supportive and fast paced environment. What you'll be responsible for: Security Monitoring & Threat Detection - Specializing in SIEM tools to identify anomalies across cloud and data center environments, while developing and maintaining security monitoring during the Azure transition. … Incident Response & Threat Hunting - Assisting in containment, eradication, and recovery of incidents, proactively hunting for threats, and mitigating operational risks. Risk & ThreatManagement - Staying updated on emerging threats, assessing risks, and implementing detection rules using security tools. Project & Stakeholder Support - Providing security guidance to ensure SOC standards More ❯
great opportunity for anyone looking to progress their career in a supportive and fast paced environment. What you'll be responsible for: * Security Monitoring & Threat Detection - Specializing in SIEM tools to identify anomalies across cloud and data center environments, while developing and maintaining security monitoring during the Azure transition. … Incident Response & Threat Hunting - Assisting in containment, eradication, and recovery of incidents, proactively hunting for threats, and mitigating operational risks. * Risk & ThreatManagement - Staying updated on emerging threats, assessing risks, and implementing detection rules using security tools. * Project & Stakeholder Support - Providing security guidance to ensure SOC standards More ❯
multi-tool environments (e.g QRadar, Sentinel, Datadog, Chronicle SIEM, XDR). The role requires advanced strategic engagement with client stakeholders at senior levels, proactive threatmanagement, governance, risk and compliance advisory, and advanced multi-cloud security knowledge. Extensive customer-facing experience in cybersecurity consulting or managed services is … Datadog, Chronicle). Advanced knowledge and practical experience with multi-cloud security (AWS, Azure, GCP) in managed services environments. Proven capability in incident handling, threat intelligence, and strategic security consulting. Training and Certifications: EC-Council C-CISO or equivalent executive cybersecurity certification CREST CPTIA (Practitioner Threat Intelligence Analyst … Chronicle SIEM Certification Advanced Multi-cloud Security Certification (AWS/Azure/GCP) CISM, CISSP or CRISC – or equivalent Soft Skills: Thought Leadership Stakeholder Management Strategic Negotiation Advanced Conflict Resolution Programme or Large Project Management experience Mentoring and Coaching Unfortunately for this role the client is not offering More ❯
Salford, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Daniel James Resourcing Ltd
Microsoft Azure environments, and enterprise infrastructure solutions . Youll be working on cutting-edge projects in a dynamic, collaborative team while developing skills in threatmanagement, compliance, and cybersecurity . Key Responsibilities: IT Infrastructure Security & Maintenance Oversee the installation, maintenance, and operation of security infrastructure including Microsoft Defender … antivirus systems, PKI, and Active Directory . Cloud & Identity Management Implement and optimize Microsoft Azure, Entra ID (Azure AD), Microsoft Intune, and Azure AD Sync to improve security and efficiency. Compliance & Best Practices Ensure compliance with ISO27001, Cyber Essentials, and security best practices , contributing to audits and regulatory assessments. … Server Hardening & Patch Management Implement security hardening across cloud and on-prem environments while driving patching strategies. Incident Response & Troubleshooting Identify and resolve operational issues while delivering reports and improvement strategies. Single Sign-On & Access Management Work with SAML 2.0, ADFS 2.0, and conditional access policies to optimize More ❯
cloud solutions. Familiarity with private cloud technologies like VMware and public cloud platforms such as Microsoft Azure is essential. A sound understanding of project management methodologies such as Agile, Waterfall, and PRINCE2. Knowledge of cyber attack modelling and breach investigation techniques. Experience with leading endpoint detection and threatmanagement products. Strong understanding of network security, including network behaviour analytics and NAC. Commercially astute with a good ability to translate between technical and business language. Commitment to providing exceptional service to internal teams and stakeholders. Familiarity with security control and compliance standards, including NCSC CAF, ISO27002, IEC17789 More ❯
cloud solutions. Familiarity with private cloud technologies like VMware and public cloud platforms such as Microsoft Azure is essential. A sound understanding of project management methodologies such as Agile, Waterfall, and PRINCE2. Knowledge of cyber attack modelling and breach investigation techniques. Experience with leading endpoint detection and threatmanagement products. Strong understanding of network security, including network behaviour analytics and NAC. Commercially astute with a good ability to translate between technical and business language. Commitment to providing exceptional service to internal teams and stakeholders. Familiarity with security control and compliance standards, including NCSC CAF, ISO27002, IEC17789 More ❯
BS1, Bristol, City of Bristol, United Kingdom Hybrid / WFH Options
Reboot Recruit Ltd
end solutions that protect their technology infrastructure and data. Your expertise will be pivotal in strengthening an organization’s security posture against a growing threat landscape, while building lasting relationships with clients. What’s in it for you? Enjoy hybrid working for an improved work-life balance, alongside a … role within an MSP/Reseller organization Experience in cybersecurity incident response and familiarity with industry standards (ISO27002, NIST, etc.) Expertise in endpoint detection, threatmanagement, and advanced cybersecurity services (SSE, SASE, SIEM, MDR/EDR) Strong communication, organizational, and problem-solving skills Relevant certifications (CISSP, CISM, etc. More ❯
Pre-Sales or similar role within an MSP/Reseller. Experience with incident response teams and understanding of response stages. Familiar with endpoint detection, threatmanagement, and cyber security services (SSE, SASE, SIEM, MDR/EDR). Strong knowledge of global Information Security Standards (ISO27002, NIST CSF). More ❯
West Midlands, United Kingdom Hybrid / WFH Options
La Fosse
a household name that impacts all of our lives to develop new cyber capabilities from the ground up. They're looking for a Cyber Threat Manager (OT/CNI) to help out build out their Cyber Defence Function in the OT/CNI space and keep them ahead of … the curve when it comes to threat management. This is a rare opportunity to join a large organisation and play a pivotal role in building new capabilities with no legacy systems in place and you'll have the chance to shape the future of their cybersecurity operations from the … very beginning. We're looking for candidates with experience in: Cyber Defence SecOps Incident Response Digital Forensics ThreatManagement Operational Technology CNI Staying up to date with new and emerging threats Details: Location : West Midlands – Hybrid Salary : Up to £95,000 Bonus : 10% Pension : 6%/10% Healthcare More ❯
london, south east england, united kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
gap analysis What We’re Looking For 5+ years in Pre-Sales or similar role within an MSP/Reseller organisation. Endpoint detection and threatmanagement products Experience with the following vendors would be advantageous – Microsoft, Crowdstrike, Sophos, SentinelOne, ESET, Fortinet, Palo Alto and Zscaler Relevant security certifications More ❯
High Wycombe, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Dreams Ltd
retail/multi-site/FMCG space. - Understanding IT Security concepts used in dispersed organisations, such as Firewalls, Web Filtering, Virus Protection, encryption and Threat Management. - Understanding the needs of secure IT environments, backup and patch processes and change control process. - Awareness of ITIL principles and best practice and More ❯