it job board logo
  • Home
  • Find IT Jobs
  • Register CV
  • Register as Employer
  • Contact us
  • Career Advice
  • Recruiting? Post a job
  • Sign in
  • Sign up
  • Home
  • Find IT Jobs
  • Register CV
  • Register as Employer
  • Contact us
  • Career Advice
Sorry, that job is no longer available. Here are some results that may be similar to the job you were looking for.

260 jobs found

Email me jobs like this
Refine Search
Current Search
cyber security analyst
Acorn Insurance and Financial Services Limited
Senior Information Security Analyst
Acorn Insurance and Financial Services Limited Liverpool
Due to a period of exciting growth Acorn are looking for a highly skilled and experienced Senior Information Security Analyst to join our Information Security Team. Within this role you get the opportunity to join a collaborative team and have a chance to blend GRC responsibilities with technical security experience, all whilst working for a market leading insurance company, supporting and maintaining robust security controls and regulatory compliance.   Job Title:  Senior Information Security Analyst (12 month FTC) Location:  Liverpool City Centre, Hybrid working available Working Hours:  Monday to Friday, 37.5 hours per week , 9:00 AM – 5:30 PM Salary:  £50,000 - £60,000 pa (DOE).   What you will be doing: Work with all parties across the business to identify and assess risk and ensure mitigations are tracked to completion. Lead the development and maintenance of information security policies, standards and procedures in line with regulatory frameworks and industry standards. Lead third party risk management processes. Collaborate across all areas of the business to align security policies and processes with business objectives and regulatory obligations. Work with Security Operations and IT teams to provide oversight of vulnerability assessments and remediation activities. Lead on security architecture reviews for new systems and services. Evaluate technical security controls and recommending improvements. Support the implementation of security tools and technologies. Provide oversight of the security incident management process. Provide security metrics for interested parties at all levels. Lead the security awareness programme to promote a culture of security within all levels of the Group. Provide support for internal and external security audits. Lead security governance meetings representing the Information Security team and standing in for the Head of Information Security when required. Provide subject matter expertise liaising across all business functions.   What we look for: Minimum 5 years' experience in information security roles. Strong leadership and mentorship abilities with a strategic mindset. Experience with risk assessment methodologies. Excellent analytical and problem-solving skills with attention to detail. Strong communication skills with the ability to explain complex security concepts to non-technical stakeholders. Ability to manage risk and compliance projects and drive security initiatives. Knowledge of information security frameworks such as ISO 27001 or NIST. Knowledge of vulnerability management processes.   About Acorn Insurance With over 40 years of experience, Acorn Insurance is a specialist provider dedicated to helping individuals secure motor insurance across the UK. We proudly serve more than 50,000 customers, ensuring they find policies that meet their needs and provide the peace of mind that comes with high-quality cover. At Acorn Insurance, we offer comprehensive training and continuous in-house coaching. You'll receive in-depth, FCA-regulated industry knowledge and all the tools necessary to grow your career with us. We celebrate diversity and are committed to fostering a culture where everyone feels respected and valued. As a Disability Confident Level 1 and Level 2 employer, we ensure our workplace is accessible and inclusive, encouraging our people to bring their best selves to work every day. The Acorn Group has been recognised as a Great Place to Work for 2024/5. A record number of employees participated in our survey, overwhelmingly highlighting our welcoming and supportive atmosphere as an excellent place to build a career. We are committed to continuous improvement and have ambitious plans for 2025.  Why Acorn Insurance? Acorn Insurance want to give you more than a job, we want to give you a purpose and a career. So, what can we offer you as an employer? Some of the "your tomorrow" benefits you will receive include: Wellbeing:  Enhanced Annual Leave entitlement starting at 31 days and potentially increasing to 35 days per year depending on grade & length of service (including bank holidays) Enhanced paternity pay and 16 weeks full maternity pay. Colleague Assistance programme offers a suite of wellbeing services such as: 6 Free Counselling sessions per year Unlimited access to a telephone councillor 24/7 Access to a free 4-week programme of cognitive behavioural therapy (CBT) with a trained therapist mentor.  Network of internal qualified mental health first aiders are available to provide support to colleagues. Financial: A core level of life assurance with the option to increase cover via salary sacrifice and add your spouse/partner  Ability to access your earnings before payday via Dayforce Wallet. Company pension scheme Refer a friend scheme with a £250 bonus for every colleague recommended on passing their probation period. Access to a flexible benefits platform including an annual flex pot allowance to spend on over 15 benefits of your choice. Ability to give back. You can opt into donating money to charity to climate positive organisations directly from your salary.   Reward, Recognition and Culture :  Long Service Award paid on 5,10- and 15-years’ service A reward and recognition hub to celebrate and reward colleagues and peers. Consistent and engaging company events including company awards, competitions and charity fundraisers. Budgets for department leaders to use for social and engagement events. Please visit out website to view more of our excellent work benefits!    All roles are subject to DBS and Financial checks, any offer made will be conditional until checks are completed to a satisfactory standard. Unfortunately, due to the length of training and complexity of the role, we can only accept applications from candidates who have at least one year remaining on their (Graduate/ Post study work) visa. Unfortunately, we are unable to provide visa sponsorships. At Acorn, we are committed to creating an inclusive and supportive work environment. We recognise that candidates may have specific needs and are happy to consider reasonable adjustments to the recruitment process and working environment to accommodate individual requirements. Whether it’s modifying equipment, adjusting working hours, or providing additional support, we aim to ensure all employees can perform at their best. If you require any reasonable adjustments, please let us know during the application or interview process, and we will work with you to ensure your needs are met.
25/04/2025
Full time
Due to a period of exciting growth Acorn are looking for a highly skilled and experienced Senior Information Security Analyst to join our Information Security Team. Within this role you get the opportunity to join a collaborative team and have a chance to blend GRC responsibilities with technical security experience, all whilst working for a market leading insurance company, supporting and maintaining robust security controls and regulatory compliance.   Job Title:  Senior Information Security Analyst (12 month FTC) Location:  Liverpool City Centre, Hybrid working available Working Hours:  Monday to Friday, 37.5 hours per week , 9:00 AM – 5:30 PM Salary:  £50,000 - £60,000 pa (DOE).   What you will be doing: Work with all parties across the business to identify and assess risk and ensure mitigations are tracked to completion. Lead the development and maintenance of information security policies, standards and procedures in line with regulatory frameworks and industry standards. Lead third party risk management processes. Collaborate across all areas of the business to align security policies and processes with business objectives and regulatory obligations. Work with Security Operations and IT teams to provide oversight of vulnerability assessments and remediation activities. Lead on security architecture reviews for new systems and services. Evaluate technical security controls and recommending improvements. Support the implementation of security tools and technologies. Provide oversight of the security incident management process. Provide security metrics for interested parties at all levels. Lead the security awareness programme to promote a culture of security within all levels of the Group. Provide support for internal and external security audits. Lead security governance meetings representing the Information Security team and standing in for the Head of Information Security when required. Provide subject matter expertise liaising across all business functions.   What we look for: Minimum 5 years' experience in information security roles. Strong leadership and mentorship abilities with a strategic mindset. Experience with risk assessment methodologies. Excellent analytical and problem-solving skills with attention to detail. Strong communication skills with the ability to explain complex security concepts to non-technical stakeholders. Ability to manage risk and compliance projects and drive security initiatives. Knowledge of information security frameworks such as ISO 27001 or NIST. Knowledge of vulnerability management processes.   About Acorn Insurance With over 40 years of experience, Acorn Insurance is a specialist provider dedicated to helping individuals secure motor insurance across the UK. We proudly serve more than 50,000 customers, ensuring they find policies that meet their needs and provide the peace of mind that comes with high-quality cover. At Acorn Insurance, we offer comprehensive training and continuous in-house coaching. You'll receive in-depth, FCA-regulated industry knowledge and all the tools necessary to grow your career with us. We celebrate diversity and are committed to fostering a culture where everyone feels respected and valued. As a Disability Confident Level 1 and Level 2 employer, we ensure our workplace is accessible and inclusive, encouraging our people to bring their best selves to work every day. The Acorn Group has been recognised as a Great Place to Work for 2024/5. A record number of employees participated in our survey, overwhelmingly highlighting our welcoming and supportive atmosphere as an excellent place to build a career. We are committed to continuous improvement and have ambitious plans for 2025.  Why Acorn Insurance? Acorn Insurance want to give you more than a job, we want to give you a purpose and a career. So, what can we offer you as an employer? Some of the "your tomorrow" benefits you will receive include: Wellbeing:  Enhanced Annual Leave entitlement starting at 31 days and potentially increasing to 35 days per year depending on grade & length of service (including bank holidays) Enhanced paternity pay and 16 weeks full maternity pay. Colleague Assistance programme offers a suite of wellbeing services such as: 6 Free Counselling sessions per year Unlimited access to a telephone councillor 24/7 Access to a free 4-week programme of cognitive behavioural therapy (CBT) with a trained therapist mentor.  Network of internal qualified mental health first aiders are available to provide support to colleagues. Financial: A core level of life assurance with the option to increase cover via salary sacrifice and add your spouse/partner  Ability to access your earnings before payday via Dayforce Wallet. Company pension scheme Refer a friend scheme with a £250 bonus for every colleague recommended on passing their probation period. Access to a flexible benefits platform including an annual flex pot allowance to spend on over 15 benefits of your choice. Ability to give back. You can opt into donating money to charity to climate positive organisations directly from your salary.   Reward, Recognition and Culture :  Long Service Award paid on 5,10- and 15-years’ service A reward and recognition hub to celebrate and reward colleagues and peers. Consistent and engaging company events including company awards, competitions and charity fundraisers. Budgets for department leaders to use for social and engagement events. Please visit out website to view more of our excellent work benefits!    All roles are subject to DBS and Financial checks, any offer made will be conditional until checks are completed to a satisfactory standard. Unfortunately, due to the length of training and complexity of the role, we can only accept applications from candidates who have at least one year remaining on their (Graduate/ Post study work) visa. Unfortunately, we are unable to provide visa sponsorships. At Acorn, we are committed to creating an inclusive and supportive work environment. We recognise that candidates may have specific needs and are happy to consider reasonable adjustments to the recruitment process and working environment to accommodate individual requirements. Whether it’s modifying equipment, adjusting working hours, or providing additional support, we aim to ensure all employees can perform at their best. If you require any reasonable adjustments, please let us know during the application or interview process, and we will work with you to ensure your needs are met.
iFindTech Ltd
Security Operations Center Analyst
iFindTech Ltd
Graduate SOC Analyst Managed Security Services Provider, London Fully Remote We are working with a leading MSSP in London who are looking to hire a Graduate SOC Analyst to join their growing Security Operations team. This is a fully remote role, ideal for someone at the start of their cyber security career who is keen to learn, investigate, and grow in a hands on SOC environment. Main Skills Required Basic programming or Scripting experience Linux experience Bonus Skills Genuine passion for cyber security Enjoys problem solving and investigation Naturally inquisitive mindset Understanding of the Cyber Kill Chain and the phases of security incident response Responsibilities Analyse and investigate alerts generated by SIEM platforms Support the day to day maintenance and tuning of SIEM and Next Gen UBA tools, including rules, alerts, and reports Take ownership of the security incident management process, including customer notification, prioritisation, investigation, updates, reporting, and closure Monitor and analyse events and abnormal user behaviour to identify potential breaches, malware, and malicious activity Use threat intelligence services to identify known and emerging threats and help develop mitigations Work closely with customer security teams to detect, contain, and eradicate threats Build knowledge across wider IT and security tools including Firewalls, endpoint solutions, and Active Directory Gain exposure to security assessments and compliance standards such as ISO27001 and PCI, advantageous but not essential This role offers structured training, real world security exposure, and a clear path for progression within a professional SOC environment, all while working fully remotely.
08/01/2026
Full time
Graduate SOC Analyst Managed Security Services Provider, London Fully Remote We are working with a leading MSSP in London who are looking to hire a Graduate SOC Analyst to join their growing Security Operations team. This is a fully remote role, ideal for someone at the start of their cyber security career who is keen to learn, investigate, and grow in a hands on SOC environment. Main Skills Required Basic programming or Scripting experience Linux experience Bonus Skills Genuine passion for cyber security Enjoys problem solving and investigation Naturally inquisitive mindset Understanding of the Cyber Kill Chain and the phases of security incident response Responsibilities Analyse and investigate alerts generated by SIEM platforms Support the day to day maintenance and tuning of SIEM and Next Gen UBA tools, including rules, alerts, and reports Take ownership of the security incident management process, including customer notification, prioritisation, investigation, updates, reporting, and closure Monitor and analyse events and abnormal user behaviour to identify potential breaches, malware, and malicious activity Use threat intelligence services to identify known and emerging threats and help develop mitigations Work closely with customer security teams to detect, contain, and eradicate threats Build knowledge across wider IT and security tools including Firewalls, endpoint solutions, and Active Directory Gain exposure to security assessments and compliance standards such as ISO27001 and PCI, advantageous but not essential This role offers structured training, real world security exposure, and a clear path for progression within a professional SOC environment, all while working fully remotely.
Akkodis
Principal Cyber Security Incident Response Analyst
Akkodis
Principal Cyber Security Incident Response Analyst 60,000 - 70,000 Full Time / Permanent West Midlands / Hybrid (1-2 days a month in the office ideally) The Role I am looking for a driven and experienced Principal Cyber Security Incident Response Analyst to join a large nationally recognised brand head quartered in the West Midlands. As a Principal Cyber Security Incident Response Analyst, you will play a pivotal role in protecting critical systems, assets, and people from cyber security threats. You'll be part of a world-class team, working at the forefront of threat detection and response. We are ideally looking for someone Midlands based who can be on site in Warwickshire 1-2 days a month on average. Responsibilities Provide leadership and mentorship to Analysts and Senior Analysts, fostering a culture of excellence and continuous development. Drive the evolution and enhancement of the Cyber Security Incident Response function, ensuring the team consistently meets and exceeds key performance indicators. Lead investigations and remediation efforts for cyber security incidents and alerts across diverse sources, including network, endpoint, cloud environments, and threat intelligence feeds. Perform in-depth trend analysis to identify patterns and inform improvements in organisational controls and threat detection capabilities. Develop, maintain, and continuously improve documentation and reporting frameworks to support transparency, consistency, and strategic decision-making. Experience required: Previous experience in a similar Cyber Incident Response Analyst role, preferably in a senior or lead capacity. Strong experience in security monitoring across diverse systems and environments, including cloud and on-premises. Proven leadership in incident response within SOC settings. Deep understanding of the cyber threat landscape, attack vectors, and detection techniques. Proficient in cybersecurity tools, regulations, and compliance standards. Excellent communication and stakeholder engagement skills, with the ability to convey technical insights to varied audiences. Please apply via the link or contact (url removed) for more information Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers in the UK. Modis Europe Ltd provide a variety of international solutions that connect clients to the best talent in the world. For all positions based in Switzerland, Modis Europe Ltd works with its licensed Swiss partner Accurity GmbH to ensure that candidate applications are handled in accordance with Swiss law. Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers. By applying for this role your details will be submitted to Modis International Ltd and/ or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website.
08/01/2026
Full time
Principal Cyber Security Incident Response Analyst 60,000 - 70,000 Full Time / Permanent West Midlands / Hybrid (1-2 days a month in the office ideally) The Role I am looking for a driven and experienced Principal Cyber Security Incident Response Analyst to join a large nationally recognised brand head quartered in the West Midlands. As a Principal Cyber Security Incident Response Analyst, you will play a pivotal role in protecting critical systems, assets, and people from cyber security threats. You'll be part of a world-class team, working at the forefront of threat detection and response. We are ideally looking for someone Midlands based who can be on site in Warwickshire 1-2 days a month on average. Responsibilities Provide leadership and mentorship to Analysts and Senior Analysts, fostering a culture of excellence and continuous development. Drive the evolution and enhancement of the Cyber Security Incident Response function, ensuring the team consistently meets and exceeds key performance indicators. Lead investigations and remediation efforts for cyber security incidents and alerts across diverse sources, including network, endpoint, cloud environments, and threat intelligence feeds. Perform in-depth trend analysis to identify patterns and inform improvements in organisational controls and threat detection capabilities. Develop, maintain, and continuously improve documentation and reporting frameworks to support transparency, consistency, and strategic decision-making. Experience required: Previous experience in a similar Cyber Incident Response Analyst role, preferably in a senior or lead capacity. Strong experience in security monitoring across diverse systems and environments, including cloud and on-premises. Proven leadership in incident response within SOC settings. Deep understanding of the cyber threat landscape, attack vectors, and detection techniques. Proficient in cybersecurity tools, regulations, and compliance standards. Excellent communication and stakeholder engagement skills, with the ability to convey technical insights to varied audiences. Please apply via the link or contact (url removed) for more information Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers in the UK. Modis Europe Ltd provide a variety of international solutions that connect clients to the best talent in the world. For all positions based in Switzerland, Modis Europe Ltd works with its licensed Swiss partner Accurity GmbH to ensure that candidate applications are handled in accordance with Swiss law. Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers. By applying for this role your details will be submitted to Modis International Ltd and/ or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website.
Hays Technology
Lead SOC Analyst
Hays Technology
Your New Company and Role We're partnering with a leading organisation seeking an experienced Lead SOC Analyst to join their team in Glasgow on a 12-month contract. This is a fantastic opportunity to take a leadership role within a 24/7 Security Operations Centre (SOC), protecting critical systems from cyber threats. As a Level 2 SOC Analyst, you'll not only monitor and respond to incidents but also provide guidance and support to junior team members. Your responsibilities will include: Continuous Monitoring: Oversee SIEM tools (including Splunk) to detect suspicious activity and ensure timely response. Incident Triage: Analyse alerts and logs to confirm genuine incidents and prioritise effectively. Initial Incident Response: Execute containment actions and escalate complex cases to senior analysts. Reporting & Documentation: Maintain detailed records of incidents and actions taken for tracking and analysis. Team Leadership: Provide direction and support to junior analysts during shifts and ensure smooth handovers. Tool Management: Assist in maintaining and optimising security tools for peak performance. What You'll Need to Succeed Strong leadership skills with the ability to guide and mentor junior team members. Excellent problem-solving abilities, attention to detail, and ability to work under pressure. Hands-on experience with Splunk in a SOC environment. Solid understanding of networking (TCP/IP, DNS), operating systems (Windows/Linux), and common cyber-attack techniques. A degree in Computer Science, Cybersecurity, IT, or equivalent experience. Certifications such as CompTIA Security+, CySA+, or similar are highly desirable. What You'll Get in Return Competitive daily rate up to 633. 12-month contract with potential for extension. Opportunity to lead within a high-performing SOC team on mission-critical projects. What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now. If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion about your career. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
08/01/2026
Contractor
Your New Company and Role We're partnering with a leading organisation seeking an experienced Lead SOC Analyst to join their team in Glasgow on a 12-month contract. This is a fantastic opportunity to take a leadership role within a 24/7 Security Operations Centre (SOC), protecting critical systems from cyber threats. As a Level 2 SOC Analyst, you'll not only monitor and respond to incidents but also provide guidance and support to junior team members. Your responsibilities will include: Continuous Monitoring: Oversee SIEM tools (including Splunk) to detect suspicious activity and ensure timely response. Incident Triage: Analyse alerts and logs to confirm genuine incidents and prioritise effectively. Initial Incident Response: Execute containment actions and escalate complex cases to senior analysts. Reporting & Documentation: Maintain detailed records of incidents and actions taken for tracking and analysis. Team Leadership: Provide direction and support to junior analysts during shifts and ensure smooth handovers. Tool Management: Assist in maintaining and optimising security tools for peak performance. What You'll Need to Succeed Strong leadership skills with the ability to guide and mentor junior team members. Excellent problem-solving abilities, attention to detail, and ability to work under pressure. Hands-on experience with Splunk in a SOC environment. Solid understanding of networking (TCP/IP, DNS), operating systems (Windows/Linux), and common cyber-attack techniques. A degree in Computer Science, Cybersecurity, IT, or equivalent experience. Certifications such as CompTIA Security+, CySA+, or similar are highly desirable. What You'll Get in Return Competitive daily rate up to 633. 12-month contract with potential for extension. Opportunity to lead within a high-performing SOC team on mission-critical projects. What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now. If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion about your career. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
Hays Technology
Senior SOC Analyst
Hays Technology
Your New Company and Role We're working with a leading organisation seeking a Senior SOC Analyst to join their team in Glasgow on a 12-month contract. This is an exciting opportunity to be at the forefront of cyber defence, protecting critical systems from evolving threats. As part of a 24/7 Security Operations Centre (SOC) team, you'll monitor systems, detect potential incidents, and initiate the incident response process. Your key responsibilities will include: Continuous Monitoring: Use SIEM tools (including Splunk) to identify suspicious activity and respond efficiently. Incident Triage: Analyse alerts and logs to determine genuine incidents and prioritise accordingly. Initial Incident Response: Perform containment actions and escalate to senior analysts for deeper investigation. Reporting & Documentation: Create detailed incident reports and maintain accurate records. Tool Management: Assist in maintaining and optimising security tools for peak performance. What You'll Need to Succeed Strong problem-solving skills, attention to detail, and ability to work under pressure. Excellent communication skills and a collaborative approach. Hands-on experience with Splunk in a SOC environment. Solid understanding of networking (TCP/IP, DNS), operating systems (Windows/Linux), and common cyber-attack techniques. A degree in Computer Science, Cybersecurity, IT, or equivalent experience. Certifications such as CompTIA Security+, CySA+, or similar are highly desirable. What You'll Get in Return Competitive daily rate up to 573. 12-month contract with potential for extension. Opportunity to work in a high-performing SOC team on mission-critical projects. What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now. If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion about your career. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
08/01/2026
Contractor
Your New Company and Role We're working with a leading organisation seeking a Senior SOC Analyst to join their team in Glasgow on a 12-month contract. This is an exciting opportunity to be at the forefront of cyber defence, protecting critical systems from evolving threats. As part of a 24/7 Security Operations Centre (SOC) team, you'll monitor systems, detect potential incidents, and initiate the incident response process. Your key responsibilities will include: Continuous Monitoring: Use SIEM tools (including Splunk) to identify suspicious activity and respond efficiently. Incident Triage: Analyse alerts and logs to determine genuine incidents and prioritise accordingly. Initial Incident Response: Perform containment actions and escalate to senior analysts for deeper investigation. Reporting & Documentation: Create detailed incident reports and maintain accurate records. Tool Management: Assist in maintaining and optimising security tools for peak performance. What You'll Need to Succeed Strong problem-solving skills, attention to detail, and ability to work under pressure. Excellent communication skills and a collaborative approach. Hands-on experience with Splunk in a SOC environment. Solid understanding of networking (TCP/IP, DNS), operating systems (Windows/Linux), and common cyber-attack techniques. A degree in Computer Science, Cybersecurity, IT, or equivalent experience. Certifications such as CompTIA Security+, CySA+, or similar are highly desirable. What You'll Get in Return Competitive daily rate up to 573. 12-month contract with potential for extension. Opportunity to work in a high-performing SOC team on mission-critical projects. What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now. If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion about your career. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
RAIL SAFETY AND STANDARDS BOARD
Principal Control, Command, Signalling, and Communications (CCS&C) Engineer
RAIL SAFETY AND STANDARDS BOARD
Principal Control, Command, Signalling, and Communications (CCS&C) Engineer We are seeking a Principal Control, Command, Signalling, and Communications (CCS&C) Engineer to provide expert guidance on RSSB's CCS&C standards and signalling projects, with expertise in either conventional signalling or digital signalling. This integral role involves leading the development of system compatibility requirements, ensuring safe integration, and managing operational technology including hardware, firmware, software, and data for signalling, train control, traffic management, SCADA, and remote monitoring systems. This is a permanent, full-time role based at our Fenchurch Avenue office and includes some hybrid working. The closing date for this role is 12th January 2026. Early application is encouraged, and candidates may be contacted before the close date. RSSB reserves the right to close this advertisement early should suitable candidates be identified. What you'll be doing: Provide technical leadership and expertise on rail systems engineering, predominately control, command, signalling and communications (CCS&C) Lead and contribute to research and innovation projects, standards development, and industry guidance on CCS&C topics, such as conventional signalling, digital signalling, cyber security, and interoperability Engage with a wide range of stakeholders, including rail operators, infrastructure managers, suppliers, regulators, and academia, to understand their needs and expectations, and to influence and promote best practice in (CCS&C) engineering Work as part of a multidisciplinary team of engineers, analysts, and specialists, and collaborate with external partners and experts, to deliver high-quality outputs that support RSSB's vision and mission What we're looking for: A degree in engineering, computer science, or a related discipline, and a professional qualification (e.g. CEng, IEng, CITP) or equivalent experience Extensive knowledge and experience in (CCS&C) engineering, and a track record of delivering successful projects and outcomes Effective communication and interpersonal skills, and the ability to present complex technical information to diverse audiences, both verbally and in writing Analytical and problem-solving skills, and the ability to apply systems thinking and innovation to (CCS&C) challenges and opportunities A passion for rail safety and standards, and a commitment to continuous learning and professional development Why Join RSSB? We value our people and offer a competitive benefits package, including: 30 days annual leave (plus bank holidays) Private medical and dental cover Smart working policy Season ticket loan and travel subsidy Cycle to work scheme Volunteer leave Performance-related bonus Pension scheme Learning and development opportunities We value diversity and equal opportunities in employment and are committed to creating a workplace which is inclusive to everyone. As a member of the Disability Confident Scheme , we encourage candidates with disabilities who meet the minimum criteria, to apply for our jobs. If you have applied under the Disability Confident Scheme, please let us know in advance by emailing Find out more about Diversity and Inclusion at RSSB: Rail Safety and Standards Board Careers - VERCIDA If you require any reasonable adjustments with respect to our selection process including information in an alternative format, please contact us at We understand the importance of work-life balance and we offer our staff the flexibility to work within our core hours and the option to vary their location between both the office and home. If you are looking for further flexibility, speak to us at interview stage so that we can consider your request.
07/01/2026
Full time
Principal Control, Command, Signalling, and Communications (CCS&C) Engineer We are seeking a Principal Control, Command, Signalling, and Communications (CCS&C) Engineer to provide expert guidance on RSSB's CCS&C standards and signalling projects, with expertise in either conventional signalling or digital signalling. This integral role involves leading the development of system compatibility requirements, ensuring safe integration, and managing operational technology including hardware, firmware, software, and data for signalling, train control, traffic management, SCADA, and remote monitoring systems. This is a permanent, full-time role based at our Fenchurch Avenue office and includes some hybrid working. The closing date for this role is 12th January 2026. Early application is encouraged, and candidates may be contacted before the close date. RSSB reserves the right to close this advertisement early should suitable candidates be identified. What you'll be doing: Provide technical leadership and expertise on rail systems engineering, predominately control, command, signalling and communications (CCS&C) Lead and contribute to research and innovation projects, standards development, and industry guidance on CCS&C topics, such as conventional signalling, digital signalling, cyber security, and interoperability Engage with a wide range of stakeholders, including rail operators, infrastructure managers, suppliers, regulators, and academia, to understand their needs and expectations, and to influence and promote best practice in (CCS&C) engineering Work as part of a multidisciplinary team of engineers, analysts, and specialists, and collaborate with external partners and experts, to deliver high-quality outputs that support RSSB's vision and mission What we're looking for: A degree in engineering, computer science, or a related discipline, and a professional qualification (e.g. CEng, IEng, CITP) or equivalent experience Extensive knowledge and experience in (CCS&C) engineering, and a track record of delivering successful projects and outcomes Effective communication and interpersonal skills, and the ability to present complex technical information to diverse audiences, both verbally and in writing Analytical and problem-solving skills, and the ability to apply systems thinking and innovation to (CCS&C) challenges and opportunities A passion for rail safety and standards, and a commitment to continuous learning and professional development Why Join RSSB? We value our people and offer a competitive benefits package, including: 30 days annual leave (plus bank holidays) Private medical and dental cover Smart working policy Season ticket loan and travel subsidy Cycle to work scheme Volunteer leave Performance-related bonus Pension scheme Learning and development opportunities We value diversity and equal opportunities in employment and are committed to creating a workplace which is inclusive to everyone. As a member of the Disability Confident Scheme , we encourage candidates with disabilities who meet the minimum criteria, to apply for our jobs. If you have applied under the Disability Confident Scheme, please let us know in advance by emailing Find out more about Diversity and Inclusion at RSSB: Rail Safety and Standards Board Careers - VERCIDA If you require any reasonable adjustments with respect to our selection process including information in an alternative format, please contact us at We understand the importance of work-life balance and we offer our staff the flexibility to work within our core hours and the option to vary their location between both the office and home. If you are looking for further flexibility, speak to us at interview stage so that we can consider your request.
Pontoon
Geopolitical Intelligence Analyst
Pontoon Warwick, Warwickshire
Geopolitical Intelligence Analyst Utilities Predominantly remote - 1 day per month in Warwick 6 months+ Contract In short: We require an Intelligence Analyst with experience in Geopolitics to join a specialist Threat Intelligence team. You will research, read, document and present findings to senior stakeholders. This is not a cyber threat role and wouldn't suit a pure cyber candidate (too technical). This role would suit an intelligence analyst who can demonstrate an ability to analyse current geopolitics affecting the energy industry. In full: Role overview: Monitor, research and evaluate geopolitical issues and trends that may impact business objectives and provide corresponding guidance and recommendations to inform risk assessments and business decisions relating to security posture, operations, investments and partners. Guidance and recommendations include tactical, operational and strategic threat intelligence to allow us to proactively defend against current and emerging geopolitical threats stemming from any jurisdiction globally and achieve operational effectiveness at reducing the risk and impact of any geopolitical threats confronting the business. Develop, implement and maintain a framework for monitoring and analysis, centred on clear intelligence requirements and key indicators or warnings. Engage with senior business stakeholders to define and agree intelligence requirements and understanding of assessments and recommendations. Provide strategic direction and outlook by horizon scanning for future trends and threats in the geopolitical domain. Simultaneously work closely with the Security leadership team and Strategy (under the Chief Commercial Officer) to ensure that timely intelligence is distributed to allow effective and timely security and business decision making. Generate confidence in intelligence products by managing disagreement and questions relating to intelligence sources and assessments. Manage conflict and orchestrate consensus in high pressure and politically sensitive environments, which ensuring operational security of assessments and sources at all times. Deputise for the Threat Intelligence Manager, including management of a team and supporting senior stakeholders up to EXCO level. Key accountabilities: By their nature, Intelligence roles are operating in a high-pressure environment where threat information is hidden, scarce or missing. Each role is accountable for the assessments they provide and to defend the evidence and analytical rigour they've used. This accountability isn't delegated upwards. Day to day monitoring and analysis of geopolitical developments against Priority Intelligence Requirements. Contribute to the analysis and delivery of broad thematic issues that inform wider strategy and implementation, and the security risks posed. Monitor and interrogate geopolitical intelligence and security feeds/sources. Provide geopolitical assessments and trends analysis for the weekly intelligence summary and other routine intelligence products and briefings. Provide guidance and consultancy to the Security Leadership team and other relevant business units such as Strategy and Markets on all matters relating to geopolitical threats such as how they're identified, tracked, evaluated and countered. Enable these stakeholders to be threat lead in their approach and priorities; and respond swiftly with controls/countermeasures by having timely and accurate understanding of geopolitical impacts on security. Collect strategic, operational and tactical geopolitical intelligence and assess the threat posed by external developments. Produce proactive intelligence reports to aid Security response plans on emerging threats. Produce geopolitical threat assessments for the weekly intelligence summary and quarterly threat intelligence updates for the OES forum. Monitor global and strategic trends in security threats. Ensure that emerging trends are briefed in regular cadence intelligence products. Produce the monthly EXCO intelligence summary which includes reviewing and orchestrating threat intelligence content from the Strategic Cyber Senior Analyst and the Physical & Environmental Senior Analyst, reviewing and guiding them on the relevance, clarity and prioritisation of content for EXCO. React to any geopolitical related requirement for intelligence request (RFI) as per the priorities set by the intelligence manager. Brief geopolitical intelligence updates to EXCO level or partners across government as the SME. Attend and provide intelligence briefs at the UK Energy Resilience Group Special Interest Group (SIG) - a Gov't/Industry roundtable to collaborate on strategic, operational and tactical security threats, risks and responses Essential experience: Proven experience in the fields of geopolitics, geoeconomics, threat intelligence, security & defence and the ability to produce all source analysis and assessments that identify the relevance. A deep understanding of, and interest in, the geopolitical and political context for the UK, critical national infrastructure, Energy Sector, gas sector (Methane, Hydrogen and CO2) and Gas. Proven ability to work independently and proactively. Must have ability to independently conduct high-quality preliminary research and analysis. Proven experience of managing intelligence collection plans and developing indicators of warnings. Excellent research, analysis and critical thinking skills. Strong understanding of how threat intelligence is translated into intelligence assessments and recommendations in an all-source analysis environment. Candidates will ideally show evidence of the above in their CV in order to be considered.
07/01/2026
Contractor
Geopolitical Intelligence Analyst Utilities Predominantly remote - 1 day per month in Warwick 6 months+ Contract In short: We require an Intelligence Analyst with experience in Geopolitics to join a specialist Threat Intelligence team. You will research, read, document and present findings to senior stakeholders. This is not a cyber threat role and wouldn't suit a pure cyber candidate (too technical). This role would suit an intelligence analyst who can demonstrate an ability to analyse current geopolitics affecting the energy industry. In full: Role overview: Monitor, research and evaluate geopolitical issues and trends that may impact business objectives and provide corresponding guidance and recommendations to inform risk assessments and business decisions relating to security posture, operations, investments and partners. Guidance and recommendations include tactical, operational and strategic threat intelligence to allow us to proactively defend against current and emerging geopolitical threats stemming from any jurisdiction globally and achieve operational effectiveness at reducing the risk and impact of any geopolitical threats confronting the business. Develop, implement and maintain a framework for monitoring and analysis, centred on clear intelligence requirements and key indicators or warnings. Engage with senior business stakeholders to define and agree intelligence requirements and understanding of assessments and recommendations. Provide strategic direction and outlook by horizon scanning for future trends and threats in the geopolitical domain. Simultaneously work closely with the Security leadership team and Strategy (under the Chief Commercial Officer) to ensure that timely intelligence is distributed to allow effective and timely security and business decision making. Generate confidence in intelligence products by managing disagreement and questions relating to intelligence sources and assessments. Manage conflict and orchestrate consensus in high pressure and politically sensitive environments, which ensuring operational security of assessments and sources at all times. Deputise for the Threat Intelligence Manager, including management of a team and supporting senior stakeholders up to EXCO level. Key accountabilities: By their nature, Intelligence roles are operating in a high-pressure environment where threat information is hidden, scarce or missing. Each role is accountable for the assessments they provide and to defend the evidence and analytical rigour they've used. This accountability isn't delegated upwards. Day to day monitoring and analysis of geopolitical developments against Priority Intelligence Requirements. Contribute to the analysis and delivery of broad thematic issues that inform wider strategy and implementation, and the security risks posed. Monitor and interrogate geopolitical intelligence and security feeds/sources. Provide geopolitical assessments and trends analysis for the weekly intelligence summary and other routine intelligence products and briefings. Provide guidance and consultancy to the Security Leadership team and other relevant business units such as Strategy and Markets on all matters relating to geopolitical threats such as how they're identified, tracked, evaluated and countered. Enable these stakeholders to be threat lead in their approach and priorities; and respond swiftly with controls/countermeasures by having timely and accurate understanding of geopolitical impacts on security. Collect strategic, operational and tactical geopolitical intelligence and assess the threat posed by external developments. Produce proactive intelligence reports to aid Security response plans on emerging threats. Produce geopolitical threat assessments for the weekly intelligence summary and quarterly threat intelligence updates for the OES forum. Monitor global and strategic trends in security threats. Ensure that emerging trends are briefed in regular cadence intelligence products. Produce the monthly EXCO intelligence summary which includes reviewing and orchestrating threat intelligence content from the Strategic Cyber Senior Analyst and the Physical & Environmental Senior Analyst, reviewing and guiding them on the relevance, clarity and prioritisation of content for EXCO. React to any geopolitical related requirement for intelligence request (RFI) as per the priorities set by the intelligence manager. Brief geopolitical intelligence updates to EXCO level or partners across government as the SME. Attend and provide intelligence briefs at the UK Energy Resilience Group Special Interest Group (SIG) - a Gov't/Industry roundtable to collaborate on strategic, operational and tactical security threats, risks and responses Essential experience: Proven experience in the fields of geopolitics, geoeconomics, threat intelligence, security & defence and the ability to produce all source analysis and assessments that identify the relevance. A deep understanding of, and interest in, the geopolitical and political context for the UK, critical national infrastructure, Energy Sector, gas sector (Methane, Hydrogen and CO2) and Gas. Proven ability to work independently and proactively. Must have ability to independently conduct high-quality preliminary research and analysis. Proven experience of managing intelligence collection plans and developing indicators of warnings. Excellent research, analysis and critical thinking skills. Strong understanding of how threat intelligence is translated into intelligence assessments and recommendations in an all-source analysis environment. Candidates will ideally show evidence of the above in their CV in order to be considered.
Data Idols
Product Data Analyst
Data Idols
Product Data Analyst Salary: 65,000 - 75,000 Location: Fully Remote We are currently looking for an Product Data Analyst to join a fast-growing , innovative , and data-driven tech team within a global cybersecurity education company. You'll play a pivotal role in shaping data strategy and delivering insights that drive smarter decisions across the business. As an Product Data Analyst, you'll own the full data journey, from managing pipelines and creating models to developing visualisations that help teams understand user behaviour and business performance. This is a high-impact role, giving you the chance to transform complex data into meaningful stories that influence strategy and product direction. The Opportunity As part of a rapidly scaling technology company, you'll work with modern data tools to deliver real-time insights and automation. This Product Data Analyst role stands out because you'll have genuine ownership of analytics and visibility across the organisation, not just building dashboards, but defining how data drives growth. Key Responsibilities: Design, build, and maintain data models and pipelines. Create engaging dashboards and visualisations to present findings to non-technical audiences. Collaborate with stakeholders to translate business needs into data-driven outcomes. Use analytics to uncover trends, opportunities, and risks that shape company strategy. Champion data best practices and innovation within the wider team. What's in it for you? Competitive salary (based on geography and experience). Fully remote working - work from anywhere in the world. 2,500 personal development budget for certifications, training, and learning. Health insurance (where applicable). Skills and Experience Must Have: 2+ years' experience as a Data Analyst, Data Engineer, or Analytics Engineer. dbt Advanced SQL skills and experience with data visualisation tools (Tableau preferred). Knowledge of data modelling, warehousing, and analytics best practices. Strong communication skills with the ability to explain technical findings clearly. Nice to Have: Exposure to event-based analytics and user behaviour tracking. Understanding of machine learning models and techniques. Experience in a start-up or fast-scaling tech environment. If you'd like to be considered for this exciting Product Data Analyst opportunity and think you'd be a great fit, please click the Apply button below to submit your CV. We look forward to hearing from you!
07/01/2026
Full time
Product Data Analyst Salary: 65,000 - 75,000 Location: Fully Remote We are currently looking for an Product Data Analyst to join a fast-growing , innovative , and data-driven tech team within a global cybersecurity education company. You'll play a pivotal role in shaping data strategy and delivering insights that drive smarter decisions across the business. As an Product Data Analyst, you'll own the full data journey, from managing pipelines and creating models to developing visualisations that help teams understand user behaviour and business performance. This is a high-impact role, giving you the chance to transform complex data into meaningful stories that influence strategy and product direction. The Opportunity As part of a rapidly scaling technology company, you'll work with modern data tools to deliver real-time insights and automation. This Product Data Analyst role stands out because you'll have genuine ownership of analytics and visibility across the organisation, not just building dashboards, but defining how data drives growth. Key Responsibilities: Design, build, and maintain data models and pipelines. Create engaging dashboards and visualisations to present findings to non-technical audiences. Collaborate with stakeholders to translate business needs into data-driven outcomes. Use analytics to uncover trends, opportunities, and risks that shape company strategy. Champion data best practices and innovation within the wider team. What's in it for you? Competitive salary (based on geography and experience). Fully remote working - work from anywhere in the world. 2,500 personal development budget for certifications, training, and learning. Health insurance (where applicable). Skills and Experience Must Have: 2+ years' experience as a Data Analyst, Data Engineer, or Analytics Engineer. dbt Advanced SQL skills and experience with data visualisation tools (Tableau preferred). Knowledge of data modelling, warehousing, and analytics best practices. Strong communication skills with the ability to explain technical findings clearly. Nice to Have: Exposure to event-based analytics and user behaviour tracking. Understanding of machine learning models and techniques. Experience in a start-up or fast-scaling tech environment. If you'd like to be considered for this exciting Product Data Analyst opportunity and think you'd be a great fit, please click the Apply button below to submit your CV. We look forward to hearing from you!
CV Screen Ltd
Information Security Analyst - Law Firm
CV Screen Ltd City, Birmingham
Information Security Analyst Law Firm Introduction CV Screen is recruiting an Information Security Analyst for a well-established, full-service law firm with a strong national presence and over 150 years of heritage. Based in Birmingham, this hybrid role offers a fantastic opportunity to play a key part in protecting sensitive legal and client data within a professional services environment. The firm employs several hundred staff across multiple UK offices and continues to grow steadily. The position is offered on an 18-month fixed-term basis and comes with a salary of £55,000 plus an excellent benefits package. Duties & Responsibilities Monitor systems and networks to identify, analyse and escalate security incidents Support incident investigations, documenting outcomes and remediation actions Coordinate vulnerability assessments, penetration testing and remediation activity Maintain security policies, controls and accreditations including ISO 27001 and Cyber Essentials Promote security awareness across the business through guidance and training initiatives What Experience is Required Proven experience in an information or data security role, ideally within the legal sector Strong working knowledge of ISO 27001, UK GDPR and recognised security frameworks Relevant security certifications such as CISSP, CISM or CompTIA Security+ Salary & Benefits Salary: £55,000 Excellent benefits package including pension, holiday allowance and flexible working Hybrid working model supporting work life balance Location This role is based in Birmingham and is easily commutable from Solihull, Wolverhampton, Dudley, West Bromwich, Walsall and Coventry. How to Apply To apply, please send your CV to Kate Morgan at CV Screen in strict confidence. Alternate Job Titles Data Protection & Information Security Analyst Information Security & Risk Analyst Cyber Risk Analyst Information Assurance Analyst CV Screen Ltd acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the Privacy Policy which can be found on the CV Screen website. (url removed)
07/01/2026
Full time
Information Security Analyst Law Firm Introduction CV Screen is recruiting an Information Security Analyst for a well-established, full-service law firm with a strong national presence and over 150 years of heritage. Based in Birmingham, this hybrid role offers a fantastic opportunity to play a key part in protecting sensitive legal and client data within a professional services environment. The firm employs several hundred staff across multiple UK offices and continues to grow steadily. The position is offered on an 18-month fixed-term basis and comes with a salary of £55,000 plus an excellent benefits package. Duties & Responsibilities Monitor systems and networks to identify, analyse and escalate security incidents Support incident investigations, documenting outcomes and remediation actions Coordinate vulnerability assessments, penetration testing and remediation activity Maintain security policies, controls and accreditations including ISO 27001 and Cyber Essentials Promote security awareness across the business through guidance and training initiatives What Experience is Required Proven experience in an information or data security role, ideally within the legal sector Strong working knowledge of ISO 27001, UK GDPR and recognised security frameworks Relevant security certifications such as CISSP, CISM or CompTIA Security+ Salary & Benefits Salary: £55,000 Excellent benefits package including pension, holiday allowance and flexible working Hybrid working model supporting work life balance Location This role is based in Birmingham and is easily commutable from Solihull, Wolverhampton, Dudley, West Bromwich, Walsall and Coventry. How to Apply To apply, please send your CV to Kate Morgan at CV Screen in strict confidence. Alternate Job Titles Data Protection & Information Security Analyst Information Security & Risk Analyst Cyber Risk Analyst Information Assurance Analyst CV Screen Ltd acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the Privacy Policy which can be found on the CV Screen website. (url removed)
Robert Half
IT Risk & Compliance Analyst
Robert Half Newport, Gwent
We're looking for an IT Risk & Compliance Analyst to join our team and help strengthen how IT risks are identified, assessed, and managed across the organisation. You'll work closely with technical specialists and business stakeholders to ensure technology risks are clearly understood, monitored, and addressed. What you'll do Support IT risk assessments and facilitate risk review sessions with stakeholders Maintain and update IT risk registers and track ongoing risk exposure Analyse risk scenarios and contribute to clear, actionable risk reporting Recommend proportionate and cost-effective controls to reduce IT risk Collect, challenge, and report on key risk indicators Prepare risk updates for governance forums and committees Track and report IT risk events and emerging issues Support programmes and agile teams by identifying risks linked to IT change Help maintain risk processes, guidance, and training materials What you'll bring A solid understanding of IT systems, processes, and controls The ability to explain technical risk topics clearly to both technical and non-technical audiences Strong analytical skills with attention to detail and an ability to see wider impacts Confidence working with data to support risk analysis and decision-making A collaborative mindset with the ability to work independently when required A customer-focused approach and strong communication skills Desirable experience Exposure to highly regulated environments Familiarity with recognised frameworks such as COBIT, ITIL, ISO 27001, or NIST Experience working with auditors or formal assurance activities Knowledge of quantitative risk methods such as FAIR Qualifications Degree in IT, Computer Science, Engineering, Information Security, or a related discipline Practical experience performing IT or cyber risk analysis Relevant risk or security certifications are an advantage Robert Half Ltd acts as an employment business for temporary positions and an employment agency for permanent positions. Robert Half is committed to diversity, equity and inclusion. Suitable candidates with equivalent qualifications and more or less experience can apply. Rates of pay and salary ranges are dependent upon your experience, qualifications and training. If you wish to apply, please read our Privacy Notice describing how we may process, disclose and store your personal data:
07/01/2026
Full time
We're looking for an IT Risk & Compliance Analyst to join our team and help strengthen how IT risks are identified, assessed, and managed across the organisation. You'll work closely with technical specialists and business stakeholders to ensure technology risks are clearly understood, monitored, and addressed. What you'll do Support IT risk assessments and facilitate risk review sessions with stakeholders Maintain and update IT risk registers and track ongoing risk exposure Analyse risk scenarios and contribute to clear, actionable risk reporting Recommend proportionate and cost-effective controls to reduce IT risk Collect, challenge, and report on key risk indicators Prepare risk updates for governance forums and committees Track and report IT risk events and emerging issues Support programmes and agile teams by identifying risks linked to IT change Help maintain risk processes, guidance, and training materials What you'll bring A solid understanding of IT systems, processes, and controls The ability to explain technical risk topics clearly to both technical and non-technical audiences Strong analytical skills with attention to detail and an ability to see wider impacts Confidence working with data to support risk analysis and decision-making A collaborative mindset with the ability to work independently when required A customer-focused approach and strong communication skills Desirable experience Exposure to highly regulated environments Familiarity with recognised frameworks such as COBIT, ITIL, ISO 27001, or NIST Experience working with auditors or formal assurance activities Knowledge of quantitative risk methods such as FAIR Qualifications Degree in IT, Computer Science, Engineering, Information Security, or a related discipline Practical experience performing IT or cyber risk analysis Relevant risk or security certifications are an advantage Robert Half Ltd acts as an employment business for temporary positions and an employment agency for permanent positions. Robert Half is committed to diversity, equity and inclusion. Suitable candidates with equivalent qualifications and more or less experience can apply. Rates of pay and salary ranges are dependent upon your experience, qualifications and training. If you wish to apply, please read our Privacy Notice describing how we may process, disclose and store your personal data:
TRIA
Threat Intelligence Analyst
TRIA Portsmouth, Hampshire
Threat Intelligence Analyst - initial 3-6 month contract Portsmouth or London (2 days a week onsite) 500 - 600 a day (inside IR35) We're seeking a highly experienced Threat Intelligence Analyst to lead adversary tracking, threat analysis, and intelligence integration across this large organisation. This is a senior, hands-on role combining strategic threat insight with operational delivery, acting as the primary threat intelligence specialist within the InfoSec function and managing a third-party intelligence provider. This role is ideal for someone who understands the UK threat landscape, particularly critical national infrastructure and public sector risks, and can translate threat intelligence into actionable detection, response, and executive insight. Key Responsibilities Lead threat actor tracking and attribution, focusing on APTs, ransomware, supply chain attacks and UK-relevant campaigns Maintain adversary profiles using MITRE ATT&CK, Diamond Model and sector-specific threat frameworks Correlate internal security telemetry with external intelligence feeds (e.g. MISP, Recorded Future, ISACs, Microsoft TI) Operationalise STIX/TAXII feeds and enrich IOC/IOA pipelines for SOC and Incident Response teams Translate threat intelligence into actionable detections, working with engineers on KQL/SPL queries and proactive threat hunts Produce regular threat reports and briefings for SOC leadership, CISO and senior stakeholders, including board-level risk narratives Manage and oversee a third-party cyber threat intelligence provider, ensuring quality, relevance and value Engage with UK threat-sharing communities and maintain internal threat intelligence documentation and playbooks Required Skills & Experience 5+ years' experience in Threat Intelligence, SOC or Incident Response Strong working knowledge of MITRE ATT&CK and threat actor lifecycle analysis Hands-on experience with threat intelligence platforms such as MISP, Recorded Future, Anomali or similar Strong experience with Microsoft security tooling, ideally Sentinel and Defender Proficiency in KQL and working knowledge of Python for automation and enrichment Experience integrating intelligence into SIEM, EDR/XDR, and cloud security platforms (Microsoft, AWS, CrowdStrike, etc.) Deep understanding of the UK cyber threat landscape, particularly critical national infrastructure and public sector threats Comfortable operating as a sole senior threat intelligence specialist while collaborating across SOC and InfoSec teams Desirable Certifications GIAC Cyber Threat Intelligence (GCTI) CREST Threat Intelligence Analyst GCIH, SC-200, AWS Security Specialty We're looking for someone who can interview in Jan and ideally start within a few weeks so please apply asap
07/01/2026
Contractor
Threat Intelligence Analyst - initial 3-6 month contract Portsmouth or London (2 days a week onsite) 500 - 600 a day (inside IR35) We're seeking a highly experienced Threat Intelligence Analyst to lead adversary tracking, threat analysis, and intelligence integration across this large organisation. This is a senior, hands-on role combining strategic threat insight with operational delivery, acting as the primary threat intelligence specialist within the InfoSec function and managing a third-party intelligence provider. This role is ideal for someone who understands the UK threat landscape, particularly critical national infrastructure and public sector risks, and can translate threat intelligence into actionable detection, response, and executive insight. Key Responsibilities Lead threat actor tracking and attribution, focusing on APTs, ransomware, supply chain attacks and UK-relevant campaigns Maintain adversary profiles using MITRE ATT&CK, Diamond Model and sector-specific threat frameworks Correlate internal security telemetry with external intelligence feeds (e.g. MISP, Recorded Future, ISACs, Microsoft TI) Operationalise STIX/TAXII feeds and enrich IOC/IOA pipelines for SOC and Incident Response teams Translate threat intelligence into actionable detections, working with engineers on KQL/SPL queries and proactive threat hunts Produce regular threat reports and briefings for SOC leadership, CISO and senior stakeholders, including board-level risk narratives Manage and oversee a third-party cyber threat intelligence provider, ensuring quality, relevance and value Engage with UK threat-sharing communities and maintain internal threat intelligence documentation and playbooks Required Skills & Experience 5+ years' experience in Threat Intelligence, SOC or Incident Response Strong working knowledge of MITRE ATT&CK and threat actor lifecycle analysis Hands-on experience with threat intelligence platforms such as MISP, Recorded Future, Anomali or similar Strong experience with Microsoft security tooling, ideally Sentinel and Defender Proficiency in KQL and working knowledge of Python for automation and enrichment Experience integrating intelligence into SIEM, EDR/XDR, and cloud security platforms (Microsoft, AWS, CrowdStrike, etc.) Deep understanding of the UK cyber threat landscape, particularly critical national infrastructure and public sector threats Comfortable operating as a sole senior threat intelligence specialist while collaborating across SOC and InfoSec teams Desirable Certifications GIAC Cyber Threat Intelligence (GCTI) CREST Threat Intelligence Analyst GCIH, SC-200, AWS Security Specialty We're looking for someone who can interview in Jan and ideally start within a few weeks so please apply asap
Robert Walters
GRC Analyst
Robert Walters Norwich, Norfolk
Robert Walters is working in partnership with a world-class educational institution. They offer a wide range of services focused on knowledge development, skill enhancement and personal growth. They provide specialised programs across multiple disciplines focusing on research, innovation and collaboration. Due to continued growth, they are keen to appoint a GRC Analyst to be based out of the Norwich offices on a hybrid model paying a salary range of £40,000 to £46,000 plus benefits. As an experienced GRC Analyst, you will focus on strengthening governance frameworks, managing IT & cyber risk, ensuing compliance with internal polices and external regulations - including data protection legislation and sector specific standards. GRC Analyst: Responsibilities Ensure group complies with relevant regulations: PCI-DSS, NHS DSPT, ISO27001 Monitor/Report compliance with policies and procedures Assist with audits and assessments Develop GRC processes and procedures Select/Adapt security frameworks Implement security controls Identify risks in infrastructure and applications InfoSec controls - policies and guidelines governing security practises Information assurance - assessing effectiveness of controls Risk management - identify/prioritise risks based on impact Develop risk management strategies in line with governance frameworks GRC Analyst: Experience Managing group compliance - PCI-DSS, Cyber Essentials, ISO27001 Experience of ITSM tools Knowledge of developing Governance frameworks Familiar with GRC tools Data privacy regulations - DPA 2018 Knowledge of Identity Platforms The opportunity for a GRC Analyst is a hybrid role based out of the Norwich offices. The role will pay a salary range of £40,000 to £46,000 plus benefits. This is an opportunity to join an industry leader that has continued to grow year on year. For further information, please apply with an updated CV and reach out to Ajay Hayre on (see below) Robert Walters Operations Limited is an employment business and employment agency and welcomes applications from all candidates
06/01/2026
Full time
Robert Walters is working in partnership with a world-class educational institution. They offer a wide range of services focused on knowledge development, skill enhancement and personal growth. They provide specialised programs across multiple disciplines focusing on research, innovation and collaboration. Due to continued growth, they are keen to appoint a GRC Analyst to be based out of the Norwich offices on a hybrid model paying a salary range of £40,000 to £46,000 plus benefits. As an experienced GRC Analyst, you will focus on strengthening governance frameworks, managing IT & cyber risk, ensuing compliance with internal polices and external regulations - including data protection legislation and sector specific standards. GRC Analyst: Responsibilities Ensure group complies with relevant regulations: PCI-DSS, NHS DSPT, ISO27001 Monitor/Report compliance with policies and procedures Assist with audits and assessments Develop GRC processes and procedures Select/Adapt security frameworks Implement security controls Identify risks in infrastructure and applications InfoSec controls - policies and guidelines governing security practises Information assurance - assessing effectiveness of controls Risk management - identify/prioritise risks based on impact Develop risk management strategies in line with governance frameworks GRC Analyst: Experience Managing group compliance - PCI-DSS, Cyber Essentials, ISO27001 Experience of ITSM tools Knowledge of developing Governance frameworks Familiar with GRC tools Data privacy regulations - DPA 2018 Knowledge of Identity Platforms The opportunity for a GRC Analyst is a hybrid role based out of the Norwich offices. The role will pay a salary range of £40,000 to £46,000 plus benefits. This is an opportunity to join an industry leader that has continued to grow year on year. For further information, please apply with an updated CV and reach out to Ajay Hayre on (see below) Robert Walters Operations Limited is an employment business and employment agency and welcomes applications from all candidates
Salt
NHS Band 6 Cyber Assurance Officer
Salt
We are seeking a skilled Cyber Assurance Analyst to join a busy cyber security team, delivering a high-quality, outcome-focused service to support organisational cyber resilience. The post holder will triage and respond to cyber security alerts and incidents, support assurance activity, contribute to cyber risk assessments and audits, and act as an escalation point for junior team members. The role supports compliance with national cyber and information security standards and contributes to wider cyber improvement projects. Main duties Triage and respond to cyber security alerts, incidents and service requests Prioritise and escalate tickets based on severity and risk Support delivery and assurance of the Data Security and Protection Toolkit (DSPT) Conduct cyber risk assessments and contribute to DPIAs Monitor, assess and remediate vulnerabilities and security controls Support penetration testing and vulnerability management activities Maintain compliance with cyber standards (eg DSPT, Cyber Essentials, CareCERT) Investigate potential security breaches and cyber incidents Provide cyber security advice and guidance to stakeholders Support and mentor junior team members Contribute to cyber policies, procedures and continuous improvement Key skills and experience Strong knowledge of cyber security principles and controls Experience handling security incidents, alerts and investigations Understanding of risk assessment, assurance and audit frameworks Experience working with Microsoft, O365, security and monitoring tools Ability to analyse complex technical information and logs Excellent communication skills, including explaining cyber risks to non-technical audiences Strong prioritisation, problem-solving and decision-making skills Degree-level qualification or equivalent relevant experience *Rates depend on experience and client requirements
06/01/2026
Contractor
We are seeking a skilled Cyber Assurance Analyst to join a busy cyber security team, delivering a high-quality, outcome-focused service to support organisational cyber resilience. The post holder will triage and respond to cyber security alerts and incidents, support assurance activity, contribute to cyber risk assessments and audits, and act as an escalation point for junior team members. The role supports compliance with national cyber and information security standards and contributes to wider cyber improvement projects. Main duties Triage and respond to cyber security alerts, incidents and service requests Prioritise and escalate tickets based on severity and risk Support delivery and assurance of the Data Security and Protection Toolkit (DSPT) Conduct cyber risk assessments and contribute to DPIAs Monitor, assess and remediate vulnerabilities and security controls Support penetration testing and vulnerability management activities Maintain compliance with cyber standards (eg DSPT, Cyber Essentials, CareCERT) Investigate potential security breaches and cyber incidents Provide cyber security advice and guidance to stakeholders Support and mentor junior team members Contribute to cyber policies, procedures and continuous improvement Key skills and experience Strong knowledge of cyber security principles and controls Experience handling security incidents, alerts and investigations Understanding of risk assessment, assurance and audit frameworks Experience working with Microsoft, O365, security and monitoring tools Ability to analyse complex technical information and logs Excellent communication skills, including explaining cyber risks to non-technical audiences Strong prioritisation, problem-solving and decision-making skills Degree-level qualification or equivalent relevant experience *Rates depend on experience and client requirements
MYO Talent
CSIRT Lead/Analyst/Manager/Cyber Security
MYO Talent
CSIRT Lead/Senior CSIRT/CSIRT Manager/Principle CSIRT/CSIRT Analyst/Cyber Security/Incident Management/Cyber Security Incident Response Team/Computer Security Incident Response Team/Hybrid - Home/remote/Warwickshire/Permanent role £60,000 - 70,000 + benefits + bonus. One of our leading clients is looking to recruit a CSIRT Lead/Analyst. Location - Hybrid - 1 day per week in Warwickshire My client is looking for candidates based within 1.5 hours of Warwickshire. Permanent role £60,000 - 70,000 + bonus + benefits Experience/Role: Leading and mentoring CSIRT Analysts and Senior Analysts. Leading the development and continuous improvement of the CSIRT, ensuring that the team meets key performance indicators. Investigating and remediating cyber security cases and alerts from various sources, such as network, endpoint, cloud, and threat intelligence. Conducting trend analysis to improve organisational controls and detection capability. Lead the effort to maintain high standards in everything we do within the CSIRT. Develop and maintain CSIRT documentation and reporting. Extensive experience in a Cyber Security Operations Centre (CSOC) Proven experience leading Cyber Incident Response activities. In-depth knowledge of cyber threat landscape and attack vectors. Expertise in incident detection, analysis, and resolution. Proficiency in relevant cybersecurity tools and technologies. Excellent communication and stakeholder engagement skills. Knowledge of relevant regulations and compliance standards. Communication skills to explain your technical findings to a variety of audiences, including business stakeholders, officials and non-technical individuals. Solid cloud and on-premises enterprise security monitoring experience.
06/01/2026
Full time
CSIRT Lead/Senior CSIRT/CSIRT Manager/Principle CSIRT/CSIRT Analyst/Cyber Security/Incident Management/Cyber Security Incident Response Team/Computer Security Incident Response Team/Hybrid - Home/remote/Warwickshire/Permanent role £60,000 - 70,000 + benefits + bonus. One of our leading clients is looking to recruit a CSIRT Lead/Analyst. Location - Hybrid - 1 day per week in Warwickshire My client is looking for candidates based within 1.5 hours of Warwickshire. Permanent role £60,000 - 70,000 + bonus + benefits Experience/Role: Leading and mentoring CSIRT Analysts and Senior Analysts. Leading the development and continuous improvement of the CSIRT, ensuring that the team meets key performance indicators. Investigating and remediating cyber security cases and alerts from various sources, such as network, endpoint, cloud, and threat intelligence. Conducting trend analysis to improve organisational controls and detection capability. Lead the effort to maintain high standards in everything we do within the CSIRT. Develop and maintain CSIRT documentation and reporting. Extensive experience in a Cyber Security Operations Centre (CSOC) Proven experience leading Cyber Incident Response activities. In-depth knowledge of cyber threat landscape and attack vectors. Expertise in incident detection, analysis, and resolution. Proficiency in relevant cybersecurity tools and technologies. Excellent communication and stakeholder engagement skills. Knowledge of relevant regulations and compliance standards. Communication skills to explain your technical findings to a variety of audiences, including business stakeholders, officials and non-technical individuals. Solid cloud and on-premises enterprise security monitoring experience.
Rise Technical Recruitment
Cyber Assurance Officer
Rise Technical Recruitment Norwich, Norfolk
Cyber Assurance Analyst Norwich (On-site) 19.78- 23.82 per hour (Contract / Public Sector) Excellent opportunity for a Cyber Security Analyst with strong assurance/risk experience to join a large public sector organisation in a critical environment, offering a varied role across alert triage, compliance, risk assessments and incident response. This company are a major public sector organisation supporting essential services and operating a complex technology estate. They are looking to strengthen their cyber function to improve security posture, maintain compliance and support ongoing projects. In this role you will triage and prioritise cyber security alerts and tickets, act as the first escalation point for junior team members, and contribute to wider security workstreams. You'll deliver cyber risk assessments, monitor security controls, support audits, manage vulnerability actions, and advise stakeholders on policy and cyber risk. The ideal candidate will have experience in cyber security with a strong understanding of assurance/control frameworks, risk assessment and compliance. You'll be confident communicating technical cyber issues to non-technical stakeholders and comfortable working in a shift-based environment. This is a fantastic opportunity to secure a contract role with real impact, helping protect essential services while working across a broad cyber remit. The Role: Triaging cyber alerts/tickets, prioritisation and escalation support Cyber risk assessments, controls monitoring, audits and project advice Support compliance activity (DSPT / standards) and vulnerability management Incident response support + maintaining SOPs and security tooling (e.g., AV/firewalls) The Person: Cyber security experience (assurance/risk/compliance or SecOps background) Good knowledge of security frameworks, risk assessment and governance Strong communication skills with non-technical stakeholders Happy with on-site working in Norwich and shift-based cover Reference Number: BBBH(phone number removed) To apply for this role or for to be considered for further roles, please click "Apply Now" or contact Tommy Williams at Rise Technical Recruitment. Rise Technical Recruitment Ltd acts an employment agency for permanent roles and an employment business for temporary roles. The salary advertised is the bracket available for this position. The actual salary paid will be dependent on your level of experience, qualifications and skill set. We are an equal opportunities employer and welcome applications from all suitable candidates.
06/01/2026
Contractor
Cyber Assurance Analyst Norwich (On-site) 19.78- 23.82 per hour (Contract / Public Sector) Excellent opportunity for a Cyber Security Analyst with strong assurance/risk experience to join a large public sector organisation in a critical environment, offering a varied role across alert triage, compliance, risk assessments and incident response. This company are a major public sector organisation supporting essential services and operating a complex technology estate. They are looking to strengthen their cyber function to improve security posture, maintain compliance and support ongoing projects. In this role you will triage and prioritise cyber security alerts and tickets, act as the first escalation point for junior team members, and contribute to wider security workstreams. You'll deliver cyber risk assessments, monitor security controls, support audits, manage vulnerability actions, and advise stakeholders on policy and cyber risk. The ideal candidate will have experience in cyber security with a strong understanding of assurance/control frameworks, risk assessment and compliance. You'll be confident communicating technical cyber issues to non-technical stakeholders and comfortable working in a shift-based environment. This is a fantastic opportunity to secure a contract role with real impact, helping protect essential services while working across a broad cyber remit. The Role: Triaging cyber alerts/tickets, prioritisation and escalation support Cyber risk assessments, controls monitoring, audits and project advice Support compliance activity (DSPT / standards) and vulnerability management Incident response support + maintaining SOPs and security tooling (e.g., AV/firewalls) The Person: Cyber security experience (assurance/risk/compliance or SecOps background) Good knowledge of security frameworks, risk assessment and governance Strong communication skills with non-technical stakeholders Happy with on-site working in Norwich and shift-based cover Reference Number: BBBH(phone number removed) To apply for this role or for to be considered for further roles, please click "Apply Now" or contact Tommy Williams at Rise Technical Recruitment. Rise Technical Recruitment Ltd acts an employment agency for permanent roles and an employment business for temporary roles. The salary advertised is the bracket available for this position. The actual salary paid will be dependent on your level of experience, qualifications and skill set. We are an equal opportunities employer and welcome applications from all suitable candidates.
Adecco
Business Process Analyst - Cyber Security
Adecco City, London
Job Title: Business Process Analyst - Cyber Security Contract Daily Rate: Up to 400 - inside IR35 via umbrella Contract Length: 3 Months initially Location: Hybrid Working - 3 days in either London, Birmingham, Manchester or Bristol Are you ready to take your expertise in business process analysis to the next level? Our client is looking for a skilled Business Process Analyst specialising in Cyber Security to join their team on a temporary basis. In this role, you will play a crucial part in developing a new overarching cybersecurity controls framework that will unify processes across the organisation. Role Overview: The primary focus of this position is to design a comprehensive cybersecurity controls framework tailored for a large enterprise. This framework will integrate key areas such as Identity and Access Management, Penetration Testing, and System Security, serving as a robust governance, risk, and compliance (GRC) structure. Other frameworks, including CAF, PCI, and ISO, will nest under this new framework, enhancing the organisation's overall security posture. Key Characteristics: Business Process Orientation: Your role will emphasise aligning processes, terminology, and roles across the organisation. Systems Thinking: You will leverage systems thinking to create a framework that is scalable and effective for a large enterprise environment. Metrics & Monitoring: Understanding and implementing metrics will be essential to ensure that processes operate efficiently. Stakeholder Engagement: You will collaborate with managers and operators of processes, as well as engage with senior-level stakeholders when necessary. Skills & Experience: Organisational Experience: A strong background in large organisations is essential; experience in small businesses may not translate effectively to this role. Industry Background: While experience in telecommunications is preferred, candidates with a background in banking or other regulated sectors at an enterprise scale are also encouraged to apply. Business Analysis Expertise: A focus on business analysis and process design within the cybersecurity GRC domain is crucial, rather than deep technical expertise. Additional Details: In this role, you will also help gather requirements for security tooling and coordinate improvements across cybersecurity processes. If you are a strategic thinker with a passion for aligning business processes within the cybersecurity landscape, we want to hear from you! Join us in making a significant impact on the organisation's cybersecurity framework. How to Apply: To express your interest in this exciting opportunity, please submit your CV and a brief cover letter outlining your relevant experience. Don't miss your chance to contribute to a vital area of cybersecurity in a dynamic environment. We look forward to receiving your application! Adecco is a disability-confident employer. It is important to us that we run an inclusive and accessible recruitment process to support candidates of all backgrounds and all abilities to apply. Adecco is committed to building a supportive environment for you to explore the next steps in your career. If you require reasonable adjustments at any stage, please let us know and we will be happy to support you.
05/01/2026
Contractor
Job Title: Business Process Analyst - Cyber Security Contract Daily Rate: Up to 400 - inside IR35 via umbrella Contract Length: 3 Months initially Location: Hybrid Working - 3 days in either London, Birmingham, Manchester or Bristol Are you ready to take your expertise in business process analysis to the next level? Our client is looking for a skilled Business Process Analyst specialising in Cyber Security to join their team on a temporary basis. In this role, you will play a crucial part in developing a new overarching cybersecurity controls framework that will unify processes across the organisation. Role Overview: The primary focus of this position is to design a comprehensive cybersecurity controls framework tailored for a large enterprise. This framework will integrate key areas such as Identity and Access Management, Penetration Testing, and System Security, serving as a robust governance, risk, and compliance (GRC) structure. Other frameworks, including CAF, PCI, and ISO, will nest under this new framework, enhancing the organisation's overall security posture. Key Characteristics: Business Process Orientation: Your role will emphasise aligning processes, terminology, and roles across the organisation. Systems Thinking: You will leverage systems thinking to create a framework that is scalable and effective for a large enterprise environment. Metrics & Monitoring: Understanding and implementing metrics will be essential to ensure that processes operate efficiently. Stakeholder Engagement: You will collaborate with managers and operators of processes, as well as engage with senior-level stakeholders when necessary. Skills & Experience: Organisational Experience: A strong background in large organisations is essential; experience in small businesses may not translate effectively to this role. Industry Background: While experience in telecommunications is preferred, candidates with a background in banking or other regulated sectors at an enterprise scale are also encouraged to apply. Business Analysis Expertise: A focus on business analysis and process design within the cybersecurity GRC domain is crucial, rather than deep technical expertise. Additional Details: In this role, you will also help gather requirements for security tooling and coordinate improvements across cybersecurity processes. If you are a strategic thinker with a passion for aligning business processes within the cybersecurity landscape, we want to hear from you! Join us in making a significant impact on the organisation's cybersecurity framework. How to Apply: To express your interest in this exciting opportunity, please submit your CV and a brief cover letter outlining your relevant experience. Don't miss your chance to contribute to a vital area of cybersecurity in a dynamic environment. We look forward to receiving your application! Adecco is a disability-confident employer. It is important to us that we run an inclusive and accessible recruitment process to support candidates of all backgrounds and all abilities to apply. Adecco is committed to building a supportive environment for you to explore the next steps in your career. If you require reasonable adjustments at any stage, please let us know and we will be happy to support you.
Access Computer Consulting
Junior Cyber Assurance Analyst
Access Computer Consulting Norwich, Norfolk
I am recruiting for a Cyber Assurance Analyst to be based in Norwich. The role falls inside IR35 so you will be required to work through an umbrella company for the duration of the contract. You will be responsible for using your sound knowledge of cyber security processes to triage and handle cyber security alerts and tickets, as well as being the first escalation point for more junior members of the team. You will provide professional advice on cyber security including phishing, computer security and cyber-crime. You will be able to maintain compliance with various standards in place e.g., Data Security and Protection Toolkit, CareCERT, Cyber Essentials, Network, and Information Systems Regulations etc. You must have previous experience of working in the cyber security field with specific experience of working to KPI's/KRI's. Experience of working within the NHS or a healthcare setting would be preferable. Please apply ASAP to find out more.
05/01/2026
Contractor
I am recruiting for a Cyber Assurance Analyst to be based in Norwich. The role falls inside IR35 so you will be required to work through an umbrella company for the duration of the contract. You will be responsible for using your sound knowledge of cyber security processes to triage and handle cyber security alerts and tickets, as well as being the first escalation point for more junior members of the team. You will provide professional advice on cyber security including phishing, computer security and cyber-crime. You will be able to maintain compliance with various standards in place e.g., Data Security and Protection Toolkit, CareCERT, Cyber Essentials, Network, and Information Systems Regulations etc. You must have previous experience of working in the cyber security field with specific experience of working to KPI's/KRI's. Experience of working within the NHS or a healthcare setting would be preferable. Please apply ASAP to find out more.
Voyage Care
2nd Line IT Support Analyst
Voyage Care Shenstone, Staffordshire
Role Overview and Purpose The 2nd Line IT Support Analyst is responsible for delivering high-quality second-line technical support to Voyage Care staff across the organisation. The post holder will respond promptly to support requests, providing regular updates to users to keep them informed of ticket progress. The successful candidate will contribute as a key member of the team, attending the office two to three times per week as required. This role is responsible for managing ticket escalations from the 1st Line Support team, providing assistance with hardware, software, and infrastructure queries that require a higher level of technical expertise. The post holder is expected to draw on their knowledge and experience to thoroughly troubleshoot and resolve these issues wherever possible. If a problem cannot be remedied at this stage, the analyst is responsible for escalating the ticket to the engineering teams, making certain that all appropriate troubleshooting steps have been completed. Detailed documentation of all actions taken and findings is required, ensuring that subsequent teams have comprehensive information to facilitate a swift resolution. Additionally, the analyst will contribute to service improvement initiatives, such as managing support queues and identifying opportunities for process enhancements on designated days. Professional development is highly encouraged at Voyage Care. The successful applicant will be expected to further their knowledge of the Azure platform and participate in meetings with other business units to gain a deeper understanding of various operational roles and daily tasks. Key Responsibilities Deliver high-quality second-line technical support to staff, ensuring prompt responses and regular updates on ticket progress. Manage ticket escalations from the 1st Line Support team, applying advanced technical knowledge to troubleshoot and resolve hardware, software, and infrastructure issues. Escalate unresolved Incident s and Problems to engineering teams, ensuring all troubleshooting steps are thoroughly documented for efficient handover. Provide technical assistance both remotely and on-site, including the installation and maintenance of hardware and software. Maintain and support IT infrastructure, such as PCs, laptops, printers etc. ensuring systems are operating optimally. Accurately log support calls and document fixes within the helpdesk ticketing system for future reference. Liaise with 3rd line support, infrastructure teams, and external suppliers to resolve complex or specialised technical issues. Proactively identify and report potential IT and cybersecurity risks to minimise organisational impact. Contribute to service improvement initiatives by managing support queues and suggesting process enhancements. Create and maintain knowledge articles to support the ongoing development of the service desk knowledge library. Participate in meetings with other business units to enhance understanding of operational roles and support professional development Skills, Experience and Qualifications Previous experience in a 2nd line IT support or similar technical support role within a service desk environment. Strong understanding of computer hardware, operating systems (including Windows 10/11), and common software applications. Experience managing user accounts and permissions in Active Directory and Entra ID. Using remote support tools and ticketing systems for logging and tracking incidents. Ability to diagnose and resolve more complex incidents that have been escalated from 1st line support. Knowledge of networking concepts such as TCP/IP, DNS, DHCP, and VPN connectivity. Awareness of cybersecurity best practices and procedures for identifying and escalating risks. IT certifications (e.g., CompTIA A+, Microsoft Certs) are desirable but not essential. Strong organisational skills and the ability to prioritise workload. Essential Attributes Technical Proficiency: Strong skills in troubleshooting hardware, software, and network issues. Customer Service Skills: Ability to interact professionally and efficiently with users, acting as an internal customer. Documentation: Ability to clearly document technical issues and resolutions. Problem-Solving: Taking ownership of user problems and performing technical diagnosis to find effective solutions. Excellent communication and interpersonal skills for liaising with users and technical teams.
02/01/2026
Full time
Role Overview and Purpose The 2nd Line IT Support Analyst is responsible for delivering high-quality second-line technical support to Voyage Care staff across the organisation. The post holder will respond promptly to support requests, providing regular updates to users to keep them informed of ticket progress. The successful candidate will contribute as a key member of the team, attending the office two to three times per week as required. This role is responsible for managing ticket escalations from the 1st Line Support team, providing assistance with hardware, software, and infrastructure queries that require a higher level of technical expertise. The post holder is expected to draw on their knowledge and experience to thoroughly troubleshoot and resolve these issues wherever possible. If a problem cannot be remedied at this stage, the analyst is responsible for escalating the ticket to the engineering teams, making certain that all appropriate troubleshooting steps have been completed. Detailed documentation of all actions taken and findings is required, ensuring that subsequent teams have comprehensive information to facilitate a swift resolution. Additionally, the analyst will contribute to service improvement initiatives, such as managing support queues and identifying opportunities for process enhancements on designated days. Professional development is highly encouraged at Voyage Care. The successful applicant will be expected to further their knowledge of the Azure platform and participate in meetings with other business units to gain a deeper understanding of various operational roles and daily tasks. Key Responsibilities Deliver high-quality second-line technical support to staff, ensuring prompt responses and regular updates on ticket progress. Manage ticket escalations from the 1st Line Support team, applying advanced technical knowledge to troubleshoot and resolve hardware, software, and infrastructure issues. Escalate unresolved Incident s and Problems to engineering teams, ensuring all troubleshooting steps are thoroughly documented for efficient handover. Provide technical assistance both remotely and on-site, including the installation and maintenance of hardware and software. Maintain and support IT infrastructure, such as PCs, laptops, printers etc. ensuring systems are operating optimally. Accurately log support calls and document fixes within the helpdesk ticketing system for future reference. Liaise with 3rd line support, infrastructure teams, and external suppliers to resolve complex or specialised technical issues. Proactively identify and report potential IT and cybersecurity risks to minimise organisational impact. Contribute to service improvement initiatives by managing support queues and suggesting process enhancements. Create and maintain knowledge articles to support the ongoing development of the service desk knowledge library. Participate in meetings with other business units to enhance understanding of operational roles and support professional development Skills, Experience and Qualifications Previous experience in a 2nd line IT support or similar technical support role within a service desk environment. Strong understanding of computer hardware, operating systems (including Windows 10/11), and common software applications. Experience managing user accounts and permissions in Active Directory and Entra ID. Using remote support tools and ticketing systems for logging and tracking incidents. Ability to diagnose and resolve more complex incidents that have been escalated from 1st line support. Knowledge of networking concepts such as TCP/IP, DNS, DHCP, and VPN connectivity. Awareness of cybersecurity best practices and procedures for identifying and escalating risks. IT certifications (e.g., CompTIA A+, Microsoft Certs) are desirable but not essential. Strong organisational skills and the ability to prioritise workload. Essential Attributes Technical Proficiency: Strong skills in troubleshooting hardware, software, and network issues. Customer Service Skills: Ability to interact professionally and efficiently with users, acting as an internal customer. Documentation: Ability to clearly document technical issues and resolutions. Problem-Solving: Taking ownership of user problems and performing technical diagnosis to find effective solutions. Excellent communication and interpersonal skills for liaising with users and technical teams.
Tribe Recruitment
Senior Cybersecurity & Compliance Architect
Tribe Recruitment City, Manchester
Senior Security & Compliance Consultant & Architect Location: Hybrid - Manchester HQ with occasional customer site visits as required Salary: Dependant on Experience Please note - We cannot accept candidates who are currently on, or may require a Visa at this or any time. Overview This role exists to strengthen and mature the security capability across consultancy, architecture, and technical delivery. The successful candidate will design pragmatic security controls, produce actionable roadmaps, understand frameworks such as ISO 27001, CE+, NIST, CIS, and MOD/DEFSTAN, and ensure these controls are implemented effectively across customer environments. A key part of this role is working closely with the security-focused support desk analysts, providing ongoing mentoring, technical guidance, and structured development. This position will help shape and accelerate the growth of the Managed Security Services (MSS) offering. Key Responsibilities: Security Architecture & Technical Direction Define and lead the technical security direction across Microsoft 365, identity, endpoint, network, and cloud layers Translate framework requirements into practical, phased roadmaps for customer environments Perform environment reviews and define realistic uplift plans that balance risk, user experience, and operational impact Ensure architectural decisions are scalable, consistent, and repeatable across multi-tenant estates Framework & Compliance Interpretation Interpret ISO 27001, CE+, NIST CSF, CIS Benchmarks and MOD/DEFSTAN controls into implementable technical actions Support structured assessments and develop remediation plans with clear prioritisation. Provide the why behind recommendations to achieve stakeholder buy-in and avoid heavy-handed approaches Consultancy & Customer Engagement Act as a senior security advisor to customers at both technical and leadership levels Communicate security concepts clearly and confidently, tailoring detail to the audience Present options and risk-based reasoning Support pre-sales, account management, engineering, and service teams with expert security guidance Technical Delivery & Implementation Lead the end-to-end delivery of complex security transformation programmes, including identity re-architecture, Zero Trust alignment, and phased implementation of modern security controls across multi-tenant estates Design and implement Conditional Access frameworks that account for risk-based policies, break-glass strategy, device trust, session controls, privileged access scenarios, and operational edge-cases Oversee full Intune security baselining, including secure device provisioning, compliance models, remediation scripts, endpoint hardening, managed configurations, and integration with incident response Architect and tune the Microsoft Defender XDR stack, including advanced hunting, alert tuning, automation rules, vulnerability management, attack surface reduction, and integration with SOC workflows Design firewall and network segmentation strategies that reflect real operational usage, least privilege principles, east-west traffic controls, VPN hardening, and isolation of high-risk or high-value assets Implement identity governance and access control models covering privileged identity management, entitlement workflows, elevated access justification, and audit-ready forensic traceability Build out logging, monitoring, and incident response capabilities, ensuring telemetry is collected, correlated, enriched, and actionable for both engineering and SOC teams Champion technical evidence collection and audit readiness, ensuring controls are measurable, repeatable, and presented clearly during customer or external audits Validate end-to-end outcomes, confirm alignment between design intent and implementation, and ensure security uplift is embedded into operational practice rather than left as one-off actions Mentoring & MSS Growth Work closely with our security-focused support desk analyst, providing hands-on mentoring, coaching, and progression pathways Help define the processes, standards, and technical methods that underpin Managed Security Services (MSS) Ensure the internal team understands how and why controls are implemented to drive capability growth across the whole business Internal Capability Development Improve internal documentation, repeatable processes, and delivery frameworks Provide architectural oversight across security projects and initiatives Contribute to long-term planning for security service evolution Required Experience & Skills Technical Expertise Strong hands-on experience with Microsoft cloud security (Entra ID, Conditional Access, Intune, Defender XDR) Ability to design secure configurations across identity, endpoint, and network layers Proven experience delivering end-to-end security uplift projects Solid understanding of Zero Trust concepts and modern security architecture Framework Knowledge Practical understanding of ISO 27001, Cyber Essentials Plus, NIST CSF, CIS Benchmarks and similar Frameworks Experience turning framework requirements into realistic, implementable controls Comfortable producing structured gap analyses and remediation pathways Consultancy & Communication Skilled in presenting complex security concepts in simple, actionable terms Able to influence decision-making through clarity, options, and rationale Confident working directly with stakeholders ranging from engineers to leadership teams Professional Background Experience in an MSP, consultancy, or multi-tenant environment Exposure to defence, MOD, or high-assurance environments is strongly beneficial Security certifications advantageous (AZ-500, SC-100, SC-300, CISSP, CISM etc.)
02/01/2026
Full time
Senior Security & Compliance Consultant & Architect Location: Hybrid - Manchester HQ with occasional customer site visits as required Salary: Dependant on Experience Please note - We cannot accept candidates who are currently on, or may require a Visa at this or any time. Overview This role exists to strengthen and mature the security capability across consultancy, architecture, and technical delivery. The successful candidate will design pragmatic security controls, produce actionable roadmaps, understand frameworks such as ISO 27001, CE+, NIST, CIS, and MOD/DEFSTAN, and ensure these controls are implemented effectively across customer environments. A key part of this role is working closely with the security-focused support desk analysts, providing ongoing mentoring, technical guidance, and structured development. This position will help shape and accelerate the growth of the Managed Security Services (MSS) offering. Key Responsibilities: Security Architecture & Technical Direction Define and lead the technical security direction across Microsoft 365, identity, endpoint, network, and cloud layers Translate framework requirements into practical, phased roadmaps for customer environments Perform environment reviews and define realistic uplift plans that balance risk, user experience, and operational impact Ensure architectural decisions are scalable, consistent, and repeatable across multi-tenant estates Framework & Compliance Interpretation Interpret ISO 27001, CE+, NIST CSF, CIS Benchmarks and MOD/DEFSTAN controls into implementable technical actions Support structured assessments and develop remediation plans with clear prioritisation. Provide the why behind recommendations to achieve stakeholder buy-in and avoid heavy-handed approaches Consultancy & Customer Engagement Act as a senior security advisor to customers at both technical and leadership levels Communicate security concepts clearly and confidently, tailoring detail to the audience Present options and risk-based reasoning Support pre-sales, account management, engineering, and service teams with expert security guidance Technical Delivery & Implementation Lead the end-to-end delivery of complex security transformation programmes, including identity re-architecture, Zero Trust alignment, and phased implementation of modern security controls across multi-tenant estates Design and implement Conditional Access frameworks that account for risk-based policies, break-glass strategy, device trust, session controls, privileged access scenarios, and operational edge-cases Oversee full Intune security baselining, including secure device provisioning, compliance models, remediation scripts, endpoint hardening, managed configurations, and integration with incident response Architect and tune the Microsoft Defender XDR stack, including advanced hunting, alert tuning, automation rules, vulnerability management, attack surface reduction, and integration with SOC workflows Design firewall and network segmentation strategies that reflect real operational usage, least privilege principles, east-west traffic controls, VPN hardening, and isolation of high-risk or high-value assets Implement identity governance and access control models covering privileged identity management, entitlement workflows, elevated access justification, and audit-ready forensic traceability Build out logging, monitoring, and incident response capabilities, ensuring telemetry is collected, correlated, enriched, and actionable for both engineering and SOC teams Champion technical evidence collection and audit readiness, ensuring controls are measurable, repeatable, and presented clearly during customer or external audits Validate end-to-end outcomes, confirm alignment between design intent and implementation, and ensure security uplift is embedded into operational practice rather than left as one-off actions Mentoring & MSS Growth Work closely with our security-focused support desk analyst, providing hands-on mentoring, coaching, and progression pathways Help define the processes, standards, and technical methods that underpin Managed Security Services (MSS) Ensure the internal team understands how and why controls are implemented to drive capability growth across the whole business Internal Capability Development Improve internal documentation, repeatable processes, and delivery frameworks Provide architectural oversight across security projects and initiatives Contribute to long-term planning for security service evolution Required Experience & Skills Technical Expertise Strong hands-on experience with Microsoft cloud security (Entra ID, Conditional Access, Intune, Defender XDR) Ability to design secure configurations across identity, endpoint, and network layers Proven experience delivering end-to-end security uplift projects Solid understanding of Zero Trust concepts and modern security architecture Framework Knowledge Practical understanding of ISO 27001, Cyber Essentials Plus, NIST CSF, CIS Benchmarks and similar Frameworks Experience turning framework requirements into realistic, implementable controls Comfortable producing structured gap analyses and remediation pathways Consultancy & Communication Skilled in presenting complex security concepts in simple, actionable terms Able to influence decision-making through clarity, options, and rationale Confident working directly with stakeholders ranging from engineers to leadership teams Professional Background Experience in an MSP, consultancy, or multi-tenant environment Exposure to defence, MOD, or high-assurance environments is strongly beneficial Security certifications advantageous (AZ-500, SC-100, SC-300, CISSP, CISM etc.)
WNTD
Technical Architect (NDR)
WNTD Milton Keynes, Buckinghamshire
Technical Architect (NDR) Clearance Requirements: Minimum SC clearance (DV preferred) Contract Length: 12 months initially, with an option to extend Start Date: ASAP Location: Milton Keynes Resource Requirements Provide end-to-end technical leadership, architecture, and delivery oversight for NDR and XDR solutions using Darktrace and Microsoft Defender Work closely with cybersecurity, infrastructure, networking, SOC analysts, service owners, and senior stakeholders to ensure alignment with security strategy, operating models, and business objectives Define the target architecture for Darktrace NDR and Microsoft Defender XDR across on-premises, hybrid, and cloud environments Produce high-level and low-level solution designs aligned to enterprise architecture standards, secure-by-design principles, and regulatory requirements Develop architecture decision records, design patterns, and technical documentation to support long-term maintainability Lead technical delivery workstreams, providing guidance and assurance to engineering teams Act as the primary technical authority for Darktrace and Microsoft Defender XDR programmes Clearly communicate complex technical concepts to senior leadership, security teams, and operational stakeholders Support programme planning activities, including capacity forecasting, licensing strategy, and cost modelling Ensure effective transition to operations, including documentation, training, dashboards, and runbooks Demonstrate deep technical expertise in Darktrace NDR and Microsoft Defender XDR platforms Possess strong knowledge of network architecture, identity systems, cloud security, endpoint security, and behavioural analytics Have experience integrating SIEM/SOAR solutions, telemetry pipelines, and incident response workflows Ability to design and clearly articulate secure, resilient, and operationally sustainable solutions
02/01/2026
Contractor
Technical Architect (NDR) Clearance Requirements: Minimum SC clearance (DV preferred) Contract Length: 12 months initially, with an option to extend Start Date: ASAP Location: Milton Keynes Resource Requirements Provide end-to-end technical leadership, architecture, and delivery oversight for NDR and XDR solutions using Darktrace and Microsoft Defender Work closely with cybersecurity, infrastructure, networking, SOC analysts, service owners, and senior stakeholders to ensure alignment with security strategy, operating models, and business objectives Define the target architecture for Darktrace NDR and Microsoft Defender XDR across on-premises, hybrid, and cloud environments Produce high-level and low-level solution designs aligned to enterprise architecture standards, secure-by-design principles, and regulatory requirements Develop architecture decision records, design patterns, and technical documentation to support long-term maintainability Lead technical delivery workstreams, providing guidance and assurance to engineering teams Act as the primary technical authority for Darktrace and Microsoft Defender XDR programmes Clearly communicate complex technical concepts to senior leadership, security teams, and operational stakeholders Support programme planning activities, including capacity forecasting, licensing strategy, and cost modelling Ensure effective transition to operations, including documentation, training, dashboards, and runbooks Demonstrate deep technical expertise in Darktrace NDR and Microsoft Defender XDR platforms Possess strong knowledge of network architecture, identity systems, cloud security, endpoint security, and behavioural analytics Have experience integrating SIEM/SOAR solutions, telemetry pipelines, and incident response workflows Ability to design and clearly articulate secure, resilient, and operationally sustainable solutions

Modal Window

  • Home
  • Contact
  • About Us
  • FAQs
  • Terms & Conditions
  • Privacy
  • Employer
  • Post a Job
  • Search Resumes
  • Sign in
  • Job Seeker
  • Find Jobs
  • Create Resume
  • Sign in
  • IT blog
  • Facebook
  • Twitter
  • LinkedIn
  • Youtube
© 2008-2026 IT Job Board