it job board logo
  • Home
  • Find IT Jobs
  • Register CV
  • Career Advice
  • Contact us
  • Employers
    • Register as Employer
    • Pricing Plans
  • Recruiting? Post a job
  • Sign in
  • Sign up
  • Home
  • Find IT Jobs
  • Register CV
  • Career Advice
  • Contact us
  • Employers
    • Register as Employer
    • Pricing Plans
Sorry, that job is no longer available. Here are some results that may be similar to the job you were looking for.

117 jobs found

Email me jobs like this
Refine Search
Current Search
incident response analyst
MBDA UK
Network Security Engineer (SOC)
MBDA UK Stevenage, Hertfordshire
An exciting opportunity for a passionate Network Security Engineer to join a unique, multi-national Information Management function. Ideal candidates should be committed to protecting our critical systems and ensuring the integrity and security of our network infrastructure. Salary: Circa £50,000depending on experience+ shift allowance Dynamic (hybrid) working: 5 days per week on-site due to workload classification, working a 24/7 Shift Pattern Security Clearance: British Citizen This role will require DV Clearance. Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS) and a Security Check (SC) clearance, which are managed by the MBDA Personnel Security Team. What we can offer you: Company bonus: Up to £2,500 (based on company performance and will vary year to year) Pension: maximum total (employer and employee) contribution of up to 14% Overtime: opportunity for paid overtime Flexi Leave: Up to 15 additional days Enhanced parental leave: offers up to 26 weeks for maternity, adoption and shared parental leave -enhancements are available for paternity leave, neonatal leave and fertility testing and treatments Facilities: Fantastic site facilities including subsidised meals, free car parking and much more The opportunity: Join our forward thinking team as a Network Security Engineer, where you will play a key role in safeguarding our organisations' network infrastructure as part of the 24x7 Internal Security Response (ISR) team. When not involved in incident response and triage activity with the SOC team, you will be responsible for designing, implementing and maintaining robust security solutions to protect against evolving threats. Collaborating with cross-functional teams, you will work on implementing changes securely, identifying vulnerabilities, managing security incidents and ensuring compliance with industry best practices. The role will be involved in the optimisation of network security tools to remediate "purple team" highlighted areas identified for improvement. You will also have the opportunity to immerse your time into the standardisation of network tools. This is a dynamic opportunity to contribute to security initiatives, solve complex challenges, and have a direct impact on the overall resilience of our IT environment. If you are passionate about security and proactive defence, this role is the perfect fit. If you are looking to leverage your technical skills in a values-led company that values innovation and diversity, this is the place to make an impact. What we're looking for from you: ESSENTIALS Solid understanding of networking principles (TCP/IP, DNS, routing, switching, VLANS and load balancing) Strong expertise in configuring, maintaining and troubleshooting firewalls e.g. Cisco, Checkpoint, Palo Alto Demonstrable hands-on experience in next-gen firewalls and advancing security features like IPS/IDS, SSL decryption and deep packet inspection. Proven experience in managing secure proxy solutions (e.g. Bluecoat, F5) and the ability to implement policies for content filtering, SSL inspection and network traffic monitoring. In depth knowledge of security protocols such as IPSec, SSL / TLS, VPNs and two factor authentication. Understanding of network architectures and security zones (DMZ, internal networks). Proficient in monitoring technologies e.g. PRTG, Nagios. DESIRABLES Understanding of cyber security capabilities and their integrations to networks infrastructure. Existing knowledge of / aptitude to learn Darktrace Antigena and Respond, Splunk ES or Log Rhythm tools. Strong ability to interpret complex information via use of packet capture in order to identify malicious traffic in detail, revealing attacker behaviours like C2, exploitation, lateral movement, or data exfiltration. Proven ability to review SOC alerting in collaboration with SOC analysts to effectively triage and manage Tier 1 SOC alerts to the appropriate outcome. Experience with LDAP, and application traffic flow root cause analysis. Previous experience to identify root cause from (TBC for review - Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools). Our company: Peace is not a given, Freedom is not a given, Sovereignty is not a given MBDA is a leading defence organisation. We are proud of the role we play in supporting the Armed Forces who protect our nations. We partner with governments to work together towards a common goal, defending our freedom. We are proud of our employee-led networks, examples include: Gender Equality, Pride, Menopause Matters, Parents and Carers, Armed Forces, Ethnic Diversity, Neurodiversity, Disability and more We recognise that everyone is unique, and we encourage you to speak to us should you require any advice, support or adjustments throughout our recruitment process. Follow us on LinkedIn (MBDA), X Instagram (MBDA_UK) and Glassdoor or visit our MBDA Careers website for more information.
03/04/2026
Full time
An exciting opportunity for a passionate Network Security Engineer to join a unique, multi-national Information Management function. Ideal candidates should be committed to protecting our critical systems and ensuring the integrity and security of our network infrastructure. Salary: Circa £50,000depending on experience+ shift allowance Dynamic (hybrid) working: 5 days per week on-site due to workload classification, working a 24/7 Shift Pattern Security Clearance: British Citizen This role will require DV Clearance. Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS) and a Security Check (SC) clearance, which are managed by the MBDA Personnel Security Team. What we can offer you: Company bonus: Up to £2,500 (based on company performance and will vary year to year) Pension: maximum total (employer and employee) contribution of up to 14% Overtime: opportunity for paid overtime Flexi Leave: Up to 15 additional days Enhanced parental leave: offers up to 26 weeks for maternity, adoption and shared parental leave -enhancements are available for paternity leave, neonatal leave and fertility testing and treatments Facilities: Fantastic site facilities including subsidised meals, free car parking and much more The opportunity: Join our forward thinking team as a Network Security Engineer, where you will play a key role in safeguarding our organisations' network infrastructure as part of the 24x7 Internal Security Response (ISR) team. When not involved in incident response and triage activity with the SOC team, you will be responsible for designing, implementing and maintaining robust security solutions to protect against evolving threats. Collaborating with cross-functional teams, you will work on implementing changes securely, identifying vulnerabilities, managing security incidents and ensuring compliance with industry best practices. The role will be involved in the optimisation of network security tools to remediate "purple team" highlighted areas identified for improvement. You will also have the opportunity to immerse your time into the standardisation of network tools. This is a dynamic opportunity to contribute to security initiatives, solve complex challenges, and have a direct impact on the overall resilience of our IT environment. If you are passionate about security and proactive defence, this role is the perfect fit. If you are looking to leverage your technical skills in a values-led company that values innovation and diversity, this is the place to make an impact. What we're looking for from you: ESSENTIALS Solid understanding of networking principles (TCP/IP, DNS, routing, switching, VLANS and load balancing) Strong expertise in configuring, maintaining and troubleshooting firewalls e.g. Cisco, Checkpoint, Palo Alto Demonstrable hands-on experience in next-gen firewalls and advancing security features like IPS/IDS, SSL decryption and deep packet inspection. Proven experience in managing secure proxy solutions (e.g. Bluecoat, F5) and the ability to implement policies for content filtering, SSL inspection and network traffic monitoring. In depth knowledge of security protocols such as IPSec, SSL / TLS, VPNs and two factor authentication. Understanding of network architectures and security zones (DMZ, internal networks). Proficient in monitoring technologies e.g. PRTG, Nagios. DESIRABLES Understanding of cyber security capabilities and their integrations to networks infrastructure. Existing knowledge of / aptitude to learn Darktrace Antigena and Respond, Splunk ES or Log Rhythm tools. Strong ability to interpret complex information via use of packet capture in order to identify malicious traffic in detail, revealing attacker behaviours like C2, exploitation, lateral movement, or data exfiltration. Proven ability to review SOC alerting in collaboration with SOC analysts to effectively triage and manage Tier 1 SOC alerts to the appropriate outcome. Experience with LDAP, and application traffic flow root cause analysis. Previous experience to identify root cause from (TBC for review - Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools). Our company: Peace is not a given, Freedom is not a given, Sovereignty is not a given MBDA is a leading defence organisation. We are proud of the role we play in supporting the Armed Forces who protect our nations. We partner with governments to work together towards a common goal, defending our freedom. We are proud of our employee-led networks, examples include: Gender Equality, Pride, Menopause Matters, Parents and Carers, Armed Forces, Ethnic Diversity, Neurodiversity, Disability and more We recognise that everyone is unique, and we encourage you to speak to us should you require any advice, support or adjustments throughout our recruitment process. Follow us on LinkedIn (MBDA), X Instagram (MBDA_UK) and Glassdoor or visit our MBDA Careers website for more information.
SURREY COUNTY COUNCIL
Chief Information Security Officer
SURREY COUNTY COUNCIL Reigate, Surrey
This role has a starting salary of £70,975 per annum, for working 36 hours per week. We are excited to be recruiting a Chief Information Security Officer to join our fantastic team based at Woodhatch Place in Reigate. We offer a hybrid working model with a minimum of two office days per week. Our Offer to You 26 days' holiday, rising to 28 days after 2 years' service and 31 days after 5 years' service (prorated for part time staff) Option to buy up to 10 days of additional annual leave A generous local government salary related pension Up to 5 days of carer's leave and 2 paid volunteering days per year Paternity, adoption and dependents leave An Employee Assistance Programme (EAP) to support health and wellbeing Learning and development hub where you can access a wealth of resources Wellbeing and lifestyle discounts including gym, travel, and shoppingA chance to make a real difference to the lives of our residents. About the Role In this senior leadership role, you will own and drive cyber security strategy, governance and operational resilience across Surrey County Council's complex hybrid environment. Your typical week will include: Leading cyber risk management, governance forums and assurance activity across IT&D, ensuring risks are identified, assessed and clearly reported to senior stakeholders. Overseeing incident preparedness and live response, including coordination with suppliers, IT operations and information governance. Providing expert direction on security technologies, control effectiveness, logging/monitoring, and vulnerability management priorities. Setting clear security expectations and driving cultural change across service owners, technical teams and leadership groups. Developing and maintaining cyber policies, standards and evidence based reporting. This is a hands-on leadership role where strategic thinking and operational decision-making are equally important. You will hold line management responsibility for the cyber security function, including analysts or virtual team members through matrix management, and provide leadership and direction across IT&D and supplier teams. Within your first 12-18 months, you will be expected to lead or significantly contribute to: Delivery of a refreshed cyber security strategy and multi year improvement roadmap Establishment of strengthened cyber governance, including improved reporting, risk tracking and decision making structures Implementation of a formal cyber exercising programme (tabletop and technical) across IT&D, information governance and key suppliers Measurable improvements in vulnerability management, logging/monitoring coverage and supplier assurance Significant uplift in incident response maturity, including documentation of playbooks, interfaces and recovery expectations. This role is central to strengthening the resilience of essential public services. You will directly shape the council's ability to manage and reduce cyber risk, influence technology and service design decisions, and embed a cyber aware culture across one of the UK's largest local government environments. With a dedicated investment programme to drive security improvements, you will have a significant opportunity to transform how the organisation protects its people, data and systems. Your Application In order to be considered for shortlisting, your application will clearly evidence the following skills and align with our behaviours: Significant senior cyber security leadership experience in a complex organisation Strong capability to operate strategically and hands on, delivering measurable security improvements Deep understanding of cyber risk management, governance and assurance frameworks Proven experience leading cyber incidents, including response coordination and exercising Excellent communication and stakeholder influence skills across technical and non technical groups Familiarity with NCSC aligned approaches and/or frameworks such as NIST CSF Relevant professional qualifications such as CISSP or CISM To apply, we request that you submit a CV and you will be asked the following 4 questions: What steps would you take in your first few months to understand our cyber risks and priorities? Can you describe a complex cyber incident you have led, including how you coordinated the response and what improvements were implemented afterwards? How do you balance strategic cyber security planning with hands on delivery to ensure both long term resilience and quick, tactical gains? Which cyber security governance or risk management frameworks (e.g., NCSC CAF, NIST CSF) have you implemented, and how have they influenced decision making and assurance in your previous organisations? The job advert closes at 23:59 on 12/04/2026 with interviews planned shortly afterwards. Local Government Reorganisation (LGR) Surrey County Council is undergoing Local Government Reorganisation, moving from a two-tier system to two new unitary councils in April 2027. If you are employed by Surrey on 1st April 2027, your role will transfer with current terms and conditions to one of the new organisations, supporting local devolution and greater powers for our communities. Join our dynamic team and shape the future of local government. Make a lasting impact with innovative solutions and improved services for our community. Help us build a brighter future for our residents! Our Commitment We are a disability confident employer which means if you have shared a disability on your application form and have evidenced you meet the minimum criteria, we guarantee you an interview. Your skills and experience truly matter to us. From application to your first day, we're committed to supporting you with any adjustments you need, we value inclusion and warmly welcome you to join and help build a workplace where everyone be
02/04/2026
Full time
This role has a starting salary of £70,975 per annum, for working 36 hours per week. We are excited to be recruiting a Chief Information Security Officer to join our fantastic team based at Woodhatch Place in Reigate. We offer a hybrid working model with a minimum of two office days per week. Our Offer to You 26 days' holiday, rising to 28 days after 2 years' service and 31 days after 5 years' service (prorated for part time staff) Option to buy up to 10 days of additional annual leave A generous local government salary related pension Up to 5 days of carer's leave and 2 paid volunteering days per year Paternity, adoption and dependents leave An Employee Assistance Programme (EAP) to support health and wellbeing Learning and development hub where you can access a wealth of resources Wellbeing and lifestyle discounts including gym, travel, and shoppingA chance to make a real difference to the lives of our residents. About the Role In this senior leadership role, you will own and drive cyber security strategy, governance and operational resilience across Surrey County Council's complex hybrid environment. Your typical week will include: Leading cyber risk management, governance forums and assurance activity across IT&D, ensuring risks are identified, assessed and clearly reported to senior stakeholders. Overseeing incident preparedness and live response, including coordination with suppliers, IT operations and information governance. Providing expert direction on security technologies, control effectiveness, logging/monitoring, and vulnerability management priorities. Setting clear security expectations and driving cultural change across service owners, technical teams and leadership groups. Developing and maintaining cyber policies, standards and evidence based reporting. This is a hands-on leadership role where strategic thinking and operational decision-making are equally important. You will hold line management responsibility for the cyber security function, including analysts or virtual team members through matrix management, and provide leadership and direction across IT&D and supplier teams. Within your first 12-18 months, you will be expected to lead or significantly contribute to: Delivery of a refreshed cyber security strategy and multi year improvement roadmap Establishment of strengthened cyber governance, including improved reporting, risk tracking and decision making structures Implementation of a formal cyber exercising programme (tabletop and technical) across IT&D, information governance and key suppliers Measurable improvements in vulnerability management, logging/monitoring coverage and supplier assurance Significant uplift in incident response maturity, including documentation of playbooks, interfaces and recovery expectations. This role is central to strengthening the resilience of essential public services. You will directly shape the council's ability to manage and reduce cyber risk, influence technology and service design decisions, and embed a cyber aware culture across one of the UK's largest local government environments. With a dedicated investment programme to drive security improvements, you will have a significant opportunity to transform how the organisation protects its people, data and systems. Your Application In order to be considered for shortlisting, your application will clearly evidence the following skills and align with our behaviours: Significant senior cyber security leadership experience in a complex organisation Strong capability to operate strategically and hands on, delivering measurable security improvements Deep understanding of cyber risk management, governance and assurance frameworks Proven experience leading cyber incidents, including response coordination and exercising Excellent communication and stakeholder influence skills across technical and non technical groups Familiarity with NCSC aligned approaches and/or frameworks such as NIST CSF Relevant professional qualifications such as CISSP or CISM To apply, we request that you submit a CV and you will be asked the following 4 questions: What steps would you take in your first few months to understand our cyber risks and priorities? Can you describe a complex cyber incident you have led, including how you coordinated the response and what improvements were implemented afterwards? How do you balance strategic cyber security planning with hands on delivery to ensure both long term resilience and quick, tactical gains? Which cyber security governance or risk management frameworks (e.g., NCSC CAF, NIST CSF) have you implemented, and how have they influenced decision making and assurance in your previous organisations? The job advert closes at 23:59 on 12/04/2026 with interviews planned shortly afterwards. Local Government Reorganisation (LGR) Surrey County Council is undergoing Local Government Reorganisation, moving from a two-tier system to two new unitary councils in April 2027. If you are employed by Surrey on 1st April 2027, your role will transfer with current terms and conditions to one of the new organisations, supporting local devolution and greater powers for our communities. Join our dynamic team and shape the future of local government. Make a lasting impact with innovative solutions and improved services for our community. Help us build a brighter future for our residents! Our Commitment We are a disability confident employer which means if you have shared a disability on your application form and have evidenced you meet the minimum criteria, we guarantee you an interview. Your skills and experience truly matter to us. From application to your first day, we're committed to supporting you with any adjustments you need, we value inclusion and warmly welcome you to join and help build a workplace where everyone be
Apprentify
Trainee Cyber Security Analyst
Apprentify
About the opportunity Are you ready to launch a career in cyber security? Netcom Training's fully-funded Cyber Security course (NCFE Certificate in Cyber Security Practices, Level 3) equips you with the practical skills employers in Greater Manchester are actively seeking. From threat intelligence and security testing to incident response and ethical compliance, you'll gain hands-on experience that prepares you for today's fast-growing cyber security and IT roles. Our learners have gone on to roles such as Cyber Security Analyst, Junior Penetration Tester, SOC Analyst, and IT Support, working with companies across tech, logistics, public services, and digital sectors. Complete the course and gain a guaranteed interview with a leading employer, helping you start your career protecting businesses, data, and digital systems. Course Details Start Date: 30/03 Duration: 14 weeks Format: Online, practical workshops Schedule: Mon-Thurs 6-9PM What you'll learn Cyber Principles: Understand core frameworks and security principles. Threat Intelligence: Develop expertise to identify risks and analyze threats. Vulnerability Testing: Conduct cyber security testing, identify vulnerabilities, and implement controls. Incident Response: Prepare for and respond to live cyber security incidents. Ethics & Law: Understand legislation and ethical conduct within the cyber security sector. Professional Skills: Build the behaviours required for the modern cyber security workplace. Career Pathway Successful participants are guaranteed an interview with us or our network of UK-wide partners working with leading brands. Potential Roles: Trainee Cyber Security Analyst, SOC Analyst, Junior Information Security Officer. Starting Salaries: Typically £22,000 - £35,000 (role dependent). Eligibility This is a government-funded opportunity. To apply, you must: Live in Greater Manchester. Be aged 19 or over. Earn below the gross annual wage cap of £32,400. Not currently be undertaking other government-funded training. Right to Work: You must have lived in the UK/EU for the last 3 years and have the right to work in the UK (Student/Graduate visas are not eligible). Cost This is a fully-funded course with no fees - complete the training, gain essential cyber security skills.
02/04/2026
Full time
About the opportunity Are you ready to launch a career in cyber security? Netcom Training's fully-funded Cyber Security course (NCFE Certificate in Cyber Security Practices, Level 3) equips you with the practical skills employers in Greater Manchester are actively seeking. From threat intelligence and security testing to incident response and ethical compliance, you'll gain hands-on experience that prepares you for today's fast-growing cyber security and IT roles. Our learners have gone on to roles such as Cyber Security Analyst, Junior Penetration Tester, SOC Analyst, and IT Support, working with companies across tech, logistics, public services, and digital sectors. Complete the course and gain a guaranteed interview with a leading employer, helping you start your career protecting businesses, data, and digital systems. Course Details Start Date: 30/03 Duration: 14 weeks Format: Online, practical workshops Schedule: Mon-Thurs 6-9PM What you'll learn Cyber Principles: Understand core frameworks and security principles. Threat Intelligence: Develop expertise to identify risks and analyze threats. Vulnerability Testing: Conduct cyber security testing, identify vulnerabilities, and implement controls. Incident Response: Prepare for and respond to live cyber security incidents. Ethics & Law: Understand legislation and ethical conduct within the cyber security sector. Professional Skills: Build the behaviours required for the modern cyber security workplace. Career Pathway Successful participants are guaranteed an interview with us or our network of UK-wide partners working with leading brands. Potential Roles: Trainee Cyber Security Analyst, SOC Analyst, Junior Information Security Officer. Starting Salaries: Typically £22,000 - £35,000 (role dependent). Eligibility This is a government-funded opportunity. To apply, you must: Live in Greater Manchester. Be aged 19 or over. Earn below the gross annual wage cap of £32,400. Not currently be undertaking other government-funded training. Right to Work: You must have lived in the UK/EU for the last 3 years and have the right to work in the UK (Student/Graduate visas are not eligible). Cost This is a fully-funded course with no fees - complete the training, gain essential cyber security skills.
Netcom Training
Cyber Security Analyst - Training Course
Netcom Training City, Sheffield
About the opportunity Are you ready to launch a career in cyber security? Netcom Training s fully-funded Cyber Security course (NCFE Certificate in Cyber Security Practices, Level 2) equips you with the practical skills employers are actively seeking. From threat intelligence and security testing to incident response and ethical compliance, you ll gain hands-on experience that prepares you for today s fast-growing cyber security and IT roles. Our learners have gone on to roles such as IT support, second line support, junior development, cyber security analysis and business analyst positions, working with companies across tech, logistics, public services and digital sectors. Complete the course and gain a guaranteed interview with a leading employer, helping you start your career protecting businesses, data and digital systems. Course Details Start Date: 13/04 Duration: 5 weeks Format: Online, practical workshops Schedule: Mon-Fri 9:45AM - 2:45PM What you ll learn Principles: Understand cyber security principles and core frameworks Threat Intelligence: Develop expertise to identify risks Testing: Conduct cyber security testing, identify vulnerabilities and implement controls Incident Response: Prepare for and respond to cyber security incidents Ethics: Understand legislation and ethical conduct within cyber security Professional Skills: Build professional skills and behaviours for the sector Protection: Gain practical knowledge to protect and secure digital environments Potential Roles & Starting Salaries: Cyber Security Analyst IT Support Technician Junior Penetration Tester SOC Analyst Eligibility To apply, you must: Live in the Sheffield area Be aged 19 or over Earn below the gross annual wage cap of £23,400 Not currently be undertaking other government-funded training Not be in the UK on a student, graduate, postgraduate, or sponsored visa, or as a dependent Cost This is a fully-funded course with no fees. Complete the training and gain essential cyber security skills.
02/04/2026
Full time
About the opportunity Are you ready to launch a career in cyber security? Netcom Training s fully-funded Cyber Security course (NCFE Certificate in Cyber Security Practices, Level 2) equips you with the practical skills employers are actively seeking. From threat intelligence and security testing to incident response and ethical compliance, you ll gain hands-on experience that prepares you for today s fast-growing cyber security and IT roles. Our learners have gone on to roles such as IT support, second line support, junior development, cyber security analysis and business analyst positions, working with companies across tech, logistics, public services and digital sectors. Complete the course and gain a guaranteed interview with a leading employer, helping you start your career protecting businesses, data and digital systems. Course Details Start Date: 13/04 Duration: 5 weeks Format: Online, practical workshops Schedule: Mon-Fri 9:45AM - 2:45PM What you ll learn Principles: Understand cyber security principles and core frameworks Threat Intelligence: Develop expertise to identify risks Testing: Conduct cyber security testing, identify vulnerabilities and implement controls Incident Response: Prepare for and respond to cyber security incidents Ethics: Understand legislation and ethical conduct within cyber security Professional Skills: Build professional skills and behaviours for the sector Protection: Gain practical knowledge to protect and secure digital environments Potential Roles & Starting Salaries: Cyber Security Analyst IT Support Technician Junior Penetration Tester SOC Analyst Eligibility To apply, you must: Live in the Sheffield area Be aged 19 or over Earn below the gross annual wage cap of £23,400 Not currently be undertaking other government-funded training Not be in the UK on a student, graduate, postgraduate, or sponsored visa, or as a dependent Cost This is a fully-funded course with no fees. Complete the training and gain essential cyber security skills.
Netcom Training
Cyber Security Analyst - Training Course
Netcom Training City, Birmingham
About the opportunity Are you ready to launch a career in cyber security? Netcom Training s fully-funded Cyber Security course (NCFE Certificate in Cyber Security Practices, Level 3) equips you with the practical skills employers are actively seeking. From threat intelligence and security testing to incident response and ethical compliance, you ll gain hands-on experience that prepares you for today s fast-growing cyber security and IT roles. Our learners have gone on to roles such as IT support, second line support, junior development, cyber security analysis and business analyst positions, working with companies across tech, logistics, public services and digital sectors. Complete the course and gain a guaranteed interview with a leading employer, helping you start your career protecting businesses, data and digital systems. Course Details Start Date: 13/04 Duration: 14 weeks Format: Online, practical workshops Schedule: Full-time (day) or evening options available What you ll learn Principles: Understand cyber security principles and core frameworks Threat Intelligence: Develop expertise to identify risks Testing: Conduct cyber security testing, identify vulnerabilities and implement controls Incident Response: Prepare for and respond to cyber security incidents Ethics: Understand legislation and ethical conduct within cyber security Professional Skills: Build professional skills and behaviours for the sector Protection: Gain practical knowledge to protect and secure digital environments Potential Roles & Starting Salaries: Cyber Security Analyst IT Support Technician Junior Penetration Tester SOC Analyst Eligibility To apply, you must: Live in the West Midlands Be aged 19 or over Earn below the gross annual wage cap of £34,194 Not currently be undertaking other government-funded training Not be in the UK on a student, graduate, postgraduate, or sponsored visa, or as a dependent Cost This is a fully-funded course with no fees complete the training and gain essential cyber security skills.
02/04/2026
Full time
About the opportunity Are you ready to launch a career in cyber security? Netcom Training s fully-funded Cyber Security course (NCFE Certificate in Cyber Security Practices, Level 3) equips you with the practical skills employers are actively seeking. From threat intelligence and security testing to incident response and ethical compliance, you ll gain hands-on experience that prepares you for today s fast-growing cyber security and IT roles. Our learners have gone on to roles such as IT support, second line support, junior development, cyber security analysis and business analyst positions, working with companies across tech, logistics, public services and digital sectors. Complete the course and gain a guaranteed interview with a leading employer, helping you start your career protecting businesses, data and digital systems. Course Details Start Date: 13/04 Duration: 14 weeks Format: Online, practical workshops Schedule: Full-time (day) or evening options available What you ll learn Principles: Understand cyber security principles and core frameworks Threat Intelligence: Develop expertise to identify risks Testing: Conduct cyber security testing, identify vulnerabilities and implement controls Incident Response: Prepare for and respond to cyber security incidents Ethics: Understand legislation and ethical conduct within cyber security Professional Skills: Build professional skills and behaviours for the sector Protection: Gain practical knowledge to protect and secure digital environments Potential Roles & Starting Salaries: Cyber Security Analyst IT Support Technician Junior Penetration Tester SOC Analyst Eligibility To apply, you must: Live in the West Midlands Be aged 19 or over Earn below the gross annual wage cap of £34,194 Not currently be undertaking other government-funded training Not be in the UK on a student, graduate, postgraduate, or sponsored visa, or as a dependent Cost This is a fully-funded course with no fees complete the training and gain essential cyber security skills.
Manpower UK Ltd
Technical Support Analyst
Manpower UK Ltd
Technical Support Analyst (Contract) Cranfield (Hybrid - 3 days onsite / 2 days remote) Initial 6-month contract (with potential extension up to 12 months) About the Role We are seeking a proactive and detail-oriented Technical Support Analyst to support a fast-paced automotive client. This is an excellent opportunity to work cross-functionally with design, quality, and engineering teams while developing your analytical and technical skillset. Key Responsibilities Manage and respond to service requests using ticket management systems Monitor and track incident tickets through to resolution Analyse data to identify trends, anomalies, and root causes (including use of SQL where required) Use advanced Excel tools (Power Query, Power Pivot, Power Automate) to manipulate and interpret cloud-based data Validate reports produced by offshore teams for use in vehicle campaigns Collaborate with cross-functional teams to ensure timely responses and clear communication of issues Provide technical support to offshore call centre teams Skills & Experience Required Degree-qualified (or equivalent experience) Experience using ticket management tools (e.g. ServiceNow preferred) Strong Excel skills, including advanced functions and data tools Familiarity with Power Platform tools (Power BI, Power Query, Power Automate) is advantageous Demonstrable problem-solving skills and analytical thinking Strong written and verbal communication skills Proficient in Microsoft Office applications (Excel, PowerPoint, etc.) Ability to manage multiple priorities and work across several projects simultaneously Self-motivated, organised, and adaptable, with a flexible approach to work Working Arrangements Hybrid working model: 3 days onsite in Cranfield, 2 days remote Flexibility required to attend onsite more frequently depending on business needs Why Apply? This role offers the chance to gain hands-on experience in data analysis, incident management, and cross-functional collaboration within a dynamic and supportive environment.
01/04/2026
Contractor
Technical Support Analyst (Contract) Cranfield (Hybrid - 3 days onsite / 2 days remote) Initial 6-month contract (with potential extension up to 12 months) About the Role We are seeking a proactive and detail-oriented Technical Support Analyst to support a fast-paced automotive client. This is an excellent opportunity to work cross-functionally with design, quality, and engineering teams while developing your analytical and technical skillset. Key Responsibilities Manage and respond to service requests using ticket management systems Monitor and track incident tickets through to resolution Analyse data to identify trends, anomalies, and root causes (including use of SQL where required) Use advanced Excel tools (Power Query, Power Pivot, Power Automate) to manipulate and interpret cloud-based data Validate reports produced by offshore teams for use in vehicle campaigns Collaborate with cross-functional teams to ensure timely responses and clear communication of issues Provide technical support to offshore call centre teams Skills & Experience Required Degree-qualified (or equivalent experience) Experience using ticket management tools (e.g. ServiceNow preferred) Strong Excel skills, including advanced functions and data tools Familiarity with Power Platform tools (Power BI, Power Query, Power Automate) is advantageous Demonstrable problem-solving skills and analytical thinking Strong written and verbal communication skills Proficient in Microsoft Office applications (Excel, PowerPoint, etc.) Ability to manage multiple priorities and work across several projects simultaneously Self-motivated, organised, and adaptable, with a flexible approach to work Working Arrangements Hybrid working model: 3 days onsite in Cranfield, 2 days remote Flexibility required to attend onsite more frequently depending on business needs Why Apply? This role offers the chance to gain hands-on experience in data analysis, incident management, and cross-functional collaboration within a dynamic and supportive environment.
Ryder Reid Legal Ltd
Applications Operations Analyst
Ryder Reid Legal Ltd
Applications Operations Analyst - LondonPermanent Hybrid Working Competitive Salary An international law firm is seeking an experienced Applications Operations Analyst to join its London office. This is a fantastic opportunity to play a key role in maintaining and improving the performance, security, and reliability of enterprise applications across a dynamic and fast-paced professional services environment. Reporting to the Manager of Applications Operations, the successful candidate will be responsible for day-to-day system support, patching, monitoring, and troubleshooting, while also contributing to process improvement, documentation, and integration stability. The role involves close collaboration with infrastructure, security, and business teams to ensure seamless application performance and user experience. Key Responsibilities: Perform system maintenance, patching, and upgrades in line with change management procedures Monitor application health and performance, proactively resolving issues Manage user access controls and support security audits Respond to incidents and service requests within SLA targets Support application deployments, integrations, and configuration changes Maintain documentation, runbooks, and support knowledge base articles Identify opportunities for automation and process optimisation Track and report on KPIs, system uptime, and user engagement metrics Collaborate with cross-functional teams to support scalability and performance tuning Ideal Candidate Profile: 3+ years of experience in enterprise application support or IT operations Strong troubleshooting and analytical skills Familiarity with ITSM platforms (e.g., ServiceNow) and monitoring tools Understanding of access management, patching, and vulnerability remediation Exposure to ITIL practices and professional services environments Experience with documentation tools and scripting (e.g., PowerShell, Python) Relevant certifications (e.g., ITIL Foundation) preferred It offers the chance to work within a collaborative team and contribute to the ongoing improvement of critical business systems. To express interest or learn more, please get in touch directly. Due to the high volume of applications, we are not able to respond to all enquiries. If you have not received a response within 72 hours, please assume you have not been shortlisted at this stage, however thank you for taking the time to apply. Ryder Reid Legal is a recruitment specialist. For over thirty years we've been connecting legal talent with many of the leading law firms in London and internationally. Follow our LinkedIn page for the latest vacancies.
01/04/2026
Full time
Applications Operations Analyst - LondonPermanent Hybrid Working Competitive Salary An international law firm is seeking an experienced Applications Operations Analyst to join its London office. This is a fantastic opportunity to play a key role in maintaining and improving the performance, security, and reliability of enterprise applications across a dynamic and fast-paced professional services environment. Reporting to the Manager of Applications Operations, the successful candidate will be responsible for day-to-day system support, patching, monitoring, and troubleshooting, while also contributing to process improvement, documentation, and integration stability. The role involves close collaboration with infrastructure, security, and business teams to ensure seamless application performance and user experience. Key Responsibilities: Perform system maintenance, patching, and upgrades in line with change management procedures Monitor application health and performance, proactively resolving issues Manage user access controls and support security audits Respond to incidents and service requests within SLA targets Support application deployments, integrations, and configuration changes Maintain documentation, runbooks, and support knowledge base articles Identify opportunities for automation and process optimisation Track and report on KPIs, system uptime, and user engagement metrics Collaborate with cross-functional teams to support scalability and performance tuning Ideal Candidate Profile: 3+ years of experience in enterprise application support or IT operations Strong troubleshooting and analytical skills Familiarity with ITSM platforms (e.g., ServiceNow) and monitoring tools Understanding of access management, patching, and vulnerability remediation Exposure to ITIL practices and professional services environments Experience with documentation tools and scripting (e.g., PowerShell, Python) Relevant certifications (e.g., ITIL Foundation) preferred It offers the chance to work within a collaborative team and contribute to the ongoing improvement of critical business systems. To express interest or learn more, please get in touch directly. Due to the high volume of applications, we are not able to respond to all enquiries. If you have not received a response within 72 hours, please assume you have not been shortlisted at this stage, however thank you for taking the time to apply. Ryder Reid Legal is a recruitment specialist. For over thirty years we've been connecting legal talent with many of the leading law firms in London and internationally. Follow our LinkedIn page for the latest vacancies.
JAM Recruitment Ltd
SOC Analyst
JAM Recruitment Ltd Hereford, Herefordshire
SOC Analyst 75.48 p/hr (Inside IR35) Onsite Hereford 12 months Level 1 SOC Cyber Analyst to join the TMCT security team to serve as the first internal responder to alerts generated by our outsourced SOC provider. In this role the individual will perform initial triage, conduct low level investigations, interact directly with end users and asset owners, and escalate verified incidents for advanced analysis and response. The level 1 SOC analyst will act as a key link between our internal security team and the external SOC, ensuring that potential threats are quickly validated, documented, and routed through appropriate channels for resolution. Duties: Alert Triage: Review and assess alerts escalated by the outsourced SOC; validate their accuracy and determine potential impact. Initial Investigation: Perform first-line investigation using available tools (SIEM, Device Logs, firewall logs and SIEM alerts). User Interaction: Engage with affected end users or asset owners to collect additional information, verify events, or guide immediate containment steps (e.g.asset isolation, password reset). Escalation: Escalate confirmed or high severity incidents to the Level 2 SOC (outsourced) or internal incident response teams, ensuring complete and accurate handoff documentation. Incident Documentation: Create and maintain detailed case notes, timelines, and evidence within the case management system to support investigations and compliance requirements. Collaboration: Serve as the coordination point between the security team and the external SOC partner, maintaining strong communication and situational awareness. Playbook Execution: follow established triage and escalation playbooks; suggest improvements based on recurring issues or inefficiencies. Threat Awareness: Maintain awareness of current cyber threats, attacker techniques (MITRE ATT&CK), and industry trends relevant to the organisations threat landscape. Essential: 2-4 years of experience in a SOC, IT Operations, or security support role. Understanding of key security concepts including malware, phishing, lateral movement and privilege escalation. Working knowledge of network fundamentals, windows/Linux system logs and authentication systems. Working knowledge of SIEM platforms (e.g. Microsoft sentinel, Splunk, Elastic, QRadar). Desirable: Awareness of security frameworks and methodologies (NIST CSF, MITRE ATT&CK, ISO27001). Qualifications: Desirable: CompTIA Security+, CySA+ or other entry level certification.
01/04/2026
Contractor
SOC Analyst 75.48 p/hr (Inside IR35) Onsite Hereford 12 months Level 1 SOC Cyber Analyst to join the TMCT security team to serve as the first internal responder to alerts generated by our outsourced SOC provider. In this role the individual will perform initial triage, conduct low level investigations, interact directly with end users and asset owners, and escalate verified incidents for advanced analysis and response. The level 1 SOC analyst will act as a key link between our internal security team and the external SOC, ensuring that potential threats are quickly validated, documented, and routed through appropriate channels for resolution. Duties: Alert Triage: Review and assess alerts escalated by the outsourced SOC; validate their accuracy and determine potential impact. Initial Investigation: Perform first-line investigation using available tools (SIEM, Device Logs, firewall logs and SIEM alerts). User Interaction: Engage with affected end users or asset owners to collect additional information, verify events, or guide immediate containment steps (e.g.asset isolation, password reset). Escalation: Escalate confirmed or high severity incidents to the Level 2 SOC (outsourced) or internal incident response teams, ensuring complete and accurate handoff documentation. Incident Documentation: Create and maintain detailed case notes, timelines, and evidence within the case management system to support investigations and compliance requirements. Collaboration: Serve as the coordination point between the security team and the external SOC partner, maintaining strong communication and situational awareness. Playbook Execution: follow established triage and escalation playbooks; suggest improvements based on recurring issues or inefficiencies. Threat Awareness: Maintain awareness of current cyber threats, attacker techniques (MITRE ATT&CK), and industry trends relevant to the organisations threat landscape. Essential: 2-4 years of experience in a SOC, IT Operations, or security support role. Understanding of key security concepts including malware, phishing, lateral movement and privilege escalation. Working knowledge of network fundamentals, windows/Linux system logs and authentication systems. Working knowledge of SIEM platforms (e.g. Microsoft sentinel, Splunk, Elastic, QRadar). Desirable: Awareness of security frameworks and methodologies (NIST CSF, MITRE ATT&CK, ISO27001). Qualifications: Desirable: CompTIA Security+, CySA+ or other entry level certification.
OCC Group
Information Security Analyst - Staffordshire
OCC Group
Information Security Analyst - Staffordshire Cyber Analyst to join the Information Security Team. Someone who can take those outputs from projects / tools and drive improvements. Looking for an experienced, proactive Security Analyst to ensure the correct level of security integrity to protect systems, information, personal data and people from cyber-attacks and unauthorised access. Working with other departments to ensure security systems are secure, fit for purpose and protected to an optimal level. You will be responsible for driving the security scrutiny, culture, awareness, and adoption across the business. Security Toolsets and a Technical Mindset, you re not expected or required to be an expert in all areas but expected to have a solid understanding and grounding in security principals to adapt to the varied requirements Experienced in a wide variety of security software, systems, services and toolsets such as E-mail Security, EDR, NAC, IT/OT Segmentation, 365 etc along with an understanding of malware prevention, emerging threats, attacks and vulnerability management Understanding of Information Security best practice for elements including workstations, servers, cloud, networking, architecture, common protocols, and application security Can confidently perform security audits, both internal and external (e.g., third party and supplier assurance) and ensure recommendations are followed for continuous improvement Strong Incident Response Management skills including threat and vulnerability analysis Understanding of security frameworks such as NIST, and Cyber Essentials As the analyst you will work with the security manager and engineer the day-to-day running and monitoring of Information Security systems. Analyse and interpret outputs to identify security weaknesses and recommend continuous improvements and be involved in - Respond to Security Incidents, reports and alerts ensuring prompt containment and recovery. Plan and oversee regular security penetration testing against new and existing services to identify weaknesses and formulate plans and processes to minimise current and future risk Conduct regular security risk reviews and manage security remediation activity, internally on new IT/Business projects and with third parties This is working for an excellent client who offer progression and development. This is an office-based role in Staffordshire and you will join a small, dedicated security team.
01/04/2026
Full time
Information Security Analyst - Staffordshire Cyber Analyst to join the Information Security Team. Someone who can take those outputs from projects / tools and drive improvements. Looking for an experienced, proactive Security Analyst to ensure the correct level of security integrity to protect systems, information, personal data and people from cyber-attacks and unauthorised access. Working with other departments to ensure security systems are secure, fit for purpose and protected to an optimal level. You will be responsible for driving the security scrutiny, culture, awareness, and adoption across the business. Security Toolsets and a Technical Mindset, you re not expected or required to be an expert in all areas but expected to have a solid understanding and grounding in security principals to adapt to the varied requirements Experienced in a wide variety of security software, systems, services and toolsets such as E-mail Security, EDR, NAC, IT/OT Segmentation, 365 etc along with an understanding of malware prevention, emerging threats, attacks and vulnerability management Understanding of Information Security best practice for elements including workstations, servers, cloud, networking, architecture, common protocols, and application security Can confidently perform security audits, both internal and external (e.g., third party and supplier assurance) and ensure recommendations are followed for continuous improvement Strong Incident Response Management skills including threat and vulnerability analysis Understanding of security frameworks such as NIST, and Cyber Essentials As the analyst you will work with the security manager and engineer the day-to-day running and monitoring of Information Security systems. Analyse and interpret outputs to identify security weaknesses and recommend continuous improvements and be involved in - Respond to Security Incidents, reports and alerts ensuring prompt containment and recovery. Plan and oversee regular security penetration testing against new and existing services to identify weaknesses and formulate plans and processes to minimise current and future risk Conduct regular security risk reviews and manage security remediation activity, internally on new IT/Business projects and with third parties This is working for an excellent client who offer progression and development. This is an office-based role in Staffordshire and you will join a small, dedicated security team.
Hays Specialist Recruitment Limited
GRC Analyst - Data Protection
Hays Specialist Recruitment Limited
GRC Analyst - Data Protection & GDPR Compliance Fixed Term Contract, 12 months - £45k - £50k Location: Hybrid - Birmingham Your new company: I am looking to recruit a GRC Analyst, focusing on Data Protection and GDPR, to join a leader in the hospitality space, with the role focusing on GRC activities, with a strong focus on information security, privacy, and regulatory assurance across the organisation. The role responsibilities: This role focusses on data protection assurance and GDPR compliance, ensuring personal data is processed lawfully, and in line with regulatory and organisational requirements. Key parts of the role: Reviewing how personal data is used across systems, business processes, and technology solutions. Identifying opportunities to reduce, anonymise, or eliminate personal data processing where it is not essential to business needs. Support the review, development, and rollout of information security and data protection policies. Contribute to the management of information security, third party, and privacy risk registers. Assist with internal and external audits, including GDPR assurance, PCI DSS, and financial audits. Track remediation of identified security, privacy, and compliance issues to ensure timely closure. Support incident and breach response activities, including investigation, documentation, and follow up actions. You will need: Strong understanding of GDPR, the UK Data Protection Act, and privacy and security control requirements. Experience working in GRC, information security, data protection, supplier assurance, or a related compliance role. Ability to interpret and assess technical and organisational controls. Strong analytical skills with excellent attention to detail. Confident written and verbal communication skills, able to engage across legal, technical, and operational teams. Experience contributing to incident or breach investigations. Ability to manage multiple competing priorities and constructively challenge established processes. Minimum 3 years' experience in a relevant role. CIPP/E, CIPM, CompTIA Security+, or BCS Practitioner Certificate in Data Protection, desirable. What you'll get in return: Salary of between £45k-£50k Hybrid working Company discounts A pension contribution matched at 1.5x, up to 5%. Private healthcare, dental plan, cycle to work, and keep-fit schemes. 26 days annual leave plus bank holidays. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at hays.co.uk
01/04/2026
Full time
GRC Analyst - Data Protection & GDPR Compliance Fixed Term Contract, 12 months - £45k - £50k Location: Hybrid - Birmingham Your new company: I am looking to recruit a GRC Analyst, focusing on Data Protection and GDPR, to join a leader in the hospitality space, with the role focusing on GRC activities, with a strong focus on information security, privacy, and regulatory assurance across the organisation. The role responsibilities: This role focusses on data protection assurance and GDPR compliance, ensuring personal data is processed lawfully, and in line with regulatory and organisational requirements. Key parts of the role: Reviewing how personal data is used across systems, business processes, and technology solutions. Identifying opportunities to reduce, anonymise, or eliminate personal data processing where it is not essential to business needs. Support the review, development, and rollout of information security and data protection policies. Contribute to the management of information security, third party, and privacy risk registers. Assist with internal and external audits, including GDPR assurance, PCI DSS, and financial audits. Track remediation of identified security, privacy, and compliance issues to ensure timely closure. Support incident and breach response activities, including investigation, documentation, and follow up actions. You will need: Strong understanding of GDPR, the UK Data Protection Act, and privacy and security control requirements. Experience working in GRC, information security, data protection, supplier assurance, or a related compliance role. Ability to interpret and assess technical and organisational controls. Strong analytical skills with excellent attention to detail. Confident written and verbal communication skills, able to engage across legal, technical, and operational teams. Experience contributing to incident or breach investigations. Ability to manage multiple competing priorities and constructively challenge established processes. Minimum 3 years' experience in a relevant role. CIPP/E, CIPM, CompTIA Security+, or BCS Practitioner Certificate in Data Protection, desirable. What you'll get in return: Salary of between £45k-£50k Hybrid working Company discounts A pension contribution matched at 1.5x, up to 5%. Private healthcare, dental plan, cycle to work, and keep-fit schemes. 26 days annual leave plus bank holidays. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at hays.co.uk
NG Bailey
Business Systems Analyst Application Support
NG Bailey Leeds, Yorkshire
Business Systems Analyst (Application Support) Leeds - hybrid -2-3days in office Permanent Summary We're seeking a Systems Analyst to join our team, who are based in our Leeds office. In this role, you'll support critical business systems used across the group, working closely with colleagues to plan, estimate and oversee smooth, successful implementations. You'll be at the heart of innovation, ensuring every new solution transitions seamlessly into business-as-usual operations and delivers a real impact from day one. Some of the key deliverables will include: Monitor and manage a queue of tickets to ensure all tickets are within SLA targets Provide excellent customer service for all tickets ensuring customer expectations are set and regular communication is sent to customers Provide technical support to business users/ICT BAU support staff Working alone, or as part of a team, analyse the underlying issues arising from investigations into requirements and problems, and identify available options for consideration Manage small change requests through the full systems life cycle to completion. Including Requirement Gathering, Feasibility Analysis, Specification, Build and Configuration, Testing and UAT, Training, Implementation, Operational Handover and Post Implementation Support Ensure system configuration and operational support documentation is complete and accurate Support continuous improvement programs in response to support service metrics, customer feedback and process efficiencies Carry out root cause analysis in support of Problem Management. Reconcile issues across support teams to improve Incident Management Process Provide support to ICT Projects Work with a project team to assist with the timely delivery of tasks within a project. Tasks could include Testing and UAT, Training, Operational Handover. Ensure progress/issues/delays are communicated effectively with the Project Manager Delivery of BAU handover tasks into the Systems team and other ICT teams where necessary Create new and update existing Standard Process documentation to aid with knowledge sharing within the systems team. Arrange, prepare and conduct meetings, workshops, training and presentations for a wide variety of audiences. Security Patches/Service Packs are installed in a timely manner, in-line with Cyber Essentials Ensure Information Security risks are identified, reported and actions taken to reduce the occurrence and impact of security incidents. What we're looking for: Previous experience of working within a Systems Analyst/Application Support role Ideally have supported COINS, FocalPoint, IFS or other ERP systems Excellent analytical skills Strong communication, presentational and written skills, with the ability to explain complex issues in a simple way Ability to work under pressure and meet tight deadlines whist still producing good quality work Proven experience at gathering requirements and in negotiations Experience in prioritisation of calls Excels at transferring knowledge through user guides or training Basic knowledge of programming code, relational databases, T-SQL and report writing Able to keep abreast of new technology and can learn new systems quickly with little guidance Exposure to 2nd line support for one or more ERP systems. Next Steps: As a business, we're on a journey to build on our culture where everyone is included, treated fairly and with respect. This starts with recruitment and how we bring people into the organisation. We'll do our best to outline the recruitment process to you ahead of time with plenty of notice. If you require any accommodations to participate in the application or interview process, please let us know and we will work with you to ensure your needs are met. About Us: We are one of the leading independent engineering and services businesses in the UK. Founded in 1921, with a turnover of £500m and 3000 employees, we are proud of our history of developing great people through our investment in training. Working across a variety of sectors within the building and infrastructure industry, our innovative, responsible and forward-thinking approach allows us to work on fantastic ground-breaking projects, providing solutions using the latest tools and technologies. Progression is something we value, and we will make sure that when you join us you have a clearly defined development path, supported by regular reviews, training and ongoing support to enable you to be the best you can be.
01/04/2026
Full time
Business Systems Analyst (Application Support) Leeds - hybrid -2-3days in office Permanent Summary We're seeking a Systems Analyst to join our team, who are based in our Leeds office. In this role, you'll support critical business systems used across the group, working closely with colleagues to plan, estimate and oversee smooth, successful implementations. You'll be at the heart of innovation, ensuring every new solution transitions seamlessly into business-as-usual operations and delivers a real impact from day one. Some of the key deliverables will include: Monitor and manage a queue of tickets to ensure all tickets are within SLA targets Provide excellent customer service for all tickets ensuring customer expectations are set and regular communication is sent to customers Provide technical support to business users/ICT BAU support staff Working alone, or as part of a team, analyse the underlying issues arising from investigations into requirements and problems, and identify available options for consideration Manage small change requests through the full systems life cycle to completion. Including Requirement Gathering, Feasibility Analysis, Specification, Build and Configuration, Testing and UAT, Training, Implementation, Operational Handover and Post Implementation Support Ensure system configuration and operational support documentation is complete and accurate Support continuous improvement programs in response to support service metrics, customer feedback and process efficiencies Carry out root cause analysis in support of Problem Management. Reconcile issues across support teams to improve Incident Management Process Provide support to ICT Projects Work with a project team to assist with the timely delivery of tasks within a project. Tasks could include Testing and UAT, Training, Operational Handover. Ensure progress/issues/delays are communicated effectively with the Project Manager Delivery of BAU handover tasks into the Systems team and other ICT teams where necessary Create new and update existing Standard Process documentation to aid with knowledge sharing within the systems team. Arrange, prepare and conduct meetings, workshops, training and presentations for a wide variety of audiences. Security Patches/Service Packs are installed in a timely manner, in-line with Cyber Essentials Ensure Information Security risks are identified, reported and actions taken to reduce the occurrence and impact of security incidents. What we're looking for: Previous experience of working within a Systems Analyst/Application Support role Ideally have supported COINS, FocalPoint, IFS or other ERP systems Excellent analytical skills Strong communication, presentational and written skills, with the ability to explain complex issues in a simple way Ability to work under pressure and meet tight deadlines whist still producing good quality work Proven experience at gathering requirements and in negotiations Experience in prioritisation of calls Excels at transferring knowledge through user guides or training Basic knowledge of programming code, relational databases, T-SQL and report writing Able to keep abreast of new technology and can learn new systems quickly with little guidance Exposure to 2nd line support for one or more ERP systems. Next Steps: As a business, we're on a journey to build on our culture where everyone is included, treated fairly and with respect. This starts with recruitment and how we bring people into the organisation. We'll do our best to outline the recruitment process to you ahead of time with plenty of notice. If you require any accommodations to participate in the application or interview process, please let us know and we will work with you to ensure your needs are met. About Us: We are one of the leading independent engineering and services businesses in the UK. Founded in 1921, with a turnover of £500m and 3000 employees, we are proud of our history of developing great people through our investment in training. Working across a variety of sectors within the building and infrastructure industry, our innovative, responsible and forward-thinking approach allows us to work on fantastic ground-breaking projects, providing solutions using the latest tools and technologies. Progression is something we value, and we will make sure that when you join us you have a clearly defined development path, supported by regular reviews, training and ongoing support to enable you to be the best you can be.
Additional Resources Ltd
Cyber Security Engineer (Threat Detection & Automation)
Additional Resources Ltd
An exciting opportunity has arisen for a Threat Detection Engineer to join a well-established biotech company using large-scale genetic data and AI to predict disease risk and advance precision healthcare. As a Threat Detection Engineer, you will be responsible for developing and enhancing threat detection capabilities within a modern cloud-first setting. This role offers hybrid / remote working options, a salary range of £60,000 - £80,000 and benefits. You will be responsible for: Designing and implementing threat-led detection logic informed by threat intelligence and hunting activities. Developing innovative analytical techniques to identify incidents effectively. Collaborating with an outsourced SOC to maintain, tune, and optimise detection catalogues. Creating and refining DLP, Insider Risk Management, and other security rules using cloud-native tools. Monitoring and ensuring high-quality service delivery from external SOC providers. Automating reporting on security performance and operational metrics. Partnering with technology teams to ensure adequate monitoring across cloud platforms, SaaS, and internal systems. Documenting security processes, tool configurations, and contributing to service delivery documentation. Supporting colleagues with ISO 27001 compliance and KQL-related tasks. What we are looking for: Previously worked as an SOC Analyst, Threat Detection Engineer or in a similar role. Must have strong expertise in KQL. Hands-on experience with Microsoft Sentinel and Defender (Endpoint, Office 365). Familiarity with Microsoft Entra ID, including Identity Governance. Experience with Microsoft Purview, particularly DLP and data protection tools. Exposure to cloud-native logging in Azure and Kubernetes environments. Understanding of "detection as code" or "everything as code" approaches, including CI/CD pipelines. Experience working with or alongside MSP SOC teams. Awareness of Agile methodologies and ways of working. Knowledge of attacker TTPs, threat modelling, and cyber security frameworks. Understanding of statistics, data science, or AI/ML as applied to security. Awareness of ISO 27001 standards. Relevant cyber security certifications (e.g., MS-500, AZ-500, SC-200, SC-300, SC-400, Security+, GSOC, CCSK). This is a rare chance to contribute to meaningful cyber security work in a role where your expertise will directly influence how threats are detected and mitigated at scale. Relevant job titles: Threat Detection Engineer, Cyber Threat Engineer, Detection & Response Engineer, Security Detection Engineer Important Information: We endeavour to process your personal data in a fair and transparent manner. In applying for this role, Additional Resources will be acting in your best interest and may contact you in relation to the role, either by email, phone, or text message. For more information see our Privacy Policy on our website. It is important you are aware of your individual rights and the provisions the company has put in place to protect your data. If you would like further information on the policy or GDPR please contact us. Additional Resources Ltd is an Employment Business and an Employment Agency as defined within The Conduct of Employment Agencies & Employment Businesses Regulations 2003.
01/04/2026
Full time
An exciting opportunity has arisen for a Threat Detection Engineer to join a well-established biotech company using large-scale genetic data and AI to predict disease risk and advance precision healthcare. As a Threat Detection Engineer, you will be responsible for developing and enhancing threat detection capabilities within a modern cloud-first setting. This role offers hybrid / remote working options, a salary range of £60,000 - £80,000 and benefits. You will be responsible for: Designing and implementing threat-led detection logic informed by threat intelligence and hunting activities. Developing innovative analytical techniques to identify incidents effectively. Collaborating with an outsourced SOC to maintain, tune, and optimise detection catalogues. Creating and refining DLP, Insider Risk Management, and other security rules using cloud-native tools. Monitoring and ensuring high-quality service delivery from external SOC providers. Automating reporting on security performance and operational metrics. Partnering with technology teams to ensure adequate monitoring across cloud platforms, SaaS, and internal systems. Documenting security processes, tool configurations, and contributing to service delivery documentation. Supporting colleagues with ISO 27001 compliance and KQL-related tasks. What we are looking for: Previously worked as an SOC Analyst, Threat Detection Engineer or in a similar role. Must have strong expertise in KQL. Hands-on experience with Microsoft Sentinel and Defender (Endpoint, Office 365). Familiarity with Microsoft Entra ID, including Identity Governance. Experience with Microsoft Purview, particularly DLP and data protection tools. Exposure to cloud-native logging in Azure and Kubernetes environments. Understanding of "detection as code" or "everything as code" approaches, including CI/CD pipelines. Experience working with or alongside MSP SOC teams. Awareness of Agile methodologies and ways of working. Knowledge of attacker TTPs, threat modelling, and cyber security frameworks. Understanding of statistics, data science, or AI/ML as applied to security. Awareness of ISO 27001 standards. Relevant cyber security certifications (e.g., MS-500, AZ-500, SC-200, SC-300, SC-400, Security+, GSOC, CCSK). This is a rare chance to contribute to meaningful cyber security work in a role where your expertise will directly influence how threats are detected and mitigated at scale. Relevant job titles: Threat Detection Engineer, Cyber Threat Engineer, Detection & Response Engineer, Security Detection Engineer Important Information: We endeavour to process your personal data in a fair and transparent manner. In applying for this role, Additional Resources will be acting in your best interest and may contact you in relation to the role, either by email, phone, or text message. For more information see our Privacy Policy on our website. It is important you are aware of your individual rights and the provisions the company has put in place to protect your data. If you would like further information on the policy or GDPR please contact us. Additional Resources Ltd is an Employment Business and an Employment Agency as defined within The Conduct of Employment Agencies & Employment Businesses Regulations 2003.
Franklin Fitch
Senior Security Analyst
Franklin Fitch Fareham, Hampshire
Detection & Response Analyst (SOC / Security Engineering Pathway) Portsmouth (Hybrid) Why this role is different Most SOC roles are alert-heavy and repetitive. This isn't one of them. You'll be joining a team that's actively moving beyond traditional SOC work-focusing on threat detection, automation, and security engineering , not just ticket handling. If you're looking to step up from SOC OR move closer to engineering / threat hunting , this is a genuine pathway role. What you'll be doing Investigating and responding to security incidents across enterprise environments Building and improving SIEM detection rules / use cases Working with security tooling (EDR, SIEM, cloud security platforms) Supporting threat hunting and proactive detection activities Collaborating with engineering teams to improve automation and response Contributing to continuous improvement of security operations What we're looking for We're open to people from a range of backgrounds, including SOC, SecOps, or infrastructure with security exposure. You might have: Experience in a SOC, SecOps, or similar security-focused role Exposure to tools like SIEM (Splunk, Sentinel, QRadar, etc.) or EDR Understanding of common attack techniques (MITRE ATT&CK, incident response basics) An interest in detection engineering, automation, or threat hunting Not ticking every box? That's fine-we're hiring for potential as well as experience . Progression & development This role is designed as a stepping stone into more advanced security work , including: Threat Hunting Detection Engineering Security Engineering / Automation Incident Response You'll be supported with training, certifications, and hands-on exposure to modern tooling. Working setup Hybrid Flexible working environment Portsmouth office for collaboration when needed Why join? Clear progression beyond traditional SOC work Opportunity to work on modern security tooling and detection engineering Supportive team environment with real development focus Chance to build skills that are highly in demand across cyber security
01/04/2026
Full time
Detection & Response Analyst (SOC / Security Engineering Pathway) Portsmouth (Hybrid) Why this role is different Most SOC roles are alert-heavy and repetitive. This isn't one of them. You'll be joining a team that's actively moving beyond traditional SOC work-focusing on threat detection, automation, and security engineering , not just ticket handling. If you're looking to step up from SOC OR move closer to engineering / threat hunting , this is a genuine pathway role. What you'll be doing Investigating and responding to security incidents across enterprise environments Building and improving SIEM detection rules / use cases Working with security tooling (EDR, SIEM, cloud security platforms) Supporting threat hunting and proactive detection activities Collaborating with engineering teams to improve automation and response Contributing to continuous improvement of security operations What we're looking for We're open to people from a range of backgrounds, including SOC, SecOps, or infrastructure with security exposure. You might have: Experience in a SOC, SecOps, or similar security-focused role Exposure to tools like SIEM (Splunk, Sentinel, QRadar, etc.) or EDR Understanding of common attack techniques (MITRE ATT&CK, incident response basics) An interest in detection engineering, automation, or threat hunting Not ticking every box? That's fine-we're hiring for potential as well as experience . Progression & development This role is designed as a stepping stone into more advanced security work , including: Threat Hunting Detection Engineering Security Engineering / Automation Incident Response You'll be supported with training, certifications, and hands-on exposure to modern tooling. Working setup Hybrid Flexible working environment Portsmouth office for collaboration when needed Why join? Clear progression beyond traditional SOC work Opportunity to work on modern security tooling and detection engineering Supportive team environment with real development focus Chance to build skills that are highly in demand across cyber security
Chapman Tate Associates
SOC Analyst (L2)
Chapman Tate Associates Aylesbury, Buckinghamshire
SOC Analyst (Level 2) Location: Aylesbury (Hybrid) Salary: Up to £45,000 (depending on experience) CTA are working with a Cyber Security company who are for a SOC Analyst (L2) to join their growing Security Operations Centre. This role is ideal for a junior analyst looking to build hands-on experience in monitoring, triaging, and responding to security incidents in a fast-paced, shift-based environment. Key Responsibilities Advanced Security Monitoring: Analyse SIEM alerts, logs, and security events to identify and respond to complex threats. Incident Response: Lead investigations, perform deep analysis, determine impact, and coordinate response activities. Threat Detection & Analysis: Develop and refine detection rules and use cases to improve threat visibility. Threat Hunting: Proactively hunt for advanced threats and indicators of compromise across the environment. Vulnerability Management: Identify, assess, and prioritise vulnerabilities and recommend remediation actions. Security Reporting: Produce detailed reports on incidents, trends, and overall security posture. Process Improvement & Automation: Enhance SOC processes, playbooks, and automation capabilities. Skills & Experience Strong experience with SIEM platforms (e.g., Microsoft Sentinel, Sumo Logic) Hands-on experience with EDR/XDR tools (e.g., CrowdStrike, Microsoft Defender) Solid understanding of: Incident response lifecycle Threat detection methodologies Networking protocols (TCP/IP, DNS, HTTP/S) Experience analysing logs from multiple sources (endpoints, network, cloud) Ability to independently investigate and resolve security incidents Scripting or automation experience (e.g., Python, PowerShell) is a plus Strong communication and stakeholder management skills What You'll Be Doing Acting as an escalation point for Level 1 analysts Working closely with customers and internal teams on incident investigations Tuning detection rules and improving alert quality Staying up to date with emerging threats, vulnerabilities, and attack techniques Supporting and mentoring junior analysts Requirements UK Citizenship (required due to the nature of the role) If you are looking for a progressive move with an established Cyber company, please do send your application through for consideration.
01/04/2026
Full time
SOC Analyst (Level 2) Location: Aylesbury (Hybrid) Salary: Up to £45,000 (depending on experience) CTA are working with a Cyber Security company who are for a SOC Analyst (L2) to join their growing Security Operations Centre. This role is ideal for a junior analyst looking to build hands-on experience in monitoring, triaging, and responding to security incidents in a fast-paced, shift-based environment. Key Responsibilities Advanced Security Monitoring: Analyse SIEM alerts, logs, and security events to identify and respond to complex threats. Incident Response: Lead investigations, perform deep analysis, determine impact, and coordinate response activities. Threat Detection & Analysis: Develop and refine detection rules and use cases to improve threat visibility. Threat Hunting: Proactively hunt for advanced threats and indicators of compromise across the environment. Vulnerability Management: Identify, assess, and prioritise vulnerabilities and recommend remediation actions. Security Reporting: Produce detailed reports on incidents, trends, and overall security posture. Process Improvement & Automation: Enhance SOC processes, playbooks, and automation capabilities. Skills & Experience Strong experience with SIEM platforms (e.g., Microsoft Sentinel, Sumo Logic) Hands-on experience with EDR/XDR tools (e.g., CrowdStrike, Microsoft Defender) Solid understanding of: Incident response lifecycle Threat detection methodologies Networking protocols (TCP/IP, DNS, HTTP/S) Experience analysing logs from multiple sources (endpoints, network, cloud) Ability to independently investigate and resolve security incidents Scripting or automation experience (e.g., Python, PowerShell) is a plus Strong communication and stakeholder management skills What You'll Be Doing Acting as an escalation point for Level 1 analysts Working closely with customers and internal teams on incident investigations Tuning detection rules and improving alert quality Staying up to date with emerging threats, vulnerabilities, and attack techniques Supporting and mentoring junior analysts Requirements UK Citizenship (required due to the nature of the role) If you are looking for a progressive move with an established Cyber company, please do send your application through for consideration.
Chapman Tate Associates
SOC Analyst (L1)
Chapman Tate Associates Aylesbury, Buckinghamshire
SOC Analyst (Level 1) Location: Aylesbury (Hybrid) Salary: Up to £25,000-£30,000 + shift allowance Shift Pattern: 24/7 rotating shifts (including nights and weekends) CTA are working with a Cyber Security company who are for a SOC Analyst (Level 1) to join their growing Security Operations Centre. This role is ideal for a junior analyst looking to build hands-on experience in monitoring, triaging, and responding to security incidents in a fast-paced, shift-based environment. Key Responsibilities Security Monitoring: Monitor SIEM dashboards, alerts, and log data to identify suspicious or malicious activity. Alert Triage: Perform initial investigation and prioritisation of security alerts, escalating where necessary. Incident Response (L1): Assist in incident investigation, gather relevant evidence, and support escalation to senior analysts or IR teams. Threat Detection: Support detection of threats using established rules and playbooks. Basic Threat Hunting: Assist with proactive searches for anomalies under guidance from senior analysts. Vulnerability Awareness: Identify and report potential vulnerabilities or misconfigurations. Reporting: Document incidents, actions taken, and findings clearly for internal teams and customers. Continuous Improvement: Contribute to improving SOC processes, playbooks, and detection rules. Skills & Experience Exposure to SIEM tools (e.g., Sumo Logic, Microsoft Sentinel) Familiarity with EDR/XDR tools (e.g., CrowdStrike, Microsoft Defender) Basic understanding of: Security operations Incident response lifecycle Networking fundamentals (TCP/IP, DNS, etc.) Strong analytical and problem-solving skills Good communication skills (written and verbal) Ability and willingness to work 24/7 shift patterns (including nights/weekends) What You'll Be Doing Working closely with senior analysts and wider security teams Supporting customers with security monitoring and incident triage Participating in a shift-based rota to ensure continuous SOC coverage Keeping up to date with emerging cyber threats and trends Learning industry tools and best practices through structured training Growth Opportunity Join a newly formed SOC team with a clear training and development pathway , offering progression into SOC Analyst Level 2 and beyond. Requirements UK Citizenship (required due to the nature of the role) If you are looking for a progressive move with an established Cyber company, please do send your application through for consideration.
01/04/2026
Full time
SOC Analyst (Level 1) Location: Aylesbury (Hybrid) Salary: Up to £25,000-£30,000 + shift allowance Shift Pattern: 24/7 rotating shifts (including nights and weekends) CTA are working with a Cyber Security company who are for a SOC Analyst (Level 1) to join their growing Security Operations Centre. This role is ideal for a junior analyst looking to build hands-on experience in monitoring, triaging, and responding to security incidents in a fast-paced, shift-based environment. Key Responsibilities Security Monitoring: Monitor SIEM dashboards, alerts, and log data to identify suspicious or malicious activity. Alert Triage: Perform initial investigation and prioritisation of security alerts, escalating where necessary. Incident Response (L1): Assist in incident investigation, gather relevant evidence, and support escalation to senior analysts or IR teams. Threat Detection: Support detection of threats using established rules and playbooks. Basic Threat Hunting: Assist with proactive searches for anomalies under guidance from senior analysts. Vulnerability Awareness: Identify and report potential vulnerabilities or misconfigurations. Reporting: Document incidents, actions taken, and findings clearly for internal teams and customers. Continuous Improvement: Contribute to improving SOC processes, playbooks, and detection rules. Skills & Experience Exposure to SIEM tools (e.g., Sumo Logic, Microsoft Sentinel) Familiarity with EDR/XDR tools (e.g., CrowdStrike, Microsoft Defender) Basic understanding of: Security operations Incident response lifecycle Networking fundamentals (TCP/IP, DNS, etc.) Strong analytical and problem-solving skills Good communication skills (written and verbal) Ability and willingness to work 24/7 shift patterns (including nights/weekends) What You'll Be Doing Working closely with senior analysts and wider security teams Supporting customers with security monitoring and incident triage Participating in a shift-based rota to ensure continuous SOC coverage Keeping up to date with emerging cyber threats and trends Learning industry tools and best practices through structured training Growth Opportunity Join a newly formed SOC team with a clear training and development pathway , offering progression into SOC Analyst Level 2 and beyond. Requirements UK Citizenship (required due to the nature of the role) If you are looking for a progressive move with an established Cyber company, please do send your application through for consideration.
Michael Page Technology
Information Security Risk Analyst (Hybrid / Multiple Locations)
Michael Page Technology Manchester, Lancashire
The Information Security Officer will support the safeguarding of the organisation's information assets by identifying risks, monitoring security controls, and ensuring best-practice governance. The role also contributes to incident response, third-party oversight, and ongoing security improvements. It is a hybrid role. You can choose to work in either one of the offices: Manchester, Cardiff, London. Client Details The client is a rapid growing finance service provider, with a strong focus on data protection, operational resilience, and continuous improvement in cybersecurity. They offer a supportive environment with investment in modern tools, frameworks, and professional development. Description Conduct and support information security risk assessments, vulnerability reviews, and the maintenance of the risk register. Work closely with SOC team and infrastructure team for remediation plan Assist with regulatory and audit obligations by preparing documentation and ensuring compliance with legal standards. Maintain and update security policies, standards, and procedures to reflect organisational needs and current threats. Deliver security awareness initiatives and training to promote secure behaviours across the organisation. Perform due-diligence reviews of third-party suppliers and support ongoing monitoring of external security risks. Profile Experience in information security, risk assessment within a regulated or structured environment. Familiarity with security monitoring tools, vulnerability management, and supporting audit activities. Understanding of security frameworks such as ISO 27001, NIST, or Cyber Essentials. Strong communication skills, with the ability to explain technical security matters to non-technical stakeholders. Highly organised, proactive, and capable of managing multiple priorities with attention to detail. Relevant qualifications (CISM is highly preferred) or certifications (e.g., CISMP, Security+, CISM, CISSP, SC-200, AZ-500) Job Offer Hybrid role: 60% in Manchester, Cardiff or London office 25 days holiday plus birthday off Pension Scheme (8% matched) Life Assurance Private Medical Insurance Gym Memberships Retails discounts
01/04/2026
Full time
The Information Security Officer will support the safeguarding of the organisation's information assets by identifying risks, monitoring security controls, and ensuring best-practice governance. The role also contributes to incident response, third-party oversight, and ongoing security improvements. It is a hybrid role. You can choose to work in either one of the offices: Manchester, Cardiff, London. Client Details The client is a rapid growing finance service provider, with a strong focus on data protection, operational resilience, and continuous improvement in cybersecurity. They offer a supportive environment with investment in modern tools, frameworks, and professional development. Description Conduct and support information security risk assessments, vulnerability reviews, and the maintenance of the risk register. Work closely with SOC team and infrastructure team for remediation plan Assist with regulatory and audit obligations by preparing documentation and ensuring compliance with legal standards. Maintain and update security policies, standards, and procedures to reflect organisational needs and current threats. Deliver security awareness initiatives and training to promote secure behaviours across the organisation. Perform due-diligence reviews of third-party suppliers and support ongoing monitoring of external security risks. Profile Experience in information security, risk assessment within a regulated or structured environment. Familiarity with security monitoring tools, vulnerability management, and supporting audit activities. Understanding of security frameworks such as ISO 27001, NIST, or Cyber Essentials. Strong communication skills, with the ability to explain technical security matters to non-technical stakeholders. Highly organised, proactive, and capable of managing multiple priorities with attention to detail. Relevant qualifications (CISM is highly preferred) or certifications (e.g., CISMP, Security+, CISM, CISSP, SC-200, AZ-500) Job Offer Hybrid role: 60% in Manchester, Cardiff or London office 25 days holiday plus birthday off Pension Scheme (8% matched) Life Assurance Private Medical Insurance Gym Memberships Retails discounts
Cloud Application Analyst, Senior
Epicor Bracknell, Berkshire
Senior Cloud Application Support Engineer We are seeking a technically strong, customer-facing Cloud Reliability Analystwho can work directly with end users while also diagnosing and resolving complex infrastructure and application issues. This role requires deep troubleshooting skills across Windows-based Azure environments, as well as the ability to translate technical findings into clear, actionable communication for non-technical stakeholders. The ideal candidate combines hands-on cloud and systems expertise with strong ownership, sound judgment, and a proactive mindset. Join our dynamic team in Bracknell or Peterborough ! This is a full-time, permanent hybrid position, offering the perfect balance of three days in the office and two days working from home. Embrace the flexibility and be part of an innovative environment where your contributions truly matter. Duties & Responsibilities Deploy, maintain, and support Windows-based environments in Microsoft Azure. Support and troubleshoot technologies including: Remote Desktop Services (RDS) FSLogix IIS Active Directory SQL Server Serve as a primary technical point of contact for end users, providing professional communication and timely resolution of issues. Perform deep troubleshooting across multi-tier application environments (application, database, OS, networking). Analyze application logs, Windows event logs, and SQL logs to determine root cause. Monitor live production environments and proactively respond to performance degradation, monitoring alerts, and service disruptions. Participate in incident response and contribute to reducing Mean Time to Resolution (MTTR). Collaborate with development, operations, and infrastructure teams to implement scalable, reliable solutions. Design and implement automation to eliminate repetitive manual tasks and improve deployment consistency. Identify opportunities to optimize system performance, stability, and reliability. Act as a subject matter expert (SME) for internal stakeholders outside the IT organization. Knowledge, Skills & Abilities Strong experience with Microsoft Azure (AWS or similar cloud platforms a plus). Solid understanding of Windows Server environments and enterprise infrastructure. Strong knowledge of networking fundamentals, including DNS, routing, firewalls, and load balancing. Experience supporting Active Directory and identity-integrated applications. Proven ability to troubleshoot complex, multi-tier production environments. Intermediate SQL knowledge (querying, performance analysis, indexing basics preferred). Experience with Azure monitoring tools such as Log Analytics, Application Insights, or similar. Familiarity with scripting and automation (PowerShell, Azure CLI, ARM/Bicep, Terraform, or similar). Experience with performance tuning, capacity planning, and resource optimization. Experience working in SLA-driven or incident-managed environments. Ability to work directly with end users of varying technical proficiency and translate technical issues into understandable terms. Experience leveraging AI-assisted troubleshooting tools to accelerate issue diagnosis and resolution. Qualifications 5+ years of relevant IT experience with demonstrated success in application support, infrastructure, or cloud operations roles. 2+ years supporting cloud-hosted production environments.
31/03/2026
Full time
Senior Cloud Application Support Engineer We are seeking a technically strong, customer-facing Cloud Reliability Analystwho can work directly with end users while also diagnosing and resolving complex infrastructure and application issues. This role requires deep troubleshooting skills across Windows-based Azure environments, as well as the ability to translate technical findings into clear, actionable communication for non-technical stakeholders. The ideal candidate combines hands-on cloud and systems expertise with strong ownership, sound judgment, and a proactive mindset. Join our dynamic team in Bracknell or Peterborough ! This is a full-time, permanent hybrid position, offering the perfect balance of three days in the office and two days working from home. Embrace the flexibility and be part of an innovative environment where your contributions truly matter. Duties & Responsibilities Deploy, maintain, and support Windows-based environments in Microsoft Azure. Support and troubleshoot technologies including: Remote Desktop Services (RDS) FSLogix IIS Active Directory SQL Server Serve as a primary technical point of contact for end users, providing professional communication and timely resolution of issues. Perform deep troubleshooting across multi-tier application environments (application, database, OS, networking). Analyze application logs, Windows event logs, and SQL logs to determine root cause. Monitor live production environments and proactively respond to performance degradation, monitoring alerts, and service disruptions. Participate in incident response and contribute to reducing Mean Time to Resolution (MTTR). Collaborate with development, operations, and infrastructure teams to implement scalable, reliable solutions. Design and implement automation to eliminate repetitive manual tasks and improve deployment consistency. Identify opportunities to optimize system performance, stability, and reliability. Act as a subject matter expert (SME) for internal stakeholders outside the IT organization. Knowledge, Skills & Abilities Strong experience with Microsoft Azure (AWS or similar cloud platforms a plus). Solid understanding of Windows Server environments and enterprise infrastructure. Strong knowledge of networking fundamentals, including DNS, routing, firewalls, and load balancing. Experience supporting Active Directory and identity-integrated applications. Proven ability to troubleshoot complex, multi-tier production environments. Intermediate SQL knowledge (querying, performance analysis, indexing basics preferred). Experience with Azure monitoring tools such as Log Analytics, Application Insights, or similar. Familiarity with scripting and automation (PowerShell, Azure CLI, ARM/Bicep, Terraform, or similar). Experience with performance tuning, capacity planning, and resource optimization. Experience working in SLA-driven or incident-managed environments. Ability to work directly with end users of varying technical proficiency and translate technical issues into understandable terms. Experience leveraging AI-assisted troubleshooting tools to accelerate issue diagnosis and resolution. Qualifications 5+ years of relevant IT experience with demonstrated success in application support, infrastructure, or cloud operations roles. 2+ years supporting cloud-hosted production environments.
Akkodis
Principal Digital Forensics Analyst
Akkodis
Principal Digital Forensics Analyst 65,000 - 70,000 + bonus + extensive benefits Full Time / Permanent Remote with occasional travel to West Midlands offices and labs and sites throughout the UK for major incidents The Role and Company: I am looking for a driven and experienced Principal Digital Forensics Analyst to join a large nationally recognised brand head quartered in the West Midlands. As the Principal Digital Forensics Analyst, you will be the most senior analyst in the team and will possess expert level of proficiency in forensically acquiring, preserving, and analysing digital evidence across a variety of platforms to support internal investigations, e-discovery, litigation, and incident response efforts. The Principal Analyst will also take a lead role in complex cases, develop forensic methodologies, and mentor other team members. This role can be primarily remote based however the successful candidate must be willing to travel to the West Midlands head offices and labs and sites throughout the UK for major incidents. Key Responsibilities: Lead and conduct digital forensic investigations to identify causes and impacts of cyber incidents, insider threats, fraud, IP theft, and regulatory non-compliance. Acquire and process digital evidence across multiple sources (laptops, servers, mobile, cloud, network logs) to ensure evidential integrity and maintain a strict chain of custody. Perform forensic analysis of file systems, OS artefacts, memory, network traffic, and malware to reconstruct events and determine root causes. Prepare and deliver detailed technical reports and executive summaries to communicate findings clearly to technical, legal, and senior business stakeholders. Research and implement emerging forensic tools and methodologies to enhance investigation capabilities and maintain operational excellence. Collaborate with the Cyber Security Incident Response Team to provide rapid forensic support during live cybersecurity incidents. Experience required: Proven Digital Forensics experience operating at a senior / lead level within large and complex enterprise organisations. Previous experience or a practical understanding of Operational Technology (OT) cyber security frameworks and standards. Proven expert knowledge of core forensic principles, evidence handling best practices, and the legal framework surrounding digital evidence, seizure of items and chain of custody. Expert level proficiency with industry leading forensic tools. Deep understanding of operating system internals (Windows, macOS, Linux) and file systems. Solid experience with network forensics, log analysis, and an understanding of network protocols (TCP/IP). Please apply via the link or contact (url removed) for more information Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers in the UK. Modis Europe Ltd provide a variety of international solutions that connect clients to the best talent in the world. For all positions based in Switzerland, Modis Europe Ltd works with its licensed Swiss partner Accurity GmbH to ensure that candidate applications are handled in accordance with Swiss law. Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers. By applying for this role your details will be submitted to Modis International Ltd and/ or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website.
31/03/2026
Full time
Principal Digital Forensics Analyst 65,000 - 70,000 + bonus + extensive benefits Full Time / Permanent Remote with occasional travel to West Midlands offices and labs and sites throughout the UK for major incidents The Role and Company: I am looking for a driven and experienced Principal Digital Forensics Analyst to join a large nationally recognised brand head quartered in the West Midlands. As the Principal Digital Forensics Analyst, you will be the most senior analyst in the team and will possess expert level of proficiency in forensically acquiring, preserving, and analysing digital evidence across a variety of platforms to support internal investigations, e-discovery, litigation, and incident response efforts. The Principal Analyst will also take a lead role in complex cases, develop forensic methodologies, and mentor other team members. This role can be primarily remote based however the successful candidate must be willing to travel to the West Midlands head offices and labs and sites throughout the UK for major incidents. Key Responsibilities: Lead and conduct digital forensic investigations to identify causes and impacts of cyber incidents, insider threats, fraud, IP theft, and regulatory non-compliance. Acquire and process digital evidence across multiple sources (laptops, servers, mobile, cloud, network logs) to ensure evidential integrity and maintain a strict chain of custody. Perform forensic analysis of file systems, OS artefacts, memory, network traffic, and malware to reconstruct events and determine root causes. Prepare and deliver detailed technical reports and executive summaries to communicate findings clearly to technical, legal, and senior business stakeholders. Research and implement emerging forensic tools and methodologies to enhance investigation capabilities and maintain operational excellence. Collaborate with the Cyber Security Incident Response Team to provide rapid forensic support during live cybersecurity incidents. Experience required: Proven Digital Forensics experience operating at a senior / lead level within large and complex enterprise organisations. Previous experience or a practical understanding of Operational Technology (OT) cyber security frameworks and standards. Proven expert knowledge of core forensic principles, evidence handling best practices, and the legal framework surrounding digital evidence, seizure of items and chain of custody. Expert level proficiency with industry leading forensic tools. Deep understanding of operating system internals (Windows, macOS, Linux) and file systems. Solid experience with network forensics, log analysis, and an understanding of network protocols (TCP/IP). Please apply via the link or contact (url removed) for more information Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers in the UK. Modis Europe Ltd provide a variety of international solutions that connect clients to the best talent in the world. For all positions based in Switzerland, Modis Europe Ltd works with its licensed Swiss partner Accurity GmbH to ensure that candidate applications are handled in accordance with Swiss law. Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers. By applying for this role your details will be submitted to Modis International Ltd and/ or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website.
DGH Recruitment Ltd
Cyber Security Analyst
DGH Recruitment Ltd Newcastle Upon Tyne, Tyne And Wear
Cyber Security Analyst DGH Recruitment are currently recruiting on behalf of a leading client in the professional services industry who require a Cyber Security Analyst to join the firm in Newcastle. The scope of the Information Security function includes all strategic security planning and control oversight to ensure effective risk mitigation takes place within the firm. The team operates a number of security solutions directly, such as anti-malware solutions, Internet security proxy servers, and the vulnerability scanning platforms. Key Responsibilities: Review, action, and escalate, any unusual event behaviour identified. Assist with development and maintenance of the Firm-wide security infrastructure configuration, policies and procedures, identifying improvements to procedures, and reporting on incidents. Actively promote security governance in support of the Information Security policies, to ensure appropriate measures are taken to secure the Firm's confidentiality and integrity. Encourage cooperative working with all business functions to achieve shared goals, ensuring skills transfer and technical security awareness within the teams. This includes writing process documents and conducting training. Key Skills and Experience: At least 5 years' experience working within Information Security infrastructure or vocation to move from another technical discipline. Proven ability to adapt quickly to emerging threats or new information, shifting focus as needed. Demonstrated expertise in Microsoft 365 Defender and Azure Sentinel for detecting, investigating, and responding to suspicious behaviors and anomalous activities. Familiarity with endpoint security solutions and security infrastructure, including EDR, vulnerability management tools, DLP solutions, and removable media encryption. Working knowledge of cloud based web and email filtering solutions such as , Zscaler, Mimecast, Proofpoint, or Cisco. Experience with securing cloud environments (AWS, Azure, GCP), including configuration management, identity and access controls, monitoring, and incident response. Familiarity with cloud security tools (e.g., Microsoft Defender for Cloud, AWS Security Hub), and cloud compliance frameworks (e.g., CIS, CSA CCM) is highly desirable. Experience with security automation and orchestration, including the use of scripting languages (such as PowerShell or Python) and SOAR platforms to streamline incident response, automate repetitive tasks, and enhance overall security operations. Strong knowledge of security technologies (e.g., firewalls, IDS/IPS, EDR, SIEM) Technical bachelor's degree or equivalent IT / Information Security experience (required) Security-related certification e.g. CompTIA Security+, GSEC, CISSP, CISA, CCSP (preferred). Good understanding of security frameworks such as ISO 27001, NIST, Mitre (preferred) Cyber Security Analyst In accordance with the Employment Agencies and Employment Businesses Regulations 2003, this position is advertised based upon DGH Recruitment Limited having first sought approval of its client to find candidates for this position. DGH Recruitment Limited acts as both an Employment Agency and Employment Business
31/03/2026
Full time
Cyber Security Analyst DGH Recruitment are currently recruiting on behalf of a leading client in the professional services industry who require a Cyber Security Analyst to join the firm in Newcastle. The scope of the Information Security function includes all strategic security planning and control oversight to ensure effective risk mitigation takes place within the firm. The team operates a number of security solutions directly, such as anti-malware solutions, Internet security proxy servers, and the vulnerability scanning platforms. Key Responsibilities: Review, action, and escalate, any unusual event behaviour identified. Assist with development and maintenance of the Firm-wide security infrastructure configuration, policies and procedures, identifying improvements to procedures, and reporting on incidents. Actively promote security governance in support of the Information Security policies, to ensure appropriate measures are taken to secure the Firm's confidentiality and integrity. Encourage cooperative working with all business functions to achieve shared goals, ensuring skills transfer and technical security awareness within the teams. This includes writing process documents and conducting training. Key Skills and Experience: At least 5 years' experience working within Information Security infrastructure or vocation to move from another technical discipline. Proven ability to adapt quickly to emerging threats or new information, shifting focus as needed. Demonstrated expertise in Microsoft 365 Defender and Azure Sentinel for detecting, investigating, and responding to suspicious behaviors and anomalous activities. Familiarity with endpoint security solutions and security infrastructure, including EDR, vulnerability management tools, DLP solutions, and removable media encryption. Working knowledge of cloud based web and email filtering solutions such as , Zscaler, Mimecast, Proofpoint, or Cisco. Experience with securing cloud environments (AWS, Azure, GCP), including configuration management, identity and access controls, monitoring, and incident response. Familiarity with cloud security tools (e.g., Microsoft Defender for Cloud, AWS Security Hub), and cloud compliance frameworks (e.g., CIS, CSA CCM) is highly desirable. Experience with security automation and orchestration, including the use of scripting languages (such as PowerShell or Python) and SOAR platforms to streamline incident response, automate repetitive tasks, and enhance overall security operations. Strong knowledge of security technologies (e.g., firewalls, IDS/IPS, EDR, SIEM) Technical bachelor's degree or equivalent IT / Information Security experience (required) Security-related certification e.g. CompTIA Security+, GSEC, CISSP, CISA, CCSP (preferred). Good understanding of security frameworks such as ISO 27001, NIST, Mitre (preferred) Cyber Security Analyst In accordance with the Employment Agencies and Employment Businesses Regulations 2003, this position is advertised based upon DGH Recruitment Limited having first sought approval of its client to find candidates for this position. DGH Recruitment Limited acts as both an Employment Agency and Employment Business
Experis
SOC Analyst / SecOps Consultant (DV Cleared) - Remote
Experis
SOC Analyst / SecOps Consultant - Remote with occasional trip to Farnborough Must have an Active DV Clearance An opportunity is available for an experienced SOC Analyst / SecOps Consultant to support and enhance Security Operations Centre capability within a highly secure environment. This role focuses on hands on SecOps delivery with a strong emphasis on Elastic Stack ownership, continuous improvement, and collaboration across multiple SOC functions. About the Role - SOC Analyst / SecOps Consultant As a SOC Analyst / SecOps Consultant , you will deliver day to day SOC and SecOps operations in support of live security services. You will take ownership of administering and managing the Elastic Stack, including agent deployment and data onboarding. You will tune detection rules, build and maintain dashboards, and improve alert fidelity across the SOC. You will work closely with internal SOC teams, external SOCs, and end customers to support incident response and service improvement. You will maintain high quality SOC documentation and contribute to continuous improvement initiatives across processes and tooling. Key Skills - SOC Analyst / SecOps Consultant Proven experience working in SOC or SecOps environments. Strong hands on expertise with Elastic Stack (ELK) , including data ingestion and rule tuning. Experience integrating and managing security data sources. Ability to collaborate effectively across multi SOC environments. Strong written and verbal communication skills with a focus on clear documentation. This role suits a delivery focused SOC Analyst / SecOps Consultant who enjoys deep technical ownership and driving measurable security improvements. To apply, please send your CV by pressing the apply button
31/03/2026
Contractor
SOC Analyst / SecOps Consultant - Remote with occasional trip to Farnborough Must have an Active DV Clearance An opportunity is available for an experienced SOC Analyst / SecOps Consultant to support and enhance Security Operations Centre capability within a highly secure environment. This role focuses on hands on SecOps delivery with a strong emphasis on Elastic Stack ownership, continuous improvement, and collaboration across multiple SOC functions. About the Role - SOC Analyst / SecOps Consultant As a SOC Analyst / SecOps Consultant , you will deliver day to day SOC and SecOps operations in support of live security services. You will take ownership of administering and managing the Elastic Stack, including agent deployment and data onboarding. You will tune detection rules, build and maintain dashboards, and improve alert fidelity across the SOC. You will work closely with internal SOC teams, external SOCs, and end customers to support incident response and service improvement. You will maintain high quality SOC documentation and contribute to continuous improvement initiatives across processes and tooling. Key Skills - SOC Analyst / SecOps Consultant Proven experience working in SOC or SecOps environments. Strong hands on expertise with Elastic Stack (ELK) , including data ingestion and rule tuning. Experience integrating and managing security data sources. Ability to collaborate effectively across multi SOC environments. Strong written and verbal communication skills with a focus on clear documentation. This role suits a delivery focused SOC Analyst / SecOps Consultant who enjoys deep technical ownership and driving measurable security improvements. To apply, please send your CV by pressing the apply button

Modal Window

  • Home
  • Contact
  • About Us
  • FAQs
  • Terms & Conditions
  • Privacy
  • Employer
  • Post a Job
  • Search Resumes
  • Sign in
  • Job Seeker
  • Find Jobs
  • Create Resume
  • Sign in
  • IT blog
  • Facebook
  • Twitter
  • LinkedIn
  • Youtube
© 2008-2026 IT Job Board