it job board logo
  • Home
  • Find IT Jobs
  • Register CV
  • Register as Employer
  • Contact us
  • Career Advice
  • Recruiting? Post a job
  • Sign in
  • Sign up
  • Home
  • Find IT Jobs
  • Register CV
  • Register as Employer
  • Contact us
  • Career Advice
Sorry, that job is no longer available. Here are some results that may be similar to the job you were looking for.

246 jobs found

Email me jobs like this
Refine Search
Current Search
cyber security analyst soc
Acorn Insurance and Financial Services Limited
Senior Information Security Analyst
Acorn Insurance and Financial Services Limited Liverpool
Due to a period of exciting growth Acorn are looking for a highly skilled and experienced Senior Information Security Analyst to join our Information Security Team. Within this role you get the opportunity to join a collaborative team and have a chance to blend GRC responsibilities with technical security experience, all whilst working for a market leading insurance company, supporting and maintaining robust security controls and regulatory compliance.   Job Title:  Senior Information Security Analyst (12 month FTC) Location:  Liverpool City Centre, Hybrid working available Working Hours:  Monday to Friday, 37.5 hours per week , 9:00 AM – 5:30 PM Salary:  £50,000 - £60,000 pa (DOE).   What you will be doing: Work with all parties across the business to identify and assess risk and ensure mitigations are tracked to completion. Lead the development and maintenance of information security policies, standards and procedures in line with regulatory frameworks and industry standards. Lead third party risk management processes. Collaborate across all areas of the business to align security policies and processes with business objectives and regulatory obligations. Work with Security Operations and IT teams to provide oversight of vulnerability assessments and remediation activities. Lead on security architecture reviews for new systems and services. Evaluate technical security controls and recommending improvements. Support the implementation of security tools and technologies. Provide oversight of the security incident management process. Provide security metrics for interested parties at all levels. Lead the security awareness programme to promote a culture of security within all levels of the Group. Provide support for internal and external security audits. Lead security governance meetings representing the Information Security team and standing in for the Head of Information Security when required. Provide subject matter expertise liaising across all business functions.   What we look for: Minimum 5 years' experience in information security roles. Strong leadership and mentorship abilities with a strategic mindset. Experience with risk assessment methodologies. Excellent analytical and problem-solving skills with attention to detail. Strong communication skills with the ability to explain complex security concepts to non-technical stakeholders. Ability to manage risk and compliance projects and drive security initiatives. Knowledge of information security frameworks such as ISO 27001 or NIST. Knowledge of vulnerability management processes.   About Acorn Insurance With over 40 years of experience, Acorn Insurance is a specialist provider dedicated to helping individuals secure motor insurance across the UK. We proudly serve more than 50,000 customers, ensuring they find policies that meet their needs and provide the peace of mind that comes with high-quality cover. At Acorn Insurance, we offer comprehensive training and continuous in-house coaching. You'll receive in-depth, FCA-regulated industry knowledge and all the tools necessary to grow your career with us. We celebrate diversity and are committed to fostering a culture where everyone feels respected and valued. As a Disability Confident Level 1 and Level 2 employer, we ensure our workplace is accessible and inclusive, encouraging our people to bring their best selves to work every day. The Acorn Group has been recognised as a Great Place to Work for 2024/5. A record number of employees participated in our survey, overwhelmingly highlighting our welcoming and supportive atmosphere as an excellent place to build a career. We are committed to continuous improvement and have ambitious plans for 2025.  Why Acorn Insurance? Acorn Insurance want to give you more than a job, we want to give you a purpose and a career. So, what can we offer you as an employer? Some of the "your tomorrow" benefits you will receive include: Wellbeing:  Enhanced Annual Leave entitlement starting at 31 days and potentially increasing to 35 days per year depending on grade & length of service (including bank holidays) Enhanced paternity pay and 16 weeks full maternity pay. Colleague Assistance programme offers a suite of wellbeing services such as: 6 Free Counselling sessions per year Unlimited access to a telephone councillor 24/7 Access to a free 4-week programme of cognitive behavioural therapy (CBT) with a trained therapist mentor.  Network of internal qualified mental health first aiders are available to provide support to colleagues. Financial: A core level of life assurance with the option to increase cover via salary sacrifice and add your spouse/partner  Ability to access your earnings before payday via Dayforce Wallet. Company pension scheme Refer a friend scheme with a £250 bonus for every colleague recommended on passing their probation period. Access to a flexible benefits platform including an annual flex pot allowance to spend on over 15 benefits of your choice. Ability to give back. You can opt into donating money to charity to climate positive organisations directly from your salary.   Reward, Recognition and Culture :  Long Service Award paid on 5,10- and 15-years’ service A reward and recognition hub to celebrate and reward colleagues and peers. Consistent and engaging company events including company awards, competitions and charity fundraisers. Budgets for department leaders to use for social and engagement events. Please visit out website to view more of our excellent work benefits!    All roles are subject to DBS and Financial checks, any offer made will be conditional until checks are completed to a satisfactory standard. Unfortunately, due to the length of training and complexity of the role, we can only accept applications from candidates who have at least one year remaining on their (Graduate/ Post study work) visa. Unfortunately, we are unable to provide visa sponsorships. At Acorn, we are committed to creating an inclusive and supportive work environment. We recognise that candidates may have specific needs and are happy to consider reasonable adjustments to the recruitment process and working environment to accommodate individual requirements. Whether it’s modifying equipment, adjusting working hours, or providing additional support, we aim to ensure all employees can perform at their best. If you require any reasonable adjustments, please let us know during the application or interview process, and we will work with you to ensure your needs are met.
25/04/2025
Full time
Due to a period of exciting growth Acorn are looking for a highly skilled and experienced Senior Information Security Analyst to join our Information Security Team. Within this role you get the opportunity to join a collaborative team and have a chance to blend GRC responsibilities with technical security experience, all whilst working for a market leading insurance company, supporting and maintaining robust security controls and regulatory compliance.   Job Title:  Senior Information Security Analyst (12 month FTC) Location:  Liverpool City Centre, Hybrid working available Working Hours:  Monday to Friday, 37.5 hours per week , 9:00 AM – 5:30 PM Salary:  £50,000 - £60,000 pa (DOE).   What you will be doing: Work with all parties across the business to identify and assess risk and ensure mitigations are tracked to completion. Lead the development and maintenance of information security policies, standards and procedures in line with regulatory frameworks and industry standards. Lead third party risk management processes. Collaborate across all areas of the business to align security policies and processes with business objectives and regulatory obligations. Work with Security Operations and IT teams to provide oversight of vulnerability assessments and remediation activities. Lead on security architecture reviews for new systems and services. Evaluate technical security controls and recommending improvements. Support the implementation of security tools and technologies. Provide oversight of the security incident management process. Provide security metrics for interested parties at all levels. Lead the security awareness programme to promote a culture of security within all levels of the Group. Provide support for internal and external security audits. Lead security governance meetings representing the Information Security team and standing in for the Head of Information Security when required. Provide subject matter expertise liaising across all business functions.   What we look for: Minimum 5 years' experience in information security roles. Strong leadership and mentorship abilities with a strategic mindset. Experience with risk assessment methodologies. Excellent analytical and problem-solving skills with attention to detail. Strong communication skills with the ability to explain complex security concepts to non-technical stakeholders. Ability to manage risk and compliance projects and drive security initiatives. Knowledge of information security frameworks such as ISO 27001 or NIST. Knowledge of vulnerability management processes.   About Acorn Insurance With over 40 years of experience, Acorn Insurance is a specialist provider dedicated to helping individuals secure motor insurance across the UK. We proudly serve more than 50,000 customers, ensuring they find policies that meet their needs and provide the peace of mind that comes with high-quality cover. At Acorn Insurance, we offer comprehensive training and continuous in-house coaching. You'll receive in-depth, FCA-regulated industry knowledge and all the tools necessary to grow your career with us. We celebrate diversity and are committed to fostering a culture where everyone feels respected and valued. As a Disability Confident Level 1 and Level 2 employer, we ensure our workplace is accessible and inclusive, encouraging our people to bring their best selves to work every day. The Acorn Group has been recognised as a Great Place to Work for 2024/5. A record number of employees participated in our survey, overwhelmingly highlighting our welcoming and supportive atmosphere as an excellent place to build a career. We are committed to continuous improvement and have ambitious plans for 2025.  Why Acorn Insurance? Acorn Insurance want to give you more than a job, we want to give you a purpose and a career. So, what can we offer you as an employer? Some of the "your tomorrow" benefits you will receive include: Wellbeing:  Enhanced Annual Leave entitlement starting at 31 days and potentially increasing to 35 days per year depending on grade & length of service (including bank holidays) Enhanced paternity pay and 16 weeks full maternity pay. Colleague Assistance programme offers a suite of wellbeing services such as: 6 Free Counselling sessions per year Unlimited access to a telephone councillor 24/7 Access to a free 4-week programme of cognitive behavioural therapy (CBT) with a trained therapist mentor.  Network of internal qualified mental health first aiders are available to provide support to colleagues. Financial: A core level of life assurance with the option to increase cover via salary sacrifice and add your spouse/partner  Ability to access your earnings before payday via Dayforce Wallet. Company pension scheme Refer a friend scheme with a £250 bonus for every colleague recommended on passing their probation period. Access to a flexible benefits platform including an annual flex pot allowance to spend on over 15 benefits of your choice. Ability to give back. You can opt into donating money to charity to climate positive organisations directly from your salary.   Reward, Recognition and Culture :  Long Service Award paid on 5,10- and 15-years’ service A reward and recognition hub to celebrate and reward colleagues and peers. Consistent and engaging company events including company awards, competitions and charity fundraisers. Budgets for department leaders to use for social and engagement events. Please visit out website to view more of our excellent work benefits!    All roles are subject to DBS and Financial checks, any offer made will be conditional until checks are completed to a satisfactory standard. Unfortunately, due to the length of training and complexity of the role, we can only accept applications from candidates who have at least one year remaining on their (Graduate/ Post study work) visa. Unfortunately, we are unable to provide visa sponsorships. At Acorn, we are committed to creating an inclusive and supportive work environment. We recognise that candidates may have specific needs and are happy to consider reasonable adjustments to the recruitment process and working environment to accommodate individual requirements. Whether it’s modifying equipment, adjusting working hours, or providing additional support, we aim to ensure all employees can perform at their best. If you require any reasonable adjustments, please let us know during the application or interview process, and we will work with you to ensure your needs are met.
Netcom Training
Trainee Cyber Security Assistant - Training Course
Netcom Training City, Manchester
About the opportunity Send your CV to us, complete the fully-funded course and get a certified qualification. Are you ready to launch a career in cyber security? Netcom Training s fully-funded Cyber Security course (NCFE Certificate in Cyber Security Practices, Level 3) equips you with the practical skills employers in Greater Manchester are actively seeking. From threat intelligence and security testing to incident response and ethical compliance, you ll gain hands-on experience that prepares you for today s fast-growing cyber security and IT roles. Our learners have gone on to roles such as Cyber Security Analyst, Junior Penetration Tester, SOC Analyst, and IT Support, working with companies across tech, logistics, public services, and digital sectors. Complete the course and gain a guaranteed interview with a leading employer, helping you start your career protecting businesses, data, and digital systems. Course Details Start Date: 16/02 Duration: 14 weeks Format: Online, practical workshops Schedule: Mon-Thurs 6-9PM What you ll learn Cyber Principles: Understand core frameworks and security principles. Threat Intelligence: Develop expertise to identify risks and analyze threats. Vulnerability Testing: Conduct cyber security testing, identify vulnerabilities, and implement controls. Incident Response: Prepare for and respond to live cyber security incidents. Ethics & Law: Understand legislation and ethical conduct within the cyber security sector. Professional Skills: Build the behaviours required for the modern cyber security workplace. Career Pathway Successful participants are guaranteed an interview with us or our network of UK-wide partners working with leading brands. Potential Roles: Trainee Cyber Security Analyst, SOC Analyst, Junior Information Security Officer Eligibility This is a government-funded opportunity. To apply, you must: Live in Greater Manchester. Be aged 19 or over. Earn below the gross annual wage cap of £32,400. Not currently be undertaking other government-funded training. Right to Work: You must have lived in the UK/EU for the last 3 years and have the right to work in the UK (Student/Graduate visas are not eligible). Cost This is a fully-funded course with no fees complete the training, gain essential cyber security skills, and secure your guaranteed interview. IT Support: Manage helpdesk tickets, resolve technical issues, and configure operating systems. Network & Cloud: Configure network devices and explore cloud computing models like IaaS and SaaS. Digital Security: Learn to protect data using risk management, SIEM tools, and vulnerability assessments. Data Management: Source, cleanse, and analyse data to present actionable insights. Digital Transformation: Explore Agile project management and how to support digital change. Sector Skills: Understand IT policies, legislation, and industry structure. Career Pathway Successful participants are guaranteed an interview with our network of partners. Potential Roles: IT Support Technician Cloud Support Assistant Junior Network Engineer Service Desk Analyst Eligibility This is a government-funded opportunity. To apply, you must: Live in Greater Manchester (GMCA region). Be aged 19 or over. Have lived in the UK/EU for a minimum of 3 years. Earn below the gross annual wage cap. Prerequisites: Basic IT skills are required. Cost This is a fully-funded course with no fees complete the training, build your portfolio, and secure your guaranteed interview.
12/02/2026
Full time
About the opportunity Send your CV to us, complete the fully-funded course and get a certified qualification. Are you ready to launch a career in cyber security? Netcom Training s fully-funded Cyber Security course (NCFE Certificate in Cyber Security Practices, Level 3) equips you with the practical skills employers in Greater Manchester are actively seeking. From threat intelligence and security testing to incident response and ethical compliance, you ll gain hands-on experience that prepares you for today s fast-growing cyber security and IT roles. Our learners have gone on to roles such as Cyber Security Analyst, Junior Penetration Tester, SOC Analyst, and IT Support, working with companies across tech, logistics, public services, and digital sectors. Complete the course and gain a guaranteed interview with a leading employer, helping you start your career protecting businesses, data, and digital systems. Course Details Start Date: 16/02 Duration: 14 weeks Format: Online, practical workshops Schedule: Mon-Thurs 6-9PM What you ll learn Cyber Principles: Understand core frameworks and security principles. Threat Intelligence: Develop expertise to identify risks and analyze threats. Vulnerability Testing: Conduct cyber security testing, identify vulnerabilities, and implement controls. Incident Response: Prepare for and respond to live cyber security incidents. Ethics & Law: Understand legislation and ethical conduct within the cyber security sector. Professional Skills: Build the behaviours required for the modern cyber security workplace. Career Pathway Successful participants are guaranteed an interview with us or our network of UK-wide partners working with leading brands. Potential Roles: Trainee Cyber Security Analyst, SOC Analyst, Junior Information Security Officer Eligibility This is a government-funded opportunity. To apply, you must: Live in Greater Manchester. Be aged 19 or over. Earn below the gross annual wage cap of £32,400. Not currently be undertaking other government-funded training. Right to Work: You must have lived in the UK/EU for the last 3 years and have the right to work in the UK (Student/Graduate visas are not eligible). Cost This is a fully-funded course with no fees complete the training, gain essential cyber security skills, and secure your guaranteed interview. IT Support: Manage helpdesk tickets, resolve technical issues, and configure operating systems. Network & Cloud: Configure network devices and explore cloud computing models like IaaS and SaaS. Digital Security: Learn to protect data using risk management, SIEM tools, and vulnerability assessments. Data Management: Source, cleanse, and analyse data to present actionable insights. Digital Transformation: Explore Agile project management and how to support digital change. Sector Skills: Understand IT policies, legislation, and industry structure. Career Pathway Successful participants are guaranteed an interview with our network of partners. Potential Roles: IT Support Technician Cloud Support Assistant Junior Network Engineer Service Desk Analyst Eligibility This is a government-funded opportunity. To apply, you must: Live in Greater Manchester (GMCA region). Be aged 19 or over. Have lived in the UK/EU for a minimum of 3 years. Earn below the gross annual wage cap. Prerequisites: Basic IT skills are required. Cost This is a fully-funded course with no fees complete the training, build your portfolio, and secure your guaranteed interview.
Netcom Training
Cyber Security Analyst - Training Course
Netcom Training
About the opportunity Are you ready to launch a career in cyber security? Netcom Training s fully-funded Cyber Security course (NCFE Certificate in Cyber Security Practices, Level 3) equips you with the practical skills employers in Greater Manchester are actively seeking. From threat intelligence and security testing to incident response and ethical compliance, you ll gain hands-on experience that prepares you for today s fast-growing cyber security and IT roles. Our learners have gone on to roles such as Cyber Security Analyst, Junior Penetration Tester, SOC Analyst, and IT Support, working with companies across tech, logistics, public services, and digital sectors. Complete the course and gain a guaranteed interview with a leading employer, helping you start your career protecting businesses, data, and digital systems. Course Details Start Date: 09/03 Duration: 14 weeks Format: Online, practical workshops Schedule: Mon-Thurs 6-9PM What you ll learn Cyber Principles: Understand core frameworks and security principles. Threat Intelligence: Develop expertise to identify risks and analyze threats. Vulnerability Testing: Conduct cyber security testing, identify vulnerabilities, and implement controls. Incident Response: Prepare for and respond to live cyber security incidents. Ethics & Law: Understand legislation and ethical conduct within the cyber security sector. Professional Skills: Build the behaviours required for the modern cyber security workplace. Career Pathway Successful participants are guaranteed an interview with us or our network of UK-wide partners working with leading brands. Potential Roles: Trainee Cyber Security Analyst, SOC Analyst, Junior Information Security Officer. Starting Salaries: Typically £22,000 £35,000 (role dependent). Eligibility This is a government-funded opportunity. To apply, you must: Live in Greater Manchester. Be aged 19 or over. Earn below the gross annual wage cap of £32,400. Not currently be undertaking other government-funded training. Right to Work: You must have lived in the UK/EU for the last 3 years and have the right to work in the UK (Student/Graduate visas are not eligible). Cost This is a fully-funded course with no fees complete the training, gain essential cyber security skills, and secure your guaranteed interview.
11/02/2026
Full time
About the opportunity Are you ready to launch a career in cyber security? Netcom Training s fully-funded Cyber Security course (NCFE Certificate in Cyber Security Practices, Level 3) equips you with the practical skills employers in Greater Manchester are actively seeking. From threat intelligence and security testing to incident response and ethical compliance, you ll gain hands-on experience that prepares you for today s fast-growing cyber security and IT roles. Our learners have gone on to roles such as Cyber Security Analyst, Junior Penetration Tester, SOC Analyst, and IT Support, working with companies across tech, logistics, public services, and digital sectors. Complete the course and gain a guaranteed interview with a leading employer, helping you start your career protecting businesses, data, and digital systems. Course Details Start Date: 09/03 Duration: 14 weeks Format: Online, practical workshops Schedule: Mon-Thurs 6-9PM What you ll learn Cyber Principles: Understand core frameworks and security principles. Threat Intelligence: Develop expertise to identify risks and analyze threats. Vulnerability Testing: Conduct cyber security testing, identify vulnerabilities, and implement controls. Incident Response: Prepare for and respond to live cyber security incidents. Ethics & Law: Understand legislation and ethical conduct within the cyber security sector. Professional Skills: Build the behaviours required for the modern cyber security workplace. Career Pathway Successful participants are guaranteed an interview with us or our network of UK-wide partners working with leading brands. Potential Roles: Trainee Cyber Security Analyst, SOC Analyst, Junior Information Security Officer. Starting Salaries: Typically £22,000 £35,000 (role dependent). Eligibility This is a government-funded opportunity. To apply, you must: Live in Greater Manchester. Be aged 19 or over. Earn below the gross annual wage cap of £32,400. Not currently be undertaking other government-funded training. Right to Work: You must have lived in the UK/EU for the last 3 years and have the right to work in the UK (Student/Graduate visas are not eligible). Cost This is a fully-funded course with no fees complete the training, gain essential cyber security skills, and secure your guaranteed interview.
CapGemini
Technical Analyst
CapGemini Manchester, Lancashire
Security Clearance: To be successfully appointed to this role, must be eligible to obtain Security Check (SC) clearance. To obtain SC clearance, the successful applicant must have resided continuously within the United Kingdom for the last 5 years, along with other criteria and requirements. Throughout the recruitment process, you will be asked questions about your security clearance eligibility such as, but not limited to, country of residence and nationality. Some posts are restricted to sole UK Nationals for security reasons; therefore, you may be asked about your citizenship in the application process. Hybrid working: The places that you work from day to day will vary according to your role, your needs, and those of the business; it will be a blend of Company offices, client sites, and your home; noting that you will be unable to work at home 100% of the time. If you are successfully offered this position, you will go through a series of pre-employment checks, including identity, nationality (single or dual) or immigration status, employment history going back three continuous years, and unspent criminal record check (known as Disclosure and Barring Service) What we will offer you You will be encouraged to have a positive work-life balance. Our hybrid-first way of working means we embed hybrid working in all that we do and make flexible working arrangements the day-to-day reality for our people. All UK employees are eligible to request flexible working arrangements. You will be empowered to explore, innovate, and progress. You will benefit from Capgemini's 'learning for life' mindset, meaning you will have countless training and development opportunities from thinktanks to hackathons, and access to 250,000 courses with numerous external certifications from AWS, Microsoft, Harvard Manage Mentor, Cybersecurity qualifications and much more. Why we are different At Capgemini, we help organisations across the world become more agile, more competitive, and more successful. Smart, tailored, often ground-breaking technical solutions to complex problems are the norm. But so, too, is a culture that is as collaborative as it is forward thinking. Working closely with each other, and with our clients, we get under the skin of businesses and to the heart of their goals. You will too. Capgemini is proud to represent nearly 130 nationalities and its cultural diversity. Our holistic definition of diversity extends beyond gender, gender identity, sexual orientation, disability, ethnicity, race, age, and religion. Capgemini views diversity as everything that makes us who we are as an organization, including our social background, our experiences in life and work, our communication styles and even our personality. These dimensions contribute to the type of diversity we value the most: diversity of thought. Who you will be working with You will join the Data Trust Capability in Capgemini's Insights and Data (I&D) business unit. Insights and Data is a global business unit covering Enterprise Data Management, Cloud Platforms, Enterprise Content Management and AI & Analytics. Our team is one of the largest and most successful Data Management teams in the UK delivering innovative Data Management and Governance thought leadership to our clients. The Enterprise Data Management provides services on Information Strategy, Data Governance, Master Data Management, Data Architecture, Data Migration and Lifecycle Management. We help our clients build an enterprise-class data platform that allows them to move ahead in their journey of data and insights. Primarily working with leading software vendors like SAP, Informatica, IBM, Oracle et al, the team are primarily Consultants, putting client requirements and industry best practices at the heart of delivery. The focus of your role Configure and maintain Microsoft Purview features, including: Information Protection (sensitivity labels, auto-labelling), Data Loss Prevention (M365, Endpoint, Cloud Apps), Data Governance (catalogue, scanning, classification), Records Management (retention labels & policies), Insider Risk Management, eDiscovery (Standard & Premium) Manage scanning rules, data connectors, metadata sources, and catalog assets. Support integration with M365, Azure, Power Platform, and on premises data sources Monitor Purview alerts, DLP incidents, policy matches, and governance activity logs Perform investigation of policy violations, insider risk alerts, and data protection events Track and escape issues to engineering or architecture teams as required Maintain audit trails, compliance dashboards, and monthly reporting Assist with maintaining data classification schemas, taxonomy, and metadata models Support data owners and stewards in cataloguing and tagging data assets Run data scans, quality checks, and lineage validation tasks Produce and maintain operational runbooks, configuration documentation, and governance processes Create user guides for end users, compliance officers, and IT support teams Document incident response processes related to Purview alerts Work closely with Compliance, Security, Data Governance, and IT teams to implement policies into Purview Support end users by troubleshooting classification, labelling, and access issues Provide training sessions and knowledge transfer on Purview features Identify gaps in data governance and compliance processes; recommend improvements You may also offer insights to the wider community through blogs, articles, and social media. At Capgemini, we believe in bringing your whole self to work. Equity, diversity, and inclusion are woven into our everyday culture, creating a welcoming and supportive environment for everyone. What You Will Bring As a Technical Purview Analyst, you will have 7 years plus experience in data governance, security, compliance, or Microsoft 365 administration. You will have hands on experience with Microsoft Purview or related compliance/security platforms, with exposure to operational support, incident management, or compliance monitoring. Experience Microsoft Purview Information Protection - labels, policies, auto labelling, encryption Data Loss Prevention - endpoint, SharePoint/OneDrive/Teams, Exchange, cloud apps Purview Data Governance - cataloguing, scanning, metadata management Records Management & Retention Labelling eDiscovery workflows and case management Defender for Cloud Apps Wider integration with SharePoint, OneDrive, Exchange, Azure Storage, SQL, Synapse, Data Factory, and Power BI Understanding of classification, metadata, and governance principles Knowledge of Microsoft 365 security & compliance capabilities Basic understanding of Azure Active Directory / Entra ID identity and access concepts Familiarity with ITSM/incident management processes Understanding of regulatory compliance basics How compliance and data protection teams use Purview outputs Data sensitivity models and how they map to business processes Governance best practices, including cataloguing and lineage use cases Ability to configure and manage Purview policies and scanning tools Strong analytical and troubleshooting skills Familiarity with KQL, PowerShell, or Microsoft Graph Ability to interpret logs, alerts, and governance reporting Strong documentation and verbal communication skills Ability to work collaboratively with cross functional teams Good organisational and time management abilities Certifications (Desirable)
10/02/2026
Full time
Security Clearance: To be successfully appointed to this role, must be eligible to obtain Security Check (SC) clearance. To obtain SC clearance, the successful applicant must have resided continuously within the United Kingdom for the last 5 years, along with other criteria and requirements. Throughout the recruitment process, you will be asked questions about your security clearance eligibility such as, but not limited to, country of residence and nationality. Some posts are restricted to sole UK Nationals for security reasons; therefore, you may be asked about your citizenship in the application process. Hybrid working: The places that you work from day to day will vary according to your role, your needs, and those of the business; it will be a blend of Company offices, client sites, and your home; noting that you will be unable to work at home 100% of the time. If you are successfully offered this position, you will go through a series of pre-employment checks, including identity, nationality (single or dual) or immigration status, employment history going back three continuous years, and unspent criminal record check (known as Disclosure and Barring Service) What we will offer you You will be encouraged to have a positive work-life balance. Our hybrid-first way of working means we embed hybrid working in all that we do and make flexible working arrangements the day-to-day reality for our people. All UK employees are eligible to request flexible working arrangements. You will be empowered to explore, innovate, and progress. You will benefit from Capgemini's 'learning for life' mindset, meaning you will have countless training and development opportunities from thinktanks to hackathons, and access to 250,000 courses with numerous external certifications from AWS, Microsoft, Harvard Manage Mentor, Cybersecurity qualifications and much more. Why we are different At Capgemini, we help organisations across the world become more agile, more competitive, and more successful. Smart, tailored, often ground-breaking technical solutions to complex problems are the norm. But so, too, is a culture that is as collaborative as it is forward thinking. Working closely with each other, and with our clients, we get under the skin of businesses and to the heart of their goals. You will too. Capgemini is proud to represent nearly 130 nationalities and its cultural diversity. Our holistic definition of diversity extends beyond gender, gender identity, sexual orientation, disability, ethnicity, race, age, and religion. Capgemini views diversity as everything that makes us who we are as an organization, including our social background, our experiences in life and work, our communication styles and even our personality. These dimensions contribute to the type of diversity we value the most: diversity of thought. Who you will be working with You will join the Data Trust Capability in Capgemini's Insights and Data (I&D) business unit. Insights and Data is a global business unit covering Enterprise Data Management, Cloud Platforms, Enterprise Content Management and AI & Analytics. Our team is one of the largest and most successful Data Management teams in the UK delivering innovative Data Management and Governance thought leadership to our clients. The Enterprise Data Management provides services on Information Strategy, Data Governance, Master Data Management, Data Architecture, Data Migration and Lifecycle Management. We help our clients build an enterprise-class data platform that allows them to move ahead in their journey of data and insights. Primarily working with leading software vendors like SAP, Informatica, IBM, Oracle et al, the team are primarily Consultants, putting client requirements and industry best practices at the heart of delivery. The focus of your role Configure and maintain Microsoft Purview features, including: Information Protection (sensitivity labels, auto-labelling), Data Loss Prevention (M365, Endpoint, Cloud Apps), Data Governance (catalogue, scanning, classification), Records Management (retention labels & policies), Insider Risk Management, eDiscovery (Standard & Premium) Manage scanning rules, data connectors, metadata sources, and catalog assets. Support integration with M365, Azure, Power Platform, and on premises data sources Monitor Purview alerts, DLP incidents, policy matches, and governance activity logs Perform investigation of policy violations, insider risk alerts, and data protection events Track and escape issues to engineering or architecture teams as required Maintain audit trails, compliance dashboards, and monthly reporting Assist with maintaining data classification schemas, taxonomy, and metadata models Support data owners and stewards in cataloguing and tagging data assets Run data scans, quality checks, and lineage validation tasks Produce and maintain operational runbooks, configuration documentation, and governance processes Create user guides for end users, compliance officers, and IT support teams Document incident response processes related to Purview alerts Work closely with Compliance, Security, Data Governance, and IT teams to implement policies into Purview Support end users by troubleshooting classification, labelling, and access issues Provide training sessions and knowledge transfer on Purview features Identify gaps in data governance and compliance processes; recommend improvements You may also offer insights to the wider community through blogs, articles, and social media. At Capgemini, we believe in bringing your whole self to work. Equity, diversity, and inclusion are woven into our everyday culture, creating a welcoming and supportive environment for everyone. What You Will Bring As a Technical Purview Analyst, you will have 7 years plus experience in data governance, security, compliance, or Microsoft 365 administration. You will have hands on experience with Microsoft Purview or related compliance/security platforms, with exposure to operational support, incident management, or compliance monitoring. Experience Microsoft Purview Information Protection - labels, policies, auto labelling, encryption Data Loss Prevention - endpoint, SharePoint/OneDrive/Teams, Exchange, cloud apps Purview Data Governance - cataloguing, scanning, metadata management Records Management & Retention Labelling eDiscovery workflows and case management Defender for Cloud Apps Wider integration with SharePoint, OneDrive, Exchange, Azure Storage, SQL, Synapse, Data Factory, and Power BI Understanding of classification, metadata, and governance principles Knowledge of Microsoft 365 security & compliance capabilities Basic understanding of Azure Active Directory / Entra ID identity and access concepts Familiarity with ITSM/incident management processes Understanding of regulatory compliance basics How compliance and data protection teams use Purview outputs Data sensitivity models and how they map to business processes Governance best practices, including cataloguing and lineage use cases Ability to configure and manage Purview policies and scanning tools Strong analytical and troubleshooting skills Familiarity with KQL, PowerShell, or Microsoft Graph Ability to interpret logs, alerts, and governance reporting Strong documentation and verbal communication skills Ability to work collaboratively with cross functional teams Good organisational and time management abilities Certifications (Desirable)
Littlefish
IT - Cyber Security Analyst
Littlefish Nottingham, Nottinghamshire
IT - Cyber Security Analyst When registering to this job board you will be redirected to the online application form. Please ensure that this is completed in full in order that your application can be reviewed. Come and join Littlefish Work location: Nottingham or Sheffield Hybrid Salary: Up to: £31,500 Must be eligible for SC Clearance (UK resident for the last 5 years) and NPPV2 clearance As we continue to grow and evolve, we know that our strength lies in the talent, creativity, and drive of our existing workforce. You are the giant slayers who have shaped Littlefish into the business it is today-and now, we're looking for the next wave of internal trailblazers to help us take things even further. We're seeking individuals who embrace change with optimism, who think beyond the obvious, and who bring energy, curiosity, and collaboration to everything they do. Whether you're looking to stretch your skills, take on a new challenge, or explore a fresh direction, this is your opportunity to make an impact from within. So, if this opportunity sparks your interest and you're excited by the idea of working alongside passionate, creative, and friendly colleagues apply today. The role and what you'll be getting up to on a day to day basis: Are you looking to take the next step in your cyber journey and join a team at the heart of protecting our customers? We're looking for a Cyber Security Analyst - Tier 1 to join our Cyber Security Operations Centre (CSOC) - someone who is curious, analytical, calm under pressure, and passionate about cyber security. This is an exciting frontline role where you'll actively monitor customer environments, investigate threats, respond to alerts, and help safeguard systems from compromise. If you enjoy problem-solving, learning fast, and being part of a supportive, high-performing team, this could be the perfect opportunity for you. You will: Monitoring security incidents via the ITSM platform Conducting analysis using a wide range of security tools Investigating alerts and responding swiftly to events Helping maintain the integrity of client IT infrastructures Identifying and containing internal or external threats Conducting privileged account reviews Performing vulnerability and risk assessments Analysing security breaches to determine root cause Contributing to enhancing the SIEM platform Supporting continuous improvement across CSOC operations What you bring: Basic understanding of security threats and compromise methods Knowledge of Servers, clients, and network technologies Understanding of malware, reconnaissance, emerging threats Awareness of vulnerability assessment and remediation Clear, logical thinking and excellent judgement Strong written and verbal communication Good client engagement, time management, and expectation management skills Desirable SC-200, CompTIA Security+, or related certifications Previous SOC experience Hands-on cyber incident response experience Experience with SIEM platforms, vulnerability assessments or antivirus tooling What can we offer you? Through our one of a kind training programme, the Littlefish Academy, you can increase your earnings by £4,500 Referral bonus scheme of £1000 when you successfully refer a friend. Access to our LinkedIn Learning platform, with over 16000 expert-led online tutorials to enhance and achieve your personal and professional goals. Healthcare cash plan. This will give you access to online GP appointments, 24/7 access to qualified counsellors and cash back against a range of general healthcare Casual dress policy Company Pension Scheme Company social events 25 days annual leave plus public/bank holidays Purchase of annual leave scheme Life at Littlefish: Our company values shape who we are as a business, what we stand for and how we work. Hiring people with our values at heart, is very important as we see Littlefish grow. I am High Performing- I like to raise the bar, we look at creating opportunities to increase quality and improve efficiency, we strive for service excellence. I am Passionate- We build team success and celebrate them together, I am enthusiastic and energetic, I care about the people I work with and we support one another. I Have a Can-Do Attitude - I am not afraid to step outside my comfort zone, we are not afraid to challenge status quo, we get stuff done! So, if you feel like you can make a tangible difference, apply today, and join us on this journey. Here at Littlefish we aim to be somewhere everyone can be themselves. We are committed to encouraging a diverse and inclusive community where everyone irrespective of who they are, or their background, can feel equal and supported. We encourage applications from people of all backgrounds. Please get in touch if you are concerned about any difficulties you may face during your recruitment process, so we adjust accordingly. Part of our application process includes a set of ED&I (Equality, diversity and inclusion) questions. Please note, each question has a prefer not to say option).
10/02/2026
Full time
IT - Cyber Security Analyst When registering to this job board you will be redirected to the online application form. Please ensure that this is completed in full in order that your application can be reviewed. Come and join Littlefish Work location: Nottingham or Sheffield Hybrid Salary: Up to: £31,500 Must be eligible for SC Clearance (UK resident for the last 5 years) and NPPV2 clearance As we continue to grow and evolve, we know that our strength lies in the talent, creativity, and drive of our existing workforce. You are the giant slayers who have shaped Littlefish into the business it is today-and now, we're looking for the next wave of internal trailblazers to help us take things even further. We're seeking individuals who embrace change with optimism, who think beyond the obvious, and who bring energy, curiosity, and collaboration to everything they do. Whether you're looking to stretch your skills, take on a new challenge, or explore a fresh direction, this is your opportunity to make an impact from within. So, if this opportunity sparks your interest and you're excited by the idea of working alongside passionate, creative, and friendly colleagues apply today. The role and what you'll be getting up to on a day to day basis: Are you looking to take the next step in your cyber journey and join a team at the heart of protecting our customers? We're looking for a Cyber Security Analyst - Tier 1 to join our Cyber Security Operations Centre (CSOC) - someone who is curious, analytical, calm under pressure, and passionate about cyber security. This is an exciting frontline role where you'll actively monitor customer environments, investigate threats, respond to alerts, and help safeguard systems from compromise. If you enjoy problem-solving, learning fast, and being part of a supportive, high-performing team, this could be the perfect opportunity for you. You will: Monitoring security incidents via the ITSM platform Conducting analysis using a wide range of security tools Investigating alerts and responding swiftly to events Helping maintain the integrity of client IT infrastructures Identifying and containing internal or external threats Conducting privileged account reviews Performing vulnerability and risk assessments Analysing security breaches to determine root cause Contributing to enhancing the SIEM platform Supporting continuous improvement across CSOC operations What you bring: Basic understanding of security threats and compromise methods Knowledge of Servers, clients, and network technologies Understanding of malware, reconnaissance, emerging threats Awareness of vulnerability assessment and remediation Clear, logical thinking and excellent judgement Strong written and verbal communication Good client engagement, time management, and expectation management skills Desirable SC-200, CompTIA Security+, or related certifications Previous SOC experience Hands-on cyber incident response experience Experience with SIEM platforms, vulnerability assessments or antivirus tooling What can we offer you? Through our one of a kind training programme, the Littlefish Academy, you can increase your earnings by £4,500 Referral bonus scheme of £1000 when you successfully refer a friend. Access to our LinkedIn Learning platform, with over 16000 expert-led online tutorials to enhance and achieve your personal and professional goals. Healthcare cash plan. This will give you access to online GP appointments, 24/7 access to qualified counsellors and cash back against a range of general healthcare Casual dress policy Company Pension Scheme Company social events 25 days annual leave plus public/bank holidays Purchase of annual leave scheme Life at Littlefish: Our company values shape who we are as a business, what we stand for and how we work. Hiring people with our values at heart, is very important as we see Littlefish grow. I am High Performing- I like to raise the bar, we look at creating opportunities to increase quality and improve efficiency, we strive for service excellence. I am Passionate- We build team success and celebrate them together, I am enthusiastic and energetic, I care about the people I work with and we support one another. I Have a Can-Do Attitude - I am not afraid to step outside my comfort zone, we are not afraid to challenge status quo, we get stuff done! So, if you feel like you can make a tangible difference, apply today, and join us on this journey. Here at Littlefish we aim to be somewhere everyone can be themselves. We are committed to encouraging a diverse and inclusive community where everyone irrespective of who they are, or their background, can feel equal and supported. We encourage applications from people of all backgrounds. Please get in touch if you are concerned about any difficulties you may face during your recruitment process, so we adjust accordingly. Part of our application process includes a set of ED&I (Equality, diversity and inclusion) questions. Please note, each question has a prefer not to say option).
Bluetownonline
Lecturer in Networking and Cyber Security (HE)
Bluetownonline
Job Title: Lecturer in Networking and Cyber Security (HE) Location: Birmingham Salary: £38,784 - £43,482 per annum - AC2 Job type: Permanent, Full-time / Part-time The University is unlike any other. Standing proud in the heart of the city of Birmingham, they have been delivering career-focused education and training for decades. With around 8000 students across FE and HE level provision, the University is highly respected by employers and industry in meeting the region's skills needs. The University's mission is to promote and provide the opportunity for participation in the learning process by those with the ambition and commitment to succeed and to maintain a learning community that meets the diverse needs of our students, the economy and society at large. The Role: Ready to inspire the next generation of tech professionals? Join our growing Computing Department and play a key role in shaping the future of Higher Education. Join our academic team and be part of our growth! As a Lecturer, you'll deliver inspiring and inclusive teaching that supports all students in achieving their full potential. This role will focus on teaching computing programmes areas including HE Cyber Security, where you'll help shape and guide future leaders in the field. You will prioritise practical application and demonstration over theoretical instruction, ensuring students gain real-world skills and experience. Why Choose Us? Growing Department: Be part of a team that's thriving and expanding every year. Supportive & Inclusive: Join a collaborative, diverse environment. Career Development : Access ongoing professional growth opportunities. Industry Connections: Work with industry partners, bringing real-world learning into the classroom. Benefits: Generous allocation of annual leave 38 days' paid leave per year 12 Bank Holidays & Concessionary Days Excellent Teachers' Pension Scheme Employer Contributions - 28.6% Subsidised private healthcare provided by Aviva including a Digital GP Service. Employee Assistance Programme inclusive of counselling services, financial wellbeing support and bereavement support Annual health MOTs with our Registered Nurse Excellent staff development opportunities including professional qualification sponsorship A variety of salary sacrifice schemes including technology and cycle. Heavily-subsidised on-site car parking in central Birmingham Free on-site gym membership Extra Information: All applicants for employment at the University will be expected to demonstrate an understanding of the principles of Safeguarding and the PREVENT agenda in the context of further and higher education. Closing Date - Sunday 12th April 2026. Interview Date - Monday 4th May 2026. The University is an equal opportunities employer. Please click APPLY to be redirected to our website to complete an application form. Candidates with the experience or relevant job titles of; University Lecturer, Education Lead, Academic Lead, College Tutor, Tutor, Teacher, College Teacher, Cyber Security Analyst, Information Technology Security Specialist, Information Technology Security, Security Architect, Information Security Consultant, Information Technology Security Consultant, Senior Information Technology Security Officer, may also be considered for this role.
10/02/2026
Full time
Job Title: Lecturer in Networking and Cyber Security (HE) Location: Birmingham Salary: £38,784 - £43,482 per annum - AC2 Job type: Permanent, Full-time / Part-time The University is unlike any other. Standing proud in the heart of the city of Birmingham, they have been delivering career-focused education and training for decades. With around 8000 students across FE and HE level provision, the University is highly respected by employers and industry in meeting the region's skills needs. The University's mission is to promote and provide the opportunity for participation in the learning process by those with the ambition and commitment to succeed and to maintain a learning community that meets the diverse needs of our students, the economy and society at large. The Role: Ready to inspire the next generation of tech professionals? Join our growing Computing Department and play a key role in shaping the future of Higher Education. Join our academic team and be part of our growth! As a Lecturer, you'll deliver inspiring and inclusive teaching that supports all students in achieving their full potential. This role will focus on teaching computing programmes areas including HE Cyber Security, where you'll help shape and guide future leaders in the field. You will prioritise practical application and demonstration over theoretical instruction, ensuring students gain real-world skills and experience. Why Choose Us? Growing Department: Be part of a team that's thriving and expanding every year. Supportive & Inclusive: Join a collaborative, diverse environment. Career Development : Access ongoing professional growth opportunities. Industry Connections: Work with industry partners, bringing real-world learning into the classroom. Benefits: Generous allocation of annual leave 38 days' paid leave per year 12 Bank Holidays & Concessionary Days Excellent Teachers' Pension Scheme Employer Contributions - 28.6% Subsidised private healthcare provided by Aviva including a Digital GP Service. Employee Assistance Programme inclusive of counselling services, financial wellbeing support and bereavement support Annual health MOTs with our Registered Nurse Excellent staff development opportunities including professional qualification sponsorship A variety of salary sacrifice schemes including technology and cycle. Heavily-subsidised on-site car parking in central Birmingham Free on-site gym membership Extra Information: All applicants for employment at the University will be expected to demonstrate an understanding of the principles of Safeguarding and the PREVENT agenda in the context of further and higher education. Closing Date - Sunday 12th April 2026. Interview Date - Monday 4th May 2026. The University is an equal opportunities employer. Please click APPLY to be redirected to our website to complete an application form. Candidates with the experience or relevant job titles of; University Lecturer, Education Lead, Academic Lead, College Tutor, Tutor, Teacher, College Teacher, Cyber Security Analyst, Information Technology Security Specialist, Information Technology Security, Security Architect, Information Security Consultant, Information Technology Security Consultant, Senior Information Technology Security Officer, may also be considered for this role.
Littlefish
IT - Cyber Security Analyst Tier 2
Littlefish Nottingham, Nottinghamshire
IT - Cyber Security Analyst Tier 2 When registering to this job board you will be redirected to the online application form. Please ensure that this is completed in full in order that your application can be reviewed. Come and join the Littlefish team! Work location: Nottingham or Sheffield Hybrid 4 days on, 4 days off 12-hour shift rotations Salary: Up to: £35,000 with a 20% shift allowance Must be eligible for SC Clearance (UK resident for the last 5 years) and NPPV2 clearance Here at Littlefish, we look for people who can make a real difference and become a giant slayer. As the world around us continues to change, we look for people who grab that change with optimism and excitement. These are the passionate and high performing people who enjoy and thrive on thinking outside the box. Our current employees are the giant slayers who have made Littlefish who we are today, and you will be the future employees who continue to add the drive, passion, and add to our skills and experience as we see Littlefish grow. So, if this is ticking your boxes and you are excited at the thought of working with creative, passionate, energetic, friendly people- we would love to hear from you. The role and what you'll be getting up to on a day to day basis: Are you a passionate cyber security professional ready to take the next step in your SOC career? Littlefish is looking for an experienced Tier 2 Cyber Security Analyst to help protect our customers from emerging threats and play a critical role in our Cyber Security Operations Centre (CSOC). This is an exciting opportunity for someone who thrives in a fast-paced environment, enjoys deep-dive investigation work, and is motivated by defending organisations from real-world cyber-attacks. You will: As a Tier 2 Analyst, you'll be at the heart of our SOC operations, responsible for investigating complex security alerts, responding to incidents, and mentoring Tier 1 analysts. Your day-to-day will include: Monitoring and triaging security events via our ITSM platform Analysing alerts using a range of security tools including SIEM, EDR, and email security platforms Leading deep-dive investigations and working with incident responders to contain and eradicate threats Acting as the escalation point for Tier 1 analysts, offering guidance and technical support Conducting security assessments across privilege access, endpoints, email, and cloud environments Translating complex security findings into clear, actionable communication for customers Enhancing alert playbooks and helping evolve our SIEM use cases Staying ahead of the threat landscape with CTI-informed analysis and mitigation advice Who you are: Proven experience in a SOC or similar security role Strong background in incident investigation, threat identification, and response within SLAs Hands-on experience with SIEM, EDR, and email security tooling Ability to mentor and support Junior Analysts Solid understanding of attack vectors, malware behaviour, and threat actor techniques Microsoft SC-200 and/or CompTIA Security+ (or equivalent) SC-300, AZ-500 or SANS certifications Experience with vulnerability assessment and incident response Broader exposure to antivirus tooling, cloud security, or threat hunting What can we offer you? Through our one of a kind training programme, the Littlefish Academy, you can increase your earnings by £4,500 Referral bonus scheme of £1000 when you successfully refer a friend. Access to our LinkedIn Learning platform, with over 16000 expert-led online tutorials to enhance and achieve your personal and professional goals. Healthcare cash plan. This will give you access to online GP appointments, 24/7 access to qualified counsellors and cash back against a range of general healthcare Casual dress policy Company Pension Scheme Company social events 25 days annual leave plus public/bank holidays Purchase of annual leave scheme Life at Littlefish: Our company values shape who we are as a business, what we stand for and how we work. Hiring people with our values at heart, is very important as we see Littlefish grow. I am High Performing- I like to raise the bar, we look at creating opportunities to increase quality and improve efficiency, we strive for service excellence. I am Passionate- We build team success and celebrate them together, I am enthusiastic and energetic, I care about the people I work with and we support one another. I Have a Can-Do Attitude - I am not afraid to step outside my comfort zone, we are not afraid to challenge status quo, we get stuff done! So, if you feel like you can make a tangible difference, apply today, and join us on this journey. Here at Littlefish we aim to be somewhere everyone can be themselves. We are committed to encouraging a diverse and inclusive community where everyone irrespective of who they are, or their background, can feel equal and supported. We encourage applications from people of all backgrounds. Please get in touch if you are concerned about any difficulties you may face during your recruitment process, so we adjust accordingly. Part of our application process includes a set of ED&I (Equality, diversity and inclusion) questions. Please note, each question has a prefer not to say option).
10/02/2026
Full time
IT - Cyber Security Analyst Tier 2 When registering to this job board you will be redirected to the online application form. Please ensure that this is completed in full in order that your application can be reviewed. Come and join the Littlefish team! Work location: Nottingham or Sheffield Hybrid 4 days on, 4 days off 12-hour shift rotations Salary: Up to: £35,000 with a 20% shift allowance Must be eligible for SC Clearance (UK resident for the last 5 years) and NPPV2 clearance Here at Littlefish, we look for people who can make a real difference and become a giant slayer. As the world around us continues to change, we look for people who grab that change with optimism and excitement. These are the passionate and high performing people who enjoy and thrive on thinking outside the box. Our current employees are the giant slayers who have made Littlefish who we are today, and you will be the future employees who continue to add the drive, passion, and add to our skills and experience as we see Littlefish grow. So, if this is ticking your boxes and you are excited at the thought of working with creative, passionate, energetic, friendly people- we would love to hear from you. The role and what you'll be getting up to on a day to day basis: Are you a passionate cyber security professional ready to take the next step in your SOC career? Littlefish is looking for an experienced Tier 2 Cyber Security Analyst to help protect our customers from emerging threats and play a critical role in our Cyber Security Operations Centre (CSOC). This is an exciting opportunity for someone who thrives in a fast-paced environment, enjoys deep-dive investigation work, and is motivated by defending organisations from real-world cyber-attacks. You will: As a Tier 2 Analyst, you'll be at the heart of our SOC operations, responsible for investigating complex security alerts, responding to incidents, and mentoring Tier 1 analysts. Your day-to-day will include: Monitoring and triaging security events via our ITSM platform Analysing alerts using a range of security tools including SIEM, EDR, and email security platforms Leading deep-dive investigations and working with incident responders to contain and eradicate threats Acting as the escalation point for Tier 1 analysts, offering guidance and technical support Conducting security assessments across privilege access, endpoints, email, and cloud environments Translating complex security findings into clear, actionable communication for customers Enhancing alert playbooks and helping evolve our SIEM use cases Staying ahead of the threat landscape with CTI-informed analysis and mitigation advice Who you are: Proven experience in a SOC or similar security role Strong background in incident investigation, threat identification, and response within SLAs Hands-on experience with SIEM, EDR, and email security tooling Ability to mentor and support Junior Analysts Solid understanding of attack vectors, malware behaviour, and threat actor techniques Microsoft SC-200 and/or CompTIA Security+ (or equivalent) SC-300, AZ-500 or SANS certifications Experience with vulnerability assessment and incident response Broader exposure to antivirus tooling, cloud security, or threat hunting What can we offer you? Through our one of a kind training programme, the Littlefish Academy, you can increase your earnings by £4,500 Referral bonus scheme of £1000 when you successfully refer a friend. Access to our LinkedIn Learning platform, with over 16000 expert-led online tutorials to enhance and achieve your personal and professional goals. Healthcare cash plan. This will give you access to online GP appointments, 24/7 access to qualified counsellors and cash back against a range of general healthcare Casual dress policy Company Pension Scheme Company social events 25 days annual leave plus public/bank holidays Purchase of annual leave scheme Life at Littlefish: Our company values shape who we are as a business, what we stand for and how we work. Hiring people with our values at heart, is very important as we see Littlefish grow. I am High Performing- I like to raise the bar, we look at creating opportunities to increase quality and improve efficiency, we strive for service excellence. I am Passionate- We build team success and celebrate them together, I am enthusiastic and energetic, I care about the people I work with and we support one another. I Have a Can-Do Attitude - I am not afraid to step outside my comfort zone, we are not afraid to challenge status quo, we get stuff done! So, if you feel like you can make a tangible difference, apply today, and join us on this journey. Here at Littlefish we aim to be somewhere everyone can be themselves. We are committed to encouraging a diverse and inclusive community where everyone irrespective of who they are, or their background, can feel equal and supported. We encourage applications from people of all backgrounds. Please get in touch if you are concerned about any difficulties you may face during your recruitment process, so we adjust accordingly. Part of our application process includes a set of ED&I (Equality, diversity and inclusion) questions. Please note, each question has a prefer not to say option).
CHM-1
Cyber Security Analyst
CHM-1
Cyber Security Analyst Reference: JAN Location: Flexible in England - With Travel Contract: Permanent Hours: Full-time, 37.5 hours per week Salary: £51,549.00 - £55,035.00 Per Annum Benefits: Pension Scheme, Life Assurance Scheme, 34 days' Annual Leave This organisation is seeking a pragmatic, hands-on Cyber Security Analyst to help mature their security function. This role will work closely with an outsourced SOC provider and internal teams to triage and investigate security events, support supplier security assurance, provide risk-based advice across the organisation, and drive automation of security processes and tooling. This is a hands-on role suited to someone who enjoys problem-solving, working across teams, and improving how security is delivered in a complex, mission-driven organisation. Key Areas of Responsibility: Security Monitoring & Incident Support Act as the internal focal point with the outsourced SOC provider - ensuring effective communication, follow-up, and escalation of alerts. Triage, investigate, and support resolution of security events and incidents. Contribute to lessons learned and improvements following incidents. Lead the instantiation of the Cyber Security Incident Response Team (CSIRT) and associated processes and playbooks Supplier & Third-Party Security Assess cyber security risk for key suppliers and partners. Review supplier security documentation, raise concerns, and help negotiate security requirements. Risk & Advice Provide pragmatic, risk-based security guidance to internal teams and respond to ad-hoc queries. Help develop and maintain security standards and processes that reflect organisational risk tolerances. Advise system owners and project managers on pen testing approach and scope Run simulated phishing campaigns and produce security awareness communications Automation & Process Improvement Identify and implement opportunities to automate security detection, response, reporting, and remediation workflows. Work with the SOC and internal technical teams to refine alert logic, improve data quality, and reduce manual effort. Help optimise security tools (e.g., SIEM, EDR, ticketing, dashboards). General Develop and produce regular Security reports for senior management. Monitor and respond to queries in group mailbox Essential skills, knowledge, & experience: 5 years' experience in a cyber security, IT security, or technology risk role Practical, demonstrable experience of working with a SOC (internal or outsourced) and investigating cyber security incidents using best practice methodologies and tools Good understanding of cyber risk concepts, controls, and technical security tools. Strong communication skills with both technical and non-technical stakeholders and experience producing communications materials and reports Relevant security certifications/qualifications (e.g. CISSP, SSCP, GCIA, CEH, CompTIA) Knowledge of UK best practice frameworks (e.g., NCSC guidance, PCI DSS, ISO 27001, Cyber Essentials). Scripting or practical automation experience. Experience assessing third-party/supplier security risk. Demonstrated passion for and experience in improving security processes and utilising automation to achieve this Experience with threat hunting and horizon scanning Strong technical security knowledge of networking technologies, IDAM, EDR/XDR Experience supporting security and compliance audit activities Personal Attributes Pragmatic and solutions-focused, with an ability to balance risk and usability Curious and motivated to improve and automate how security operates Comfortable working in a developing security function where processes are evolving Collaborative and supportive, with a strong sense of ownership Aligned with the values and mission of the organisation What Success Looks Like Efficient, risk-focused handling of alerts & incidents alongside the SOC partner. Clear, up-to-date internal security standards and processes. Reduced manual effort through practical automation improvements. Strong supplier security assurance controls supporting risk-based decision-making. Additional Information This role will be home-based with occasional travel to the employers head office or other UK locations (generally one/two days per month). This is a permanent, full-time role for 37.5 hours per week. Closing date: 23:59, Sunday 22nd February 2026 The employer is looking to conduct first interviews for this position on Thursday, February the 26th and Monday, March the 2nd. N.B. If you are interested in applying for this role we recommend doing so asap as the employer reserves the right to close this advert early should the demand be especially high. Interested? Please click the job board apply button to be taken to the next stage where you can find out more information and complete your application by following the instructions (you may need to scroll down). The employer is committed to developing an inclusive and diverse organisation, in which everyone feels supported, valued, and able to be their full selves. To achieve their vision of creating a world richer in nature, they need more people, and more diverse people, on nature's side. People of colour and disabled people are currently underrepresented across the environment, climate, sustainability, and conservation sector. If you identify as a person of colour and/or disabled, they are particularly interested in receiving your application. The organisation is an equal opportunities employer. This role is covered by the Rehabilitation of Offenders Act 1974. This role is not eligible for UK Visa Sponsorship - the successful applicant will need to have a pre-existing Right to Work in the UK in order to be offered an employment contract. No agencies please.
09/02/2026
Full time
Cyber Security Analyst Reference: JAN Location: Flexible in England - With Travel Contract: Permanent Hours: Full-time, 37.5 hours per week Salary: £51,549.00 - £55,035.00 Per Annum Benefits: Pension Scheme, Life Assurance Scheme, 34 days' Annual Leave This organisation is seeking a pragmatic, hands-on Cyber Security Analyst to help mature their security function. This role will work closely with an outsourced SOC provider and internal teams to triage and investigate security events, support supplier security assurance, provide risk-based advice across the organisation, and drive automation of security processes and tooling. This is a hands-on role suited to someone who enjoys problem-solving, working across teams, and improving how security is delivered in a complex, mission-driven organisation. Key Areas of Responsibility: Security Monitoring & Incident Support Act as the internal focal point with the outsourced SOC provider - ensuring effective communication, follow-up, and escalation of alerts. Triage, investigate, and support resolution of security events and incidents. Contribute to lessons learned and improvements following incidents. Lead the instantiation of the Cyber Security Incident Response Team (CSIRT) and associated processes and playbooks Supplier & Third-Party Security Assess cyber security risk for key suppliers and partners. Review supplier security documentation, raise concerns, and help negotiate security requirements. Risk & Advice Provide pragmatic, risk-based security guidance to internal teams and respond to ad-hoc queries. Help develop and maintain security standards and processes that reflect organisational risk tolerances. Advise system owners and project managers on pen testing approach and scope Run simulated phishing campaigns and produce security awareness communications Automation & Process Improvement Identify and implement opportunities to automate security detection, response, reporting, and remediation workflows. Work with the SOC and internal technical teams to refine alert logic, improve data quality, and reduce manual effort. Help optimise security tools (e.g., SIEM, EDR, ticketing, dashboards). General Develop and produce regular Security reports for senior management. Monitor and respond to queries in group mailbox Essential skills, knowledge, & experience: 5 years' experience in a cyber security, IT security, or technology risk role Practical, demonstrable experience of working with a SOC (internal or outsourced) and investigating cyber security incidents using best practice methodologies and tools Good understanding of cyber risk concepts, controls, and technical security tools. Strong communication skills with both technical and non-technical stakeholders and experience producing communications materials and reports Relevant security certifications/qualifications (e.g. CISSP, SSCP, GCIA, CEH, CompTIA) Knowledge of UK best practice frameworks (e.g., NCSC guidance, PCI DSS, ISO 27001, Cyber Essentials). Scripting or practical automation experience. Experience assessing third-party/supplier security risk. Demonstrated passion for and experience in improving security processes and utilising automation to achieve this Experience with threat hunting and horizon scanning Strong technical security knowledge of networking technologies, IDAM, EDR/XDR Experience supporting security and compliance audit activities Personal Attributes Pragmatic and solutions-focused, with an ability to balance risk and usability Curious and motivated to improve and automate how security operates Comfortable working in a developing security function where processes are evolving Collaborative and supportive, with a strong sense of ownership Aligned with the values and mission of the organisation What Success Looks Like Efficient, risk-focused handling of alerts & incidents alongside the SOC partner. Clear, up-to-date internal security standards and processes. Reduced manual effort through practical automation improvements. Strong supplier security assurance controls supporting risk-based decision-making. Additional Information This role will be home-based with occasional travel to the employers head office or other UK locations (generally one/two days per month). This is a permanent, full-time role for 37.5 hours per week. Closing date: 23:59, Sunday 22nd February 2026 The employer is looking to conduct first interviews for this position on Thursday, February the 26th and Monday, March the 2nd. N.B. If you are interested in applying for this role we recommend doing so asap as the employer reserves the right to close this advert early should the demand be especially high. Interested? Please click the job board apply button to be taken to the next stage where you can find out more information and complete your application by following the instructions (you may need to scroll down). The employer is committed to developing an inclusive and diverse organisation, in which everyone feels supported, valued, and able to be their full selves. To achieve their vision of creating a world richer in nature, they need more people, and more diverse people, on nature's side. People of colour and disabled people are currently underrepresented across the environment, climate, sustainability, and conservation sector. If you identify as a person of colour and/or disabled, they are particularly interested in receiving your application. The organisation is an equal opportunities employer. This role is covered by the Rehabilitation of Offenders Act 1974. This role is not eligible for UK Visa Sponsorship - the successful applicant will need to have a pre-existing Right to Work in the UK in order to be offered an employment contract. No agencies please.
SOC Analyst (24/7) - Remote & Training Path
Nomios Basingstoke, Hampshire
A cybersecurity firm in Basingstoke is looking for a SOC Analyst to monitor and investigate security events in a dynamic environment. This role offers career development pathways into various security functions. Ideal candidates will have SOC experience or a background in networking with a focus on security. The position is home-based with occasional office visits, requiring flexibility in hours for major incidents.
08/02/2026
Full time
A cybersecurity firm in Basingstoke is looking for a SOC Analyst to monitor and investigate security events in a dynamic environment. This role offers career development pathways into various security functions. Ideal candidates will have SOC experience or a background in networking with a focus on security. The position is home-based with occasional office visits, requiring flexibility in hours for major incidents.
T2 Cyber Security Analyst - Enterprise Markets
Gamma Bradford, Yorkshire
T2 Cyber Security Analyst - Enterprise Markets Bradford, UK Job Description Posted Thursday 5 February 2026 at 01:00 Cyber Security Analyst (Tier 2) Hybrid working from Bradford A bit about us At Gamma, we're more than just a leader in Unified Communications as a Service (UCaaS) - we're a dynamic, forward-thinking team revolutionizing the way businesses connect and communicate. We provide voice, data, and mobile solutions to businesses across the UK, Germany, Spain, and the Benelux region, and we're expanding rapidly to bring digital automation and Gamma-powered services to SMEs through a growing network of channel partners. We move fast with a start-up mindset, but we have the stability of a leading European business. Our team thrives on collaboration, innovation, and the belief that diverse perspectives make us stronger. Join us, and you'll have the opportunity to make an impact, grow your career, and be part of a company that celebrates inclusivity and fresh ideas. Who are we looking for? Join our dedicated customer on-prem service desk team to monitor and respond to cybersecurity incidents for our strategic customer. Your focus will be on detecting, investigating, and resolving security incidents, utilizing your technical skills and security knowledge. As a Cyber Security Analyst - Tier 2 you will report to the Service Desk Manager and support our Managed Detection and Response (MDR) technologies and security incident handling. The ideal candidate will have a good understanding of security principles, networking, threat actors, and threat vectors. Finally, you will possess good problem-solving and communication skills to take a proactive approach to identifying areas of customer security improvements. In this fast-paced environment, you will regularly collaborate with experienced security professionals to enhance our customers' security posture from emerging cyber threats 24/7/365. What will you be doing day-to-day? Analysis: Monitor and analyse security alerts using SIEM tools, conduct initial triage of incidents, and assist in investigating breaches and vulnerabilities through a ticketing system. Documentation: Record incidents, actions taken, and provide resolutions per company SOPs. Customer Support: Address security and technical queries, escalate issues as needed, often reporting in to customer senior management. Collaboration: Work with team members to enhance security protocols and improve incident response. Working closely with internal network support teams and 24/7 SOC. Incident Handling: Provide initial triage of alerts, escalate incidents to customers and where applicable senior analysts. Security Measures: Assist in implementing security measures like tuning and use case development. Communication: Collaborate with cross-functional teams, communicate security requirements to stakeholders, and ensure successful handovers to support teams. Research: Proactively stay informed about emerging threats, technologies, and regulatory changes. What you'll need: Experience dealing with attack types, threat detection, incident response, risk management, and familiarity with security tools (e.g., SIEM, Firewalls, IDS/IPS, Antivirus). Understanding of TCP/IP, VPNs, Firewalls, Common Ports, OSI Model. Understanding of Best Practices, Security Standards, Policies, and Governance frameworks . Basic knowledge of hybrid cloud architectures and their complexities. Understanding of corporate networks, attack vectors, threat actor TTPs, and various threat intelligence models. Ability to make decisions under pressure. Strong Problem-Solving skills. Strong communication and interpersonal skills. What do we offer you? At Gamma, we believe in work-life balance, which is why we offer 25 days of annual leave, plus an extra day off for your birthday. Giving back is important to us, so we also provide a volunteer day to support a charity that matters to you. Family matters, too. With enhanced maternity and paternity pay, we're here to support you as a parent and help you thrive in your career. We offer a contributory pension plan to help you save for the years ahead, with Gamma's contribution varying dependant on yours. Your well-being is our priority. We offer group income protection and life assurance (four times your salary) to ensure peace of mind for you and your loved ones. We want you to share in our success. That's why we offer tax-efficient share save and share incentive plans, giving you the opportunity to benefit from Gamma's growth. We're committed to health, both physical and mental, and provide private medical insurance through Vitality, which extends to your immediate family And, because we care about the environment, we offer an Electric Vehicle scheme through Octopus and a Cycle to Work scheme, making it easier to get around sustainably. A few things to note Unfortunately, we can't offer visa sponsorship or relocation support for this role. This role requires hybrid working from our client site in their Bradford office. If you feel you could be a good fit for Gamma but do not think that you meet all the requirements, we still encourage you to apply as you could be the person that we are looking for! Gamma is an equal-opportunity employer. We care about inclusion and believe in having diverse teams where everyone can be their true authentic selves. We value each person and their range of backgrounds and actively encourage people from underrepresented backgrounds to apply. We don't discriminate based on any protected characteristics e.g., race, colour, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, marital status, disability, or age. We are a family-friendly employer with a culture based on trust, autonomy, and flexibility to help you create a work-life balance and enjoy working here at Gamma. For recruitment agencies - we have a network of fantastic partners that support us in our hiring from time to time. We're not looking to increase that network currently, so please don't send speculative CVs.
07/02/2026
Full time
T2 Cyber Security Analyst - Enterprise Markets Bradford, UK Job Description Posted Thursday 5 February 2026 at 01:00 Cyber Security Analyst (Tier 2) Hybrid working from Bradford A bit about us At Gamma, we're more than just a leader in Unified Communications as a Service (UCaaS) - we're a dynamic, forward-thinking team revolutionizing the way businesses connect and communicate. We provide voice, data, and mobile solutions to businesses across the UK, Germany, Spain, and the Benelux region, and we're expanding rapidly to bring digital automation and Gamma-powered services to SMEs through a growing network of channel partners. We move fast with a start-up mindset, but we have the stability of a leading European business. Our team thrives on collaboration, innovation, and the belief that diverse perspectives make us stronger. Join us, and you'll have the opportunity to make an impact, grow your career, and be part of a company that celebrates inclusivity and fresh ideas. Who are we looking for? Join our dedicated customer on-prem service desk team to monitor and respond to cybersecurity incidents for our strategic customer. Your focus will be on detecting, investigating, and resolving security incidents, utilizing your technical skills and security knowledge. As a Cyber Security Analyst - Tier 2 you will report to the Service Desk Manager and support our Managed Detection and Response (MDR) technologies and security incident handling. The ideal candidate will have a good understanding of security principles, networking, threat actors, and threat vectors. Finally, you will possess good problem-solving and communication skills to take a proactive approach to identifying areas of customer security improvements. In this fast-paced environment, you will regularly collaborate with experienced security professionals to enhance our customers' security posture from emerging cyber threats 24/7/365. What will you be doing day-to-day? Analysis: Monitor and analyse security alerts using SIEM tools, conduct initial triage of incidents, and assist in investigating breaches and vulnerabilities through a ticketing system. Documentation: Record incidents, actions taken, and provide resolutions per company SOPs. Customer Support: Address security and technical queries, escalate issues as needed, often reporting in to customer senior management. Collaboration: Work with team members to enhance security protocols and improve incident response. Working closely with internal network support teams and 24/7 SOC. Incident Handling: Provide initial triage of alerts, escalate incidents to customers and where applicable senior analysts. Security Measures: Assist in implementing security measures like tuning and use case development. Communication: Collaborate with cross-functional teams, communicate security requirements to stakeholders, and ensure successful handovers to support teams. Research: Proactively stay informed about emerging threats, technologies, and regulatory changes. What you'll need: Experience dealing with attack types, threat detection, incident response, risk management, and familiarity with security tools (e.g., SIEM, Firewalls, IDS/IPS, Antivirus). Understanding of TCP/IP, VPNs, Firewalls, Common Ports, OSI Model. Understanding of Best Practices, Security Standards, Policies, and Governance frameworks . Basic knowledge of hybrid cloud architectures and their complexities. Understanding of corporate networks, attack vectors, threat actor TTPs, and various threat intelligence models. Ability to make decisions under pressure. Strong Problem-Solving skills. Strong communication and interpersonal skills. What do we offer you? At Gamma, we believe in work-life balance, which is why we offer 25 days of annual leave, plus an extra day off for your birthday. Giving back is important to us, so we also provide a volunteer day to support a charity that matters to you. Family matters, too. With enhanced maternity and paternity pay, we're here to support you as a parent and help you thrive in your career. We offer a contributory pension plan to help you save for the years ahead, with Gamma's contribution varying dependant on yours. Your well-being is our priority. We offer group income protection and life assurance (four times your salary) to ensure peace of mind for you and your loved ones. We want you to share in our success. That's why we offer tax-efficient share save and share incentive plans, giving you the opportunity to benefit from Gamma's growth. We're committed to health, both physical and mental, and provide private medical insurance through Vitality, which extends to your immediate family And, because we care about the environment, we offer an Electric Vehicle scheme through Octopus and a Cycle to Work scheme, making it easier to get around sustainably. A few things to note Unfortunately, we can't offer visa sponsorship or relocation support for this role. This role requires hybrid working from our client site in their Bradford office. If you feel you could be a good fit for Gamma but do not think that you meet all the requirements, we still encourage you to apply as you could be the person that we are looking for! Gamma is an equal-opportunity employer. We care about inclusion and believe in having diverse teams where everyone can be their true authentic selves. We value each person and their range of backgrounds and actively encourage people from underrepresented backgrounds to apply. We don't discriminate based on any protected characteristics e.g., race, colour, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, marital status, disability, or age. We are a family-friendly employer with a culture based on trust, autonomy, and flexibility to help you create a work-life balance and enjoy working here at Gamma. For recruitment agencies - we have a network of fantastic partners that support us in our hiring from time to time. We're not looking to increase that network currently, so please don't send speculative CVs.
SOC Analyst
2022 - Chief Operating Office
Overview Business Unit: Chief Operating Office Salary Range: £28,800 - £36,000 per annum DOE+ shift allowance + benefits Location: UK Hybrid with occasional travel to key hubs when required. Contract Type: Permanent Working Pattern: This role operates on a shift pattern of 3 days, 3 off, 3 nights, 3 off Our Team This role sits within the Detect & Respond sub-team of the Group Security Operations Centre, under the Cyber Security tower in Security & Resilience. Working with the team you will be analysing and responding to security events as they surface, making initial judgements as to possible severity, seeking support and guidance where needed, and escalating or developing mitigation recommendations to help defend our systems and data. Your role will often require close collaboration with other parts of the business to help identify, enable, and drive the right investigation steps and response actions. The GSOC defends the whole of Nationwide and Virgin Money's estate, both Member-facing and support capabilities, requiring engagement and communication with both technical and non-technical teams across the business. You'll help mature our internal processes, developing or defining appropriate detection, response and containment capabilities as well as contributing to the GSOC Strategy. You will help shape our future technology direction, suggesting and assisting with innovative ways to combat contemporary cyber threats so we remain fit to find and confront malicious activity. What you'll be doing You'll be handling cyber security alerts from triage through to closure, making and evidencing high quality decisions and escalating where appropriate There will be opportunities to play a supporting role in Incident Response activities to enable the prompt identification, investigation and mitigation of threats, acting across various roles and responsibilities to achieve cyber risk reduction in cloud, hybrid and on-premises environments You'll be expected to identify potential service improvements to enable GSOC Detect & Respond to operate more effectively and efficiently, providing feedback and taking ownership to deliver improvement activities where appropriate Supporting BAU operational demands, including process/playbook development, use case review, and the collection and production of Management Information This role will require you to work closely with other teams across S&R, TOCs and COO to drive positive security outcomes We need you to have Experience of working within a Cyber Security (e.g., SOC, Cyber Incident Response, Penetration Testing) or IT (e.g. Service Desk, Sysadmin) role A problem-solving mindset, with the ability to use structured and analytical approaches Demonstrable knowledge of basic IT concepts, including but not limited to Networking, Hardware, Operating Systems & Cloud Computing Working knowledge of core Cyber Security concepts and tooling, and the ability to apply this understanding to investigations The ability to build good working relationships with both technical and business stakeholders, gaining their respect and trust based on your knowledge and professionalism The ability and desire to quickly learn new technologies It's a bonus if you have but not essential CompTIA Security+ (or equivalent Defensive Security certification) CompTIA Network+ (or equivalent Networking certification) Certified Ethical Hacker (or equivalent Offensive Security certification) MS SC-200 (or equivalent Security Tooling certification) Red Hot Rewards 25 days holiday per year, increasing over time to 30. Plus, an option to buy more, giving you even more choice. Private medical insurance A highly competitive pension to help you build a strong foundation for retirement Access to an annual performance-related bonus Training and development to help you progress your career A great selection of additional benefits through our flexible benefits scheme Life assurance to provide peace of mind for you and your loved ones Up to 2 days of paid volunteering a year If we're lucky to receive a lot of interest, we may close the advert early. Please ensure to submit your applications as soon as possible. Say hello to Virgin Money Virgin Money is so much more than just a bank. As part of theNationwide group,together we're the UK's first full-service mutual bank serving millions of retail and business customers and all driven by our purpose. Banking but fairer, more rewarding and for the good of society. With us, you'll be part of an organisation uniquely positioned to make a difference to the lives of customers, communities and broader society and embark on a collaborative, customer obsessed, and fun-filled career journey. Embrace the weekdays, enjoy fantastic perks, and make a meaningful positive difference. Time to discover what it means to be part of the first mutual full-service banking provider. Be yourself at Virgin Money At Virgin Money, we celebrate everyone. We have fun, think big, and relentlessly include each other, all in pursuit of our purpose: Banking - but fairer, more rewarding, and for the good of society. We're committed to creating an inclusive culture where colleagues feel safe and inspired to contribute, speak up and be heard. As a Disability Confident Leader, we're committed to removing any obstacles to inclusion. If you need any reasonable adjustments or support making your application, contact our Talent Acquisition team. Please note: If we receive a high volume of eligible applications, we may need to prioritise candidates whose skills and experience most closely align with the role, while still ensuring fair and equitable consideration for all applicants. Now the legal bit We're in the process of bringing Virgin Money and Nationwide together which, subject to Court approval, will happen on 2 April 2026. You can find out more about what this means at the Nationwide transfer page. If you're successful in securing a role with us, your employment will move automatically to Nationwide when this transfer goes ahead. Although some of our roles allow you to be based anywhere in the UK, we'll need you to confirm you have the right to work in the UK. If you're successful in securing a role with us, there are some checks you need to complete before starting. These include credit and criminal record checks and three years' worth of satisfactory references. If the role is part of the Senior Manager Regime and Certification Regime, it requires enhanced pre-employment checks - we'll ask for six years of regulatory references, and once in the role, you'll be subject to periodic employment checks.
07/02/2026
Full time
Overview Business Unit: Chief Operating Office Salary Range: £28,800 - £36,000 per annum DOE+ shift allowance + benefits Location: UK Hybrid with occasional travel to key hubs when required. Contract Type: Permanent Working Pattern: This role operates on a shift pattern of 3 days, 3 off, 3 nights, 3 off Our Team This role sits within the Detect & Respond sub-team of the Group Security Operations Centre, under the Cyber Security tower in Security & Resilience. Working with the team you will be analysing and responding to security events as they surface, making initial judgements as to possible severity, seeking support and guidance where needed, and escalating or developing mitigation recommendations to help defend our systems and data. Your role will often require close collaboration with other parts of the business to help identify, enable, and drive the right investigation steps and response actions. The GSOC defends the whole of Nationwide and Virgin Money's estate, both Member-facing and support capabilities, requiring engagement and communication with both technical and non-technical teams across the business. You'll help mature our internal processes, developing or defining appropriate detection, response and containment capabilities as well as contributing to the GSOC Strategy. You will help shape our future technology direction, suggesting and assisting with innovative ways to combat contemporary cyber threats so we remain fit to find and confront malicious activity. What you'll be doing You'll be handling cyber security alerts from triage through to closure, making and evidencing high quality decisions and escalating where appropriate There will be opportunities to play a supporting role in Incident Response activities to enable the prompt identification, investigation and mitigation of threats, acting across various roles and responsibilities to achieve cyber risk reduction in cloud, hybrid and on-premises environments You'll be expected to identify potential service improvements to enable GSOC Detect & Respond to operate more effectively and efficiently, providing feedback and taking ownership to deliver improvement activities where appropriate Supporting BAU operational demands, including process/playbook development, use case review, and the collection and production of Management Information This role will require you to work closely with other teams across S&R, TOCs and COO to drive positive security outcomes We need you to have Experience of working within a Cyber Security (e.g., SOC, Cyber Incident Response, Penetration Testing) or IT (e.g. Service Desk, Sysadmin) role A problem-solving mindset, with the ability to use structured and analytical approaches Demonstrable knowledge of basic IT concepts, including but not limited to Networking, Hardware, Operating Systems & Cloud Computing Working knowledge of core Cyber Security concepts and tooling, and the ability to apply this understanding to investigations The ability to build good working relationships with both technical and business stakeholders, gaining their respect and trust based on your knowledge and professionalism The ability and desire to quickly learn new technologies It's a bonus if you have but not essential CompTIA Security+ (or equivalent Defensive Security certification) CompTIA Network+ (or equivalent Networking certification) Certified Ethical Hacker (or equivalent Offensive Security certification) MS SC-200 (or equivalent Security Tooling certification) Red Hot Rewards 25 days holiday per year, increasing over time to 30. Plus, an option to buy more, giving you even more choice. Private medical insurance A highly competitive pension to help you build a strong foundation for retirement Access to an annual performance-related bonus Training and development to help you progress your career A great selection of additional benefits through our flexible benefits scheme Life assurance to provide peace of mind for you and your loved ones Up to 2 days of paid volunteering a year If we're lucky to receive a lot of interest, we may close the advert early. Please ensure to submit your applications as soon as possible. Say hello to Virgin Money Virgin Money is so much more than just a bank. As part of theNationwide group,together we're the UK's first full-service mutual bank serving millions of retail and business customers and all driven by our purpose. Banking but fairer, more rewarding and for the good of society. With us, you'll be part of an organisation uniquely positioned to make a difference to the lives of customers, communities and broader society and embark on a collaborative, customer obsessed, and fun-filled career journey. Embrace the weekdays, enjoy fantastic perks, and make a meaningful positive difference. Time to discover what it means to be part of the first mutual full-service banking provider. Be yourself at Virgin Money At Virgin Money, we celebrate everyone. We have fun, think big, and relentlessly include each other, all in pursuit of our purpose: Banking - but fairer, more rewarding, and for the good of society. We're committed to creating an inclusive culture where colleagues feel safe and inspired to contribute, speak up and be heard. As a Disability Confident Leader, we're committed to removing any obstacles to inclusion. If you need any reasonable adjustments or support making your application, contact our Talent Acquisition team. Please note: If we receive a high volume of eligible applications, we may need to prioritise candidates whose skills and experience most closely align with the role, while still ensuring fair and equitable consideration for all applicants. Now the legal bit We're in the process of bringing Virgin Money and Nationwide together which, subject to Court approval, will happen on 2 April 2026. You can find out more about what this means at the Nationwide transfer page. If you're successful in securing a role with us, your employment will move automatically to Nationwide when this transfer goes ahead. Although some of our roles allow you to be based anywhere in the UK, we'll need you to confirm you have the right to work in the UK. If you're successful in securing a role with us, there are some checks you need to complete before starting. These include credit and criminal record checks and three years' worth of satisfactory references. If the role is part of the Senior Manager Regime and Certification Regime, it requires enhanced pre-employment checks - we'll ask for six years of regulatory references, and once in the role, you'll be subject to periodic employment checks.
Maxwell Bond
SOC Analyst
Maxwell Bond Denver, Norfolk
SOC Analyst Cybersecurity Consultancy Hybrid - Colorado Salary: $90,000 - $110,000 + Benefits Maxwell Bond is recruiting on behalf of a high-growth cybersecurity consultancy delivering managed security and compliance services to SMBs operating in regulated and mission-critical environments. This organisation provides 24/7 security monitoring, threat detection and response, vulnerability management, and compliance support through a modern SOC platform. They're building a strong operations team and are looking for a capable SOC Analyst to play a key role in its development. The Role As a SOC Analyst , you'll be responsible for monitoring, investigating, and responding to security events across customer environments. This is a hands-on role suited to someone who enjoys threat analysis, incident response, and working with modern security tooling. The position involves shift-based work , including some nights, weekends, and rotating on-call. Key Responsibilities Triage and investigate security alerts using SIEM, EDR, and SOC tooling Research threat actor techniques and perform threat hunting activities Support vulnerability prioritisation and remediation efforts Assist with development of detection rules and analytics Contribute to SOC processes, tooling, and operational improvements Work closely with engineering and product teams to improve security operations Experience & Skills 2-4 years experience in a Security Operations Centre Hands-on experience with SIEM and EDR platforms Solid understanding of modern cyber threats and attack techniques Basic knowledge of vulnerability management and compliance frameworks Comfortable working independently and as part of a SOC team Location Colorado - Hybrid working model Salary & Benefits $90,000 - $110,000 base salary Comprehensive benefits package (health, dental, vision, PTO, retirement) Opportunity to join a growing SOC and progress as the team scales
07/02/2026
Full time
SOC Analyst Cybersecurity Consultancy Hybrid - Colorado Salary: $90,000 - $110,000 + Benefits Maxwell Bond is recruiting on behalf of a high-growth cybersecurity consultancy delivering managed security and compliance services to SMBs operating in regulated and mission-critical environments. This organisation provides 24/7 security monitoring, threat detection and response, vulnerability management, and compliance support through a modern SOC platform. They're building a strong operations team and are looking for a capable SOC Analyst to play a key role in its development. The Role As a SOC Analyst , you'll be responsible for monitoring, investigating, and responding to security events across customer environments. This is a hands-on role suited to someone who enjoys threat analysis, incident response, and working with modern security tooling. The position involves shift-based work , including some nights, weekends, and rotating on-call. Key Responsibilities Triage and investigate security alerts using SIEM, EDR, and SOC tooling Research threat actor techniques and perform threat hunting activities Support vulnerability prioritisation and remediation efforts Assist with development of detection rules and analytics Contribute to SOC processes, tooling, and operational improvements Work closely with engineering and product teams to improve security operations Experience & Skills 2-4 years experience in a Security Operations Centre Hands-on experience with SIEM and EDR platforms Solid understanding of modern cyber threats and attack techniques Basic knowledge of vulnerability management and compliance frameworks Comfortable working independently and as part of a SOC team Location Colorado - Hybrid working model Salary & Benefits $90,000 - $110,000 base salary Comprehensive benefits package (health, dental, vision, PTO, retirement) Opportunity to join a growing SOC and progress as the team scales
Senior Security Engineer
Nomios Basingstoke, Hampshire
Overview Nomios' mission is to build a secure and connected future. Organisations across the globe depend on us to help secure and connect their digital infrastructures. As part of our continued UK growth, we are expanding our Professional Services capability and seeking a Senior Security Engineer to deliver specialist security engineering and operations consultancy across our customer base. This is a hands-on technical role within the Security Operations domain, focused on helping customers improve and automate their SOC functions, tooling, and detection capabilities. You will work across a range of technologies and engagements, from SOAR and SIEM implementation through to vulnerability management, exposure management, and process automation. Responsibilities Key responsibilities of the role include: Deliver Deliver Professional Services engagements across SOAR, SIEM, XDR, vulnerability and exposure management platforms Conduct Azure and cloud environment security health checks and configuration reviews Design and build SOAR playbooks, integrations, and automation frameworks Develop and maintain custom log source parsers, normalisation, and correlation logic Deploy, configure, and optimise SIEM and XDR solutions for customer environments Build and tune vulnerability management workflows and dashboards using common tools such as Rapid7, Tenable, and Qualys Perform CTEM-related assessments using tools such as Cymulate or XM Cyber Produce clear technical documentation and customer deliverables following each engagement Collaborate Work closely with the internal SOC Engineering team to align practices and share technical improvements Support engineering escalations and onboarding for customer environments Contribute to engineering design sessions, roadmap planning, and internal innovation projects Mentor and share knowledge with internal engineers and analysts Improve Identify and implement automation and efficiency improvements across customer and internal toolsets Contribute to the development of reusable playbooks, connectors, and integration frameworks Support the continual enhancement of Nomios' Professional Services delivery templates, labs, and testing environments We hire result-orientated, smart, and high-energy individuals who bring a can-do attitude and a willingness to go the extra mile and deliver exceptional outcomes. You should be organised and rigorous, with excellent analytical skills. Good communication with internal stakeholders is vital, as is the ability to work as part of a dynamic team. Required skills Minimum 1 year in a Security Operations Centre (SOC), or Minimum 3 years in infrastructure or networking roles with demonstrable security exposure Experience triaging and investigating security alerts Understanding of attacker behaviours, TTPs, and common malware execution chains (e.g., phishing leading to script or binary execution) Ability to recognise indicators of compromise such as unusual processes, network connections, irregular logon activity or file changes Hands-on experience with at least one major security platform (SIEM, EDR or XDR) Familiarity with ticketing tools such as ServiceNow, Salesforce, or JIRA Familiarity with Windows event logs, authentication logs, basic process trees, and command-line tools (Windows & Unix-like systems) Understanding of core network protocols: DNS, HTTP, SMB, LDAP Operational knowledge of Windows, macOS and Linux Ability to read and interpret logs from multiple sources Awareness of MITRE ATT&CK and differentiating legitimate admin activity vs suspicious behaviour Desirable skills Experience with Microsoft Sentinel, Google SecOps or other SIEM platforms Experience with Defender, CrowdStrike, SentinelOne or other XDR solutions Ability to query in KQL, CQL, S1QL, XQL or similar languages Awareness of threat intelligence concepts and application to investigations Awareness of coding or scripting, with proficiency in at least one language preferred (but not required) Job specifics Location: This role is home-based with occasional visits to the office in Basingstoke Security clearance: Eligibility for SC clearance (lived in the UK for five years consecutively) required. DV clearance eligibility is advantageous. Why join Nomios? We invest in our people. You will get to work in a dynamic, fast-paced environment where you are free to use your initiative in support of our strategic objectives. You will work alongside high calibre sales, technical, and operational experts as part of a supportive, tight-knit team, within which every individual has an important part to play and makes a real difference. Nomios offers a highly competitive salary and commission scheme along with industry-leading benefits. Ready to make an impact? Apply now! Nomios is an equal opportunity employer and is committed to creating and sustaining an environment in which everyone is provided with an equal opportunity to grow and develop, and no individual will be unjustly discriminated against. This includes, but is not limited to, discrimination because of age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race, religion and belief, sex and sexual orientation.
07/02/2026
Full time
Overview Nomios' mission is to build a secure and connected future. Organisations across the globe depend on us to help secure and connect their digital infrastructures. As part of our continued UK growth, we are expanding our Professional Services capability and seeking a Senior Security Engineer to deliver specialist security engineering and operations consultancy across our customer base. This is a hands-on technical role within the Security Operations domain, focused on helping customers improve and automate their SOC functions, tooling, and detection capabilities. You will work across a range of technologies and engagements, from SOAR and SIEM implementation through to vulnerability management, exposure management, and process automation. Responsibilities Key responsibilities of the role include: Deliver Deliver Professional Services engagements across SOAR, SIEM, XDR, vulnerability and exposure management platforms Conduct Azure and cloud environment security health checks and configuration reviews Design and build SOAR playbooks, integrations, and automation frameworks Develop and maintain custom log source parsers, normalisation, and correlation logic Deploy, configure, and optimise SIEM and XDR solutions for customer environments Build and tune vulnerability management workflows and dashboards using common tools such as Rapid7, Tenable, and Qualys Perform CTEM-related assessments using tools such as Cymulate or XM Cyber Produce clear technical documentation and customer deliverables following each engagement Collaborate Work closely with the internal SOC Engineering team to align practices and share technical improvements Support engineering escalations and onboarding for customer environments Contribute to engineering design sessions, roadmap planning, and internal innovation projects Mentor and share knowledge with internal engineers and analysts Improve Identify and implement automation and efficiency improvements across customer and internal toolsets Contribute to the development of reusable playbooks, connectors, and integration frameworks Support the continual enhancement of Nomios' Professional Services delivery templates, labs, and testing environments We hire result-orientated, smart, and high-energy individuals who bring a can-do attitude and a willingness to go the extra mile and deliver exceptional outcomes. You should be organised and rigorous, with excellent analytical skills. Good communication with internal stakeholders is vital, as is the ability to work as part of a dynamic team. Required skills Minimum 1 year in a Security Operations Centre (SOC), or Minimum 3 years in infrastructure or networking roles with demonstrable security exposure Experience triaging and investigating security alerts Understanding of attacker behaviours, TTPs, and common malware execution chains (e.g., phishing leading to script or binary execution) Ability to recognise indicators of compromise such as unusual processes, network connections, irregular logon activity or file changes Hands-on experience with at least one major security platform (SIEM, EDR or XDR) Familiarity with ticketing tools such as ServiceNow, Salesforce, or JIRA Familiarity with Windows event logs, authentication logs, basic process trees, and command-line tools (Windows & Unix-like systems) Understanding of core network protocols: DNS, HTTP, SMB, LDAP Operational knowledge of Windows, macOS and Linux Ability to read and interpret logs from multiple sources Awareness of MITRE ATT&CK and differentiating legitimate admin activity vs suspicious behaviour Desirable skills Experience with Microsoft Sentinel, Google SecOps or other SIEM platforms Experience with Defender, CrowdStrike, SentinelOne or other XDR solutions Ability to query in KQL, CQL, S1QL, XQL or similar languages Awareness of threat intelligence concepts and application to investigations Awareness of coding or scripting, with proficiency in at least one language preferred (but not required) Job specifics Location: This role is home-based with occasional visits to the office in Basingstoke Security clearance: Eligibility for SC clearance (lived in the UK for five years consecutively) required. DV clearance eligibility is advantageous. Why join Nomios? We invest in our people. You will get to work in a dynamic, fast-paced environment where you are free to use your initiative in support of our strategic objectives. You will work alongside high calibre sales, technical, and operational experts as part of a supportive, tight-knit team, within which every individual has an important part to play and makes a real difference. Nomios offers a highly competitive salary and commission scheme along with industry-leading benefits. Ready to make an impact? Apply now! Nomios is an equal opportunity employer and is committed to creating and sustaining an environment in which everyone is provided with an equal opportunity to grow and develop, and no individual will be unjustly discriminated against. This includes, but is not limited to, discrimination because of age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race, religion and belief, sex and sexual orientation.
Cyber Security Engineer
Quantexa
Overview What we're all about. Do you ever have the urge to do things better than the last time? We do. And it's this urge that drives us every day. Our environment of discovery and innovation means we're able to create deep and valuable relationships with our clients to create real change for them and their industries. It's what got us here - and it's what will make our future. At Quantexa, you'll experience autonomy and support in equal measures allowing you to form a career that matches your ambitions. 41% of our colleagues come from an ethnic or religious minority background. We speak over 20 languages across our 50+ nationalities, creating a sense of belonging for all. We're heading in one direction, the future. We'd love you to join us. The opportunity The Cyber Security Engineer is a hands-on operational role within the Security Operations team, protecting Quantexa. The role is responsible for the day-to-day operation, optimisation, and monitoring of core security platforms, with a focus on Wiz (Cloud monitoring), Zscaler (Web Security/Tunnel 2.0) and CrowdStrike (Endpoint Detection and Response). Working closely with the wider Security Operations team, you will ensure that security alerts, findings, and detections are promptly triaged, validated, logged and effectively remediated. The role contributes directly to improving Quantexa's security posture by reducing risk, strengthening detection capability, and supporting timely response to security events. This position is well suited to a highly technical, curious and observant practitioner who enjoys working with key security tooling, values disciplined execution and can operate confidently within established processes while identifying opportunities for continuous improvement. What you'll be doing Wiz (Cloud Security Posture Management) Monitor and triage Wiz findings daily, validating alerts and determining operational impact. Perform tuning and threat hunting within Wiz and other tooling. Identify misconfigurations, excessive permissions, and exposed assets, escalating where required. Track remediation progress with engineering owners and ensure closure of high-priority issues. Zscaler (Web Security / Tunnel 2.0) Review and triage Zscaler alerts and policy violations, following documented response procedures. Investigate suspicious traffic, access attempts, and user activity to determine legitimacy and risk. Support enforcement actions by validating policy alignment and working with IT and Cloud teams to remediate issues. Monitor coverage and configuration across users and locations, identifying gaps or misconfigurations. Support policy tuning by analysing false positives and recommending rule or policy adjustments. Contribute to playbook development, operational maturity, and ongoing service readiness. CrowdStrike (Endpoint Detection and Response) Review and triage endpoint detections, applying documented response steps. Execute containment actions, including network isolation and sensor troubleshooting. Validate full sensor coverage across the estate and address gaps in coordination with IT. Support tuning activities by analysing false positives and proposing rule refinements. Contribute to playbook improvements and operational readiness tasks. Security Operations Conduct initial investigation of security incidents, collect evidence, and escalate based on severity with a keen eye on the quality of the output. Perform daily review of alerts across SIEM, Wiz, CrowdStrike, and other platforms. Validate vulnerabilities and configuration weaknesses raised by scanning tools. Interpret and operationalise threat intelligence, understand how it informs detection, prioritisation, and response activities, and clearly communicate technical threat intelligence to non-technical stakeholders. Support cloud security controls, identity hygiene checks, and network policy reviews. Contribute to the ongoing maturity and documentation of operational processes. Collaboration and Ways of Working Act as a trusted operational partner to the Cyber Security Manager and the wider Information Security team, providing proactive support and consistent engagement. Partner closely with DevOps, IT, and Engineering teams to drive timely and effective remediation actions. Deliver clear and concise updates on incidents and operational activities proactively, without the need for prompting. Actively participate in team stand ups, contributing constructively to continuous improvement and operational maturity. Support senior engineers with platform enhancements, integrations, and controlled change activities. What you'll bring Required Demonstrated hands-on experience with security operations, incident triage, or vulnerability management. Familiarity with EDR platforms (ideally CrowdStrike) and security telemetry analysis. Knowledge of cloud environments, particularly Azure including Entra and Conditional Access, and a good understanding of cloud security concepts. Ability to understand alert context, assess impact, and follow structured response processes. Strong attention to detail, disciplined documentation, and good communication skills. Mandatory Proficiency in the Following Platforms Practical experience with core security platforms, including Wiz for cloud posture and workload visibility, CrowdStrike for endpoint detection and response, and Zscaler for secure access and traffic inspection. Familiarity with insider risk and secret detection tooling, such as CyberHaven and GitGuardian, with the ability to support basic investigations and configuration checks. Working knowledge of CI/CD pipelines and DevOps tooling, including the ability to follow established security checks within delivery workflows. Exposure to native cloud security services (e.g. Azure Security Center, Google Cloud Command Center) for posture review, alert triage, and configuration validation. Education & Certifications Minimum of 8 years of professional experience in cybersecurity Master's degree in information security, Computer Science, or related discipline. Preferred Industry Certifications (Evidence required): GIAC certifications such as GCIA, GCED, GCIH, GDAT, GDSA or GMON, Microsoft Certified Identity and Access Administrator Associate (SC-300), Microsoft Certified Security Operations Analyst Associate (SC-200) Expectations and Mindset Proactiveness: Take initiative, seek out information, do not sit back and wait, drive your own knowledge alongside that of other guidance provided by the team, and always ask questions. Communication: Keep stakeholders informed, ask questions, and ensure clarity in all interactions. Forward thinking: Anticipate challenges and issues, think strategically, and look for opportunities for improvement. Team Communication: Follow up with the team and make sure you are seen and known, be heard and build strong relationships and establish your presence. Perks and our culture Our mission, perks, and quirks. We offer a range of benefits to support your work and well-being, including competitive salary, bonus, hybrid work options, private healthcare, generous leave, and more. Our mission We have one mission: to help businesses grow, to make data easier, and to make the world a better place. We're not a start-up, but we are a collection of bright, passionate minds harnessing complexities and helping our clients and their communities. One culture, made of many. Heading in one direction - the future. It's all about you We are an Equal Opportunity Employer. We value inclusion and diversity in our work environment. Regardless of race, beliefs, color, national origin, gender, sexual orientation, age, marital status, neurodiversity or ableness - if you are passionate, curious and caring, we want to hear from you. Start. Don't stop - Apply
07/02/2026
Full time
Overview What we're all about. Do you ever have the urge to do things better than the last time? We do. And it's this urge that drives us every day. Our environment of discovery and innovation means we're able to create deep and valuable relationships with our clients to create real change for them and their industries. It's what got us here - and it's what will make our future. At Quantexa, you'll experience autonomy and support in equal measures allowing you to form a career that matches your ambitions. 41% of our colleagues come from an ethnic or religious minority background. We speak over 20 languages across our 50+ nationalities, creating a sense of belonging for all. We're heading in one direction, the future. We'd love you to join us. The opportunity The Cyber Security Engineer is a hands-on operational role within the Security Operations team, protecting Quantexa. The role is responsible for the day-to-day operation, optimisation, and monitoring of core security platforms, with a focus on Wiz (Cloud monitoring), Zscaler (Web Security/Tunnel 2.0) and CrowdStrike (Endpoint Detection and Response). Working closely with the wider Security Operations team, you will ensure that security alerts, findings, and detections are promptly triaged, validated, logged and effectively remediated. The role contributes directly to improving Quantexa's security posture by reducing risk, strengthening detection capability, and supporting timely response to security events. This position is well suited to a highly technical, curious and observant practitioner who enjoys working with key security tooling, values disciplined execution and can operate confidently within established processes while identifying opportunities for continuous improvement. What you'll be doing Wiz (Cloud Security Posture Management) Monitor and triage Wiz findings daily, validating alerts and determining operational impact. Perform tuning and threat hunting within Wiz and other tooling. Identify misconfigurations, excessive permissions, and exposed assets, escalating where required. Track remediation progress with engineering owners and ensure closure of high-priority issues. Zscaler (Web Security / Tunnel 2.0) Review and triage Zscaler alerts and policy violations, following documented response procedures. Investigate suspicious traffic, access attempts, and user activity to determine legitimacy and risk. Support enforcement actions by validating policy alignment and working with IT and Cloud teams to remediate issues. Monitor coverage and configuration across users and locations, identifying gaps or misconfigurations. Support policy tuning by analysing false positives and recommending rule or policy adjustments. Contribute to playbook development, operational maturity, and ongoing service readiness. CrowdStrike (Endpoint Detection and Response) Review and triage endpoint detections, applying documented response steps. Execute containment actions, including network isolation and sensor troubleshooting. Validate full sensor coverage across the estate and address gaps in coordination with IT. Support tuning activities by analysing false positives and proposing rule refinements. Contribute to playbook improvements and operational readiness tasks. Security Operations Conduct initial investigation of security incidents, collect evidence, and escalate based on severity with a keen eye on the quality of the output. Perform daily review of alerts across SIEM, Wiz, CrowdStrike, and other platforms. Validate vulnerabilities and configuration weaknesses raised by scanning tools. Interpret and operationalise threat intelligence, understand how it informs detection, prioritisation, and response activities, and clearly communicate technical threat intelligence to non-technical stakeholders. Support cloud security controls, identity hygiene checks, and network policy reviews. Contribute to the ongoing maturity and documentation of operational processes. Collaboration and Ways of Working Act as a trusted operational partner to the Cyber Security Manager and the wider Information Security team, providing proactive support and consistent engagement. Partner closely with DevOps, IT, and Engineering teams to drive timely and effective remediation actions. Deliver clear and concise updates on incidents and operational activities proactively, without the need for prompting. Actively participate in team stand ups, contributing constructively to continuous improvement and operational maturity. Support senior engineers with platform enhancements, integrations, and controlled change activities. What you'll bring Required Demonstrated hands-on experience with security operations, incident triage, or vulnerability management. Familiarity with EDR platforms (ideally CrowdStrike) and security telemetry analysis. Knowledge of cloud environments, particularly Azure including Entra and Conditional Access, and a good understanding of cloud security concepts. Ability to understand alert context, assess impact, and follow structured response processes. Strong attention to detail, disciplined documentation, and good communication skills. Mandatory Proficiency in the Following Platforms Practical experience with core security platforms, including Wiz for cloud posture and workload visibility, CrowdStrike for endpoint detection and response, and Zscaler for secure access and traffic inspection. Familiarity with insider risk and secret detection tooling, such as CyberHaven and GitGuardian, with the ability to support basic investigations and configuration checks. Working knowledge of CI/CD pipelines and DevOps tooling, including the ability to follow established security checks within delivery workflows. Exposure to native cloud security services (e.g. Azure Security Center, Google Cloud Command Center) for posture review, alert triage, and configuration validation. Education & Certifications Minimum of 8 years of professional experience in cybersecurity Master's degree in information security, Computer Science, or related discipline. Preferred Industry Certifications (Evidence required): GIAC certifications such as GCIA, GCED, GCIH, GDAT, GDSA or GMON, Microsoft Certified Identity and Access Administrator Associate (SC-300), Microsoft Certified Security Operations Analyst Associate (SC-200) Expectations and Mindset Proactiveness: Take initiative, seek out information, do not sit back and wait, drive your own knowledge alongside that of other guidance provided by the team, and always ask questions. Communication: Keep stakeholders informed, ask questions, and ensure clarity in all interactions. Forward thinking: Anticipate challenges and issues, think strategically, and look for opportunities for improvement. Team Communication: Follow up with the team and make sure you are seen and known, be heard and build strong relationships and establish your presence. Perks and our culture Our mission, perks, and quirks. We offer a range of benefits to support your work and well-being, including competitive salary, bonus, hybrid work options, private healthcare, generous leave, and more. Our mission We have one mission: to help businesses grow, to make data easier, and to make the world a better place. We're not a start-up, but we are a collection of bright, passionate minds harnessing complexities and helping our clients and their communities. One culture, made of many. Heading in one direction - the future. It's all about you We are an Equal Opportunity Employer. We value inclusion and diversity in our work environment. Regardless of race, beliefs, color, national origin, gender, sexual orientation, age, marital status, neurodiversity or ableness - if you are passionate, curious and caring, we want to hear from you. Start. Don't stop - Apply
Senior Cyber Security Content Engineer, Blue Team
TryHackMe Ltd
The Role We're looking for a Senior Content Engineer to help us research, plan, and create advanced content and virtual labs for our online courses. The ideal candidate has extensive experience in blue team cyber security roles and a strong background in training content development. Technical Skills & Experience To be considered for this opportunity, you must have at least 5 years of relevant cyber security industry experience in roles such as L3/L4 SOC Analyst, Security Engineer, Incident Responder, Threat Hunter or Digital Forensics Investigator. You should also demonstrate: Strong expertise in core blue team areas: incident detection and response, threat intelligence, log analysis, security monitoring, and digital forensics. A deep understanding of networking, computing, and operating systems as they relate to security practices. Familiarity with blue team tooling (e.g., SIEM, EDR, IDS/IPS, forensic tools) and methodologies (e.g., MITRE ATT&CK framework, log analysis, malware analysis). Proven ability to research and adapt to emerging threats and technologies and translate that knowledge into engaging training content. Strong verbal and written English communication skills, essential for conveying complex technical concepts. Job Responsibilities Research, design, and develop defensive cyber security training material with supporting hands-on lab exercises (such as virtual machines and datasets for analysis). Collaborate with the Content Engineering Team to support security training coverage and identify content development opportunities. Experience developing and configuring virtual machines and sample datasets for realistic cybersecurity labs. Provide guidance and support to other Content Engineering Team members in areas of expertise. Take charge of planning and designing portions of the content development roadmap. Collaborate with the Head of Content Engineering to continuously improve the content development process. Analyze industry trends in tooling and techniques and recreate them as teachable content. Strategically plan, review, and schedule content with our blue team content engineering team. Preferred Skills (nice-to-have): Creating challenges for capture the flags (CTFs) Programming experience in any of the following: Python, PHP, Bash, Powershell Experience leading/ coaching/ mentoring others Certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Enterprise Defender (GCED), Certified SOC Analyst (CSA), Certified Forensic Analyst (GCFA), CompTIA CySA+, BTL2 Benefits & Perks 100% Remote - In a fully digital world, work from anywhere you want! Flexi Time - Choose your own hours as long as you have at least 4 hours of overlap with the UK timezone (from 8am - 6pm) Tools - a dedicated work laptop + any accessories you need to do your best work. Swag Pack - start your TryHackMe journey with a branded swag bundle! Personal Development - £2,500 training budget to acquire certifications, and more. Company Retreat - an annual company retreat, fully paid for by us! Lunch on us - whether you're a pizza-lover, salad obsessed or a big sushi fan, TryHackMe will cover the cost of your lunch order during our recurring company virtual lunches. Health Insurance - if you're in a country that doesn't have public health care. Enhanced Maternity & Paternity - an enhanced package on top of statutory requirements. 401k / Pension - TryHackMe makes it easy to save money for your retirement. Our Hiring Process Stage 1: Short introduction call (30 mins) Stage 2: Technical Take Home Exercise (part 1 & 2) Stage 3: Interview with our Head of Content Engineering (one hour) Stage 4: Final call with a Co-Founder (30 mins) At this time, we are unable to provide sponsorship.
07/02/2026
Full time
The Role We're looking for a Senior Content Engineer to help us research, plan, and create advanced content and virtual labs for our online courses. The ideal candidate has extensive experience in blue team cyber security roles and a strong background in training content development. Technical Skills & Experience To be considered for this opportunity, you must have at least 5 years of relevant cyber security industry experience in roles such as L3/L4 SOC Analyst, Security Engineer, Incident Responder, Threat Hunter or Digital Forensics Investigator. You should also demonstrate: Strong expertise in core blue team areas: incident detection and response, threat intelligence, log analysis, security monitoring, and digital forensics. A deep understanding of networking, computing, and operating systems as they relate to security practices. Familiarity with blue team tooling (e.g., SIEM, EDR, IDS/IPS, forensic tools) and methodologies (e.g., MITRE ATT&CK framework, log analysis, malware analysis). Proven ability to research and adapt to emerging threats and technologies and translate that knowledge into engaging training content. Strong verbal and written English communication skills, essential for conveying complex technical concepts. Job Responsibilities Research, design, and develop defensive cyber security training material with supporting hands-on lab exercises (such as virtual machines and datasets for analysis). Collaborate with the Content Engineering Team to support security training coverage and identify content development opportunities. Experience developing and configuring virtual machines and sample datasets for realistic cybersecurity labs. Provide guidance and support to other Content Engineering Team members in areas of expertise. Take charge of planning and designing portions of the content development roadmap. Collaborate with the Head of Content Engineering to continuously improve the content development process. Analyze industry trends in tooling and techniques and recreate them as teachable content. Strategically plan, review, and schedule content with our blue team content engineering team. Preferred Skills (nice-to-have): Creating challenges for capture the flags (CTFs) Programming experience in any of the following: Python, PHP, Bash, Powershell Experience leading/ coaching/ mentoring others Certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Enterprise Defender (GCED), Certified SOC Analyst (CSA), Certified Forensic Analyst (GCFA), CompTIA CySA+, BTL2 Benefits & Perks 100% Remote - In a fully digital world, work from anywhere you want! Flexi Time - Choose your own hours as long as you have at least 4 hours of overlap with the UK timezone (from 8am - 6pm) Tools - a dedicated work laptop + any accessories you need to do your best work. Swag Pack - start your TryHackMe journey with a branded swag bundle! Personal Development - £2,500 training budget to acquire certifications, and more. Company Retreat - an annual company retreat, fully paid for by us! Lunch on us - whether you're a pizza-lover, salad obsessed or a big sushi fan, TryHackMe will cover the cost of your lunch order during our recurring company virtual lunches. Health Insurance - if you're in a country that doesn't have public health care. Enhanced Maternity & Paternity - an enhanced package on top of statutory requirements. 401k / Pension - TryHackMe makes it easy to save money for your retirement. Our Hiring Process Stage 1: Short introduction call (30 mins) Stage 2: Technical Take Home Exercise (part 1 & 2) Stage 3: Interview with our Head of Content Engineering (one hour) Stage 4: Final call with a Co-Founder (30 mins) At this time, we are unable to provide sponsorship.
IT - Cyber Security Analyst Tier 2 302222
Little Fish (UK) Ltd. Nottingham, Nottinghamshire
Come and join the Littlefish team! Work location: Nottingham or Sheffield Hybrid 4 days on, 4 days off 12-hour shift rotations Salary: Up to: £35,000 with a 20% shift allowance Must be eligible for SC Clearance (UK resident for the last 5 years) and NPPV2 clearance Here at Littlefish, we look for people who can make a real difference and become a giant slayer. As the world around us continues to change, we look for people who grab that change with optimism and excitement. These are the passionate and high performing people who enjoy and thrive on thinking outside the box. Our current employees are the giant slayers who have made Littlefish what we are today, and you will be the future employees who continue to add the drive, passion, and add to our skills and experience as we see Littlefish grow. So, if this is tickling your boxes and you are excited at the thought of working with creative, passionate, energetic, friendly people- we would love to hear from you. The role and what you'll be getting up to on a day to day basis: Are you a passionate cyber security professional ready to take the next step in your SOC career? Littlefish is looking for an experienced Tier 2 Cyber Security Analyst to help protect our customers from emerging threats and play a critical role in our Cyber Security Operations Centre (CSOC). This is an exciting opportunity for someone who thrives in a fast paced environment, enjoys deep dive investigation work, and is motivated by defending organisations from real world cyber attacks. You will: As a Tier 2 Analyst, you'll be at the heart of our SOC operations, responsible for investigating complex security alerts, responding to incidents, and mentoring Tier 1 analysts. Your day to day will include: Monitoring and triaging security events via our ITSM platform Analysing alerts using a range of security tools including SIEM, EDR, and email security platforms Leading deep dive investigations and working with incident responders to contain and eradicate threats Acting as the escalation point for Tier 1 analysts, offering guidance and technical support Conducting security assessments across privilege access, endpoints, email, and cloud environments Translating complex security findings into clear, actionable communication for customers Enhancing alert playbooks and helping evolve our SIEM use cases Staying ahead of the threat landscape with CTI informed analysis and mitigation advice Who you are: Proven experience in a SOC or similar security role Strong background in incident investigation, threat identification, and response within SLAs Hands on experience with SIEM, EDR, and email security tooling Ability to mentor and support junior analysts Solid understanding of attack vectors, malware behaviour, and threat actor techniques Microsoft SC 200 and/or CompTIA Security+ (or equivalent) SC 300, AZ 500 or SANS certifications Experience with vulnerability assessment and incident response Broader exposure to antivirus tooling, cloud security, or threat hunting What can we offer you? Through our one of a kind training programme, the Littlefish Academy, you can increase your earnings by £4,500 Referral bonus scheme of £1000 when you successfully refer a friend. Access to our LinkedIn Learning platform, with over 16,000 expert led online tutorials to enhance and achieve your personal and professional goals. Healthcare cash plan. This will give you access to online GP appointments, 24/7 access to qualified counsellors and cash back against a range of general healthcare Casual dress policy Company Pension Scheme Company social events 25 days annual leave plus public / bank holidays Purchase of annual leave scheme Life at Littlefish: Our company values shape who we are as a business, what we stand for and how we work. Hiring people with our values at heart, is very important as we see Littlefish grow. I am High Performing- I like to raise the bar, we look at creating opportunities to increase quality and improve efficiency, we strive for service excellence. I am Passionate- We build team success and celebrate them together, I am enthusiastic and energetic, I care about the people I work with and we support one another. I Have a Can Do Attitude I am not afraid to step outside my comfort zone, we are not afraid to challenge status quo, we get stuff done! So, if you feel like you can make a tangible difference, apply today, and join us on this journey. Here at Littlefish we aim to be somewhere everyone can be themselves. We are committed to encouraging a diverse and inclusive community where everyone irrespective of who they are, or their background, can feel equal and supported. We encourage applications from people of all backgrounds. Please get in touch if you are concerned about any difficulties you may face during your recruitment process, so we adjust accordingly. Part of our application process includes a set of ED&I (Equality, diversity and inclusion) questions. Please note, each question has a 'prefer not to say' option.
05/02/2026
Full time
Come and join the Littlefish team! Work location: Nottingham or Sheffield Hybrid 4 days on, 4 days off 12-hour shift rotations Salary: Up to: £35,000 with a 20% shift allowance Must be eligible for SC Clearance (UK resident for the last 5 years) and NPPV2 clearance Here at Littlefish, we look for people who can make a real difference and become a giant slayer. As the world around us continues to change, we look for people who grab that change with optimism and excitement. These are the passionate and high performing people who enjoy and thrive on thinking outside the box. Our current employees are the giant slayers who have made Littlefish what we are today, and you will be the future employees who continue to add the drive, passion, and add to our skills and experience as we see Littlefish grow. So, if this is tickling your boxes and you are excited at the thought of working with creative, passionate, energetic, friendly people- we would love to hear from you. The role and what you'll be getting up to on a day to day basis: Are you a passionate cyber security professional ready to take the next step in your SOC career? Littlefish is looking for an experienced Tier 2 Cyber Security Analyst to help protect our customers from emerging threats and play a critical role in our Cyber Security Operations Centre (CSOC). This is an exciting opportunity for someone who thrives in a fast paced environment, enjoys deep dive investigation work, and is motivated by defending organisations from real world cyber attacks. You will: As a Tier 2 Analyst, you'll be at the heart of our SOC operations, responsible for investigating complex security alerts, responding to incidents, and mentoring Tier 1 analysts. Your day to day will include: Monitoring and triaging security events via our ITSM platform Analysing alerts using a range of security tools including SIEM, EDR, and email security platforms Leading deep dive investigations and working with incident responders to contain and eradicate threats Acting as the escalation point for Tier 1 analysts, offering guidance and technical support Conducting security assessments across privilege access, endpoints, email, and cloud environments Translating complex security findings into clear, actionable communication for customers Enhancing alert playbooks and helping evolve our SIEM use cases Staying ahead of the threat landscape with CTI informed analysis and mitigation advice Who you are: Proven experience in a SOC or similar security role Strong background in incident investigation, threat identification, and response within SLAs Hands on experience with SIEM, EDR, and email security tooling Ability to mentor and support junior analysts Solid understanding of attack vectors, malware behaviour, and threat actor techniques Microsoft SC 200 and/or CompTIA Security+ (or equivalent) SC 300, AZ 500 or SANS certifications Experience with vulnerability assessment and incident response Broader exposure to antivirus tooling, cloud security, or threat hunting What can we offer you? Through our one of a kind training programme, the Littlefish Academy, you can increase your earnings by £4,500 Referral bonus scheme of £1000 when you successfully refer a friend. Access to our LinkedIn Learning platform, with over 16,000 expert led online tutorials to enhance and achieve your personal and professional goals. Healthcare cash plan. This will give you access to online GP appointments, 24/7 access to qualified counsellors and cash back against a range of general healthcare Casual dress policy Company Pension Scheme Company social events 25 days annual leave plus public / bank holidays Purchase of annual leave scheme Life at Littlefish: Our company values shape who we are as a business, what we stand for and how we work. Hiring people with our values at heart, is very important as we see Littlefish grow. I am High Performing- I like to raise the bar, we look at creating opportunities to increase quality and improve efficiency, we strive for service excellence. I am Passionate- We build team success and celebrate them together, I am enthusiastic and energetic, I care about the people I work with and we support one another. I Have a Can Do Attitude I am not afraid to step outside my comfort zone, we are not afraid to challenge status quo, we get stuff done! So, if you feel like you can make a tangible difference, apply today, and join us on this journey. Here at Littlefish we aim to be somewhere everyone can be themselves. We are committed to encouraging a diverse and inclusive community where everyone irrespective of who they are, or their background, can feel equal and supported. We encourage applications from people of all backgrounds. Please get in touch if you are concerned about any difficulties you may face during your recruitment process, so we adjust accordingly. Part of our application process includes a set of ED&I (Equality, diversity and inclusion) questions. Please note, each question has a 'prefer not to say' option.
Tier 2 Cyber Security Analyst - SOC Investigator (Hybrid)
Little Fish (UK) Ltd. Nottingham, Nottinghamshire
A leading cybersecurity company based in the UK is seeking a passionate Tier 2 Cyber Security Analyst to join its team. The successful candidate will be responsible for investigating security alerts, responding to incidents, and mentoring junior analysts. This role requires hands-on experience with SIEM and EDR platforms, as well as a strong understanding of threat landscapes. Competitive salary offering up to £35,000 plus benefits including healthcare, training programs, and referral bonuses. Hybrid work model with a commitment to diversity and inclusion.
05/02/2026
Full time
A leading cybersecurity company based in the UK is seeking a passionate Tier 2 Cyber Security Analyst to join its team. The successful candidate will be responsible for investigating security alerts, responding to incidents, and mentoring junior analysts. This role requires hands-on experience with SIEM and EDR platforms, as well as a strong understanding of threat landscapes. Competitive salary offering up to £35,000 plus benefits including healthcare, training programs, and referral bonuses. Hybrid work model with a commitment to diversity and inclusion.
Data Architect
Robert Walters UK Harrogate, Yorkshire
Data Architect - Harrogate, Hybrid working. Up to £80,000 (DOE) + Benefits. Are you an experienced Data Architect looking to shape the data foundations of a modern, forward thinking organisation? This is a rare opportunity to take ownership of enterprise wide data architecture and play a central role in how data is structured, governed, protected, and leveraged across the business. In this role, you'll define the organisation's data vision and turn strategic goals into real, scalable data capabilities - ensuring data is trusted, secure, and treated as a strategic asset. You'll work closely with senior leaders, architects, engineers, analysts, and cybersecurity specialists to design robust data environments that support operational excellence and innovation in areas such as AI, analytics and cloud based delivery. Key Responsibilities Define the organisation's data architecture strategy, aligning it to business goals and regulatory standards. Apply best practices from DMBOK and other recognised frameworks to build a modern, scalable data ecosystem. Implement and maintain strong governance frameworks, including data quality, stewardship, ownership, and consistency processes. Embed security and risk management into all architectural design. Oversee data across its full lifecycle - from acquisition and modelling through to storage, usage, archiving and disposal. Ensure data lineage, retention policies, and governance controls are fully embedded. Design scalable architecture components including data lakes, warehouses, metadata repositories, and modern data mesh/fabric approaches. Support integration across multiple platforms and enterprise systems. Produce conceptual, logical, and physical data models that support business needs and integrate effectively with the wider enterprise architecture. Partner with solution architects, engineers, and cybersecurity teams to embed strong data architecture principles throughout delivery. Stay ahead of emerging trends in AI/ML, cloud data platforms, real time analytics, and modern architecture patterns. Propose improvements that enhance the organisation's data capability and maturity. As Data Architect you will have: Proven experience designing and evolving enterprise level data architecture. Strong understanding of data governance, data quality, and master data management. Experience designing secure, compliant environments aligned to CAF or similar frameworks. Expertise in metadata management, data cataloguing and integration platforms (e.g. MuleSoft, Boomi, ADF, AWS Glue). Knowledge of cloud platforms - AWS is particularly desirable. Understanding of BI and visualisation tools (e.g. Tableau, Power BI). Experience building solutions with AWS and Snowflake, including secure data sharing and performance optimisation. Proficiency in data modelling tools and modelling languages (UML/ERD). Familiarity with data mesh, event driven design, and cloud native services. Strong communication skills and the ability to influence senior stakeholders. Experience in agile and DevOps environments (desirable). Understanding of AI/ML lifecycle impacts on data architecture (desirable). Awareness of ESG data, data ethics, and responsible AI (desirable). Robert Walters Operations Limited is an employment business and employment agency and welcomes applications from all candidates. About the job Contract Type: Permanent Industry: Trade and Services Workplace Type: Hybrid Experience Level: Associate Location: Harrogate Specialism: Technology & Digital Focus: Architecture Salary: £75,000 - £80,000 per annum Source: Job posting dated 2 February 2026.
05/02/2026
Full time
Data Architect - Harrogate, Hybrid working. Up to £80,000 (DOE) + Benefits. Are you an experienced Data Architect looking to shape the data foundations of a modern, forward thinking organisation? This is a rare opportunity to take ownership of enterprise wide data architecture and play a central role in how data is structured, governed, protected, and leveraged across the business. In this role, you'll define the organisation's data vision and turn strategic goals into real, scalable data capabilities - ensuring data is trusted, secure, and treated as a strategic asset. You'll work closely with senior leaders, architects, engineers, analysts, and cybersecurity specialists to design robust data environments that support operational excellence and innovation in areas such as AI, analytics and cloud based delivery. Key Responsibilities Define the organisation's data architecture strategy, aligning it to business goals and regulatory standards. Apply best practices from DMBOK and other recognised frameworks to build a modern, scalable data ecosystem. Implement and maintain strong governance frameworks, including data quality, stewardship, ownership, and consistency processes. Embed security and risk management into all architectural design. Oversee data across its full lifecycle - from acquisition and modelling through to storage, usage, archiving and disposal. Ensure data lineage, retention policies, and governance controls are fully embedded. Design scalable architecture components including data lakes, warehouses, metadata repositories, and modern data mesh/fabric approaches. Support integration across multiple platforms and enterprise systems. Produce conceptual, logical, and physical data models that support business needs and integrate effectively with the wider enterprise architecture. Partner with solution architects, engineers, and cybersecurity teams to embed strong data architecture principles throughout delivery. Stay ahead of emerging trends in AI/ML, cloud data platforms, real time analytics, and modern architecture patterns. Propose improvements that enhance the organisation's data capability and maturity. As Data Architect you will have: Proven experience designing and evolving enterprise level data architecture. Strong understanding of data governance, data quality, and master data management. Experience designing secure, compliant environments aligned to CAF or similar frameworks. Expertise in metadata management, data cataloguing and integration platforms (e.g. MuleSoft, Boomi, ADF, AWS Glue). Knowledge of cloud platforms - AWS is particularly desirable. Understanding of BI and visualisation tools (e.g. Tableau, Power BI). Experience building solutions with AWS and Snowflake, including secure data sharing and performance optimisation. Proficiency in data modelling tools and modelling languages (UML/ERD). Familiarity with data mesh, event driven design, and cloud native services. Strong communication skills and the ability to influence senior stakeholders. Experience in agile and DevOps environments (desirable). Understanding of AI/ML lifecycle impacts on data architecture (desirable). Awareness of ESG data, data ethics, and responsible AI (desirable). Robert Walters Operations Limited is an employment business and employment agency and welcomes applications from all candidates. About the job Contract Type: Permanent Industry: Trade and Services Workplace Type: Hybrid Experience Level: Associate Location: Harrogate Specialism: Technology & Digital Focus: Architecture Salary: £75,000 - £80,000 per annum Source: Job posting dated 2 February 2026.
MBDA UK
Network Security Engineer (SOC)
MBDA UK Stevenage, Hertfordshire
An exciting opportunity for a passionate Network Security Engineer to join a unique, multi-national Information Management function. Ideal candidates should be committed to protecting our critical systems and ensuring the integrity and security of our network infrastructure. Salary: Circa £50,000depending on experience+ shift allowance Dynamic (hybrid) working: 5 days per week on-site due to workload classification, working a 24/7 Shift Pattern Security Clearance: British Citizen This role will require DV Clearance. Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS) and a Security Check (SC) clearance, which are managed by the MBDA Personnel Security Team. What we can offer you: Company bonus: Up to £2,500 (based on company performance and will vary year to year) Pension: maximum total (employer and employee) contribution of up to 14% Overtime: opportunity for paid overtime Flexi Leave: Up to 15 additional days Enhanced parental leave: offers up to 26 weeks for maternity, adoption and shared parental leave -enhancements are available for paternity leave, neonatal leave and fertility testing and treatments Facilities: Fantastic site facilities including subsidised meals, free car parking and much more The opportunity: Join our forward thinking team as a Network Security Engineer, where you will play a key role in safeguarding our organisations' network infrastructure as part of the 24x7 Internal Security Response (ISR) team. When not involved in incident response and triage activity with the SOC team, you will be responsible for designing, implementing and maintaining robust security solutions to protect against evolving threats. Collaborating with cross-functional teams, you will work on implementing changes securely, identifying vulnerabilities, managing security incidents and ensuring compliance with industry best practices. The role will be involved in the optimisation of network security tools to remediate "purple team" highlighted areas identified for improvement. You will also have the opportunity to immerse your time into the standardisation of network tools. This is a dynamic opportunity to contribute to security initiatives, solve complex challenges, and have a direct impact on the overall resilience of our IT environment. If you are passionate about security and proactive defence, this role is the perfect fit. If you are looking to leverage your technical skills in a values-led company that values innovation and diversity, this is the place to make an impact. What we're looking for from you: ESSENTIALS Solid understanding of networking principles (TCP/IP, DNS, routing, switching, VLANS and load balancing) Strong expertise in configuring, maintaining and troubleshooting firewalls e.g. Cisco, Checkpoint, Palo Alto Demonstrable hands-on experience in next-gen firewalls and advancing security features like IPS/IDS, SSL decryption and deep packet inspection. Proven experience in managing secure proxy solutions (e.g. Bluecoat, F5) and the ability to implement policies for content filtering, SSL inspection and network traffic monitoring. In depth knowledge of security protocols such as IPSec, SSL / TLS, VPNs and two factor authentication. Understanding of network architectures and security zones (DMZ, internal networks). Proficient in monitoring technologies e.g. PRTG, Nagios. DESIRABLES Understanding of cyber security capabilities and their integrations to networks infrastructure. Existing knowledge of / aptitude to learn Darktrace Antigena and Respond, Splunk ES or Log Rhythm tools. Strong ability to interpret complex information via use of packet capture in order to identify malicious traffic in detail, revealing attacker behaviours like C2, exploitation, lateral movement, or data exfiltration. Proven ability to review SOC alerting in collaboration with SOC analysts to effectively triage and manage Tier 1 SOC alerts to the appropriate outcome. Experience with LDAP, and application traffic flow root cause analysis. Previous experience to identify root cause from (TBC for review - Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools). Our company: Peace is not a given, Freedom is not a given, Sovereignty is not a given MBDA is a leading defence organisation. We are proud of the role we play in supporting the Armed Forces who protect our nations. We partner with governments to work together towards a common goal, defending our freedom. We are proud of our employee-led networks, examples include: Gender Equality, Pride, Menopause Matters, Parents and Carers, Armed Forces, Ethnic Diversity, Neurodiversity, Disability and more We recognise that everyone is unique, and we encourage you to speak to us should you require any advice, support or adjustments throughout our recruitment process. Follow us on LinkedIn (MBDA), X Instagram (MBDA_UK) and Glassdoor or visit our MBDA Careers website for more information.
04/02/2026
Full time
An exciting opportunity for a passionate Network Security Engineer to join a unique, multi-national Information Management function. Ideal candidates should be committed to protecting our critical systems and ensuring the integrity and security of our network infrastructure. Salary: Circa £50,000depending on experience+ shift allowance Dynamic (hybrid) working: 5 days per week on-site due to workload classification, working a 24/7 Shift Pattern Security Clearance: British Citizen This role will require DV Clearance. Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS) and a Security Check (SC) clearance, which are managed by the MBDA Personnel Security Team. What we can offer you: Company bonus: Up to £2,500 (based on company performance and will vary year to year) Pension: maximum total (employer and employee) contribution of up to 14% Overtime: opportunity for paid overtime Flexi Leave: Up to 15 additional days Enhanced parental leave: offers up to 26 weeks for maternity, adoption and shared parental leave -enhancements are available for paternity leave, neonatal leave and fertility testing and treatments Facilities: Fantastic site facilities including subsidised meals, free car parking and much more The opportunity: Join our forward thinking team as a Network Security Engineer, where you will play a key role in safeguarding our organisations' network infrastructure as part of the 24x7 Internal Security Response (ISR) team. When not involved in incident response and triage activity with the SOC team, you will be responsible for designing, implementing and maintaining robust security solutions to protect against evolving threats. Collaborating with cross-functional teams, you will work on implementing changes securely, identifying vulnerabilities, managing security incidents and ensuring compliance with industry best practices. The role will be involved in the optimisation of network security tools to remediate "purple team" highlighted areas identified for improvement. You will also have the opportunity to immerse your time into the standardisation of network tools. This is a dynamic opportunity to contribute to security initiatives, solve complex challenges, and have a direct impact on the overall resilience of our IT environment. If you are passionate about security and proactive defence, this role is the perfect fit. If you are looking to leverage your technical skills in a values-led company that values innovation and diversity, this is the place to make an impact. What we're looking for from you: ESSENTIALS Solid understanding of networking principles (TCP/IP, DNS, routing, switching, VLANS and load balancing) Strong expertise in configuring, maintaining and troubleshooting firewalls e.g. Cisco, Checkpoint, Palo Alto Demonstrable hands-on experience in next-gen firewalls and advancing security features like IPS/IDS, SSL decryption and deep packet inspection. Proven experience in managing secure proxy solutions (e.g. Bluecoat, F5) and the ability to implement policies for content filtering, SSL inspection and network traffic monitoring. In depth knowledge of security protocols such as IPSec, SSL / TLS, VPNs and two factor authentication. Understanding of network architectures and security zones (DMZ, internal networks). Proficient in monitoring technologies e.g. PRTG, Nagios. DESIRABLES Understanding of cyber security capabilities and their integrations to networks infrastructure. Existing knowledge of / aptitude to learn Darktrace Antigena and Respond, Splunk ES or Log Rhythm tools. Strong ability to interpret complex information via use of packet capture in order to identify malicious traffic in detail, revealing attacker behaviours like C2, exploitation, lateral movement, or data exfiltration. Proven ability to review SOC alerting in collaboration with SOC analysts to effectively triage and manage Tier 1 SOC alerts to the appropriate outcome. Experience with LDAP, and application traffic flow root cause analysis. Previous experience to identify root cause from (TBC for review - Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools). Our company: Peace is not a given, Freedom is not a given, Sovereignty is not a given MBDA is a leading defence organisation. We are proud of the role we play in supporting the Armed Forces who protect our nations. We partner with governments to work together towards a common goal, defending our freedom. We are proud of our employee-led networks, examples include: Gender Equality, Pride, Menopause Matters, Parents and Carers, Armed Forces, Ethnic Diversity, Neurodiversity, Disability and more We recognise that everyone is unique, and we encourage you to speak to us should you require any advice, support or adjustments throughout our recruitment process. Follow us on LinkedIn (MBDA), X Instagram (MBDA_UK) and Glassdoor or visit our MBDA Careers website for more information.
MBDA UK
CERT Incident Responder
MBDA UK
Bolton The CERT Incident Responder is responsible for leading digital forensics and incident response (DFIR) readiness. While also advancing the organisation's Adversarial Exposure Validation (AEV)- including Red and Purple Team activities The role ensures detection, response, and control validation against real-world threat actor tactics, techniques, and procedures (TTPs). Salary: £50,000 - £60,000 depending on experience Dynamic (hybrid) working: Minimum 2 days per week on-site due to workload classification Security Clearance: British Citizen or a Dual UK national with British citizenship. Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS), which are managed by the MBDA Personnel Security Team. What we can offer you: Company bonus: Up to £2,500 (based on company performance and will vary year to year) Pension: maximum total (employer and employee) contribution of up to 14% Overtime: opportunity for paid overtime Flexi Leave: Up to 15 additional days Flexible working: We welcome applicants who are looking for flexible working arrangements Enhanced parental leave: offers up to 26 weeks for maternity, adoption and shared parental leave -enhancements are available for paternity leave, neonatal leave and fertility testing and treatments Facilities: Fantastic site facilities including subsidised meals, free car parking and much more Healthcare Cash Plan: The Healthcare Cash Plan benefit provides the option to claim cash back on everyday healthcare expenses such as optical, dental, health and wellbeing and more . The opportunity: The CERT Incident Responder is responsible for leading digital forensics and incident response (DFIR) readiness. While also advancing the organisation's Adversarial Exposure Validation (AEV)- including Red and Purple Team activities. The role ensures detection, response, and control validation against real-world threat actor tactics, techniques, and procedures (TTPs). This is a Next step role for an experienced Analyst with a passion for Incident response and Threat mitigation. Essentials: Lead digital forensics and incident response (DFIR) activities, ensuring lab readiness, artefact management, and delivery of forensic objectives. Maintain and enhance forensic tools and environments (e.g., Magnet Axiom, Autopsy) to ensure operational capability. Conduct detailed forensic analysis, malware reverse engineering, and cyber investigation of complex incidents. Ensure effective chain of custody, artefact preservation, and evidence handling processes. Maintain accurate digital forensics documentation, incident playbooks, and readiness rehearsal materials. Lead and execute tabletop exercises (TTEx) to test and improve incident response and forensic readiness. Perform network and endpoint investigations, including AV scans, incident remediation, and validation of security alerts. Collaborate with IM/DEx and Security Operations to enhance incident reporting, alerting, and notification services. Deputise for CERT responders during major incidents or third-party attacks, coordinating with national and international partners (e.g., NCPC). Develop and maintain enterprise security documentation, including policies, standards, baselines, and playbooks. Desirables: Identify root causes of security incidents and recommend sustainable mitigation strategies. Manage remediation and closure of security cases, ensuring timely implementation of corrective actions. Develop and maintain threat scenarios to validate detection and response across SOC, EDR, SIEM, and XDR platforms. Translate threat intelligence into testable hypotheses and simulation exercises in collaboration with Threat Intelligence teams. Utilise adversarial emulation tools (Caldera, Atomic Red Team, AttackIQ, SCYTHE, Cobalt Strike, etc.) to replicate realistic attacker behaviours. Research and integrate emerging threats and TTPs into adversary emulation and validation methodologies. Produce detailed reporting and metrics on detection coverage, response performance, and control effectiveness. Support the wider IM/DEx team by validating new or updated controls against advanced threat simulations. Support SOC operations with investigation, alert triage, and implementation of lessons learned from adversarial validation and DFIR activities. Research and evaluate emerging security tools, technologies, and methodologies; provide gap analysis and recommendations to influence investment. Deliver metrics, dashboards, and reports demonstrating adversarial resilience and capability maturity. Contribute to small-to-medium cyber projects enhancing threat detection, emulation, and response maturity. What we're looking for from you: Demonstratable experience handling incidents, such as: Ransomware containment + remediation Business email compromise investigations Cloud account takeover Insider threat events Large-scale phishing attacks Leading incident response calls, advising leadership, and writing executive summaries Our company: Peace is not a given, Freedom is not a given, Sovereignty is not a given MBDA is a leading defence organisation. We are proud of the role we play in supporting the Armed Forces who protect our nations. We partner with governments to work together towards a common goal, defending our freedom. We are proud of our employee-led networks, examples include: Gender Equality, Pride, Menopause Matters, Parents and Carers, Armed Forces, Ethnic Diversity, Neurodiversity, Disability and more We recognise that everyone is unique, and we encourage you to speak to us should you require any advice, support or adjustments throughout our recruitment process. Follow us on LinkedIn (MBDA), X Instagram (MBDA_UK) and Glassdoor or visit our MBDA Careers website for more information.
04/02/2026
Full time
Bolton The CERT Incident Responder is responsible for leading digital forensics and incident response (DFIR) readiness. While also advancing the organisation's Adversarial Exposure Validation (AEV)- including Red and Purple Team activities The role ensures detection, response, and control validation against real-world threat actor tactics, techniques, and procedures (TTPs). Salary: £50,000 - £60,000 depending on experience Dynamic (hybrid) working: Minimum 2 days per week on-site due to workload classification Security Clearance: British Citizen or a Dual UK national with British citizenship. Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS), which are managed by the MBDA Personnel Security Team. What we can offer you: Company bonus: Up to £2,500 (based on company performance and will vary year to year) Pension: maximum total (employer and employee) contribution of up to 14% Overtime: opportunity for paid overtime Flexi Leave: Up to 15 additional days Flexible working: We welcome applicants who are looking for flexible working arrangements Enhanced parental leave: offers up to 26 weeks for maternity, adoption and shared parental leave -enhancements are available for paternity leave, neonatal leave and fertility testing and treatments Facilities: Fantastic site facilities including subsidised meals, free car parking and much more Healthcare Cash Plan: The Healthcare Cash Plan benefit provides the option to claim cash back on everyday healthcare expenses such as optical, dental, health and wellbeing and more . The opportunity: The CERT Incident Responder is responsible for leading digital forensics and incident response (DFIR) readiness. While also advancing the organisation's Adversarial Exposure Validation (AEV)- including Red and Purple Team activities. The role ensures detection, response, and control validation against real-world threat actor tactics, techniques, and procedures (TTPs). This is a Next step role for an experienced Analyst with a passion for Incident response and Threat mitigation. Essentials: Lead digital forensics and incident response (DFIR) activities, ensuring lab readiness, artefact management, and delivery of forensic objectives. Maintain and enhance forensic tools and environments (e.g., Magnet Axiom, Autopsy) to ensure operational capability. Conduct detailed forensic analysis, malware reverse engineering, and cyber investigation of complex incidents. Ensure effective chain of custody, artefact preservation, and evidence handling processes. Maintain accurate digital forensics documentation, incident playbooks, and readiness rehearsal materials. Lead and execute tabletop exercises (TTEx) to test and improve incident response and forensic readiness. Perform network and endpoint investigations, including AV scans, incident remediation, and validation of security alerts. Collaborate with IM/DEx and Security Operations to enhance incident reporting, alerting, and notification services. Deputise for CERT responders during major incidents or third-party attacks, coordinating with national and international partners (e.g., NCPC). Develop and maintain enterprise security documentation, including policies, standards, baselines, and playbooks. Desirables: Identify root causes of security incidents and recommend sustainable mitigation strategies. Manage remediation and closure of security cases, ensuring timely implementation of corrective actions. Develop and maintain threat scenarios to validate detection and response across SOC, EDR, SIEM, and XDR platforms. Translate threat intelligence into testable hypotheses and simulation exercises in collaboration with Threat Intelligence teams. Utilise adversarial emulation tools (Caldera, Atomic Red Team, AttackIQ, SCYTHE, Cobalt Strike, etc.) to replicate realistic attacker behaviours. Research and integrate emerging threats and TTPs into adversary emulation and validation methodologies. Produce detailed reporting and metrics on detection coverage, response performance, and control effectiveness. Support the wider IM/DEx team by validating new or updated controls against advanced threat simulations. Support SOC operations with investigation, alert triage, and implementation of lessons learned from adversarial validation and DFIR activities. Research and evaluate emerging security tools, technologies, and methodologies; provide gap analysis and recommendations to influence investment. Deliver metrics, dashboards, and reports demonstrating adversarial resilience and capability maturity. Contribute to small-to-medium cyber projects enhancing threat detection, emulation, and response maturity. What we're looking for from you: Demonstratable experience handling incidents, such as: Ransomware containment + remediation Business email compromise investigations Cloud account takeover Insider threat events Large-scale phishing attacks Leading incident response calls, advising leadership, and writing executive summaries Our company: Peace is not a given, Freedom is not a given, Sovereignty is not a given MBDA is a leading defence organisation. We are proud of the role we play in supporting the Armed Forces who protect our nations. We partner with governments to work together towards a common goal, defending our freedom. We are proud of our employee-led networks, examples include: Gender Equality, Pride, Menopause Matters, Parents and Carers, Armed Forces, Ethnic Diversity, Neurodiversity, Disability and more We recognise that everyone is unique, and we encourage you to speak to us should you require any advice, support or adjustments throughout our recruitment process. Follow us on LinkedIn (MBDA), X Instagram (MBDA_UK) and Glassdoor or visit our MBDA Careers website for more information.

Modal Window

  • Home
  • Contact
  • About Us
  • FAQs
  • Terms & Conditions
  • Privacy
  • Employer
  • Post a Job
  • Search Resumes
  • Sign in
  • Job Seeker
  • Find Jobs
  • Create Resume
  • Sign in
  • IT blog
  • Facebook
  • Twitter
  • LinkedIn
  • Youtube
© 2008-2026 IT Job Board