• Home
  • Find Jobs
  • Register CV
  • Advertise jobs
  • Employer Pricing
  • IT Jobs
  • Sign in
  • Sign up
  • Home
  • Find Jobs
  • Register CV
  • Advertise jobs
  • Employer Pricing
  • IT Jobs
Sorry, that job is no longer available. Here are some results that may be similar to the job you were looking for.

26 jobs found

Email me jobs like this
Refine Search
Current Search
cyber security analyst cloud
Starling Bank
IAM Analyst
Starling Bank
Description Starling is the UK's first and leading digital bank on a mission to fix banking! We built a new kind of bank because we knew technology had the power to help people save, spend and manage their money in a new and transformative way. We're a fully licensed UK bank with the culture and spirit of a fast-moving, disruptive tech company. We're a bank, but better: fairer, easier to use and designed to demystify money for everyone. We employ more than 3,000 people across our London, Southampton, Cardiff and Manchester offices. Our technologists are at the very heart of Starling and enjoy working in a fast-paced environment that is all about building things, creating new stuff, and disruptive technology that keeps us on the cutting edge of fintech. We operate a flat structure to empower you to make decisions regardless of what your primary responsibilities may be, innovation and collaboration will be at the core of everything you do. Help is never far away in our open culture, you will find support in your team and from across the business, we are in this together! The way to thrive and shine within Starling is to be a self-driven individual and be able to take full ownership of everything around you: From building things, designing, discovering, to sharing knowledge with your colleagues and making sure all processes are efficient and productive to deliver the best possible results for our customers. Our purpose is underpinned by five Starling values: Listen, Keep It Simple, Do The Right Thing, Own It, and Aim For Greatness. Hybrid Working We have a Hybrid approach to working here at Starling - our preference is that you're located within a commutable distance of one of our offices so that we're able to interact and collaborate in person. Requirements As an IAM analyst you will play a critical role in the management and optimisation of Starling's identity lifecycle and across a variety of SaaS and bespoke identity tooling. You will serve as a key liaison to the wider business, bridging the gap between high-level security requirements and practical, automated solutions. No one day is the same as any other. On any given day you might be: integrating systems with our identity provider for SSO; configuring request and review policies in our access governance system; analysing roles and permissions in third-party services and mapping these to teams and job roles for birthright access; helping end users with complex access issues; defining standards and policies relating to identity and access management; taking ownership of or contributing to projects to improve the bank's identity security posture. We understand the importance of knowledge and expertise remaining current and you'll help us to continue making things better through research, design and implementation of new solutions, including automation. You will actively contribute to us remaining current with Cyber and Identity trends through research and development. Everyone's opinion matters and we embrace a range of perspectives through inception to delivery. We're open-minded when it comes to hiring and we care more about aptitude and attitude than specific experience or qualifications. Essential Strong communication and interpersonal skills including the ability to explain complex security concepts to technical and non-technical audiences. Good understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, Privileged Access Management, Role Based Access Control and Identity Governance Understanding of risk management, including quantification and remediation. A genuine enthusiasm for identifying security problems and building solutions to them. Desirable Experience of design and delivery related to identity management systems, e.g. Okta, Entra ID, Ping, etc. Experience of design and delivery related to identity governance systems, e.g. Sailpoint, Saviynt, ConductorOne, etc. Ability to write code (e.g. automating tasks using scripting languages such as Python). Understanding of authentication protocols (e.g. SAML, OIDC). Strong general cybersecurity domain knowledge, including cloud security (GCP, AWS). Experience of fulfilling a client facing security consulting role or business facing security role. Responsibilities Independently run and contribute to Identity-related projects Design and implement identity solutions across both a variety of SaaS and bespoke identity tooling Collaborating with engineering and business stakeholders on Identity-related initiatives, including: Reviewing and analysing proposed technical solutions and business processes to identify appropriate security controls. Bridging the gap between complex business needs and technical execution by documenting clear, actionable identity requirements for engineering teams. Advising on remediation of security issues and processes to address root causes. Provide troubleshooting as well as disaster recovery planning and tests Maintain identity and access operations for specific high risk systems Develop processes, guidelines, and documentation for consumption by internal teams Triage and management of IAM security events including, where necessary, participation in IAM security incident management. Maintenance of existing solutions, including operational improvements. Provide training, guidance and mentorship for other team members Security administration and auditing of privileged systems access. Identification and quantification of relevant risks to Starling systems and processes in the context of Starling's desired security posture. Interview Process Interviewing is a two way process and we want you to have the time and opportunity to get to know us, as much as we are getting to know you! Our interviews are conversational and we want to get the best from you, so come with questions and be curious. In general you can expect the below, following a chat with one of our Talent Team: First stage with the IAM leads (team fit) 45 minutes Second stage with additional members of the IAM team (skills and technical) 1 hour Final stage with Infosec Director and CISO 45 minutes Benefits 33 days holiday (including public holidays, which you can take when it works best for you) An extra day's holiday for your birthday Annual leave is increased with length of service, and you can choose to buy or sell up to five extra days off 16 hours paid volunteering time a year Salary sacrifice, company enhanced pension scheme Life insurance at 4x your salary & group income protection Private Medical Insurance with VitalityHealth including mental health support and cancer care. Partner benefits include discounts with Waitrose, Mr&Mrs Smith and Peloton Generous family-friendly policies Incentives refer a friend scheme Perkbox membership giving access to retail discounts, a wellness platform for physical and mental health, and weekly free and boosted perks Access to initiatives like Cycle to Work, Salary Sacrificed Gym partnerships and Electric Vehicle (EV) leasing About us You may be put off applying for a role because you don't tick every box. Forget that! So, if you're excited about working with us, but aren't sure if you're 100% there yet, get in touch anyway. We're on a mission to radically reshape banking - and that starts with our brilliant team. Whatever came before, we're proud to bring together people of all backgrounds and experiences who love working together to solve problems. Starling is an equal opportunity employer, and we're proud of our ongoing efforts to foster diversity & inclusion in the workplace. Individuals seeking employment at Starling are considered without regard to race, religion, national origin, age, sex, gender, gender identity, gender expression, sexual orientation, marital status, medical condition, ancestry, physical or mental disability, military or veteran status, or any other characteristic protected by applicable law. When you provide us with this information, you are doing so at your own consent, with full knowledge that we will process this personal data in accordance with our Privacy Notice. By submitting your application, you agree that Starling will collect your personal data for recruiting and related purposes. Our Privacy Notice explains what personal information we will process, where we will process your personal information, its purposes for processing your personal information, and the rights you can exercise over our use of your personal information.
Apr 01, 2026
Full time
Description Starling is the UK's first and leading digital bank on a mission to fix banking! We built a new kind of bank because we knew technology had the power to help people save, spend and manage their money in a new and transformative way. We're a fully licensed UK bank with the culture and spirit of a fast-moving, disruptive tech company. We're a bank, but better: fairer, easier to use and designed to demystify money for everyone. We employ more than 3,000 people across our London, Southampton, Cardiff and Manchester offices. Our technologists are at the very heart of Starling and enjoy working in a fast-paced environment that is all about building things, creating new stuff, and disruptive technology that keeps us on the cutting edge of fintech. We operate a flat structure to empower you to make decisions regardless of what your primary responsibilities may be, innovation and collaboration will be at the core of everything you do. Help is never far away in our open culture, you will find support in your team and from across the business, we are in this together! The way to thrive and shine within Starling is to be a self-driven individual and be able to take full ownership of everything around you: From building things, designing, discovering, to sharing knowledge with your colleagues and making sure all processes are efficient and productive to deliver the best possible results for our customers. Our purpose is underpinned by five Starling values: Listen, Keep It Simple, Do The Right Thing, Own It, and Aim For Greatness. Hybrid Working We have a Hybrid approach to working here at Starling - our preference is that you're located within a commutable distance of one of our offices so that we're able to interact and collaborate in person. Requirements As an IAM analyst you will play a critical role in the management and optimisation of Starling's identity lifecycle and across a variety of SaaS and bespoke identity tooling. You will serve as a key liaison to the wider business, bridging the gap between high-level security requirements and practical, automated solutions. No one day is the same as any other. On any given day you might be: integrating systems with our identity provider for SSO; configuring request and review policies in our access governance system; analysing roles and permissions in third-party services and mapping these to teams and job roles for birthright access; helping end users with complex access issues; defining standards and policies relating to identity and access management; taking ownership of or contributing to projects to improve the bank's identity security posture. We understand the importance of knowledge and expertise remaining current and you'll help us to continue making things better through research, design and implementation of new solutions, including automation. You will actively contribute to us remaining current with Cyber and Identity trends through research and development. Everyone's opinion matters and we embrace a range of perspectives through inception to delivery. We're open-minded when it comes to hiring and we care more about aptitude and attitude than specific experience or qualifications. Essential Strong communication and interpersonal skills including the ability to explain complex security concepts to technical and non-technical audiences. Good understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, Privileged Access Management, Role Based Access Control and Identity Governance Understanding of risk management, including quantification and remediation. A genuine enthusiasm for identifying security problems and building solutions to them. Desirable Experience of design and delivery related to identity management systems, e.g. Okta, Entra ID, Ping, etc. Experience of design and delivery related to identity governance systems, e.g. Sailpoint, Saviynt, ConductorOne, etc. Ability to write code (e.g. automating tasks using scripting languages such as Python). Understanding of authentication protocols (e.g. SAML, OIDC). Strong general cybersecurity domain knowledge, including cloud security (GCP, AWS). Experience of fulfilling a client facing security consulting role or business facing security role. Responsibilities Independently run and contribute to Identity-related projects Design and implement identity solutions across both a variety of SaaS and bespoke identity tooling Collaborating with engineering and business stakeholders on Identity-related initiatives, including: Reviewing and analysing proposed technical solutions and business processes to identify appropriate security controls. Bridging the gap between complex business needs and technical execution by documenting clear, actionable identity requirements for engineering teams. Advising on remediation of security issues and processes to address root causes. Provide troubleshooting as well as disaster recovery planning and tests Maintain identity and access operations for specific high risk systems Develop processes, guidelines, and documentation for consumption by internal teams Triage and management of IAM security events including, where necessary, participation in IAM security incident management. Maintenance of existing solutions, including operational improvements. Provide training, guidance and mentorship for other team members Security administration and auditing of privileged systems access. Identification and quantification of relevant risks to Starling systems and processes in the context of Starling's desired security posture. Interview Process Interviewing is a two way process and we want you to have the time and opportunity to get to know us, as much as we are getting to know you! Our interviews are conversational and we want to get the best from you, so come with questions and be curious. In general you can expect the below, following a chat with one of our Talent Team: First stage with the IAM leads (team fit) 45 minutes Second stage with additional members of the IAM team (skills and technical) 1 hour Final stage with Infosec Director and CISO 45 minutes Benefits 33 days holiday (including public holidays, which you can take when it works best for you) An extra day's holiday for your birthday Annual leave is increased with length of service, and you can choose to buy or sell up to five extra days off 16 hours paid volunteering time a year Salary sacrifice, company enhanced pension scheme Life insurance at 4x your salary & group income protection Private Medical Insurance with VitalityHealth including mental health support and cancer care. Partner benefits include discounts with Waitrose, Mr&Mrs Smith and Peloton Generous family-friendly policies Incentives refer a friend scheme Perkbox membership giving access to retail discounts, a wellness platform for physical and mental health, and weekly free and boosted perks Access to initiatives like Cycle to Work, Salary Sacrificed Gym partnerships and Electric Vehicle (EV) leasing About us You may be put off applying for a role because you don't tick every box. Forget that! So, if you're excited about working with us, but aren't sure if you're 100% there yet, get in touch anyway. We're on a mission to radically reshape banking - and that starts with our brilliant team. Whatever came before, we're proud to bring together people of all backgrounds and experiences who love working together to solve problems. Starling is an equal opportunity employer, and we're proud of our ongoing efforts to foster diversity & inclusion in the workplace. Individuals seeking employment at Starling are considered without regard to race, religion, national origin, age, sex, gender, gender identity, gender expression, sexual orientation, marital status, medical condition, ancestry, physical or mental disability, military or veteran status, or any other characteristic protected by applicable law. When you provide us with this information, you are doing so at your own consent, with full knowledge that we will process this personal data in accordance with our Privacy Notice. By submitting your application, you agree that Starling will collect your personal data for recruiting and related purposes. Our Privacy Notice explains what personal information we will process, where we will process your personal information, its purposes for processing your personal information, and the rights you can exercise over our use of your personal information.
OCC Group
Information Security Analyst - Staffordshire
OCC Group
Information Security Analyst - Staffordshire Cyber Analyst to join the Information Security Team. Someone who can take those outputs from projects / tools and drive improvements. Looking for an experienced, proactive Security Analyst to ensure the correct level of security integrity to protect systems, information, personal data and people from cyber-attacks and unauthorised access. Working with other departments to ensure security systems are secure, fit for purpose and protected to an optimal level. You will be responsible for driving the security scrutiny, culture, awareness, and adoption across the business. Security Toolsets and a Technical Mindset, you re not expected or required to be an expert in all areas but expected to have a solid understanding and grounding in security principals to adapt to the varied requirements Experienced in a wide variety of security software, systems, services and toolsets such as E-mail Security, EDR, NAC, IT/OT Segmentation, 365 etc along with an understanding of malware prevention, emerging threats, attacks and vulnerability management Understanding of Information Security best practice for elements including workstations, servers, cloud, networking, architecture, common protocols, and application security Can confidently perform security audits, both internal and external (e.g., third party and supplier assurance) and ensure recommendations are followed for continuous improvement Strong Incident Response Management skills including threat and vulnerability analysis Understanding of security frameworks such as NIST, and Cyber Essentials As the analyst you will work with the security manager and engineer the day-to-day running and monitoring of Information Security systems. Analyse and interpret outputs to identify security weaknesses and recommend continuous improvements and be involved in - Respond to Security Incidents, reports and alerts ensuring prompt containment and recovery. Plan and oversee regular security penetration testing against new and existing services to identify weaknesses and formulate plans and processes to minimise current and future risk Conduct regular security risk reviews and manage security remediation activity, internally on new IT/Business projects and with third parties This is working for an excellent client who offer progression and development. This is an office-based role in Staffordshire and you will join a small, dedicated security team.
Apr 01, 2026
Full time
Information Security Analyst - Staffordshire Cyber Analyst to join the Information Security Team. Someone who can take those outputs from projects / tools and drive improvements. Looking for an experienced, proactive Security Analyst to ensure the correct level of security integrity to protect systems, information, personal data and people from cyber-attacks and unauthorised access. Working with other departments to ensure security systems are secure, fit for purpose and protected to an optimal level. You will be responsible for driving the security scrutiny, culture, awareness, and adoption across the business. Security Toolsets and a Technical Mindset, you re not expected or required to be an expert in all areas but expected to have a solid understanding and grounding in security principals to adapt to the varied requirements Experienced in a wide variety of security software, systems, services and toolsets such as E-mail Security, EDR, NAC, IT/OT Segmentation, 365 etc along with an understanding of malware prevention, emerging threats, attacks and vulnerability management Understanding of Information Security best practice for elements including workstations, servers, cloud, networking, architecture, common protocols, and application security Can confidently perform security audits, both internal and external (e.g., third party and supplier assurance) and ensure recommendations are followed for continuous improvement Strong Incident Response Management skills including threat and vulnerability analysis Understanding of security frameworks such as NIST, and Cyber Essentials As the analyst you will work with the security manager and engineer the day-to-day running and monitoring of Information Security systems. Analyse and interpret outputs to identify security weaknesses and recommend continuous improvements and be involved in - Respond to Security Incidents, reports and alerts ensuring prompt containment and recovery. Plan and oversee regular security penetration testing against new and existing services to identify weaknesses and formulate plans and processes to minimise current and future risk Conduct regular security risk reviews and manage security remediation activity, internally on new IT/Business projects and with third parties This is working for an excellent client who offer progression and development. This is an office-based role in Staffordshire and you will join a small, dedicated security team.
Chapman Tate Associates
SOC Analyst (L2)
Chapman Tate Associates Aylesbury, Buckinghamshire
SOC Analyst (Level 2) Location: Aylesbury (Hybrid) Salary: Up to £45,000 (depending on experience) CTA are working with a Cyber Security company who are for a SOC Analyst (L2) to join their growing Security Operations Centre. This role is ideal for a junior analyst looking to build hands-on experience in monitoring, triaging, and responding to security incidents in a fast-paced, shift-based environment. Key Responsibilities Advanced Security Monitoring: Analyse SIEM alerts, logs, and security events to identify and respond to complex threats. Incident Response: Lead investigations, perform deep analysis, determine impact, and coordinate response activities. Threat Detection & Analysis: Develop and refine detection rules and use cases to improve threat visibility. Threat Hunting: Proactively hunt for advanced threats and indicators of compromise across the environment. Vulnerability Management: Identify, assess, and prioritise vulnerabilities and recommend remediation actions. Security Reporting: Produce detailed reports on incidents, trends, and overall security posture. Process Improvement & Automation: Enhance SOC processes, playbooks, and automation capabilities. Skills & Experience Strong experience with SIEM platforms (e.g., Microsoft Sentinel, Sumo Logic) Hands-on experience with EDR/XDR tools (e.g., CrowdStrike, Microsoft Defender) Solid understanding of: Incident response lifecycle Threat detection methodologies Networking protocols (TCP/IP, DNS, HTTP/S) Experience analysing logs from multiple sources (endpoints, network, cloud) Ability to independently investigate and resolve security incidents Scripting or automation experience (e.g., Python, PowerShell) is a plus Strong communication and stakeholder management skills What You'll Be Doing Acting as an escalation point for Level 1 analysts Working closely with customers and internal teams on incident investigations Tuning detection rules and improving alert quality Staying up to date with emerging threats, vulnerabilities, and attack techniques Supporting and mentoring junior analysts Requirements UK Citizenship (required due to the nature of the role) If you are looking for a progressive move with an established Cyber company, please do send your application through for consideration.
Apr 01, 2026
Full time
SOC Analyst (Level 2) Location: Aylesbury (Hybrid) Salary: Up to £45,000 (depending on experience) CTA are working with a Cyber Security company who are for a SOC Analyst (L2) to join their growing Security Operations Centre. This role is ideal for a junior analyst looking to build hands-on experience in monitoring, triaging, and responding to security incidents in a fast-paced, shift-based environment. Key Responsibilities Advanced Security Monitoring: Analyse SIEM alerts, logs, and security events to identify and respond to complex threats. Incident Response: Lead investigations, perform deep analysis, determine impact, and coordinate response activities. Threat Detection & Analysis: Develop and refine detection rules and use cases to improve threat visibility. Threat Hunting: Proactively hunt for advanced threats and indicators of compromise across the environment. Vulnerability Management: Identify, assess, and prioritise vulnerabilities and recommend remediation actions. Security Reporting: Produce detailed reports on incidents, trends, and overall security posture. Process Improvement & Automation: Enhance SOC processes, playbooks, and automation capabilities. Skills & Experience Strong experience with SIEM platforms (e.g., Microsoft Sentinel, Sumo Logic) Hands-on experience with EDR/XDR tools (e.g., CrowdStrike, Microsoft Defender) Solid understanding of: Incident response lifecycle Threat detection methodologies Networking protocols (TCP/IP, DNS, HTTP/S) Experience analysing logs from multiple sources (endpoints, network, cloud) Ability to independently investigate and resolve security incidents Scripting or automation experience (e.g., Python, PowerShell) is a plus Strong communication and stakeholder management skills What You'll Be Doing Acting as an escalation point for Level 1 analysts Working closely with customers and internal teams on incident investigations Tuning detection rules and improving alert quality Staying up to date with emerging threats, vulnerabilities, and attack techniques Supporting and mentoring junior analysts Requirements UK Citizenship (required due to the nature of the role) If you are looking for a progressive move with an established Cyber company, please do send your application through for consideration.
Akkodis
Integration Engineer (must be eligible for SC clearance)
Akkodis Stevenage, Hertfordshire
Integration Engineer (must be eligible for SC clearance) 550 per day Outside IR35 Contract / 6 months Hybrid - 3 days a week in Stevenage The Company Akkodis is a global leader in engineering, technology, and R&D, harnessing the power of connected data to drive digital transformation and innovation for a smarter, more sustainable future. As part of the Adecco Group, Akkodis employs over 50,000 engineers and digital specialists across 30 countries in North America, EMEA, and APAC. Our teams bring extensive cross-sector knowledge in critical technology areas such as mobility, software services, robotics, simulations, cybersecurity, AI, and data analytics, enabling clients to tackle complex challenges in today's rapidly evolving markets. The Role I am looking for an experienced Integration Engineer to join our software & integration team. In this role, you'll be responsible for the discovery, design, and documentation of integrations across our cloud platforms, enabling seamless data flow between systems. You will work closely with software engineers, business analysts, cloud architects, and QA teams to deliver scalable and maintainable integration solutions. This is a hybrid role with the successful candidate required to be in the Stevenage head office 3 days a week on average. You must either hold or be eligible for SC clearance. Responsibilities Design and develop integrations for implementation within a low-code/no-code environment Collaborate with business analysts and solution architects to translate business requirements into integration solutions Document integration designs, data flows, and technical specifications clearly and comprehensively Configure and maintain API-based, event-driven, and batch integrations between SaaS and on-premise systems Ensure integrations are secure and compliant, following best practices Participate in code reviews, testing for integration solutions Maintain awareness of low-code/no-code platform features and enhancements to recommend best-fit solutions Skills and Experience Proven experience with low-code/no-code integration platforms Must have experience and understanding of AWS / Azure / MuleSoft or other drag and drop architectures. Experience with MuleSoft if preferred although other integration platforms e.g. Boomi or Informatica will be considered Familiarity with API design and management, REST/SOAP services, and event driven architectures Experience in documenting integration solutions, data flows, and technical specifications Strong problem-solving skills and ability to work in cross-functional teams Must already hold or be eligible for SC clearance Please apply via the link or contact (url removed) for more information Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers in the UK. Modis Europe Ltd provide a variety of international solutions that connect clients to the best talent in the world. For all positions based in Switzerland, Modis Europe Ltd works with its licensed Swiss partner Accurity GmbH to ensure that candidate applications are handled in accordance with Swiss law. Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers. By applying for this role your details will be submitted to Modis International Ltd and/ or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website.
Apr 01, 2026
Contractor
Integration Engineer (must be eligible for SC clearance) 550 per day Outside IR35 Contract / 6 months Hybrid - 3 days a week in Stevenage The Company Akkodis is a global leader in engineering, technology, and R&D, harnessing the power of connected data to drive digital transformation and innovation for a smarter, more sustainable future. As part of the Adecco Group, Akkodis employs over 50,000 engineers and digital specialists across 30 countries in North America, EMEA, and APAC. Our teams bring extensive cross-sector knowledge in critical technology areas such as mobility, software services, robotics, simulations, cybersecurity, AI, and data analytics, enabling clients to tackle complex challenges in today's rapidly evolving markets. The Role I am looking for an experienced Integration Engineer to join our software & integration team. In this role, you'll be responsible for the discovery, design, and documentation of integrations across our cloud platforms, enabling seamless data flow between systems. You will work closely with software engineers, business analysts, cloud architects, and QA teams to deliver scalable and maintainable integration solutions. This is a hybrid role with the successful candidate required to be in the Stevenage head office 3 days a week on average. You must either hold or be eligible for SC clearance. Responsibilities Design and develop integrations for implementation within a low-code/no-code environment Collaborate with business analysts and solution architects to translate business requirements into integration solutions Document integration designs, data flows, and technical specifications clearly and comprehensively Configure and maintain API-based, event-driven, and batch integrations between SaaS and on-premise systems Ensure integrations are secure and compliant, following best practices Participate in code reviews, testing for integration solutions Maintain awareness of low-code/no-code platform features and enhancements to recommend best-fit solutions Skills and Experience Proven experience with low-code/no-code integration platforms Must have experience and understanding of AWS / Azure / MuleSoft or other drag and drop architectures. Experience with MuleSoft if preferred although other integration platforms e.g. Boomi or Informatica will be considered Familiarity with API design and management, REST/SOAP services, and event driven architectures Experience in documenting integration solutions, data flows, and technical specifications Strong problem-solving skills and ability to work in cross-functional teams Must already hold or be eligible for SC clearance Please apply via the link or contact (url removed) for more information Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers in the UK. Modis Europe Ltd provide a variety of international solutions that connect clients to the best talent in the world. For all positions based in Switzerland, Modis Europe Ltd works with its licensed Swiss partner Accurity GmbH to ensure that candidate applications are handled in accordance with Swiss law. Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers. By applying for this role your details will be submitted to Modis International Ltd and/ or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website.
Hays Specialist Recruitment
IT SECURITY ANALYST
Hays Specialist Recruitment City, London
Job Purpose: This role is responsible for overseeing and enhancing the security of our IT systems, data, and networks. You will conduct regular security audits, assessments, and tests, and identify and resolve any vulnerabilities or breaches.You will also develop and implement security policies, procedures, and standards, and ensure compliance with the relevant laws and regulations, and train and educate employees on the best practices and awareness of IT security. Operating Environment: The role operates within the IT Services Team, The IT Services Team includes specialist staff delivering core outputs that are both external-facing and internal key enablers. Framework & Boundaries: The role is responsible for improving the quality, wellbeing and efficiency of our IT Security. The role has external-facing responsibilities and is required and authorised to act as a representative for the organisation. Key accountabilities: Monitor and Inspect: Regularly monitor the network for security threats or breaches. Policy Development: Develop and implement security policies and procedures to safeguard data and systems. Vulnerability Testing: Perform regular vulnerability testing and risk assessments to identify and mitigate security risks. Incident Response: Investigate security incidents and provide post-event analysis and recommendations. Security Tools Management: Manage and maintain Firewalls, intrusion detection and prevention systems, antivirus software, and other security tools. Compliance: Ensure compliance with industry regulations and standards. Training: Train technical and non-technical employees on security protocols, procedures, and best practices. Disaster Recovery: Participate in disaster recovery planning and testing to ensure business continuity in the event of a security incident. Job impact: Risk Mitigation: Implementing robust security measures to significantly reduce the risk of data breaches, cyber-attacks, and other security incidents. Proactive Threat Management: Identifying and addressing vulnerabilities before they can be exploited, thereby enhancing the overall security posture of the organisation. Ensuring that the organisation complies with relevant laws, regulations, and industry standards (eg, GDPR, HIPAA, PCI-DSS), thereby avoiding legal penalties and enhancing trust with stakeholders. Maintaining a state of readiness for security audits and assessments, ensuring that all security controls and measures are well-documented and effective. Developing and implementing disaster recovery plans to ensure business continuity in the event of a security incident or data loss. Efficiently managing and mitigating the impact of security incidents to minimise downtime and operational disruption. Knowledge and experience: Technical Proficiency: In-depth knowledge of network security software - Meraki Cloud, Cloudflare, Mimecast, encryption technologies, and other security hardware and software tools. Current Trends: Stay current with the latest trends in cybersecurity threats and defence strategies. Problem-Solving: Strong problem-solving skills and the ability to work well under pressure. Communication: Good communication skills to effectively train employees and coordinate with other departments. Functional/technical skills: Firewall Management: Proficiency in configuring and managing Firewalls to protect network boundaries. Intrusion Detection/Prevention Systems (IDS/IPS): Experience with IDS/IPS to monitor and respond to potential threats. VPNs and Remote Access: Knowledge of setting up and managing Virtual Private Networks (VPNs) and secure remote access solutions. Patch Management: Ability to manage and deploy security patches and updates to systems and applications. Endpoint Security: Experience with endpoint protection solutions, such as antivirus and anti-malware software. Proficiency in implementing and managing encryption technologies to protect data at rest and in transit. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found on our website.
Mar 30, 2026
Full time
Job Purpose: This role is responsible for overseeing and enhancing the security of our IT systems, data, and networks. You will conduct regular security audits, assessments, and tests, and identify and resolve any vulnerabilities or breaches.You will also develop and implement security policies, procedures, and standards, and ensure compliance with the relevant laws and regulations, and train and educate employees on the best practices and awareness of IT security. Operating Environment: The role operates within the IT Services Team, The IT Services Team includes specialist staff delivering core outputs that are both external-facing and internal key enablers. Framework & Boundaries: The role is responsible for improving the quality, wellbeing and efficiency of our IT Security. The role has external-facing responsibilities and is required and authorised to act as a representative for the organisation. Key accountabilities: Monitor and Inspect: Regularly monitor the network for security threats or breaches. Policy Development: Develop and implement security policies and procedures to safeguard data and systems. Vulnerability Testing: Perform regular vulnerability testing and risk assessments to identify and mitigate security risks. Incident Response: Investigate security incidents and provide post-event analysis and recommendations. Security Tools Management: Manage and maintain Firewalls, intrusion detection and prevention systems, antivirus software, and other security tools. Compliance: Ensure compliance with industry regulations and standards. Training: Train technical and non-technical employees on security protocols, procedures, and best practices. Disaster Recovery: Participate in disaster recovery planning and testing to ensure business continuity in the event of a security incident. Job impact: Risk Mitigation: Implementing robust security measures to significantly reduce the risk of data breaches, cyber-attacks, and other security incidents. Proactive Threat Management: Identifying and addressing vulnerabilities before they can be exploited, thereby enhancing the overall security posture of the organisation. Ensuring that the organisation complies with relevant laws, regulations, and industry standards (eg, GDPR, HIPAA, PCI-DSS), thereby avoiding legal penalties and enhancing trust with stakeholders. Maintaining a state of readiness for security audits and assessments, ensuring that all security controls and measures are well-documented and effective. Developing and implementing disaster recovery plans to ensure business continuity in the event of a security incident or data loss. Efficiently managing and mitigating the impact of security incidents to minimise downtime and operational disruption. Knowledge and experience: Technical Proficiency: In-depth knowledge of network security software - Meraki Cloud, Cloudflare, Mimecast, encryption technologies, and other security hardware and software tools. Current Trends: Stay current with the latest trends in cybersecurity threats and defence strategies. Problem-Solving: Strong problem-solving skills and the ability to work well under pressure. Communication: Good communication skills to effectively train employees and coordinate with other departments. Functional/technical skills: Firewall Management: Proficiency in configuring and managing Firewalls to protect network boundaries. Intrusion Detection/Prevention Systems (IDS/IPS): Experience with IDS/IPS to monitor and respond to potential threats. VPNs and Remote Access: Knowledge of setting up and managing Virtual Private Networks (VPNs) and secure remote access solutions. Patch Management: Ability to manage and deploy security patches and updates to systems and applications. Endpoint Security: Experience with endpoint protection solutions, such as antivirus and anti-malware software. Proficiency in implementing and managing encryption technologies to protect data at rest and in transit. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found on our website.
Hays Technology
Cyber Security Consultant -AI, CISSP, Risk
Hays Technology
Cyber Security Consultant -AI, CISSP, Risk Up to 495 per day (Inside IR35) London / Hybrid (3 days per week onsite) 6 Months My client is a London-based Insurer who are looking to hire a Cyber Security Consultant with CISSP certification, working knowledge of AI (Artificial Intelligence) and Risk to work on a new AI solution being implemented. Key Requirements: Proven experience in Cyber Security as a Cyber Security Analyst / Cyber Security Consultant Working knowledge of AI (Artificial Intelligence) within IT Security / Info Security / Cyber Security CISSP / CISM certification Previous experience of working in a Cloud related environment Experience of conducting Risk Assessments within a Technology environment Strong knowledge of Risk Management frameworks (ISO 27005, EBIOS) Excellent communication skills with ability to translate technical jargon to non-technical audiences Strong Stakeholder Management skills Flexible approach towards hybrid working (must be able to commit to 3 days per week onsite each week) Nice to have: Familiarity of working within Agile frameworks (SAFe) Proven experience in the Insurance industry Immediate availability Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
Oct 07, 2025
Contractor
Cyber Security Consultant -AI, CISSP, Risk Up to 495 per day (Inside IR35) London / Hybrid (3 days per week onsite) 6 Months My client is a London-based Insurer who are looking to hire a Cyber Security Consultant with CISSP certification, working knowledge of AI (Artificial Intelligence) and Risk to work on a new AI solution being implemented. Key Requirements: Proven experience in Cyber Security as a Cyber Security Analyst / Cyber Security Consultant Working knowledge of AI (Artificial Intelligence) within IT Security / Info Security / Cyber Security CISSP / CISM certification Previous experience of working in a Cloud related environment Experience of conducting Risk Assessments within a Technology environment Strong knowledge of Risk Management frameworks (ISO 27005, EBIOS) Excellent communication skills with ability to translate technical jargon to non-technical audiences Strong Stakeholder Management skills Flexible approach towards hybrid working (must be able to commit to 3 days per week onsite each week) Nice to have: Familiarity of working within Agile frameworks (SAFe) Proven experience in the Insurance industry Immediate availability Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
Triumph Consultants Ltd
Senior Cyber Security Analyst
Triumph Consultants Ltd
Senior Cyber Security Analyst Location: London hybrid working IR35: Inside via Triumph Consultants you will be paid PAYE for the length of the 3 month contract It is essential for candidates to have advanced proficiency in using Splunk for security monitoring, log analysis, threat detection, and reporting The role: The Cyber Defence team at the delivers threat intelligence, threat detection, incident response, and vulnerability management to defend both internal IT infrastructure and citizen-facing services. They are looking for a Senior Cyber Security Analyst with proven experience in incident response and Splunk to take a leading role in strengthening the organisation's cyber defence capability. Key Accountabilities: Lead investigations into security alerts and cyber incidents. Perform forensic analysis of systems, files, network traffic, and cloud environments. Drive technical response actions including containment, eradication, and recovery. Coordinate cyber incident responses across teams and stakeholders. Identify lessons learned and embed continual improvement. Develop and update incident response playbooks and knowledge base articles. Act as an escalation point and mentor for security analysts. Provide leadership and line management within the team. Join the out-of-hours on-call rota to support 24/7 incident response. Key Criteria: 5+ years' experience investigating and responding to cyber incidents in large organisations. Strong track record with incident response coordination. Significant hands-on experience with Splunk and security tools (eg, EDR, SIEM). Analytical, problem-solving, and forensic investigation skills. Proven experience coaching or mentoring junior staff. Strong understanding of threat actor tools, techniques, and procedures. Experience of cloud environments such as AWS Excellent written and verbal communication skills. How to Apply Quote the Job Title and Reference Number in your application. Submit your CV in Word format. Applications are reviewed on a rolling basis-early submission is recommended. We will also add your details to our mail out lists. Please note you may receive details of roles outside of your immediate vicinity, as many candidates are able to relocate temporarily for work. Please disregard any such emails that are not of interest and let us know if you would rather not receive such mailouts and/or if you wish us to delete your details and prefer to apply direct to our advertised roles. If you do not hear from us within three working days, unfortunately your application has not been shortlisted on this occasion. Thank you for your interest in working with us.
Oct 07, 2025
Contractor
Senior Cyber Security Analyst Location: London hybrid working IR35: Inside via Triumph Consultants you will be paid PAYE for the length of the 3 month contract It is essential for candidates to have advanced proficiency in using Splunk for security monitoring, log analysis, threat detection, and reporting The role: The Cyber Defence team at the delivers threat intelligence, threat detection, incident response, and vulnerability management to defend both internal IT infrastructure and citizen-facing services. They are looking for a Senior Cyber Security Analyst with proven experience in incident response and Splunk to take a leading role in strengthening the organisation's cyber defence capability. Key Accountabilities: Lead investigations into security alerts and cyber incidents. Perform forensic analysis of systems, files, network traffic, and cloud environments. Drive technical response actions including containment, eradication, and recovery. Coordinate cyber incident responses across teams and stakeholders. Identify lessons learned and embed continual improvement. Develop and update incident response playbooks and knowledge base articles. Act as an escalation point and mentor for security analysts. Provide leadership and line management within the team. Join the out-of-hours on-call rota to support 24/7 incident response. Key Criteria: 5+ years' experience investigating and responding to cyber incidents in large organisations. Strong track record with incident response coordination. Significant hands-on experience with Splunk and security tools (eg, EDR, SIEM). Analytical, problem-solving, and forensic investigation skills. Proven experience coaching or mentoring junior staff. Strong understanding of threat actor tools, techniques, and procedures. Experience of cloud environments such as AWS Excellent written and verbal communication skills. How to Apply Quote the Job Title and Reference Number in your application. Submit your CV in Word format. Applications are reviewed on a rolling basis-early submission is recommended. We will also add your details to our mail out lists. Please note you may receive details of roles outside of your immediate vicinity, as many candidates are able to relocate temporarily for work. Please disregard any such emails that are not of interest and let us know if you would rather not receive such mailouts and/or if you wish us to delete your details and prefer to apply direct to our advertised roles. If you do not hear from us within three working days, unfortunately your application has not been shortlisted on this occasion. Thank you for your interest in working with us.
Parker Shaw
Senior + Associate Security Analysts - Security-cleared
Parker Shaw
We are currently recruiting for Senior Cyber Security Analysts and Associate Security Analysts - both working a 3-month contract for our client 3 days per week on-site in London. As a senior security analyst with responsibility for incident response, you will: lead the investigation of security alerts to understand the nature and extent of possible cyber incidents lead the forensic analysis of systems, files, network traffic and cloud environments lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions support the wider coordination of cyber incidents review previous incidents to identify lessons and actions identify and deliver opportunities for continual improvement of the incident response capability work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities develop and update internal plans, playbooks and knowledge base articles act as an escalation point for, and provide coaching and mentoring to, security analysts be responsible for leadership and line management of security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join. We're interested in people who have: significant experience investigating and responding to cyber incidents significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents experience managing and coordinating the response to cyber incidents experience coaching and mentoring junior staff an in-depth understanding of the tools, techniques and procedures used by threat actors excellent analytical and problem solving skills excellent verbal and written communication skills It's desirable, but not essential, that you have: experience with Splunk experience working in an Agile environment experience with cloud environments such as AWS As an associate security analyst you will: triage and investigate cyber security alerts and reports from users use a variety of techniques to analyse systems, files, network traffic and cloud environments and understand the nature and extent of possible cyber incidents support the technical response to cyber incidents by identifying and implementing (or supporting the implementation of) containment, eradication and recovery actions support the coordination of cyber incidents contribute to post-incident reviews to identify lessons and actions identify opportunities for, and support the delivery of, continual improvements to the incident investigation and response capability work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities contribute to internal plans, playbooks and knowledge base articles act as an escalation point for, and provide coaching and mentoring to, apprentice security analysts be responsible for line management of apprentice security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join We're interested in people who have: experience investigating and responding to cyber incidents experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience with SIEM tools (experience of Splunk preferred but experience of Microsoft Sentinel or an equivalent SIEM tool is acceptable) an understanding of the tools, techniques and procedures commonly used by threat actors good analytical and problem-solving skills good verbal and written communication skills It's desirable, but not essential, that you have: experience with Splunk experience working in an Agile environment experience with cloud environments such as AWS If you feel you have the skills and experience needed for this role; please do apply now.
Oct 06, 2025
Contractor
We are currently recruiting for Senior Cyber Security Analysts and Associate Security Analysts - both working a 3-month contract for our client 3 days per week on-site in London. As a senior security analyst with responsibility for incident response, you will: lead the investigation of security alerts to understand the nature and extent of possible cyber incidents lead the forensic analysis of systems, files, network traffic and cloud environments lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions support the wider coordination of cyber incidents review previous incidents to identify lessons and actions identify and deliver opportunities for continual improvement of the incident response capability work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities develop and update internal plans, playbooks and knowledge base articles act as an escalation point for, and provide coaching and mentoring to, security analysts be responsible for leadership and line management of security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join. We're interested in people who have: significant experience investigating and responding to cyber incidents significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents experience managing and coordinating the response to cyber incidents experience coaching and mentoring junior staff an in-depth understanding of the tools, techniques and procedures used by threat actors excellent analytical and problem solving skills excellent verbal and written communication skills It's desirable, but not essential, that you have: experience with Splunk experience working in an Agile environment experience with cloud environments such as AWS As an associate security analyst you will: triage and investigate cyber security alerts and reports from users use a variety of techniques to analyse systems, files, network traffic and cloud environments and understand the nature and extent of possible cyber incidents support the technical response to cyber incidents by identifying and implementing (or supporting the implementation of) containment, eradication and recovery actions support the coordination of cyber incidents contribute to post-incident reviews to identify lessons and actions identify opportunities for, and support the delivery of, continual improvements to the incident investigation and response capability work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities contribute to internal plans, playbooks and knowledge base articles act as an escalation point for, and provide coaching and mentoring to, apprentice security analysts be responsible for line management of apprentice security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join We're interested in people who have: experience investigating and responding to cyber incidents experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience with SIEM tools (experience of Splunk preferred but experience of Microsoft Sentinel or an equivalent SIEM tool is acceptable) an understanding of the tools, techniques and procedures commonly used by threat actors good analytical and problem-solving skills good verbal and written communication skills It's desirable, but not essential, that you have: experience with Splunk experience working in an Agile environment experience with cloud environments such as AWS If you feel you have the skills and experience needed for this role; please do apply now.
Akkodis
Principal Cyber Security Incident Response Analyst
Akkodis
Principal Cyber Security Incident Response Analyst 60,000 - 70,000 Full Time / Permanent West Midlands / Hybrid (1-2 days a month in the office ideally) The Role I am looking for a driven and experienced Principal Cyber Security Incident Response Analyst to join a large nationally recognised brand head quartered in the West Midlands. As a Principal Cyber Security Incident Response Analyst, you will play a pivotal role in protecting critical systems, assets, and people from cyber security threats. You'll be part of a world-class team, working at the forefront of threat detection and response. We are ideally looking for someone Midlands based who can be on site in Warwickshire 1-2 days a month on average. Responsibilities: Provide leadership and mentorship to Analysts and Senior Analysts, fostering a culture of excellence and continuous development. Drive the evolution and enhancement of the Cyber Security Incident Response function, ensuring the team consistently meets and exceeds key performance indicators. Lead investigations and remediation efforts for cyber security incidents and alerts across diverse sources, including network, endpoint, cloud environments, and threat intelligence feeds. Perform in-depth trend analysis to identify patterns and inform improvements in organisational controls and threat detection capabilities. Develop, maintain, and continuously improve documentation and reporting frameworks to support transparency, consistency, and strategic decision-making. Experience required: Previous experience in a similar Cyber Incident Response Analyst role, preferably in a senior or lead capacity. Strong experience in security monitoring across diverse systems and environments, including cloud and on-premises. Proven leadership in incident response within SOC settings. Deep understanding of the cyber threat landscape, attack vectors, and detection techniques. Proficient in cybersecurity tools, regulations, and compliance standards. Excellent communication and stakeholder engagement skills, with the ability to convey technical insights to varied audiences. Please apply via the link or contact (url removed) for more information Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers in the UK. Modis Europe Ltd provide a variety of international solutions that connect clients to the best talent in the world. For all positions based in Switzerland, Modis Europe Ltd works with its licensed Swiss partner Accurity GmbH to ensure that candidate applications are handled in accordance with Swiss law. Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers. By applying for this role your details will be submitted to Modis International Ltd and/ or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website.
Oct 04, 2025
Full time
Principal Cyber Security Incident Response Analyst 60,000 - 70,000 Full Time / Permanent West Midlands / Hybrid (1-2 days a month in the office ideally) The Role I am looking for a driven and experienced Principal Cyber Security Incident Response Analyst to join a large nationally recognised brand head quartered in the West Midlands. As a Principal Cyber Security Incident Response Analyst, you will play a pivotal role in protecting critical systems, assets, and people from cyber security threats. You'll be part of a world-class team, working at the forefront of threat detection and response. We are ideally looking for someone Midlands based who can be on site in Warwickshire 1-2 days a month on average. Responsibilities: Provide leadership and mentorship to Analysts and Senior Analysts, fostering a culture of excellence and continuous development. Drive the evolution and enhancement of the Cyber Security Incident Response function, ensuring the team consistently meets and exceeds key performance indicators. Lead investigations and remediation efforts for cyber security incidents and alerts across diverse sources, including network, endpoint, cloud environments, and threat intelligence feeds. Perform in-depth trend analysis to identify patterns and inform improvements in organisational controls and threat detection capabilities. Develop, maintain, and continuously improve documentation and reporting frameworks to support transparency, consistency, and strategic decision-making. Experience required: Previous experience in a similar Cyber Incident Response Analyst role, preferably in a senior or lead capacity. Strong experience in security monitoring across diverse systems and environments, including cloud and on-premises. Proven leadership in incident response within SOC settings. Deep understanding of the cyber threat landscape, attack vectors, and detection techniques. Proficient in cybersecurity tools, regulations, and compliance standards. Excellent communication and stakeholder engagement skills, with the ability to convey technical insights to varied audiences. Please apply via the link or contact (url removed) for more information Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers in the UK. Modis Europe Ltd provide a variety of international solutions that connect clients to the best talent in the world. For all positions based in Switzerland, Modis Europe Ltd works with its licensed Swiss partner Accurity GmbH to ensure that candidate applications are handled in accordance with Swiss law. Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers. By applying for this role your details will be submitted to Modis International Ltd and/ or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website.
83Zero Ltd
IT Security Analyst
83Zero Ltd Thornaby, Yorkshire
IT Security Analyst Location: Hybrid - Middlesbrough Salary: 50,000 - 60,000 + Benefits 83zero are partnered with a market-leading software company who are on a mission to transform the construction and related industries through their end-to-end digital solutions. With teams across the UK, Europe, USA and India, they are delivering large-scale transformation projects on a global scale and are continuing to expand. We are now looking for a highly organised and detail-driven IT Security Analyst to join their growing security function. This role plays a key part in securing customer trust and supplier integrity, ensuring compliance with recognised frameworks, and supporting wider security initiatives. The Role Own and manage responses to customer security questionnaires (SIG, CAIQ, bespoke). Work cross-functionally with Legal, Compliance, Procurement, Product and Security teams. Maintain the security assurance matrix in line with ISO 27001, Cyber Essentials, and SOC 2. Act as the key point of contact for security assurance queries. Conduct vendor risk assessments against ISO 27001, NIST, and CIS Controls. Manage the third-party due diligence programme, including onboarding and periodic reviews. Track and publish key security metrics such as risk severity, SLA adherence, and turnaround times. Provide audit artefacts and support internal/external audits. Contribute to broader security initiatives and continuous improvement within the organisation. About You 3+ years' experience in Information Security, GRC, or Vendor Risk Management. Strong experience issuing or responding to security questionnaires. Knowledge of ISO 27001 Annex A, SOC 2, and GDPR/CCPA. Excellent communication skills, able to translate technical risk to non-technical stakeholders. Eligible to work in the UK and able to pass background checks. Desirable: Certifications such as CRISC, CISSP, CISA, or ISO 27001 Lead Auditor. Familiarity with SaaS/cloud platforms (AWS, Azure, GCP). Understanding of secure software supply chains (SBOM, SLSA). What's on Offer 50,000 - 55,000 base salary 25 days annual leave + public holidays (increasing with service) Matched pension scheme Private medical insurance & life assurance Fitness allowance Paid study leave & volunteering days Flexible hybrid working Excellent career development and training opportunities
Oct 03, 2025
Full time
IT Security Analyst Location: Hybrid - Middlesbrough Salary: 50,000 - 60,000 + Benefits 83zero are partnered with a market-leading software company who are on a mission to transform the construction and related industries through their end-to-end digital solutions. With teams across the UK, Europe, USA and India, they are delivering large-scale transformation projects on a global scale and are continuing to expand. We are now looking for a highly organised and detail-driven IT Security Analyst to join their growing security function. This role plays a key part in securing customer trust and supplier integrity, ensuring compliance with recognised frameworks, and supporting wider security initiatives. The Role Own and manage responses to customer security questionnaires (SIG, CAIQ, bespoke). Work cross-functionally with Legal, Compliance, Procurement, Product and Security teams. Maintain the security assurance matrix in line with ISO 27001, Cyber Essentials, and SOC 2. Act as the key point of contact for security assurance queries. Conduct vendor risk assessments against ISO 27001, NIST, and CIS Controls. Manage the third-party due diligence programme, including onboarding and periodic reviews. Track and publish key security metrics such as risk severity, SLA adherence, and turnaround times. Provide audit artefacts and support internal/external audits. Contribute to broader security initiatives and continuous improvement within the organisation. About You 3+ years' experience in Information Security, GRC, or Vendor Risk Management. Strong experience issuing or responding to security questionnaires. Knowledge of ISO 27001 Annex A, SOC 2, and GDPR/CCPA. Excellent communication skills, able to translate technical risk to non-technical stakeholders. Eligible to work in the UK and able to pass background checks. Desirable: Certifications such as CRISC, CISSP, CISA, or ISO 27001 Lead Auditor. Familiarity with SaaS/cloud platforms (AWS, Azure, GCP). Understanding of secure software supply chains (SBOM, SLSA). What's on Offer 50,000 - 55,000 base salary 25 days annual leave + public holidays (increasing with service) Matched pension scheme Private medical insurance & life assurance Fitness allowance Paid study leave & volunteering days Flexible hybrid working Excellent career development and training opportunities
Berkeley Square IT Ltd
Senior Cyber Security Consultant
Berkeley Square IT Ltd
Senior Cyber Security Analyst - Central Gov (Contract) Incident Response | Threat Detection | Forensics | SIEM The Cyber Defence team is hiring a Senior Cyber Security Analyst to lead on incident response and protect critical citizen-facing services. You'll: Investigate and respond to cyber incidents at scale Lead forensic analysis (systems, files, network, cloud) Coordinate containment, eradication & recovery actions Mentor Junior Analysts and shape IR playbooks Must have strong Splunk skills. Requirements: Strong incident response & cyber investigation experience Skilled with EDR/SIEM tools - splunk Deep knowledge of attacker TTPs Excellent problem solving & communication London | Competitive Day Rate | SC Clearance required | On-call rota
Oct 03, 2025
Contractor
Senior Cyber Security Analyst - Central Gov (Contract) Incident Response | Threat Detection | Forensics | SIEM The Cyber Defence team is hiring a Senior Cyber Security Analyst to lead on incident response and protect critical citizen-facing services. You'll: Investigate and respond to cyber incidents at scale Lead forensic analysis (systems, files, network, cloud) Coordinate containment, eradication & recovery actions Mentor Junior Analysts and shape IR playbooks Must have strong Splunk skills. Requirements: Strong incident response & cyber investigation experience Skilled with EDR/SIEM tools - splunk Deep knowledge of attacker TTPs Excellent problem solving & communication London | Competitive Day Rate | SC Clearance required | On-call rota
Associate Security Analyst
GTC RECRUITMENT LIMITED
Our client is seeking an experienced Associate Security Analyst to join their Cyber Defence team. This is a hands-on role where you will investigate and respond to cyber security incidents that could impact critical systems and services across the UK. You will play a key part in identifying threats, supporting incident response, and helping to continually improve the organisation's cyber defence capabilities. The role also involves mentoring apprentice analysts and joining an out-of-hours on-call rota to ensure 24/7 coverage of potential cyber incidents. Key Responsibilities Investigate and triage cyber security alerts and user reports. Analyse systems, files, network traffic, and cloud environments to determine the extent of incidents. Support technical responses to incidents, including containment, eradication, and recovery. Contribute to post-incident reviews and develop lessons learned. Create and improve incident response playbooks and knowledge base articles. Work closely with wider Cyber Defence functions to strengthen security operations. Act as an escalation point for apprentice security analysts, providing coaching, mentoring, and line management. What We're Looking For 2-3 years' experience investigating and responding to cyber incidents. Hands-on use of SIEM tools (Splunk preferred, Microsoft Sentinel or equivalent acceptable). Experience with EDR solutions to support incident investigation. Understanding of threat actor tools, techniques, and procedures (TTPs). Strong analytical and problem-solving skills. Excellent written and verbal communication skills. Desirable skills: Advanced Splunk experience or certification. Experience in Agile environments. Familiarity with cloud environments such as AWS. Interview Process The interview will be conducted via Microsoft Teams and will consist of: A short competency-based discussion. A practical Splunk exercise to investigate a simulated cybersecurity scenario. A short technical quiz covering general cybersecurity knowledge.
Oct 03, 2025
Full time
Our client is seeking an experienced Associate Security Analyst to join their Cyber Defence team. This is a hands-on role where you will investigate and respond to cyber security incidents that could impact critical systems and services across the UK. You will play a key part in identifying threats, supporting incident response, and helping to continually improve the organisation's cyber defence capabilities. The role also involves mentoring apprentice analysts and joining an out-of-hours on-call rota to ensure 24/7 coverage of potential cyber incidents. Key Responsibilities Investigate and triage cyber security alerts and user reports. Analyse systems, files, network traffic, and cloud environments to determine the extent of incidents. Support technical responses to incidents, including containment, eradication, and recovery. Contribute to post-incident reviews and develop lessons learned. Create and improve incident response playbooks and knowledge base articles. Work closely with wider Cyber Defence functions to strengthen security operations. Act as an escalation point for apprentice security analysts, providing coaching, mentoring, and line management. What We're Looking For 2-3 years' experience investigating and responding to cyber incidents. Hands-on use of SIEM tools (Splunk preferred, Microsoft Sentinel or equivalent acceptable). Experience with EDR solutions to support incident investigation. Understanding of threat actor tools, techniques, and procedures (TTPs). Strong analytical and problem-solving skills. Excellent written and verbal communication skills. Desirable skills: Advanced Splunk experience or certification. Experience in Agile environments. Familiarity with cloud environments such as AWS. Interview Process The interview will be conducted via Microsoft Teams and will consist of: A short competency-based discussion. A practical Splunk exercise to investigate a simulated cybersecurity scenario. A short technical quiz covering general cybersecurity knowledge.
Damia Group LTD
Senior Cyber Security Analyst
Damia Group LTD
*Senior Cyber Security Analyst - £600-800pd (experience dependent) INSIDE IR35 - 3 month initial contract - London (3 days per week onsite)* Please note: Due to the nature of the role, we are ideally looking for candidates to hold an active SC clearance. We are looking for a SC Cleared Senior Cyber Security Analyst with SPLUNK experience to join our central government client on an initial 3-month contract. You must have experience investigating and responding to cyber incidents, co-ordinating incident response in a large organisation. We have both a Senior and mid-level role available. Main responsibilities: As a senior security analyst with responsibility for incident response, you will: Lead the investigation of security alerts to understand the nature and extent of possible cyber incidents Lead the forensic analysis of systems, files, network traffic and cloud environment Lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions Support the wider coordination of cyber incidents Review previous incidents to identify lessons and actions Identify and deliver opportunities for continual improvement of the incident response capability Work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities Develop and update internal plans, playbooks and knowledge base articles Act as an escalation point for, and provide coaching and mentoring to, security analysts Be responsible for leadership and line management of security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join. Essential skills and experience: SPLUNK EDR (Endpoint Detection and Response) Significant experience investigating and responding to cyber incidents Significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience managing and coordinating the response to cyber incidents Experience coaching and mentoring junior staff An in-depth understanding of the tools, techniques and procedures used by threat actors Damia Group Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept our Data Protection Policy which can be found on our website. Please note that no terminology in this advert is intended to discriminate on the grounds of a person's gender, marital status, race, religion, colour, age, disability or sexual orientation. Every candidate will be assessed only in accordance with their merits, qualifications and ability to perform the duties of the job. Damia Group is acting as an Employment Business in relation to this vacancy and in accordance to Conduct Regulations 2003.
Oct 03, 2025
Contractor
*Senior Cyber Security Analyst - £600-800pd (experience dependent) INSIDE IR35 - 3 month initial contract - London (3 days per week onsite)* Please note: Due to the nature of the role, we are ideally looking for candidates to hold an active SC clearance. We are looking for a SC Cleared Senior Cyber Security Analyst with SPLUNK experience to join our central government client on an initial 3-month contract. You must have experience investigating and responding to cyber incidents, co-ordinating incident response in a large organisation. We have both a Senior and mid-level role available. Main responsibilities: As a senior security analyst with responsibility for incident response, you will: Lead the investigation of security alerts to understand the nature and extent of possible cyber incidents Lead the forensic analysis of systems, files, network traffic and cloud environment Lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions Support the wider coordination of cyber incidents Review previous incidents to identify lessons and actions Identify and deliver opportunities for continual improvement of the incident response capability Work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities Develop and update internal plans, playbooks and knowledge base articles Act as an escalation point for, and provide coaching and mentoring to, security analysts Be responsible for leadership and line management of security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join. Essential skills and experience: SPLUNK EDR (Endpoint Detection and Response) Significant experience investigating and responding to cyber incidents Significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience managing and coordinating the response to cyber incidents Experience coaching and mentoring junior staff An in-depth understanding of the tools, techniques and procedures used by threat actors Damia Group Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept our Data Protection Policy which can be found on our website. Please note that no terminology in this advert is intended to discriminate on the grounds of a person's gender, marital status, race, religion, colour, age, disability or sexual orientation. Every candidate will be assessed only in accordance with their merits, qualifications and ability to perform the duties of the job. Damia Group is acting as an Employment Business in relation to this vacancy and in accordance to Conduct Regulations 2003.
Aspect Resources
Associate Security Analyst - SC
Aspect Resources
J ob Title: Associate Security Analyst - SC Location: Hybrid/London - 3 days a week on site Contract Duration : 3 months initially Daily Rate: £650/day (Umbrella - Maximum) IR35 Status: Inside IR35 Minimum requirement : SPLUNK (2-3 years' experience) Knowledge of Cyber security threats Soft skills Security Clearance: SC As an associate security analyst you will: Triage and investigate cyber security alerts and reports from users Use a variety of techniques to analyse systems, files, network traffic and cloud environments and understand the nature and extent of possible cyber incidents Support the technical response to cyber incidents by identifying and implementing (or supporting the implementation of) containment, eradication and recovery actions Support the coordination of cyber incidents Contribute to post-incident reviews to identify lessons and actions Identify opportunities for, and support the delivery of, continual improvements to the incident investigation and response capability Work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities Contribute to internal plans, playbooks and knowledge base articles Act as an escalation point for, and provide coaching and mentoring to, apprentice security analysts Be responsible for line management of apprentice security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join We're interested in people who have: Experience investigating and responding to cyber incidents Experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience with SIEM tools (experience of Splunk preferred but experience of Microsoft Sentinel or an equivalent SIEM tool is acceptable) An understanding of the tools, techniques and procedures commonly used by threat actors Good analytical and problem-solving skills Good verbal and written communication skills Experience with Splunk Experience working in an Agile environments Experience with cloud environments such as AWS Disability Confident As a member of the disability confident scheme, CLIENT guarantees to interview all candidates who have a disability and who meet all the essential criteria for the vacancy. In cases where we have a high volume of candidates who have a disability who meet all the essential criteria, we will interview the best candidates from within that group. Armed Forces Covenant CLIENT is proud to support the Armed Forces Covenant and as such, we guarantee to interview all veterans or spouses/partners of military personnel who meet all the essential criteria for the vacancy. In cases where we have a high volume of ex-military candidates/military spouses or partners, who meet all of the essential criteria, we will interview the best candidates from within that group. If you qualify for the above, please notify us. We will be in touch to discuss your suitability and arrange your Guaranteed Interview. Should you require reasonable adjustments at any point during the recruitment process or if there is a more accessible way for us to communicate, please do let me know. To apply for this role please submit your latest CV or contact Aspect Resources
Oct 03, 2025
Contractor
J ob Title: Associate Security Analyst - SC Location: Hybrid/London - 3 days a week on site Contract Duration : 3 months initially Daily Rate: £650/day (Umbrella - Maximum) IR35 Status: Inside IR35 Minimum requirement : SPLUNK (2-3 years' experience) Knowledge of Cyber security threats Soft skills Security Clearance: SC As an associate security analyst you will: Triage and investigate cyber security alerts and reports from users Use a variety of techniques to analyse systems, files, network traffic and cloud environments and understand the nature and extent of possible cyber incidents Support the technical response to cyber incidents by identifying and implementing (or supporting the implementation of) containment, eradication and recovery actions Support the coordination of cyber incidents Contribute to post-incident reviews to identify lessons and actions Identify opportunities for, and support the delivery of, continual improvements to the incident investigation and response capability Work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities Contribute to internal plans, playbooks and knowledge base articles Act as an escalation point for, and provide coaching and mentoring to, apprentice security analysts Be responsible for line management of apprentice security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join We're interested in people who have: Experience investigating and responding to cyber incidents Experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience with SIEM tools (experience of Splunk preferred but experience of Microsoft Sentinel or an equivalent SIEM tool is acceptable) An understanding of the tools, techniques and procedures commonly used by threat actors Good analytical and problem-solving skills Good verbal and written communication skills Experience with Splunk Experience working in an Agile environments Experience with cloud environments such as AWS Disability Confident As a member of the disability confident scheme, CLIENT guarantees to interview all candidates who have a disability and who meet all the essential criteria for the vacancy. In cases where we have a high volume of candidates who have a disability who meet all the essential criteria, we will interview the best candidates from within that group. Armed Forces Covenant CLIENT is proud to support the Armed Forces Covenant and as such, we guarantee to interview all veterans or spouses/partners of military personnel who meet all the essential criteria for the vacancy. In cases where we have a high volume of ex-military candidates/military spouses or partners, who meet all of the essential criteria, we will interview the best candidates from within that group. If you qualify for the above, please notify us. We will be in touch to discuss your suitability and arrange your Guaranteed Interview. Should you require reasonable adjustments at any point during the recruitment process or if there is a more accessible way for us to communicate, please do let me know. To apply for this role please submit your latest CV or contact Aspect Resources
Bangura Solutions
Associate Security Analyst - Investigation, EDR, Splunk, SIEM, Threat, London, Hybrid, SC Cleared
Bangura Solutions
We are seeking an experienced SC cleared Associate Security Analyst to join our team. You will support the cybersecurity operations, incident investigation, and response efforts within a dynamic environment. Your responsibilities will include investigating security alerts, analysing threats, supporting incident response activities, and contributing to ongoing improvements in security processes Key Responsibilities: Triage and investigate cybersecurity alerts and user reports Analyze systems, files, network traffic, and cloud environments to determine the nature and extent of cyber incidents Support technical response activities including containment, eradication, and recovery Assist in coordinating cyber incident responses Contribute to post-incident reviews and identify lessons learned Support continual improvement initiatives for incident investigation and response capabilities Collaborate with Cyber Defence teams to enhance overall security posture Contribute to internal plans, playbooks, and knowledge base documentation Line management of apprentice security analysts Experience & Skills Required: 2-3 years' experience in cyber security incident investigation and response Strong knowledge of cyber security threats and attack techniques Hands-on experience with security tools such as EDR, SIEM (Splunk preferred, Microsoft Sentinel or equivalent acceptable) Understanding of threat actor tactics, techniques, and procedures Good analytical, problem-solving, and troubleshooting skills Hands-on experience with Splunk Experience working within an Agile environment Familiarity with cloud platforms such as AWS Please note active SC clearance is required for this role Minorities, women, LGBTQ+ candidates, and individuals with disabilities are encouraged to apply. Interviews will take place next week, so please apply immediately to be considered for this contract role.
Oct 03, 2025
Contractor
We are seeking an experienced SC cleared Associate Security Analyst to join our team. You will support the cybersecurity operations, incident investigation, and response efforts within a dynamic environment. Your responsibilities will include investigating security alerts, analysing threats, supporting incident response activities, and contributing to ongoing improvements in security processes Key Responsibilities: Triage and investigate cybersecurity alerts and user reports Analyze systems, files, network traffic, and cloud environments to determine the nature and extent of cyber incidents Support technical response activities including containment, eradication, and recovery Assist in coordinating cyber incident responses Contribute to post-incident reviews and identify lessons learned Support continual improvement initiatives for incident investigation and response capabilities Collaborate with Cyber Defence teams to enhance overall security posture Contribute to internal plans, playbooks, and knowledge base documentation Line management of apprentice security analysts Experience & Skills Required: 2-3 years' experience in cyber security incident investigation and response Strong knowledge of cyber security threats and attack techniques Hands-on experience with security tools such as EDR, SIEM (Splunk preferred, Microsoft Sentinel or equivalent acceptable) Understanding of threat actor tactics, techniques, and procedures Good analytical, problem-solving, and troubleshooting skills Hands-on experience with Splunk Experience working within an Agile environment Familiarity with cloud platforms such as AWS Please note active SC clearance is required for this role Minorities, women, LGBTQ+ candidates, and individuals with disabilities are encouraged to apply. Interviews will take place next week, so please apply immediately to be considered for this contract role.
Bangura Solutions
Senior Cyber Security Analyst - Government, Splunk, EDR, Defence, AWS, Hybrid, London, £800 per day
Bangura Solutions
Senior Cyber Security Analyst - Government, Splunk, EDR, Defence, AWS, Hybrid, London, SC Clearance, £800 pd We are seeking an experienced SC cleared Senior Cyber Security Analyst to lead incident response efforts within a dynamic cyber defence team. The ideal candidate will have a strong background in investigating, managing, and responding to cyber threats, with a focus on incident containment and forensic analysis. Key Responsibilities: Lead investigations into security alerts to determine the nature and scope of potential cyber incidents Conduct forensic analysis across systems, network traffic, files, and cloud environments Manage technical responses, including containment, eradication, and recovery actions Support the coordination and management of cyber incident responses Review incidents post-event to identify lessons learned and areas for improvement Develop and maintain incident response plans, playbooks, and knowledge resources Lead and line-manage security team members Experience & Skills Needed: Extensive experience investigating and responding to cyber incidents Proficiency with security tools such as EDR and SIEM platforms Proven track record of managing and coordinating incident response activities Experience in mentoring and coaching junior staff Strong understanding of threat actor techniques, tools, and tactics Excellent analytical, problem-solving, and communication skills Experience with Splunk or similar log management tools Familiarity with Agile working practices Knowledge of cloud platforms such as AWS If you possess the relevant experience and are ready to lead critical cyber defence initiatives, we encourage you to apply. Minorities, women, LGBTQ+ candidates, and individuals with disabilities are encouraged to apply. Interviews will take place next week, so please apply immediately to be considered for this contract role.
Oct 03, 2025
Contractor
Senior Cyber Security Analyst - Government, Splunk, EDR, Defence, AWS, Hybrid, London, SC Clearance, £800 pd We are seeking an experienced SC cleared Senior Cyber Security Analyst to lead incident response efforts within a dynamic cyber defence team. The ideal candidate will have a strong background in investigating, managing, and responding to cyber threats, with a focus on incident containment and forensic analysis. Key Responsibilities: Lead investigations into security alerts to determine the nature and scope of potential cyber incidents Conduct forensic analysis across systems, network traffic, files, and cloud environments Manage technical responses, including containment, eradication, and recovery actions Support the coordination and management of cyber incident responses Review incidents post-event to identify lessons learned and areas for improvement Develop and maintain incident response plans, playbooks, and knowledge resources Lead and line-manage security team members Experience & Skills Needed: Extensive experience investigating and responding to cyber incidents Proficiency with security tools such as EDR and SIEM platforms Proven track record of managing and coordinating incident response activities Experience in mentoring and coaching junior staff Strong understanding of threat actor techniques, tools, and tactics Excellent analytical, problem-solving, and communication skills Experience with Splunk or similar log management tools Familiarity with Agile working practices Knowledge of cloud platforms such as AWS If you possess the relevant experience and are ready to lead critical cyber defence initiatives, we encourage you to apply. Minorities, women, LGBTQ+ candidates, and individuals with disabilities are encouraged to apply. Interviews will take place next week, so please apply immediately to be considered for this contract role.
Lawrence Harvey
Cyber Security Analyst - SC Clearance
Lawrence Harvey
My client are looking for a Cyber Security Analyst for an initial 3 month contract opportunity to start ASAP. IR35 Status: Inside IR35 Rate: Up to £800 per day Location: Hybrid - London Duration: Initial 3 months THIS ROLE REQUIRES AN ACTIVE SC CLEARANCE Essential Requirements: Threat Detection & Incident Response: Proven ability to monitor, detect, and respond to cybersecurity incidents using SIEM tools (eg, Splunk, Sentinel, QRadar). Vulnerability Management: Experience with vulnerability scanning, risk assessment, and remediation processes across network, cloud, and endpoint environments. Security Frameworks & Compliance: Working knowledge of NIST, ISO 27001, CIS Controls, and regulatory requirements (eg, GDPR, HIPAA, or SOC 2). A thorough understanding of HMG policies and guidance, especially regarding requirements and controls around the Government Security Policy Classification, mainly at OFFICIAL. Secured web applications and cloud infrastructure environments (AWS/Azure) against vulnerabilities, and applied common and innovative remediation techniques. Secured AWS components, in particular IAM, S3 and EC2. Knowledge of security monitoring, prevention and control systems including but not limited to Firewalls, IDS/IPS, web proxies, antivirus and log correlation solutions. If you are interested, please apply with your most up to date CV. Lawrence Harvey is acting as an Employment Business in regards to this position.
Oct 03, 2025
Contractor
My client are looking for a Cyber Security Analyst for an initial 3 month contract opportunity to start ASAP. IR35 Status: Inside IR35 Rate: Up to £800 per day Location: Hybrid - London Duration: Initial 3 months THIS ROLE REQUIRES AN ACTIVE SC CLEARANCE Essential Requirements: Threat Detection & Incident Response: Proven ability to monitor, detect, and respond to cybersecurity incidents using SIEM tools (eg, Splunk, Sentinel, QRadar). Vulnerability Management: Experience with vulnerability scanning, risk assessment, and remediation processes across network, cloud, and endpoint environments. Security Frameworks & Compliance: Working knowledge of NIST, ISO 27001, CIS Controls, and regulatory requirements (eg, GDPR, HIPAA, or SOC 2). A thorough understanding of HMG policies and guidance, especially regarding requirements and controls around the Government Security Policy Classification, mainly at OFFICIAL. Secured web applications and cloud infrastructure environments (AWS/Azure) against vulnerabilities, and applied common and innovative remediation techniques. Secured AWS components, in particular IAM, S3 and EC2. Knowledge of security monitoring, prevention and control systems including but not limited to Firewalls, IDS/IPS, web proxies, antivirus and log correlation solutions. If you are interested, please apply with your most up to date CV. Lawrence Harvey is acting as an Employment Business in regards to this position.
Aspect Resources
Senior Cyber Security Analyst - SC
Aspect Resources
Job Title: Senior Cyber Security Analyst - SC Location : Hybrid/London - 3 days a week on site Contract Duration : 3 months initially Daily Rate: £800/day (Umbrella - Maximum) IR35 Status: Inside IR35 Minimum requirement: Experience of investigating and responding to cyber incidents, coordinating incident response in large org 5+ years' experience with SPLUNK EDR (Endpoint Detection and Response) Analytical, problem solving Security Clearance: SC Senior Cyber Security Analyst The Cyber Defence team delivers cyber threat intelligence, threat detection, incident response and Vulnerability management capabilities for the organisation, and is responsible for defending both internal IT infrastructure and citizen-facing services. As a senior security analyst, you'll take a leading role in building and delivering these core capabilities, focusing on incident response. As a senior security analyst with responsibility for incident response, you will l: Lead the investigation of security alerts to understand the nature and extent of possible cyber incidents Lead the forensic analysis of systems, files, network traffic and cloud environments Lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions Support the wider coordination of cyber incidents Review previous incidents to identify lessons and actions Identify and deliver opportunities for continual improvement of the incident response capability Work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities Develop and update internal plans, playbooks and knowledge base articles Act as an escalation point for, and provide coaching and mentoring to, security analysts Be responsible for leadership and line management of security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join. We're interested in people who have: Significant experience investigating and responding to cyber incidents Significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience managing and coordinating the response to cyber incidents Experience coaching and mentoring junior staff An in-depth understanding of the tools, techniques and procedures used by threat actors Excellent analytical and problem solving skills Excellent verbal and written communication skills Experience with Splunk Experience working in an Agile environment Experience with cloud environments such as AWS Disability Confident As a member of the disability confident scheme, CLIENT guarantees to interview all candidates who have a disability and who meet all the essential criteria for the vacancy. In cases where we have a high volume of candidates who have a disability who meet all the essential criteria, we will interview the best candidates from within that group. Armed Forces Covenant CLIENT is proud to support the Armed Forces Covenant and as such, we guarantee to interview all veterans or spouses/partners of military personnel who meet all the essential criteria for the vacancy. In cases where we have a high volume of ex-military candidates/military spouses or partners, who meet all of the essential criteria, we will interview the best candidates from within that group. If you qualify for the above, please notify us. We will be in touch to discuss your suitability and arrange your Guaranteed Interview. Should you require reasonable adjustments at any point during the recruitment process or if there is a more accessible way for us to communicate, please do let me know. To apply for this role please submit your latest CV or contact Aspect Resources
Oct 03, 2025
Contractor
Job Title: Senior Cyber Security Analyst - SC Location : Hybrid/London - 3 days a week on site Contract Duration : 3 months initially Daily Rate: £800/day (Umbrella - Maximum) IR35 Status: Inside IR35 Minimum requirement: Experience of investigating and responding to cyber incidents, coordinating incident response in large org 5+ years' experience with SPLUNK EDR (Endpoint Detection and Response) Analytical, problem solving Security Clearance: SC Senior Cyber Security Analyst The Cyber Defence team delivers cyber threat intelligence, threat detection, incident response and Vulnerability management capabilities for the organisation, and is responsible for defending both internal IT infrastructure and citizen-facing services. As a senior security analyst, you'll take a leading role in building and delivering these core capabilities, focusing on incident response. As a senior security analyst with responsibility for incident response, you will l: Lead the investigation of security alerts to understand the nature and extent of possible cyber incidents Lead the forensic analysis of systems, files, network traffic and cloud environments Lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions Support the wider coordination of cyber incidents Review previous incidents to identify lessons and actions Identify and deliver opportunities for continual improvement of the incident response capability Work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities Develop and update internal plans, playbooks and knowledge base articles Act as an escalation point for, and provide coaching and mentoring to, security analysts Be responsible for leadership and line management of security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join. We're interested in people who have: Significant experience investigating and responding to cyber incidents Significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience managing and coordinating the response to cyber incidents Experience coaching and mentoring junior staff An in-depth understanding of the tools, techniques and procedures used by threat actors Excellent analytical and problem solving skills Excellent verbal and written communication skills Experience with Splunk Experience working in an Agile environment Experience with cloud environments such as AWS Disability Confident As a member of the disability confident scheme, CLIENT guarantees to interview all candidates who have a disability and who meet all the essential criteria for the vacancy. In cases where we have a high volume of candidates who have a disability who meet all the essential criteria, we will interview the best candidates from within that group. Armed Forces Covenant CLIENT is proud to support the Armed Forces Covenant and as such, we guarantee to interview all veterans or spouses/partners of military personnel who meet all the essential criteria for the vacancy. In cases where we have a high volume of ex-military candidates/military spouses or partners, who meet all of the essential criteria, we will interview the best candidates from within that group. If you qualify for the above, please notify us. We will be in touch to discuss your suitability and arrange your Guaranteed Interview. Should you require reasonable adjustments at any point during the recruitment process or if there is a more accessible way for us to communicate, please do let me know. To apply for this role please submit your latest CV or contact Aspect Resources
IntecSelect
2nd Line Support Analyst
IntecSelect Maidstone, Kent
2nd Line Support Analyst Are you an experienced 2nd Line Support Analyst who thrives in a hands-on role, supporting a wide range of systems and users who enjoys working in a internal IT team? About the Role As our IT Support Engineer, you'll report directly to the IT Manager and play a key role in maintaining and improving our IT systems and services. You'll provide support across Servers, desktops, laptops, tablets, mobile devices, and applications (including MS Office), while also getting involved in specialist software and infrastructure with exposure to Azure cloud. This is a varied role where no two days are the same - from logging and resolving helpdesk tickets, to site setups, Active Directory management, and ensuring our compliance standards are met. You'll also spend at least one day a week on-site at one of our construction projects, making sure IT services run smoothly. Key Responsibilities Provide 1st and 2nd line IT support for hardware, software, and applications. Manage and escalate issues to 3rd line support or external suppliers where required. Support specialist systems such as AutoCAD, Bluebeam, Asta Powerproject, and Lecia. Maintain and improve IT documentation, ensuring compliance with standards (PCI DSS, Cyber Essentials, GDPR). Assist with site setups, network infrastructure, and mobile phone provisioning. Support core IT systems including Exchange 365, Mimecast, Manage Engine Service Desk Plus, and security tools. Travel to sites (minimum one day per week) to provide and maintain IT services. What We're Looking For Hands on experience within an IT support/service role. Hands on exposure to Exchange 365, Mimecast, Azure would be great Strong working knowledge of MS Office, including Access and SharePoint. A problem-solver with excellent customer service skills. A confident communicator who enjoys working as part of a team. Full UK driving licence (manual) and own car. Right to work in the UK.
Oct 03, 2025
Full time
2nd Line Support Analyst Are you an experienced 2nd Line Support Analyst who thrives in a hands-on role, supporting a wide range of systems and users who enjoys working in a internal IT team? About the Role As our IT Support Engineer, you'll report directly to the IT Manager and play a key role in maintaining and improving our IT systems and services. You'll provide support across Servers, desktops, laptops, tablets, mobile devices, and applications (including MS Office), while also getting involved in specialist software and infrastructure with exposure to Azure cloud. This is a varied role where no two days are the same - from logging and resolving helpdesk tickets, to site setups, Active Directory management, and ensuring our compliance standards are met. You'll also spend at least one day a week on-site at one of our construction projects, making sure IT services run smoothly. Key Responsibilities Provide 1st and 2nd line IT support for hardware, software, and applications. Manage and escalate issues to 3rd line support or external suppliers where required. Support specialist systems such as AutoCAD, Bluebeam, Asta Powerproject, and Lecia. Maintain and improve IT documentation, ensuring compliance with standards (PCI DSS, Cyber Essentials, GDPR). Assist with site setups, network infrastructure, and mobile phone provisioning. Support core IT systems including Exchange 365, Mimecast, Manage Engine Service Desk Plus, and security tools. Travel to sites (minimum one day per week) to provide and maintain IT services. What We're Looking For Hands on experience within an IT support/service role. Hands on exposure to Exchange 365, Mimecast, Azure would be great Strong working knowledge of MS Office, including Access and SharePoint. A problem-solver with excellent customer service skills. A confident communicator who enjoys working as part of a team. Full UK driving licence (manual) and own car. Right to work in the UK.
83Zero Ltd
IT Security Analyst
83Zero Ltd Chalfont St. Peter, Buckinghamshire
IT Security Analyst Location: Hybrid - Buckinghamshire Salary: 50,000 - 55,000 + Benefits 83zero are partnered with a market-leading software company who are on a mission to transform the construction and related industries through their end-to-end digital solutions. With teams across the UK, Europe, USA and India, they are delivering large-scale transformation projects on a global scale and are continuing to expand. We are now looking for a highly organised and detail-driven IT Security Analyst to join their growing security function. This role plays a key part in securing customer trust and supplier integrity, ensuring compliance with recognised frameworks, and supporting wider security initiatives. The Role Own and manage responses to customer security questionnaires (SIG, CAIQ, bespoke). Work cross-functionally with Legal, Compliance, Procurement, Product and Security teams. Maintain the security assurance matrix in line with ISO 27001, Cyber Essentials, and SOC 2. Act as the key point of contact for security assurance queries. Conduct vendor risk assessments against ISO 27001, NIST, and CIS Controls. Manage the third-party due diligence programme, including onboarding and periodic reviews. Track and publish key security metrics such as risk severity, SLA adherence, and turnaround times. Provide audit artefacts and support internal/external audits. Contribute to broader security initiatives and continuous improvement within the organisation. About You 3+ years' experience in Information Security, GRC, or Vendor Risk Management. Strong experience issuing or responding to security questionnaires. Knowledge of ISO 27001 Annex A, SOC 2, and GDPR/CCPA. Excellent communication skills, able to translate technical risk to non-technical stakeholders. Eligible to work in the UK and able to pass background checks. Desirable: Certifications such as CRISC, CISSP, CISA, or ISO 27001 Lead Auditor. Familiarity with SaaS/cloud platforms (AWS, Azure, GCP). Understanding of secure software supply chains (SBOM, SLSA). What's on Offer 50,000 - 55,000 base salary 25 days annual leave + public holidays (increasing with service) Matched pension scheme Private medical insurance & life assurance Fitness allowance Paid study leave & volunteering days Flexible hybrid working Excellent career development and training opportunities
Oct 03, 2025
Full time
IT Security Analyst Location: Hybrid - Buckinghamshire Salary: 50,000 - 55,000 + Benefits 83zero are partnered with a market-leading software company who are on a mission to transform the construction and related industries through their end-to-end digital solutions. With teams across the UK, Europe, USA and India, they are delivering large-scale transformation projects on a global scale and are continuing to expand. We are now looking for a highly organised and detail-driven IT Security Analyst to join their growing security function. This role plays a key part in securing customer trust and supplier integrity, ensuring compliance with recognised frameworks, and supporting wider security initiatives. The Role Own and manage responses to customer security questionnaires (SIG, CAIQ, bespoke). Work cross-functionally with Legal, Compliance, Procurement, Product and Security teams. Maintain the security assurance matrix in line with ISO 27001, Cyber Essentials, and SOC 2. Act as the key point of contact for security assurance queries. Conduct vendor risk assessments against ISO 27001, NIST, and CIS Controls. Manage the third-party due diligence programme, including onboarding and periodic reviews. Track and publish key security metrics such as risk severity, SLA adherence, and turnaround times. Provide audit artefacts and support internal/external audits. Contribute to broader security initiatives and continuous improvement within the organisation. About You 3+ years' experience in Information Security, GRC, or Vendor Risk Management. Strong experience issuing or responding to security questionnaires. Knowledge of ISO 27001 Annex A, SOC 2, and GDPR/CCPA. Excellent communication skills, able to translate technical risk to non-technical stakeholders. Eligible to work in the UK and able to pass background checks. Desirable: Certifications such as CRISC, CISSP, CISA, or ISO 27001 Lead Auditor. Familiarity with SaaS/cloud platforms (AWS, Azure, GCP). Understanding of secure software supply chains (SBOM, SLSA). What's on Offer 50,000 - 55,000 base salary 25 days annual leave + public holidays (increasing with service) Matched pension scheme Private medical insurance & life assurance Fitness allowance Paid study leave & volunteering days Flexible hybrid working Excellent career development and training opportunities

Modal Window

  • Blog
  • Contact
  • About Us
  • Terms & Conditions
  • Privacy
  • Employer
  • Post a Job
  • Search Resumes
  • Sign in
  • Job Seeker
  • Find Jobs
  • Create Resume
  • Sign in
  • Facebook
  • Twitter
  • Instagram
  • Pinterest
  • Youtube
Parent and Partner sites: IT Job Board | Search Jobs Near Me | RightTalent.co.uk | Quantity Surveyor jobs | Building Surveyor jobs | Construction Recruitment | Talent Recruiter | London Jobs | Property jobs
© 2008-2026 Jobs Hiring Near Me