• Home
  • Find Jobs
  • Register CV
  • Advertise jobs
  • Employer Pricing
  • IT Jobs
  • Sign in
  • Sign up
  • Home
  • Find Jobs
  • Register CV
  • Advertise jobs
  • Employer Pricing
  • IT Jobs
Sorry, that job is no longer available. Here are some results that may be similar to the job you were looking for.

91 jobs found

Email me jobs like this
Refine Search
Current Search
network security analyst
Zachary Daniels Recruitment
Cyber Security Operations Manager
Zachary Daniels Recruitment City, Liverpool
Cyber Security Operations Manager Liverpool (Hybrid) 75,000 We're working with a growing UK business looking to hire a Cyber Security Operations Manager to take full ownership of its security operations function, ensuring the organisation is protected, resilient, and continuously improving against an increasingly complex threat landscape. This is a high-impact position where you'll lead the security operations function end-to-end, driving improvements across threat detection, incident response, and overall security posture within a complex, evolving environment. The Role You'll take ownership of security operations, ensuring the business is protected against evolving threats while continuously improving processes, tooling, and team capability. Key responsibilities include: Leading the day-to-day operations of the Security Operations function, including oversight of any outsourced SOC Managing the full incident response lifecycle (detection through to recovery and post-incident review) Overseeing threat detection, vulnerability management, and cyber defence capabilities Driving improvements across SIEM, SOAR, EDR/XDR, and security tooling Ensuring robust monitoring, alerting, and response across cloud, network, and endpoint environments Partnering with Infrastructure, Cloud, and Risk teams to strengthen security across the business Leading and developing a team of cyber engineers and analysts Driving automation initiatives to improve response times and operational efficiency Supporting governance, compliance, and audit requirements Reporting on security performance, risks, and KPIs to senior stakeholders What We're Looking For Proven experience leading a Security Operations or SOC function Strong understanding of SIEM, SOAR, EDR/XDR, IDS/IPS, and security tooling Experience managing incident response and threat management in complex environments Strong knowledge of frameworks such as NIST, ISO 27001, or CIS Controls Experience working in cloud environments (Azure, AWS, or GCP) Strong leadership and stakeholder management skills Ability to balance hands-on technical understanding with strategic oversight Why Join? Opportunity to lead and shape the security operations function High visibility role across technology and leadership teams Business actively investing in cyber security and resilience If you're looking for a role where you can lead, influence, and strengthen cyber security at scale, we'd love to hear from you. Apply today with your most up to date CV. BH36094
May 17, 2026
Full time
Cyber Security Operations Manager Liverpool (Hybrid) 75,000 We're working with a growing UK business looking to hire a Cyber Security Operations Manager to take full ownership of its security operations function, ensuring the organisation is protected, resilient, and continuously improving against an increasingly complex threat landscape. This is a high-impact position where you'll lead the security operations function end-to-end, driving improvements across threat detection, incident response, and overall security posture within a complex, evolving environment. The Role You'll take ownership of security operations, ensuring the business is protected against evolving threats while continuously improving processes, tooling, and team capability. Key responsibilities include: Leading the day-to-day operations of the Security Operations function, including oversight of any outsourced SOC Managing the full incident response lifecycle (detection through to recovery and post-incident review) Overseeing threat detection, vulnerability management, and cyber defence capabilities Driving improvements across SIEM, SOAR, EDR/XDR, and security tooling Ensuring robust monitoring, alerting, and response across cloud, network, and endpoint environments Partnering with Infrastructure, Cloud, and Risk teams to strengthen security across the business Leading and developing a team of cyber engineers and analysts Driving automation initiatives to improve response times and operational efficiency Supporting governance, compliance, and audit requirements Reporting on security performance, risks, and KPIs to senior stakeholders What We're Looking For Proven experience leading a Security Operations or SOC function Strong understanding of SIEM, SOAR, EDR/XDR, IDS/IPS, and security tooling Experience managing incident response and threat management in complex environments Strong knowledge of frameworks such as NIST, ISO 27001, or CIS Controls Experience working in cloud environments (Azure, AWS, or GCP) Strong leadership and stakeholder management skills Ability to balance hands-on technical understanding with strategic oversight Why Join? Opportunity to lead and shape the security operations function High visibility role across technology and leadership teams Business actively investing in cyber security and resilience If you're looking for a role where you can lead, influence, and strengthen cyber security at scale, we'd love to hear from you. Apply today with your most up to date CV. BH36094
MBDA UK
Network Process Analyst
MBDA UK Filton, Gloucestershire
Bristol An exciting opportunity for a passionate Network Process Analyst to join a unique, multi-national Digital Excellence function. Ideal candidates should be committed to maintaining our critical systems and ensuring the integrity and security of our network infrastructure. Salary: Circa £50,000 depending on experience Dynamic (hybrid) working:2-3 days per week on-site due to workload classification Security Clearance: British Citizen only. Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS), which are managed by the MBDA Personnel Security Team. What we can offer you: Company bonus: Up to £2,500 (based on company performance and will vary year to year) Pension: maximum total (employer and employee) contribution of up to 14% Flexi Leave: Up to 15 additional days Flexible working: We welcome applicants who are looking for flexible working arrangements Enhanced parental leave: offers up to 26 weeks for maternity, adoption and shared parental leave -enhancements are available for paternity leave, neonatal leave and fertility testing and treatments Facilities: Fantastic site facilities including subsidised meals, free car parking and much more Healthcare Cash Plan: The Healthcare Cash Plan benefit provides the option to claim cash back on everyday healthcare expenses such as optical, dental, health and wellbeing and more . The opportunity: The Network Process Analyst will work alongside members of Digital Excellence (DEX) Networks Operation Teams and wider Network Teams to collate knowledge and information in order to analyse and develop this information into key processes and documentation. You will be responsible for the design, creation and governance of (DEX) Network Processes. Regularly reviewing all documentation across all of the Network's estate and ensuring that the documentation reflects any new services that any changes of new ways of working within the Network Area are reflected in accordance with standards of service. What we're looking for from you: A confident self-starter who is results driven ensuring that Digital Excellence Network Processes meet and align with overall Business governance and standards. Proven Collaboration with Key Stakeholders within the department to gather requirements and aligning processes with Digital Excellence and wider business strategy. Proven experience of Change Management and transitioning new processes through communication, training, monitoring the implementation for departmental adoption. Analytical thinking to actively identify issues and areas of improvement reflecting this in documentation and ensuring that it continues to add value to the organisation. Effective problem-solving abilities A positive and Can-Do Mind-set and not afraid to challenge the Status Quo of a Business Team Player who shares knowledge and proactively supports the wider team Understanding and Qualified in Lean Six Sigma concepts Understanding and Qualified of ITIL Methodologies and framework Experienced in process mapping toolsets such as Microsoft Visio, Canva, iGrafx, Lucidchart Understanding and adherence of ISO 9001:2015 procedures and standards (Quality Management) Our company: Peace is not a given, Freedom is not a given, Sovereignty is not a given MBDA is a leading defence organisation. We are proud of the role we play in supporting the Armed Forces who protect our nations. We partner with governments to work together towards a common goal, defending our freedom. We are proud of our employee-led networks, examples include: Gender Equality, Pride, Menopause Matters, Parents and Carers, Armed Forces, Ethnic Diversity, Neurodiversity, Disability and more We recognise that everyone is unique, and we encourage you to speak to us should you require any advice, support or adjustments throughout our recruitment process. Follow us on LinkedIn (MBDA), X Instagram (MBDA_UK) and Glassdoor or visit our MBDA Careers website for more information.
May 17, 2026
Full time
Bristol An exciting opportunity for a passionate Network Process Analyst to join a unique, multi-national Digital Excellence function. Ideal candidates should be committed to maintaining our critical systems and ensuring the integrity and security of our network infrastructure. Salary: Circa £50,000 depending on experience Dynamic (hybrid) working:2-3 days per week on-site due to workload classification Security Clearance: British Citizen only. Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS), which are managed by the MBDA Personnel Security Team. What we can offer you: Company bonus: Up to £2,500 (based on company performance and will vary year to year) Pension: maximum total (employer and employee) contribution of up to 14% Flexi Leave: Up to 15 additional days Flexible working: We welcome applicants who are looking for flexible working arrangements Enhanced parental leave: offers up to 26 weeks for maternity, adoption and shared parental leave -enhancements are available for paternity leave, neonatal leave and fertility testing and treatments Facilities: Fantastic site facilities including subsidised meals, free car parking and much more Healthcare Cash Plan: The Healthcare Cash Plan benefit provides the option to claim cash back on everyday healthcare expenses such as optical, dental, health and wellbeing and more . The opportunity: The Network Process Analyst will work alongside members of Digital Excellence (DEX) Networks Operation Teams and wider Network Teams to collate knowledge and information in order to analyse and develop this information into key processes and documentation. You will be responsible for the design, creation and governance of (DEX) Network Processes. Regularly reviewing all documentation across all of the Network's estate and ensuring that the documentation reflects any new services that any changes of new ways of working within the Network Area are reflected in accordance with standards of service. What we're looking for from you: A confident self-starter who is results driven ensuring that Digital Excellence Network Processes meet and align with overall Business governance and standards. Proven Collaboration with Key Stakeholders within the department to gather requirements and aligning processes with Digital Excellence and wider business strategy. Proven experience of Change Management and transitioning new processes through communication, training, monitoring the implementation for departmental adoption. Analytical thinking to actively identify issues and areas of improvement reflecting this in documentation and ensuring that it continues to add value to the organisation. Effective problem-solving abilities A positive and Can-Do Mind-set and not afraid to challenge the Status Quo of a Business Team Player who shares knowledge and proactively supports the wider team Understanding and Qualified in Lean Six Sigma concepts Understanding and Qualified of ITIL Methodologies and framework Experienced in process mapping toolsets such as Microsoft Visio, Canva, iGrafx, Lucidchart Understanding and adherence of ISO 9001:2015 procedures and standards (Quality Management) Our company: Peace is not a given, Freedom is not a given, Sovereignty is not a given MBDA is a leading defence organisation. We are proud of the role we play in supporting the Armed Forces who protect our nations. We partner with governments to work together towards a common goal, defending our freedom. We are proud of our employee-led networks, examples include: Gender Equality, Pride, Menopause Matters, Parents and Carers, Armed Forces, Ethnic Diversity, Neurodiversity, Disability and more We recognise that everyone is unique, and we encourage you to speak to us should you require any advice, support or adjustments throughout our recruitment process. Follow us on LinkedIn (MBDA), X Instagram (MBDA_UK) and Glassdoor or visit our MBDA Careers website for more information.
Experis
SOC Lead
Experis Bath, Somerset
SOC Lead 6 months Bath - hybrid x3 days onsite x2 remote Active SC/DV clearance required 700 per day outside IR35 The SOC Lead - Threat Hunting & Investigations is responsible for leading advanced threat detection, proactive threat hunting, and complex security investigations across the enterprise. This role focuses on identifying unknown threats, coordinating deep-dive investigations, and elevating the maturity of SOC investigative and hunting capabilities. The role combines technical leadership, hands-on expertise, and mentorship of analysts. Key Responsibilities Threat Hunting Lead proactive, hypothesis-driven threat hunting activities across endpoint, network, cloud, identity, and SaaS environments Develop and maintain threat hunting playbooks aligned to MITRE ATT&CK techniques Identify stealthy, low-and-slow, and novel attack patterns not detected by automated controls Translate threat intelligence into actionable hunt hypotheses Continuously refine detection logic based on hunt outcomes and emerging threats Investigations & Incident Response Lead complex and high-severity security investigations from triage through containment and remediation Act as the technical escalation point for advanced SOC investigations Conduct root cause analysis and attacker kill-chain reconstruction Produce clear, defensible investigation documentation suitable for executive, legal, and regulatory audiences Coordinate incident response activities with IR, IT, Legal, Risk, and external partners as required SOC Technical Leadership Define investigation standards, workflows, and quality benchmarks Mentor and upskill SOC analysts in hunting methodologies and investigative techniques Review and improve alert fidelity, detection coverage, and response effectiveness Provide technical oversight for tooling such as SIEM, EDR/XDR, NDR, SOAR, and cloud-native security platforms Detection Engineering & Improvement Collaborate with detection engineers to convert hunt findings into new or improved detections Identify visibility gaps and recommend logging, telemetry, and tooling improvements Validate detection performance through purple team activities and simulation Threat Intelligence & Collaboration Consume and operationalise internal and external threat intelligence Maintain awareness of attacker tactics, tools, and campaigns relevant to the organisation Act as a key interface between SOC, Threat Intel, Red Team, and Vulnerability Management Reporting & Metrics Track and report on hunt coverage, outcomes, dwell time, MTTR, and investigation quality Provide regular insights to senior leadership on threat trends and risk posture Required Skills & Experience Technical Experience 7+ years in Security Operations, Threat Hunting, or Incident Response Proven experience leading investigations involving advanced persistent threats, insider threats, or targeted attacks Strong hands-on expertise with: SIEM platforms (e.g. Sentinel, Splunk, Elastic) EDR/XDR solutions (e.g. Defender, CrowdStrike, SentinelOne) Network and cloud security telemetry Strong understanding of: MITRE ATT&CK Windows, Linux, and cloud attack techniques Malware behaviours, credential abuse, lateral movement, and persistence mechanisms Leadership & Soft Skills Demonstrated ability to lead and mentor technical teams Strong investigative mindset with attention to detail Excellent written and verbal communication skills Ability to translate technical findings into business and risk context Desirable Skills Experience with detection engineering or SOAR automation Purple team or red team collaboration experience Forensic analysis experience (memory, disk, network) Exposure to regulatory environments (e.g. ISO 27001, NIST, GDPR) Apply now to be part of this impactful opportunity!
May 16, 2026
Contractor
SOC Lead 6 months Bath - hybrid x3 days onsite x2 remote Active SC/DV clearance required 700 per day outside IR35 The SOC Lead - Threat Hunting & Investigations is responsible for leading advanced threat detection, proactive threat hunting, and complex security investigations across the enterprise. This role focuses on identifying unknown threats, coordinating deep-dive investigations, and elevating the maturity of SOC investigative and hunting capabilities. The role combines technical leadership, hands-on expertise, and mentorship of analysts. Key Responsibilities Threat Hunting Lead proactive, hypothesis-driven threat hunting activities across endpoint, network, cloud, identity, and SaaS environments Develop and maintain threat hunting playbooks aligned to MITRE ATT&CK techniques Identify stealthy, low-and-slow, and novel attack patterns not detected by automated controls Translate threat intelligence into actionable hunt hypotheses Continuously refine detection logic based on hunt outcomes and emerging threats Investigations & Incident Response Lead complex and high-severity security investigations from triage through containment and remediation Act as the technical escalation point for advanced SOC investigations Conduct root cause analysis and attacker kill-chain reconstruction Produce clear, defensible investigation documentation suitable for executive, legal, and regulatory audiences Coordinate incident response activities with IR, IT, Legal, Risk, and external partners as required SOC Technical Leadership Define investigation standards, workflows, and quality benchmarks Mentor and upskill SOC analysts in hunting methodologies and investigative techniques Review and improve alert fidelity, detection coverage, and response effectiveness Provide technical oversight for tooling such as SIEM, EDR/XDR, NDR, SOAR, and cloud-native security platforms Detection Engineering & Improvement Collaborate with detection engineers to convert hunt findings into new or improved detections Identify visibility gaps and recommend logging, telemetry, and tooling improvements Validate detection performance through purple team activities and simulation Threat Intelligence & Collaboration Consume and operationalise internal and external threat intelligence Maintain awareness of attacker tactics, tools, and campaigns relevant to the organisation Act as a key interface between SOC, Threat Intel, Red Team, and Vulnerability Management Reporting & Metrics Track and report on hunt coverage, outcomes, dwell time, MTTR, and investigation quality Provide regular insights to senior leadership on threat trends and risk posture Required Skills & Experience Technical Experience 7+ years in Security Operations, Threat Hunting, or Incident Response Proven experience leading investigations involving advanced persistent threats, insider threats, or targeted attacks Strong hands-on expertise with: SIEM platforms (e.g. Sentinel, Splunk, Elastic) EDR/XDR solutions (e.g. Defender, CrowdStrike, SentinelOne) Network and cloud security telemetry Strong understanding of: MITRE ATT&CK Windows, Linux, and cloud attack techniques Malware behaviours, credential abuse, lateral movement, and persistence mechanisms Leadership & Soft Skills Demonstrated ability to lead and mentor technical teams Strong investigative mindset with attention to detail Excellent written and verbal communication skills Ability to translate technical findings into business and risk context Desirable Skills Experience with detection engineering or SOAR automation Purple team or red team collaboration experience Forensic analysis experience (memory, disk, network) Exposure to regulatory environments (e.g. ISO 27001, NIST, GDPR) Apply now to be part of this impactful opportunity!
Adecco
Desktop Support Analyst - London
Adecco City, London
Desktop Support Analyst Rate - 200 (A day) Location - London (Liverpool Street) Duration - 3 Months (Initially) IR35 - Outside KEY RESPONSIBILITIES Serve as the primary IT support contact for the London office, handling hardware, software, and connectivity issues in a timely and professional manner Provide end-user support within a Citrix Virtual Desktop Infrastructure (VDI) environment, including troubleshooting session and application issues via Citrix Director Manage end-user onboarding and offboarding, including hardware provisioning, account setup, and access management via Active Directory / Microsoft Entra ID Maintain and manage hardware inventory, printers, and AV equipment across the London office Administer and support Microsoft 365 and Windows desktop environments, including user account management and license provisioning Perform network troubleshooting to diagnose and resolve connectivity issues, escalating to network teams where required Support video conferencing and collaboration tools, including Zoom and other AV systems Log, track, and resolve tickets using the organization's Jira ticketing system Communicating software and security best practices to end users at varying levels of technical ability Adhere to business continuity protocols and change control processes when implementing changes to the environment Liaise with third-party hardware and software vendors as needed to resolve escalated issues REQUIRED QUALIFICATIONS 3+ years of hands-on desktop support experience in a Microsoft 365 and virtualized environment Proven experience supporting Citrix Virtual Desktop Infrastructure (VDI) Solid knowledge of Windows desktop operating systems and core Microsoft 365 applications Experience with Active Directory and/or Microsoft Entra ID for user and device management Strong network troubleshooting skills, including TCP/IP, DNS, DHCP, and VPN Confident communicator with the ability to support users of all technical backgrounds Strong problem-solving skills with a methodical and customer-focused approach Understanding of Jira processes, including incident management and change control PREFERRED QUALIFICATIONS Experience with Zoom administration and enterprise video conferencing systems Familiarity with macOS support in a mixed-OS environment Experience using Citrix Director for session monitoring and troubleshooting Knowledge of Bloomberg terminal support and administration Previous experience in financial services or professional services environments
May 16, 2026
Contractor
Desktop Support Analyst Rate - 200 (A day) Location - London (Liverpool Street) Duration - 3 Months (Initially) IR35 - Outside KEY RESPONSIBILITIES Serve as the primary IT support contact for the London office, handling hardware, software, and connectivity issues in a timely and professional manner Provide end-user support within a Citrix Virtual Desktop Infrastructure (VDI) environment, including troubleshooting session and application issues via Citrix Director Manage end-user onboarding and offboarding, including hardware provisioning, account setup, and access management via Active Directory / Microsoft Entra ID Maintain and manage hardware inventory, printers, and AV equipment across the London office Administer and support Microsoft 365 and Windows desktop environments, including user account management and license provisioning Perform network troubleshooting to diagnose and resolve connectivity issues, escalating to network teams where required Support video conferencing and collaboration tools, including Zoom and other AV systems Log, track, and resolve tickets using the organization's Jira ticketing system Communicating software and security best practices to end users at varying levels of technical ability Adhere to business continuity protocols and change control processes when implementing changes to the environment Liaise with third-party hardware and software vendors as needed to resolve escalated issues REQUIRED QUALIFICATIONS 3+ years of hands-on desktop support experience in a Microsoft 365 and virtualized environment Proven experience supporting Citrix Virtual Desktop Infrastructure (VDI) Solid knowledge of Windows desktop operating systems and core Microsoft 365 applications Experience with Active Directory and/or Microsoft Entra ID for user and device management Strong network troubleshooting skills, including TCP/IP, DNS, DHCP, and VPN Confident communicator with the ability to support users of all technical backgrounds Strong problem-solving skills with a methodical and customer-focused approach Understanding of Jira processes, including incident management and change control PREFERRED QUALIFICATIONS Experience with Zoom administration and enterprise video conferencing systems Familiarity with macOS support in a mixed-OS environment Experience using Citrix Director for session monitoring and troubleshooting Knowledge of Bloomberg terminal support and administration Previous experience in financial services or professional services environments
JAM Recruitment Ltd
SOC Analyst
JAM Recruitment Ltd Hereford, Herefordshire
SOC Analyst 75.48 p/hr (Inside IR35) Onsite Hereford 12 months Level 1 SOC Cyber Analyst to join the TMCT security team to serve as the first internal responder to alerts generated by our outsourced SOC provider. In this role the individual will perform initial triage, conduct low level investigations, interact directly with end users and asset owners, and escalate verified incidents for advanced analysis and response. The level 1 SOC analyst will act as a key link between our internal security team and the external SOC, ensuring that potential threats are quickly validated, documented, and routed through appropriate channels for resolution. Duties: Alert Triage: Review and assess alerts escalated by the outsourced SOC; validate their accuracy and determine potential impact. Initial Investigation: Perform first-line investigation using available tools (SIEM, Device Logs, firewall logs and SIEM alerts). User Interaction: Engage with affected end users or asset owners to collect additional information, verify events, or guide immediate containment steps (e.g.asset isolation, password reset). Escalation: Escalate confirmed or high severity incidents to the Level 2 SOC (outsourced) or internal incident response teams, ensuring complete and accurate handoff documentation. Incident Documentation: Create and maintain detailed case notes, timelines, and evidence within the case management system to support investigations and compliance requirements. Collaboration: Serve as the coordination point between the security team and the external SOC partner, maintaining strong communication and situational awareness. Playbook Execution: follow established triage and escalation playbooks; suggest improvements based on recurring issues or inefficiencies. Threat Awareness: Maintain awareness of current cyber threats, attacker techniques (MITRE ATT&CK), and industry trends relevant to the organisations threat landscape. Essential: 2-4 years of experience in a SOC, IT Operations, or security support role. Understanding of key security concepts including malware, phishing, lateral movement and privilege escalation. Working knowledge of network fundamentals, windows/Linux system logs and authentication systems. Working knowledge of SIEM platforms (e.g. Microsoft sentinel, Splunk, Elastic, QRadar). Desirable: Awareness of security frameworks and methodologies (NIST CSF, MITRE ATT&CK, ISO27001). Qualifications: Desirable: CompTIA Security+, CySA+ or other entry level certification.
May 16, 2026
Contractor
SOC Analyst 75.48 p/hr (Inside IR35) Onsite Hereford 12 months Level 1 SOC Cyber Analyst to join the TMCT security team to serve as the first internal responder to alerts generated by our outsourced SOC provider. In this role the individual will perform initial triage, conduct low level investigations, interact directly with end users and asset owners, and escalate verified incidents for advanced analysis and response. The level 1 SOC analyst will act as a key link between our internal security team and the external SOC, ensuring that potential threats are quickly validated, documented, and routed through appropriate channels for resolution. Duties: Alert Triage: Review and assess alerts escalated by the outsourced SOC; validate their accuracy and determine potential impact. Initial Investigation: Perform first-line investigation using available tools (SIEM, Device Logs, firewall logs and SIEM alerts). User Interaction: Engage with affected end users or asset owners to collect additional information, verify events, or guide immediate containment steps (e.g.asset isolation, password reset). Escalation: Escalate confirmed or high severity incidents to the Level 2 SOC (outsourced) or internal incident response teams, ensuring complete and accurate handoff documentation. Incident Documentation: Create and maintain detailed case notes, timelines, and evidence within the case management system to support investigations and compliance requirements. Collaboration: Serve as the coordination point between the security team and the external SOC partner, maintaining strong communication and situational awareness. Playbook Execution: follow established triage and escalation playbooks; suggest improvements based on recurring issues or inefficiencies. Threat Awareness: Maintain awareness of current cyber threats, attacker techniques (MITRE ATT&CK), and industry trends relevant to the organisations threat landscape. Essential: 2-4 years of experience in a SOC, IT Operations, or security support role. Understanding of key security concepts including malware, phishing, lateral movement and privilege escalation. Working knowledge of network fundamentals, windows/Linux system logs and authentication systems. Working knowledge of SIEM platforms (e.g. Microsoft sentinel, Splunk, Elastic, QRadar). Desirable: Awareness of security frameworks and methodologies (NIST CSF, MITRE ATT&CK, ISO27001). Qualifications: Desirable: CompTIA Security+, CySA+ or other entry level certification.
Senior Solutions Architect - Lakewatch
Menlo Ventures
Requisition ID: FEQ427R217 Sr. Solutions Architect (Lakewatch - EMEA) The Solutions Architect (Lakewatch) team executes on Databricks' strategic Product Operating Model that provides enhanced focus on earlier stage, highly prioritized product lines in order to establish product market fit, and set the course for rapid revenue growth. They are part of a global go to market team mandate, though individually will cover a specific, local region. Clients may span across one or more business units and verticals. By working in partnership with direct account teams, they will jointly engage clients, foster the necessary relationships, position in-depth the specific product line, so as to provide compelling reasons for clients to adopt and grow the usage of the given product. They understand the appropriate approach, the guardrails, and the steps needed to successfully adopt the product line, as clients deliver on their business objectives. The Solutions Architect (Lakewatch) is paired with an Account Executive aligned to the product line with specific targets accordingly. Together, they will devise and implement a strategy across their assigned set of accounts, develop presentations, demos and other assets and deliver them such that customers make an informed decision as they decide to adopt the product line in a meaningful way. The Lakewatch product line requires the following core technical competencies: 5+ years of cybersecurity engineering, security operations (SecOps), or security architecture expertise, with a proven track record of designing and delivering customer facing security solutions (of which 3+ years are in a customer facing, pre sales or consulting role). Experience with design and implementation of data and AI applications in cybersecurity, including anomaly detection, behavioral analytics, and agentic AI workflows for triage and investigation. Deep familiarity with SIEM platforms (Splunk, Microsoft Sentinel, QRadar, or similar), including deployment, tuning, detection engineering, and migration strategies. Familiarity with SOAR platforms is also desirable. Strong understanding of the security telemetry landscape: endpoint (EDR/XDR), network (firewall, DNS, proxy), identity (Okta, Entra ID), cloud (AWS CloudTrail, Azure Activity Log, GCP Audit), and SaaS application logs. Familiarity with standards such as OCSF. Experience with "detection as code" workflows, including rule authoring in SQL or YAML, CI/CD integration for detection pipelines, and MITRE ATT&CK framework mapping. Credibility in influencing security analytics products with the market insight needed to shape and prioritize roadmap capabilities. The impact you will have Provide technical leadership to guide strategic customers to successful implementations on big data projects, ranging from architectural design to data engineering to model deployment. Collaborate with GTM leadership and account teams to design and execute high impact engagement strategies across your territory, driving Lakewatch adoption from initial data offload through full SIEM augmentation or replacement. As a trusted advisor, serve as an expert Solutions Architect building technical credibility with CISOs, security architects, SOC leadership, and security analysts to drive product adoption and vision. Enable clients at scale through workshops, POC execution, and developing customer facing collateral that increases technical knowledge and demonstrates the value of an open agentic SIEM architecture. Influence product roadmap by translating field derived, data driven insights into strategic recommendations for Product and Engineering teams. Handle the most complex technical challenges in this product line by acting as the tier 3 escalation point for the field, ensuring customer success in mission critical security environments. Establish and refine the sales qualification and POC intake process, ensuring well scoped engagements that maximize customer success and minimize friction for R&D. Competencies & Responsibilities 5+ years in a customer facing, pre sales or consulting role influencing technical executives, driving high level security strategy and product adoption. Experience with design and implementation of data and AI applications in cybersecurity, including anomaly detection, behavioral analytics, and agentic AI workflows for triage and investigation. Proficient in programming, debugging, and problem solving using SQL and Python and with AI tools. Experience collaborating with Global System Integrators (GSIs) and third party consulting organizations to drive customer outcomes in cybersecurity. Hands on experience building solutions within major public cloud environments (AWS, Azure, or GCP), with an understanding of cloud native security logging and monitoring. Deep experience in security operations, with broad familiarity across one or more of the following: data engineering, data warehousing, AI/ML for security, data governance, and streaming. Undergraduate degree (or higher) in a technical field such as Computer Science, Cybersecurity, Applied Mathematics, Engineering or similar. Our Commitment to Diversity and Inclusion At Databricks, we are committed to fostering a diverse and inclusive culture where everyone can excel. We take great care to ensure that our hiring practices are inclusive and meet equal employment opportunity standards. Individuals looking for employment at Databricks are considered without regard to age, color, disability, ethnicity, family or marital status, gender identity or expression, language, national origin, physical and mental ability, political affiliation, race, religion, sexual orientation, socio economic status, veteran status, and other protected characteristics. Compliance If access to export controlled technology or source code is required for performance of job duties, it is within Employer's discretion whether to apply for a U.S. government license for such positions, and Employer may decline to proceed with an applicant on this basis alone.
May 16, 2026
Full time
Requisition ID: FEQ427R217 Sr. Solutions Architect (Lakewatch - EMEA) The Solutions Architect (Lakewatch) team executes on Databricks' strategic Product Operating Model that provides enhanced focus on earlier stage, highly prioritized product lines in order to establish product market fit, and set the course for rapid revenue growth. They are part of a global go to market team mandate, though individually will cover a specific, local region. Clients may span across one or more business units and verticals. By working in partnership with direct account teams, they will jointly engage clients, foster the necessary relationships, position in-depth the specific product line, so as to provide compelling reasons for clients to adopt and grow the usage of the given product. They understand the appropriate approach, the guardrails, and the steps needed to successfully adopt the product line, as clients deliver on their business objectives. The Solutions Architect (Lakewatch) is paired with an Account Executive aligned to the product line with specific targets accordingly. Together, they will devise and implement a strategy across their assigned set of accounts, develop presentations, demos and other assets and deliver them such that customers make an informed decision as they decide to adopt the product line in a meaningful way. The Lakewatch product line requires the following core technical competencies: 5+ years of cybersecurity engineering, security operations (SecOps), or security architecture expertise, with a proven track record of designing and delivering customer facing security solutions (of which 3+ years are in a customer facing, pre sales or consulting role). Experience with design and implementation of data and AI applications in cybersecurity, including anomaly detection, behavioral analytics, and agentic AI workflows for triage and investigation. Deep familiarity with SIEM platforms (Splunk, Microsoft Sentinel, QRadar, or similar), including deployment, tuning, detection engineering, and migration strategies. Familiarity with SOAR platforms is also desirable. Strong understanding of the security telemetry landscape: endpoint (EDR/XDR), network (firewall, DNS, proxy), identity (Okta, Entra ID), cloud (AWS CloudTrail, Azure Activity Log, GCP Audit), and SaaS application logs. Familiarity with standards such as OCSF. Experience with "detection as code" workflows, including rule authoring in SQL or YAML, CI/CD integration for detection pipelines, and MITRE ATT&CK framework mapping. Credibility in influencing security analytics products with the market insight needed to shape and prioritize roadmap capabilities. The impact you will have Provide technical leadership to guide strategic customers to successful implementations on big data projects, ranging from architectural design to data engineering to model deployment. Collaborate with GTM leadership and account teams to design and execute high impact engagement strategies across your territory, driving Lakewatch adoption from initial data offload through full SIEM augmentation or replacement. As a trusted advisor, serve as an expert Solutions Architect building technical credibility with CISOs, security architects, SOC leadership, and security analysts to drive product adoption and vision. Enable clients at scale through workshops, POC execution, and developing customer facing collateral that increases technical knowledge and demonstrates the value of an open agentic SIEM architecture. Influence product roadmap by translating field derived, data driven insights into strategic recommendations for Product and Engineering teams. Handle the most complex technical challenges in this product line by acting as the tier 3 escalation point for the field, ensuring customer success in mission critical security environments. Establish and refine the sales qualification and POC intake process, ensuring well scoped engagements that maximize customer success and minimize friction for R&D. Competencies & Responsibilities 5+ years in a customer facing, pre sales or consulting role influencing technical executives, driving high level security strategy and product adoption. Experience with design and implementation of data and AI applications in cybersecurity, including anomaly detection, behavioral analytics, and agentic AI workflows for triage and investigation. Proficient in programming, debugging, and problem solving using SQL and Python and with AI tools. Experience collaborating with Global System Integrators (GSIs) and third party consulting organizations to drive customer outcomes in cybersecurity. Hands on experience building solutions within major public cloud environments (AWS, Azure, or GCP), with an understanding of cloud native security logging and monitoring. Deep experience in security operations, with broad familiarity across one or more of the following: data engineering, data warehousing, AI/ML for security, data governance, and streaming. Undergraduate degree (or higher) in a technical field such as Computer Science, Cybersecurity, Applied Mathematics, Engineering or similar. Our Commitment to Diversity and Inclusion At Databricks, we are committed to fostering a diverse and inclusive culture where everyone can excel. We take great care to ensure that our hiring practices are inclusive and meet equal employment opportunity standards. Individuals looking for employment at Databricks are considered without regard to age, color, disability, ethnicity, family or marital status, gender identity or expression, language, national origin, physical and mental ability, political affiliation, race, religion, sexual orientation, socio economic status, veteran status, and other protected characteristics. Compliance If access to export controlled technology or source code is required for performance of job duties, it is within Employer's discretion whether to apply for a U.S. government license for such positions, and Employer may decline to proceed with an applicant on this basis alone.
Informed Recruitment
IT Platforms Manager - M365/SharePoint/Enterprise
Informed Recruitment Lymm, Cheshire
Do you have experience of managing applications and interfaces? Do you have experience of managing Microsoft 365 applications with strong SharePoint skills? Let Informed Recruitment help you to achieve your potential with an exciting opportunity for a Systems to manage the ongoing operation, efficiencies, implementations, and upgrades of a digital estate of applications for a respected, modern, & established social enterprise in the midst of a digital transformation and service improvement programme. The main purpose of the role is to take responsibility for the end-to-end ownership and improvement of the organisation's application estate and any associated integration. You will act as product owner and manage the application roadmap, continuous improvement and upgrades, whilst promoting usability, adoption and value. Further day-to-day activities will include project managing implementations and upgrades; stakeholder management and reporting; third-party supplier management; product roadmap creation and maintenance; project management; support service provision; maintenance of super user network; data integrity and security; and the production of systems documentation and training. Essential Experience working in a Business Systems Manager, Applications Manager, Applications Team Lead, Senior Applications Analyst capacity. Strong experience of application lifecycle management across an estate of SaaS and hybrid applications. Strong Microsoft 365 applications and services experience in an organisational setting. Hands on experience managing SharePoint Online. Experience of working with core business enterprise systems with Finance, CRM, HR & Payroll, etc Project Management/Lead experience. Experience working on projects to install or upgrade commercial SaaS software applications (implementation/upgrade, build, configuration, UAT/testing, UX, training, support) and on service improvements. Mentoring or Leading teams, line management, and/or performance management and motivation. Strong supplier management capabilities. Desirable Relevant certification, such as Microsoft, vendor-specific, PRINCE2, ITIL, etc Experience implementing or operating Microsoft Purview capabilities. Azure Power Apps As an individual you will be analytical with excellent problem-solving skills. You will be a strong communicator both verbally and in presentation with a strong focus on customer service. Alongside a competitive salary you will receive an impressive benefits package that includes a strong contributory pension, healthcare flexible working, generous leave entitlement and professional development. The role is offered on a hybrid basis with two days per week in the office in the Northwest, with the rest of the time working from home. If this role describes you, then please apply without delay for the opportunity to continue your career with a driven yet friendly organisation embarking on a period of system enhancements designed to provide a better service to customers. Informed Recruitment Limited acts as an Employment Agency in respect to this vacancy as defined by the Employment Agencies Act. We are an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, colour, religion, gender, national origin, disability status, or any other basis protected by appropriate law. All hiring decisions are made based on merit, competence, and business need. As defined under the General Data Protection Regulation (GDPR), Informed Recruitment is a Data Controller and a Data Processor, and our legal basis for processing your personal data is 'Legitimate Interests'. You have the right to object to us processing your data in this way. For more information about this, your rights, and our approach to Data Protection and Privacy, please visit our website.
May 16, 2026
Full time
Do you have experience of managing applications and interfaces? Do you have experience of managing Microsoft 365 applications with strong SharePoint skills? Let Informed Recruitment help you to achieve your potential with an exciting opportunity for a Systems to manage the ongoing operation, efficiencies, implementations, and upgrades of a digital estate of applications for a respected, modern, & established social enterprise in the midst of a digital transformation and service improvement programme. The main purpose of the role is to take responsibility for the end-to-end ownership and improvement of the organisation's application estate and any associated integration. You will act as product owner and manage the application roadmap, continuous improvement and upgrades, whilst promoting usability, adoption and value. Further day-to-day activities will include project managing implementations and upgrades; stakeholder management and reporting; third-party supplier management; product roadmap creation and maintenance; project management; support service provision; maintenance of super user network; data integrity and security; and the production of systems documentation and training. Essential Experience working in a Business Systems Manager, Applications Manager, Applications Team Lead, Senior Applications Analyst capacity. Strong experience of application lifecycle management across an estate of SaaS and hybrid applications. Strong Microsoft 365 applications and services experience in an organisational setting. Hands on experience managing SharePoint Online. Experience of working with core business enterprise systems with Finance, CRM, HR & Payroll, etc Project Management/Lead experience. Experience working on projects to install or upgrade commercial SaaS software applications (implementation/upgrade, build, configuration, UAT/testing, UX, training, support) and on service improvements. Mentoring or Leading teams, line management, and/or performance management and motivation. Strong supplier management capabilities. Desirable Relevant certification, such as Microsoft, vendor-specific, PRINCE2, ITIL, etc Experience implementing or operating Microsoft Purview capabilities. Azure Power Apps As an individual you will be analytical with excellent problem-solving skills. You will be a strong communicator both verbally and in presentation with a strong focus on customer service. Alongside a competitive salary you will receive an impressive benefits package that includes a strong contributory pension, healthcare flexible working, generous leave entitlement and professional development. The role is offered on a hybrid basis with two days per week in the office in the Northwest, with the rest of the time working from home. If this role describes you, then please apply without delay for the opportunity to continue your career with a driven yet friendly organisation embarking on a period of system enhancements designed to provide a better service to customers. Informed Recruitment Limited acts as an Employment Agency in respect to this vacancy as defined by the Employment Agencies Act. We are an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, colour, religion, gender, national origin, disability status, or any other basis protected by appropriate law. All hiring decisions are made based on merit, competence, and business need. As defined under the General Data Protection Regulation (GDPR), Informed Recruitment is a Data Controller and a Data Processor, and our legal basis for processing your personal data is 'Legitimate Interests'. You have the right to object to us processing your data in this way. For more information about this, your rights, and our approach to Data Protection and Privacy, please visit our website.
Technical Business Analyst
Fyre Global Ltd Reading, Oxfordshire
Technical Business Analyst - Agile / Geospatial / Real-Time Systems - Hybrid, Berkshire (Predominantly Remote) This is not a sit in meetings and write requirements documents kind of BA role. It s much more hands-on, technical, and delivery-focused. We're working with an engineering-led business building software and hardware-integrated platforms across areas like airspace monitoring, security systems, and real-time operational technology. They re looking for a Technical Business Analyst who is comfortable sitting between engineering teams, operational users, and project delivery. What you ll be doing: Gathering and refining requirements with technical and operational stakeholders Writing structured user stories and acceptance criteria in Azure DevOps Supporting Agile delivery across sprint planning, backlog refinement, and demos Producing workflows, user journeys, and wireframes Working closely with Architects, developers, and testers on complex real-world systems Supporting deployments, demonstrations, and operational trials What they re looking for: Strong Agile BA experience (Scrum / DSDM) Experience writing user stories and BDD acceptance criteria Ability to work in technical environments rather than purely business-facing projects Strong stakeholder management and communication skills Any experience around radar, RF systems, sensors, aerospace, aviation, defence, networking, or real-time platforms would be a big advantage. The kind of person who ll do well here: You re comfortable in technical conversations You enjoy solving problems rather than just documenting them You can work with both engineers and end users You re happy operating in environments where software meets hardware and operations Hybrid working. Long-term opportunity. Genuinely interesting technology.
May 16, 2026
Full time
Technical Business Analyst - Agile / Geospatial / Real-Time Systems - Hybrid, Berkshire (Predominantly Remote) This is not a sit in meetings and write requirements documents kind of BA role. It s much more hands-on, technical, and delivery-focused. We're working with an engineering-led business building software and hardware-integrated platforms across areas like airspace monitoring, security systems, and real-time operational technology. They re looking for a Technical Business Analyst who is comfortable sitting between engineering teams, operational users, and project delivery. What you ll be doing: Gathering and refining requirements with technical and operational stakeholders Writing structured user stories and acceptance criteria in Azure DevOps Supporting Agile delivery across sprint planning, backlog refinement, and demos Producing workflows, user journeys, and wireframes Working closely with Architects, developers, and testers on complex real-world systems Supporting deployments, demonstrations, and operational trials What they re looking for: Strong Agile BA experience (Scrum / DSDM) Experience writing user stories and BDD acceptance criteria Ability to work in technical environments rather than purely business-facing projects Strong stakeholder management and communication skills Any experience around radar, RF systems, sensors, aerospace, aviation, defence, networking, or real-time platforms would be a big advantage. The kind of person who ll do well here: You re comfortable in technical conversations You enjoy solving problems rather than just documenting them You can work with both engineers and end users You re happy operating in environments where software meets hardware and operations Hybrid working. Long-term opportunity. Genuinely interesting technology.
Sr. Analyst, Falcon Complete (Remote, GBR)
CrowdStrike Holdings, Inc.
About the Role: CrowdStrike is looking for highly motivated, self-driven, technical analysts dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world. Our CrowdStrike virtual security operations center offers opportunities to expand your skill set through a wide variety of experiences, detecting and responding to incidents as they occur in real-time for our customers. What You'll Do: Conduct monitoring and perform in-depth analysis of security alerts. Exercise incident handling processes across Windows, Mac, and Linux platforms. Perform malware analysis. Perform remote remediation of malware or malicious activity. Develop and improve processes for incident detection, triage, and the execution of countermeasures Produce high-quality written and verbal communications, recommendations, and findings to customer management. Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events. Manage internal programs or teams. Serve as the technical escalation point and mentor for lower-level analysts. Provide oversight and quality assurance for issues worked by lower-level analysts. Assist in the advancement of security processes and procedures. What You'll Need: Successful candidates will have experience in one or more of the following areas: Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists. Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise. Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation. Network Forensic Analysis: knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs. Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations. Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations. Programming/Scripting: experience coding in Powershell, C, C#, VB, Python, Perl, Ruby on Rails, and.NET. Education: BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or a related field. Bonus Points: 4-6 years of relevant incident handling experience At least one relevant security certification Strong verbal and communication skills Strong problem solving skills Strong experience with Mac OS, Windows, and Unix operating systems. Ability to handle high pressure situations in a productive and professional manner. Strong time management skills with the ability to multi-task Benefits of Working at CrowdStrike: Market leader in compensation and equity awards Comprehensive physical and mental wellness programs Competitive vacation and holidays for recharge Paid parental and adoption leaves Professional development opportunities for all employees regardless of level or role Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections Vibrant office culture with world class amenities Great Place to Work Certified(TM) across the globeCrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs on valid job requirements.If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at for further assistance.
May 16, 2026
Full time
About the Role: CrowdStrike is looking for highly motivated, self-driven, technical analysts dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world. Our CrowdStrike virtual security operations center offers opportunities to expand your skill set through a wide variety of experiences, detecting and responding to incidents as they occur in real-time for our customers. What You'll Do: Conduct monitoring and perform in-depth analysis of security alerts. Exercise incident handling processes across Windows, Mac, and Linux platforms. Perform malware analysis. Perform remote remediation of malware or malicious activity. Develop and improve processes for incident detection, triage, and the execution of countermeasures Produce high-quality written and verbal communications, recommendations, and findings to customer management. Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events. Manage internal programs or teams. Serve as the technical escalation point and mentor for lower-level analysts. Provide oversight and quality assurance for issues worked by lower-level analysts. Assist in the advancement of security processes and procedures. What You'll Need: Successful candidates will have experience in one or more of the following areas: Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists. Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise. Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation. Network Forensic Analysis: knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs. Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations. Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations. Programming/Scripting: experience coding in Powershell, C, C#, VB, Python, Perl, Ruby on Rails, and.NET. Education: BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or a related field. Bonus Points: 4-6 years of relevant incident handling experience At least one relevant security certification Strong verbal and communication skills Strong problem solving skills Strong experience with Mac OS, Windows, and Unix operating systems. Ability to handle high pressure situations in a productive and professional manner. Strong time management skills with the ability to multi-task Benefits of Working at CrowdStrike: Market leader in compensation and equity awards Comprehensive physical and mental wellness programs Competitive vacation and holidays for recharge Paid parental and adoption leaves Professional development opportunities for all employees regardless of level or role Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections Vibrant office culture with world class amenities Great Place to Work Certified(TM) across the globeCrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs on valid job requirements.If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at for further assistance.
Gold Group
Combat Systems Consultant
Gold Group Southwick, Hampshire
Job Title: Combat Systems Consultant Location: Portsmouth - 2 days/week in office Role Type: Permanent Salary: 70,000 - 76,200 + 12.5% Bonus + 510/month Car Allowance Our client, an established defence engineering firm, require an experienced Combat Systems Consultant to join their multi-disciplined team in Portsmouth. This is a brand new role where this small team of engineers & analysts are focused on informing business strategy, campaigns and future product development, seeking to understand the customers challenges, inform the business response, be this in regard to short-term opportunities, or longer-term strategic positioning. What the role of the Combat Systems Consultant entails: Supporting group analysis tasks, identifying and scoping aspects of the technical support required to deliver the task, and supporting inter and intra-business discussions to facilitate this Providing Combat Systems expertise in support of the Operational Analysis team ensuring the analysis has the best (within reason and classification) representation and understanding of the performance and capabilities of the differing Combat System equipment Using personal experience to provide technical insights with regard to current and near-future capabilities in sense, decide and effect, specifically with any emphasis on real-world limitations and constraints, especially in the Maritime environment Supporting modelling and wargaming activities at all levels, providing Combat Systems engineering subject matter expertise where appropriate Providing insight into typical combat platform operations and the application of various sense, decide and effect capabilities within this context Conduct targeted research to support Operational Analysis, including enabling value-add engagement with academia and industry, addressing Maritime & Land sector knowledge gaps, and developing long-term (20-25 year) technology roadmaps to inform future capability evolution What experience you need to be the successful Combat Systems Consultant: Degree-qualified (or equivalent) with relevant professional experience in engineering, defence, or combat systems Strong & thorough expertise in combat systems Robust engineering background underpinning the analysis, development, and integration of complex defence systems Ability to challenge established norms, draw on specialist networks, and apply innovative, inclusive thinking to problem-solving and solution development Strong experience engaging senior stakeholders, particularly customers, with a proven ability to build trusted, mutually beneficial relationships Candidates would need to hold British nationality and have lived & worked in the UK for 5+ years and be eligible for SC security clearance. This really is a fantastic opportunity for a Combat Systems Consultant to progress their career. If you are interested please apply as soon as possible as this position will be filled quickly so don't miss out! Services advertised by Gold Group are those of an Agency and/or an Employment Business. We will contact you within the next 14 days if you are selected for interview. For a copy of our privacy policy please visit our website.
May 16, 2026
Full time
Job Title: Combat Systems Consultant Location: Portsmouth - 2 days/week in office Role Type: Permanent Salary: 70,000 - 76,200 + 12.5% Bonus + 510/month Car Allowance Our client, an established defence engineering firm, require an experienced Combat Systems Consultant to join their multi-disciplined team in Portsmouth. This is a brand new role where this small team of engineers & analysts are focused on informing business strategy, campaigns and future product development, seeking to understand the customers challenges, inform the business response, be this in regard to short-term opportunities, or longer-term strategic positioning. What the role of the Combat Systems Consultant entails: Supporting group analysis tasks, identifying and scoping aspects of the technical support required to deliver the task, and supporting inter and intra-business discussions to facilitate this Providing Combat Systems expertise in support of the Operational Analysis team ensuring the analysis has the best (within reason and classification) representation and understanding of the performance and capabilities of the differing Combat System equipment Using personal experience to provide technical insights with regard to current and near-future capabilities in sense, decide and effect, specifically with any emphasis on real-world limitations and constraints, especially in the Maritime environment Supporting modelling and wargaming activities at all levels, providing Combat Systems engineering subject matter expertise where appropriate Providing insight into typical combat platform operations and the application of various sense, decide and effect capabilities within this context Conduct targeted research to support Operational Analysis, including enabling value-add engagement with academia and industry, addressing Maritime & Land sector knowledge gaps, and developing long-term (20-25 year) technology roadmaps to inform future capability evolution What experience you need to be the successful Combat Systems Consultant: Degree-qualified (or equivalent) with relevant professional experience in engineering, defence, or combat systems Strong & thorough expertise in combat systems Robust engineering background underpinning the analysis, development, and integration of complex defence systems Ability to challenge established norms, draw on specialist networks, and apply innovative, inclusive thinking to problem-solving and solution development Strong experience engaging senior stakeholders, particularly customers, with a proven ability to build trusted, mutually beneficial relationships Candidates would need to hold British nationality and have lived & worked in the UK for 5+ years and be eligible for SC security clearance. This really is a fantastic opportunity for a Combat Systems Consultant to progress their career. If you are interested please apply as soon as possible as this position will be filled quickly so don't miss out! Services advertised by Gold Group are those of an Agency and/or an Employment Business. We will contact you within the next 14 days if you are selected for interview. For a copy of our privacy policy please visit our website.
hireful
Service Desk Analyst
hireful
Fancy joining this global organisation as an IT Service Desk Analyst and become the first point of contact for IT support across a fast-growing organisation of over 250 associates. This is a hands-on, customer-facing role where you will play a key part in keeping our business running smoothly across hardware, software, networks, and cloud services. You will provide first-line IT support across multiple sites, managing incidents and service requests through the Service Desk system while ensuring issues are logged, tracked, and resolved efficiently. Acting as the face of IT, you will support users at all levels, troubleshoot Windows 11, Microsoft 365, Active Directory, VPN, LAN/WAN connectivity, and device provisioning using tools such as Microsoft Intune. You will also assist with telephony systems, including cloud contact centres, and support infrastructure and cybersecurity initiatives. Beyond day-to-day support, you will help maintain documentation, improve processes, identify recurring issues, and contribute to small IT projects. You will also be involved in onboarding new starters, training users, and ensuring accurate asset and software records are maintained. Role: IT Service Desk Analyst, IT Support Analyst, Service Desk Technician, IT Helpdesk Analyst, Technical Support Analyst, 1st Line IT Support, First Line IT Support etc. Location: Milton Keynes Salary: Highly competitive base + awesome benefits We are looking for someone with at least 3 years IT support experience, strong problem-solving skills, excellent communication, and a proactive mindset. Experience with ITIL, Active Directory, Office 365, and cloud-based technologies is highly desirable. You will join a supportive, forward-thinking business that invests in your development, offering protected learning time, strong benefits, and real opportunities to grow within a global organisation.
May 15, 2026
Full time
Fancy joining this global organisation as an IT Service Desk Analyst and become the first point of contact for IT support across a fast-growing organisation of over 250 associates. This is a hands-on, customer-facing role where you will play a key part in keeping our business running smoothly across hardware, software, networks, and cloud services. You will provide first-line IT support across multiple sites, managing incidents and service requests through the Service Desk system while ensuring issues are logged, tracked, and resolved efficiently. Acting as the face of IT, you will support users at all levels, troubleshoot Windows 11, Microsoft 365, Active Directory, VPN, LAN/WAN connectivity, and device provisioning using tools such as Microsoft Intune. You will also assist with telephony systems, including cloud contact centres, and support infrastructure and cybersecurity initiatives. Beyond day-to-day support, you will help maintain documentation, improve processes, identify recurring issues, and contribute to small IT projects. You will also be involved in onboarding new starters, training users, and ensuring accurate asset and software records are maintained. Role: IT Service Desk Analyst, IT Support Analyst, Service Desk Technician, IT Helpdesk Analyst, Technical Support Analyst, 1st Line IT Support, First Line IT Support etc. Location: Milton Keynes Salary: Highly competitive base + awesome benefits We are looking for someone with at least 3 years IT support experience, strong problem-solving skills, excellent communication, and a proactive mindset. Experience with ITIL, Active Directory, Office 365, and cloud-based technologies is highly desirable. You will join a supportive, forward-thinking business that invests in your development, offering protected learning time, strong benefits, and real opportunities to grow within a global organisation.
TEKsystems
EPIC Consultant (Optime And Anesthesia)
TEKsystems Reading, Berkshire
Description Role: Senior Analyst Location: London (Hybrid) Type: Contract to Perm Duration: 18 months contract Engagement: PAYE TEKsystems are seeking a Senior Analyst to join a team to support the ongoing optimisation of Epic OpTime and Anesthesia. The Senior Epic Analyst will be a subject matter expert responsible for leading end to end life cycle activities: design, configuration, optimisation, and ongoing support with a primary focus on OpTime and Anesthesia. This role partners closely with clinical, operational and IT stakeholders to ensure Epic supports safe, efficient and high-quality surgical and Anesthesia workflows across the perioperative continuum. Required Qualifications 3 + years of Epic application experience, with deep focus on OpTime and Anesthesia Epic OpTime Certification (required) Epic Anesthesia Certification (required) Strong understanding of perioperative and anaesthesia clinical workflows experience working directly with clinical stakeholders in a hospital or surgical environment Proven ability to lead complex build and optimisation efforts independently Additional Qualification/experience experience with Epic Lumen is a bonus experience with Epic Cupid is a bonus Skills EPIC EHR EPIC OpTime EPIC Anesthesia EPIC LUMENS EPIC CUPID triage troubleshooting workflow pharmacy Job Title: EPIC Consultant (Optime And Anesthesia) Location: Reading, UK Job Type: Contract Trading as TEKsystems. Allegis Group Limited, Bracknell, RG12 1RT, United Kingdom. No Allegis Group Limited operates as an Employment Business and Employment Agency as set out in the Conduct of Employment Agencies and Employment Businesses Regulations 2003. TEKsystems is a company within the Allegis Group network of companies (collectively referred to as "Allegis Group"). Aerotek, Aston Carter, EASi, Talentis Solutions, TEKsystems, Stamford Consultants and The Stamford Group are Allegis Group brands. If you apply, your personal data will be processed as described in the Allegis Group Online Privacy Notice available at our website. To access our Online Privacy Notice, which explains what information we may collect, use, share, and store about you, and describes your rights and choices about this, please go our website. We are part of a global network of companies and as a result, the personal data you provide will be shared within Allegis Group and transferred and processed outside the UK, Switzerland and European Economic Area subject to the protections described in the Allegis Group Online Privacy Notice. We store personal data in the UK, EEA, Switzerland and the USA. If you would like to exercise your privacy rights, please visit the "Contacting Us" section of our Online Privacy Notice on our website for details on how to contact us. To protect your privacy and security, we may take steps to verify your identity, such as a password and user ID if there is an account associated with your request, or identifying information such as your address or date of birth, before proceeding with your request. commitments under the UK Data Protection Act, EU-U.S. Privacy Shield or the Swiss-U.S. Privacy Shield.
May 15, 2026
Description Role: Senior Analyst Location: London (Hybrid) Type: Contract to Perm Duration: 18 months contract Engagement: PAYE TEKsystems are seeking a Senior Analyst to join a team to support the ongoing optimisation of Epic OpTime and Anesthesia. The Senior Epic Analyst will be a subject matter expert responsible for leading end to end life cycle activities: design, configuration, optimisation, and ongoing support with a primary focus on OpTime and Anesthesia. This role partners closely with clinical, operational and IT stakeholders to ensure Epic supports safe, efficient and high-quality surgical and Anesthesia workflows across the perioperative continuum. Required Qualifications 3 + years of Epic application experience, with deep focus on OpTime and Anesthesia Epic OpTime Certification (required) Epic Anesthesia Certification (required) Strong understanding of perioperative and anaesthesia clinical workflows experience working directly with clinical stakeholders in a hospital or surgical environment Proven ability to lead complex build and optimisation efforts independently Additional Qualification/experience experience with Epic Lumen is a bonus experience with Epic Cupid is a bonus Skills EPIC EHR EPIC OpTime EPIC Anesthesia EPIC LUMENS EPIC CUPID triage troubleshooting workflow pharmacy Job Title: EPIC Consultant (Optime And Anesthesia) Location: Reading, UK Job Type: Contract Trading as TEKsystems. Allegis Group Limited, Bracknell, RG12 1RT, United Kingdom. No Allegis Group Limited operates as an Employment Business and Employment Agency as set out in the Conduct of Employment Agencies and Employment Businesses Regulations 2003. TEKsystems is a company within the Allegis Group network of companies (collectively referred to as "Allegis Group"). Aerotek, Aston Carter, EASi, Talentis Solutions, TEKsystems, Stamford Consultants and The Stamford Group are Allegis Group brands. If you apply, your personal data will be processed as described in the Allegis Group Online Privacy Notice available at our website. To access our Online Privacy Notice, which explains what information we may collect, use, share, and store about you, and describes your rights and choices about this, please go our website. We are part of a global network of companies and as a result, the personal data you provide will be shared within Allegis Group and transferred and processed outside the UK, Switzerland and European Economic Area subject to the protections described in the Allegis Group Online Privacy Notice. We store personal data in the UK, EEA, Switzerland and the USA. If you would like to exercise your privacy rights, please visit the "Contacting Us" section of our Online Privacy Notice on our website for details on how to contact us. To protect your privacy and security, we may take steps to verify your identity, such as a password and user ID if there is an account associated with your request, or identifying information such as your address or date of birth, before proceeding with your request. commitments under the UK Data Protection Act, EU-U.S. Privacy Shield or the Swiss-U.S. Privacy Shield.
NonStop Consulting
OT Cyber Security Analyst
NonStop Consulting Southmoor, Oxfordshire
Role: OT Cyber Security Analyst Location: Culham - 2 days per week on site (hybrid) Contract length: Until 18/12/2026 Day rate: Approx. 50/hour (Umbrella) or 36.43/hour (PAYE) IR35: In scope This role sits at the heart of operational technology security within critical infrastructure, giving you the chance to shape and mature OT security controls and governance in a highly visible environment. What you will be doing Implement, operate, and continuously improve OT security controls and monitoring capabilities across complex OT environments. Apply and embed an OT Security Strategy, policies, and standards across industrial control and critical infrastructure systems. Align OT security with leading frameworks such as IEC 62443, NIST CSF, CAF and ISO 27001. Carry out OT security risk assessments, gap analyses and remediation planning. Work closely with operations, engineering teams and MSPs to ensure security controls are implemented and sustained. Contribute to governance artefacts - policies, standards and documentation that underpin OT security. Support integration with SIEM/SOC functions for OT environments. What our client is looking for Strong OT security experience within ICS or critical infrastructure - ideally from oil & gas, rail, chemical, or similar process industries. Hands-on experience implementing OT security strategies, policies and standards. Solid understanding of OT networks, segmentation and common industrial protocols. Familiarity with SIEM/SOC integration for OT environments. Experience working with operations/engineering teams and advising MSPs or third-party security providers. Excellent communication and documentation skills, especially around policies and standards. Maximum notice period of 2 weeks. Desirable Experience with OT asset discovery, monitoring and OT security tools. Exposure to regulatory requirements for critical infrastructure (e.g. NIS Directive, UK CAF). Understanding of project / service delivery lifecycles and ITSM controls. Security clearance Active SC clearance or SC that has lapsed within the last 12 months is required (no flexibility on this). This is a strong opportunity for someone who wants to work at the intersection of OT, cyber security and critical national infrastructure, with the stability of a contract running to the end of 2026.
May 15, 2026
Contractor
Role: OT Cyber Security Analyst Location: Culham - 2 days per week on site (hybrid) Contract length: Until 18/12/2026 Day rate: Approx. 50/hour (Umbrella) or 36.43/hour (PAYE) IR35: In scope This role sits at the heart of operational technology security within critical infrastructure, giving you the chance to shape and mature OT security controls and governance in a highly visible environment. What you will be doing Implement, operate, and continuously improve OT security controls and monitoring capabilities across complex OT environments. Apply and embed an OT Security Strategy, policies, and standards across industrial control and critical infrastructure systems. Align OT security with leading frameworks such as IEC 62443, NIST CSF, CAF and ISO 27001. Carry out OT security risk assessments, gap analyses and remediation planning. Work closely with operations, engineering teams and MSPs to ensure security controls are implemented and sustained. Contribute to governance artefacts - policies, standards and documentation that underpin OT security. Support integration with SIEM/SOC functions for OT environments. What our client is looking for Strong OT security experience within ICS or critical infrastructure - ideally from oil & gas, rail, chemical, or similar process industries. Hands-on experience implementing OT security strategies, policies and standards. Solid understanding of OT networks, segmentation and common industrial protocols. Familiarity with SIEM/SOC integration for OT environments. Experience working with operations/engineering teams and advising MSPs or third-party security providers. Excellent communication and documentation skills, especially around policies and standards. Maximum notice period of 2 weeks. Desirable Experience with OT asset discovery, monitoring and OT security tools. Exposure to regulatory requirements for critical infrastructure (e.g. NIS Directive, UK CAF). Understanding of project / service delivery lifecycles and ITSM controls. Security clearance Active SC clearance or SC that has lapsed within the last 12 months is required (no flexibility on this). This is a strong opportunity for someone who wants to work at the intersection of OT, cyber security and critical national infrastructure, with the stability of a contract running to the end of 2026.
Arden Resourcing Limited
IT Support Analyst (ERP) - Harrogate, On Site
Arden Resourcing Limited Harrogate, Yorkshire
IT Support Analyst (ERP) - Harrogate, On Site £30,000-£40,000 A well established and rapidly growing manufacturing client is seeking an ERP & IT Support Analyst to support the day-to-day operation and continuous improvement of business-critical systems across manufacturing, warehousing, and office environments. Key Responsibilities Provide 1st and 2nd line IT support across manufacturing, warehouse, and office teams Troubleshoot hardware, software, network, and user-related issues Support and maintain ERP, MES, warehouse management, and operational systems Assist with ERP upgrades, implementations, and future system developments Support shop-floor technology including scanners, printers, and production line systems Work closely with production and warehouse teams to minimise operational downtime Manage user accounts, permissions, and system access controls Coordinate with third-party suppliers and support providers Maintain IT documentation, asset registers, and support procedures Support IT security, backups, and disaster recovery processes Required Skills & Experience Previous experience within an IT Support or ERP Support role Strong ERP systems support experience within manufacturing or warehousing environments Experience supporting production, warehouse, or operational technologies Good understanding of Windows environments, Microsoft 365, and networking fundamentals Strong troubleshooting and problem-solving skills Ability to manage multiple priorities within a fast-paced manufacturing environment Excellent communication skills with both technical and non-technical users Hands-on, proactive approach with a willingness to learn and develop Desirable Skills Experience with ERP platforms Manufacturing execution systems (MES) or warehouse systems experience Exposure to IT infrastructure and operational technology environments Package Enhanced pension and life insurance Gym membership and wellbeing support Cycle to work scheme Enhanced maternity and paternity benefits Free parking and on-site facilities Long-term development opportunities within a growing business
May 15, 2026
Full time
IT Support Analyst (ERP) - Harrogate, On Site £30,000-£40,000 A well established and rapidly growing manufacturing client is seeking an ERP & IT Support Analyst to support the day-to-day operation and continuous improvement of business-critical systems across manufacturing, warehousing, and office environments. Key Responsibilities Provide 1st and 2nd line IT support across manufacturing, warehouse, and office teams Troubleshoot hardware, software, network, and user-related issues Support and maintain ERP, MES, warehouse management, and operational systems Assist with ERP upgrades, implementations, and future system developments Support shop-floor technology including scanners, printers, and production line systems Work closely with production and warehouse teams to minimise operational downtime Manage user accounts, permissions, and system access controls Coordinate with third-party suppliers and support providers Maintain IT documentation, asset registers, and support procedures Support IT security, backups, and disaster recovery processes Required Skills & Experience Previous experience within an IT Support or ERP Support role Strong ERP systems support experience within manufacturing or warehousing environments Experience supporting production, warehouse, or operational technologies Good understanding of Windows environments, Microsoft 365, and networking fundamentals Strong troubleshooting and problem-solving skills Ability to manage multiple priorities within a fast-paced manufacturing environment Excellent communication skills with both technical and non-technical users Hands-on, proactive approach with a willingness to learn and develop Desirable Skills Experience with ERP platforms Manufacturing execution systems (MES) or warehouse systems experience Exposure to IT infrastructure and operational technology environments Package Enhanced pension and life insurance Gym membership and wellbeing support Cycle to work scheme Enhanced maternity and paternity benefits Free parking and on-site facilities Long-term development opportunities within a growing business
Technify Talent Limited
Technical Business Analyst
Technify Talent Limited
Job Title: Technical Business Analyst Location: Remote We are seeking an experienced Technical Business Analyst to support the delivery of complex hardware and software integration programmes. This is a hands-on role within multi-disciplinary Agile teams, working closely with Architects, Project Managers, Product Owners, developers, testers, IT teams, and operational end users. You will play a key role in shaping requirements, ensuring traceability, and translating business and operational needs into structured, testable deliverables. Key Responsibilities Facilitate workshops with customers, stakeholders, and operational users to gather and refine requirements. Capture both functional and non-functional requirements, maintaining full end-to-end traceability. Apply structured prioritisation techniques such as MoSCoW in line with DSDM principles. Produce user journeys, workflows, and wireframes using tools such as Figma or Miro. Conduct user research activities including observation and contextual inquiry to identify usability improvements. Translate requirements into structured user stories within Azure DevOps (or similar tools). Define clear, testable acceptance criteria using Behaviour-Driven Development (Given/When/Then). Work closely with the Architect to ensure alignment between requirements and system architecture. Support sprint planning, backlog refinement, reviews, and demonstrations within Scrum teams. Contribute to high-level design documentation and system interaction artefacts. Liaise with IT teams on network and infrastructure setup for deployments and demonstrations. Support customer demonstrations and operational trials on-site where required. Required Experience Minimum 5 years experience as a Business Analyst in complex software or systems environments. Strong experience working within Agile delivery frameworks (DSDM and/or Scrum). Proven experience capturing and structuring requirements in Azure DevOps (or similar tools). Experience applying Behaviour-Driven Development principles to create testable acceptance criteria. Experience producing user journeys, workflows, and UX artefacts. Experience working directly with operational end users. Excellent communication, facilitation, and stakeholder management skills. Desirable Experience Experience working with hardware-integrated systems such as radar, RF detection, video analytics, or sensor-based platforms. Experience within aerospace, aviation, airport systems, security platforms, or critical infrastructure environments. Experience supporting system deployments, customer demonstrations, or live operational trials. Familiarity with networking concepts, infrastructure environments, or on-site system setup. Understanding of distributed systems, real-time platforms, or microservices architectures. Professional Business Analyst certification (CBAP, AgileBA, PMI-PBA, or equivalent). Ability to obtain UK Security Clearance.
May 15, 2026
Full time
Job Title: Technical Business Analyst Location: Remote We are seeking an experienced Technical Business Analyst to support the delivery of complex hardware and software integration programmes. This is a hands-on role within multi-disciplinary Agile teams, working closely with Architects, Project Managers, Product Owners, developers, testers, IT teams, and operational end users. You will play a key role in shaping requirements, ensuring traceability, and translating business and operational needs into structured, testable deliverables. Key Responsibilities Facilitate workshops with customers, stakeholders, and operational users to gather and refine requirements. Capture both functional and non-functional requirements, maintaining full end-to-end traceability. Apply structured prioritisation techniques such as MoSCoW in line with DSDM principles. Produce user journeys, workflows, and wireframes using tools such as Figma or Miro. Conduct user research activities including observation and contextual inquiry to identify usability improvements. Translate requirements into structured user stories within Azure DevOps (or similar tools). Define clear, testable acceptance criteria using Behaviour-Driven Development (Given/When/Then). Work closely with the Architect to ensure alignment between requirements and system architecture. Support sprint planning, backlog refinement, reviews, and demonstrations within Scrum teams. Contribute to high-level design documentation and system interaction artefacts. Liaise with IT teams on network and infrastructure setup for deployments and demonstrations. Support customer demonstrations and operational trials on-site where required. Required Experience Minimum 5 years experience as a Business Analyst in complex software or systems environments. Strong experience working within Agile delivery frameworks (DSDM and/or Scrum). Proven experience capturing and structuring requirements in Azure DevOps (or similar tools). Experience applying Behaviour-Driven Development principles to create testable acceptance criteria. Experience producing user journeys, workflows, and UX artefacts. Experience working directly with operational end users. Excellent communication, facilitation, and stakeholder management skills. Desirable Experience Experience working with hardware-integrated systems such as radar, RF detection, video analytics, or sensor-based platforms. Experience within aerospace, aviation, airport systems, security platforms, or critical infrastructure environments. Experience supporting system deployments, customer demonstrations, or live operational trials. Familiarity with networking concepts, infrastructure environments, or on-site system setup. Understanding of distributed systems, real-time platforms, or microservices architectures. Professional Business Analyst certification (CBAP, AgileBA, PMI-PBA, or equivalent). Ability to obtain UK Security Clearance.
Investment Banking - EMEA Business Services - Senior Associate - London
JPMorgan Chase & Co.
This is an exciting opportunity for someone who ishighlymotivated to work in a dynamic team and to contribute to our Investment Banking business. Ourmarket leadingEMEABusiness Services sector coverageteamis responsible forthe origination and execution of public and private M&A and capital markets transactions involving corporate and financial sponsor clients in the broader business servicessector. The team has a network of relationships with the most prominentbusiness servicescompaniesand investorsin the EMEA region acrossvarioussubsectorsincluding Professional Services, Testing/Inspection/Certification, Facility Services, Infra Services, Engineering, Distribution, Security, HRservicesand others. As an Associatein the EMEABusiness ServicesInvestment Bankingcoverage teamyou willhavean importantroleinmaintaininga strategic dialog with key clients and executing M&A andequity and financingcapital market transactions. You will play apivotalrole indealexecutionas well as marketing /clientcoverageworkingwithsenior bankersand analystsin the team.You will also have plenty of opportunities topartnerwith colleagues fromcountryand product teams (M&A, ECM,LeveragedFinance,etc.). Job responsibilities Develop content for strategic meetings with clientsregardingM&A or capital market transactions Interact with senior team members and client management teamson a daily basisto execute transactions and discuss strategic alternatives Define,guideand reviewdetailed valuation analysis, including DCF, trading comparables, transactioncomparablesand LBO analyses Define,guideand reviewdetailed combination and other financial analyses in the context of M&A transactions or pitch situations Provide leadership,mentorshipand supervision toanalysts Required qualifications,capabilitiesand skills Proveninvestment banking experience Outstanding ethics,integrityand judgment Proficientfinancialmodelling/valuation and analytical skills Ability to comfortably interact with clients in a professional and mature manner Comfort in and commitment to strong teamwork environment Highly organized, detail oriented and proactive Exceptional written and verbal communication skills with specific ability to communicate concepts and ideas concisely and defend their validity Preferred qualifications,capabilitiesand skills European language skill(on top of English) This role encompasses the performance of regulated activity. The successful candidate will therefore be subject to meeting regulatory requirements in the assessment of fitness, propriety,knowledgeand competence (as assessed by the Firm) and (whereappropriate)approval by the relevant regulatory authorities to carry out such activities.
May 14, 2026
Full time
This is an exciting opportunity for someone who ishighlymotivated to work in a dynamic team and to contribute to our Investment Banking business. Ourmarket leadingEMEABusiness Services sector coverageteamis responsible forthe origination and execution of public and private M&A and capital markets transactions involving corporate and financial sponsor clients in the broader business servicessector. The team has a network of relationships with the most prominentbusiness servicescompaniesand investorsin the EMEA region acrossvarioussubsectorsincluding Professional Services, Testing/Inspection/Certification, Facility Services, Infra Services, Engineering, Distribution, Security, HRservicesand others. As an Associatein the EMEABusiness ServicesInvestment Bankingcoverage teamyou willhavean importantroleinmaintaininga strategic dialog with key clients and executing M&A andequity and financingcapital market transactions. You will play apivotalrole indealexecutionas well as marketing /clientcoverageworkingwithsenior bankersand analystsin the team.You will also have plenty of opportunities topartnerwith colleagues fromcountryand product teams (M&A, ECM,LeveragedFinance,etc.). Job responsibilities Develop content for strategic meetings with clientsregardingM&A or capital market transactions Interact with senior team members and client management teamson a daily basisto execute transactions and discuss strategic alternatives Define,guideand reviewdetailed valuation analysis, including DCF, trading comparables, transactioncomparablesand LBO analyses Define,guideand reviewdetailed combination and other financial analyses in the context of M&A transactions or pitch situations Provide leadership,mentorshipand supervision toanalysts Required qualifications,capabilitiesand skills Proveninvestment banking experience Outstanding ethics,integrityand judgment Proficientfinancialmodelling/valuation and analytical skills Ability to comfortably interact with clients in a professional and mature manner Comfort in and commitment to strong teamwork environment Highly organized, detail oriented and proactive Exceptional written and verbal communication skills with specific ability to communicate concepts and ideas concisely and defend their validity Preferred qualifications,capabilitiesand skills European language skill(on top of English) This role encompasses the performance of regulated activity. The successful candidate will therefore be subject to meeting regulatory requirements in the assessment of fitness, propriety,knowledgeand competence (as assessed by the Firm) and (whereappropriate)approval by the relevant regulatory authorities to carry out such activities.
Contracts Consultancy Ltd
SOC Cyber Security Analyst
Contracts Consultancy Ltd
CYBER SECURITY ANALYST (SOC ANALYST) CCL Global are currently recruiting for a Cyber Security Analyst to support a high-security Security Operations Centre (SOC) environment within a critical national infrastructure setting. This role will play a key part in protecting enterprise systems by monitoring, detecting, analysing, and responding to cyber security threats in real time. Type of Contract: Contract (Inside IR35) Location: Bath (100% office) Contract Length: Until April 2027 Key Duties Will Include: Monitor, investigate, and triage security events and alerts within a live SOC environment. Analyse security incidents to determine scope, impact, and priority, ensuring appropriate escalation and response. Manage end-to-end incident response activities from detection through to resolution. Support the development and enhancement of SIEM use cases, detection rules, analytics, and playbooks. Conduct real-time analysis of logs and security data to identify malicious activity or policy violations. Work closely with technical teams to support containment and remediation of security incidents. Support continuous improvement of SOC processes, tooling, and detection capability. Contribute to security reporting, documentation, and operational procedures. Requirements: Proven experience working as a SOC Analyst (Tier 2/3) within enterprise or critical environments. Strong experience with SIEM technologies (e.g. ArcSight or similar), including configuration and engineering support. Ability to triage security alerts and accurately assess risk, impact, and priority. Experience managing security incidents in real time within a SOC environment. Strong understanding of networking, cloud environments, and enterprise IT infrastructure. Experience creating and tuning detection use cases, analytics, and playbooks. Knowledge of Information Security principles, threat detection, and incident response practices. Familiarity with Microsoft technologies, Linux systems, and security tooling. Understanding of security frameworks and data protection principles including GDPR and the Data Protection Act 2018. Experience working within an ITIL-based service environment. Desirable: Industry-recognised cyber security certifications (e.g. SANS, ISC2). Experience within Defence, Government, or high-security environments. Degree in Cyber Security, Computing, Engineering, or related discipline. Experience in a senior SOC or lead analyst capacity.
May 14, 2026
Contractor
CYBER SECURITY ANALYST (SOC ANALYST) CCL Global are currently recruiting for a Cyber Security Analyst to support a high-security Security Operations Centre (SOC) environment within a critical national infrastructure setting. This role will play a key part in protecting enterprise systems by monitoring, detecting, analysing, and responding to cyber security threats in real time. Type of Contract: Contract (Inside IR35) Location: Bath (100% office) Contract Length: Until April 2027 Key Duties Will Include: Monitor, investigate, and triage security events and alerts within a live SOC environment. Analyse security incidents to determine scope, impact, and priority, ensuring appropriate escalation and response. Manage end-to-end incident response activities from detection through to resolution. Support the development and enhancement of SIEM use cases, detection rules, analytics, and playbooks. Conduct real-time analysis of logs and security data to identify malicious activity or policy violations. Work closely with technical teams to support containment and remediation of security incidents. Support continuous improvement of SOC processes, tooling, and detection capability. Contribute to security reporting, documentation, and operational procedures. Requirements: Proven experience working as a SOC Analyst (Tier 2/3) within enterprise or critical environments. Strong experience with SIEM technologies (e.g. ArcSight or similar), including configuration and engineering support. Ability to triage security alerts and accurately assess risk, impact, and priority. Experience managing security incidents in real time within a SOC environment. Strong understanding of networking, cloud environments, and enterprise IT infrastructure. Experience creating and tuning detection use cases, analytics, and playbooks. Knowledge of Information Security principles, threat detection, and incident response practices. Familiarity with Microsoft technologies, Linux systems, and security tooling. Understanding of security frameworks and data protection principles including GDPR and the Data Protection Act 2018. Experience working within an ITIL-based service environment. Desirable: Industry-recognised cyber security certifications (e.g. SANS, ISC2). Experience within Defence, Government, or high-security environments. Degree in Cyber Security, Computing, Engineering, or related discipline. Experience in a senior SOC or lead analyst capacity.
Vizion Network
Network Management Administrator
Vizion Network Hull, Yorkshire
Network Management Administrator Location: Hull Salary: £26,234 per annum What we offer 37.5 hours per week, Monday to Friday plus 1 in 6 Saturdays (8.30am - 12.30pm Employee health and benefits scheme, including anonymous counselling service, 24/7 GP service, retail and gym discounts and medical cashback scheme 21 days annual leave Additional birthday holiday Holiday purchase scheme Performance based salary increments Fun Company events and functions Free parking Monthly free food days Close to shops and amenities Reward and recognition Purpose To provide professional administrative support within the Network Management Team. The Administrator is responsible for systems management of the repairer network and repairer communication. Building relationships and customer care is very important in this role and must be sustained at all times. Role Profile Management of repairer information on our systems including Nucleus and Cortex. Ensure that new network repairers are set up and maintained correctly. Update systems on postcode changes, SLA additions/removals, repairers on and off hold. Administer full removal procedure of repairers leaving the network. Distribution of repairer communication and documents via mailshots and Docusign. Maintain Mailchimp database. Monitor weather and distribute warning alerts as and when required. Liaise with Network Performance Analysts and Controllers on sharing information on repairer updates and data changes. To receive incoming calls and emails and act promptly, dealing with all enquiries or actions in a professional manner. Manage Audatex repairer set up and assist with estimate failures The production and distribution of reports. To ensure the accurate and detailed recording of all information utilising our management systems to provide comprehensive audit trails. Always promote data security in and outside of the business, strict adherence to GDPR and information security standards. Manage complaints in line with policy. The completion of duties as required from time to time by the Management Team. Adhere to stated Company Policies and Procedures and carry out all duties in a way which is consistent with our clients' values. To promote our business and that of our clients by always providing exceptional and friendly service Person Specification Accurate data entry skills Good planning and organisational skills Able to build and maintain relationships Ability to work to agreed deadlines, targets and objectives Able to work as part of a team as well as autonomously to a high level of accuracy Excellent telephone and communication skills Good knowledge of Microsoft Office GCSE Maths and English To Apply If you feel you are a suitable candidate and would like to work for Vizion Network, please click apply to be redirected to our website to complete your application.
May 13, 2026
Full time
Network Management Administrator Location: Hull Salary: £26,234 per annum What we offer 37.5 hours per week, Monday to Friday plus 1 in 6 Saturdays (8.30am - 12.30pm Employee health and benefits scheme, including anonymous counselling service, 24/7 GP service, retail and gym discounts and medical cashback scheme 21 days annual leave Additional birthday holiday Holiday purchase scheme Performance based salary increments Fun Company events and functions Free parking Monthly free food days Close to shops and amenities Reward and recognition Purpose To provide professional administrative support within the Network Management Team. The Administrator is responsible for systems management of the repairer network and repairer communication. Building relationships and customer care is very important in this role and must be sustained at all times. Role Profile Management of repairer information on our systems including Nucleus and Cortex. Ensure that new network repairers are set up and maintained correctly. Update systems on postcode changes, SLA additions/removals, repairers on and off hold. Administer full removal procedure of repairers leaving the network. Distribution of repairer communication and documents via mailshots and Docusign. Maintain Mailchimp database. Monitor weather and distribute warning alerts as and when required. Liaise with Network Performance Analysts and Controllers on sharing information on repairer updates and data changes. To receive incoming calls and emails and act promptly, dealing with all enquiries or actions in a professional manner. Manage Audatex repairer set up and assist with estimate failures The production and distribution of reports. To ensure the accurate and detailed recording of all information utilising our management systems to provide comprehensive audit trails. Always promote data security in and outside of the business, strict adherence to GDPR and information security standards. Manage complaints in line with policy. The completion of duties as required from time to time by the Management Team. Adhere to stated Company Policies and Procedures and carry out all duties in a way which is consistent with our clients' values. To promote our business and that of our clients by always providing exceptional and friendly service Person Specification Accurate data entry skills Good planning and organisational skills Able to build and maintain relationships Ability to work to agreed deadlines, targets and objectives Able to work as part of a team as well as autonomously to a high level of accuracy Excellent telephone and communication skills Good knowledge of Microsoft Office GCSE Maths and English To Apply If you feel you are a suitable candidate and would like to work for Vizion Network, please click apply to be redirected to our website to complete your application.
Arden Resourcing
IT Support Analyst (ERP) - Harrogate, On Site
Arden Resourcing Beckwith, Yorkshire
IT Support Analyst (ERP) - Harrogate, On Site 30,000- 40,000 A well established and rapidly growing manufacturing client is seeking an ERP & IT Support Analyst to support the day-to-day operation and continuous improvement of business-critical systems across manufacturing, warehousing, and office environments. Key Responsibilities Provide 1st and 2nd line IT support across manufacturing, warehouse, and office teams Troubleshoot hardware, software, network, and user-related issues Support and maintain ERP, MES, warehouse management, and operational systems Assist with ERP upgrades, implementations, and future system developments Support shop-floor technology including scanners, printers, and production line systems Work closely with production and warehouse teams to minimise operational downtime Manage user accounts, permissions, and system access controls Coordinate with third-party suppliers and support providers Maintain IT documentation, asset registers, and support procedures Support IT security, backups, and disaster recovery processes Required Skills & Experience Previous experience within an IT Support or ERP Support role Strong ERP systems support experience within manufacturing or warehousing environments Experience supporting production, warehouse, or operational technologies Good understanding of Windows environments, Microsoft 365, and networking fundamentals Strong troubleshooting and problem-solving skills Ability to manage multiple priorities within a fast-paced manufacturing environment Excellent communication skills with both technical and non-technical users Hands-on, proactive approach with a willingness to learn and develop Desirable Skills Experience with ERP platforms Manufacturing execution systems (MES) or warehouse systems experience Exposure to IT infrastructure and operational technology environments Package Enhanced pension and life insurance Gym membership and wellbeing support Cycle to work scheme Enhanced maternity and paternity benefits Free parking and on-site facilities Long-term development opportunities within a growing business
May 13, 2026
Full time
IT Support Analyst (ERP) - Harrogate, On Site 30,000- 40,000 A well established and rapidly growing manufacturing client is seeking an ERP & IT Support Analyst to support the day-to-day operation and continuous improvement of business-critical systems across manufacturing, warehousing, and office environments. Key Responsibilities Provide 1st and 2nd line IT support across manufacturing, warehouse, and office teams Troubleshoot hardware, software, network, and user-related issues Support and maintain ERP, MES, warehouse management, and operational systems Assist with ERP upgrades, implementations, and future system developments Support shop-floor technology including scanners, printers, and production line systems Work closely with production and warehouse teams to minimise operational downtime Manage user accounts, permissions, and system access controls Coordinate with third-party suppliers and support providers Maintain IT documentation, asset registers, and support procedures Support IT security, backups, and disaster recovery processes Required Skills & Experience Previous experience within an IT Support or ERP Support role Strong ERP systems support experience within manufacturing or warehousing environments Experience supporting production, warehouse, or operational technologies Good understanding of Windows environments, Microsoft 365, and networking fundamentals Strong troubleshooting and problem-solving skills Ability to manage multiple priorities within a fast-paced manufacturing environment Excellent communication skills with both technical and non-technical users Hands-on, proactive approach with a willingness to learn and develop Desirable Skills Experience with ERP platforms Manufacturing execution systems (MES) or warehouse systems experience Exposure to IT infrastructure and operational technology environments Package Enhanced pension and life insurance Gym membership and wellbeing support Cycle to work scheme Enhanced maternity and paternity benefits Free parking and on-site facilities Long-term development opportunities within a growing business
Operations Resources
IT Security Analyst - Incident Response & Vulnerability Management
Operations Resources Cardiff, South Glamorgan
Job Title Level 3 Security Analyst - Incident Response & Vulnerability Management Department Service Delivery / Security Reporting To Security Lead / Service Delivery Manager Operates under the direction of the Incident Manager during security incidents Location UK (Hybrid) Office in Cardiff 1-2 days per week, regular client site travel. Working Pattern Monday to Friday with participation in the on-call Security and Major Incident rota as required Role Purpose The Level 3 Security Analyst is responsible for the technical investigation, containment, remediation, and resolution of IT security incidents and vulnerabilities across a complex, multi-site customer estate supported by "the MSP". The role acts as a senior technical authority for security incidents, working alongside Incident Management, Infrastructure, Network, and Application teams to ensure security issues are resolved end-to-end, correctly documented, and do not reoccur. Key Accountabilities - Security Incident Investigation & Response Act as the technical lead for the investigation of security incidents across supported platforms. Investigate malware, ransomware, account compromise, unauthorised access, suspicious activity, and security misconfiguration. Perform detailed root cause analysis across endpoint, identity, network, and application layers. Advise the Incident Manager on incident scope, impact, containment, eradication strategy, and recovery validation. Drive incidents through to full technical resolution, not temporary mitigation. Key Accountabilities - Vulnerability Management Investigate vulnerabilities identified via scanning platforms, endpoint and cloud tooling, supplier disclosures, and audit activity. Assess risk based on exploitability, exposure, and operational impact. Own remediation actions end-to-end, coordinating with Infrastructure, Network, and third-party suppliers. Validate remediation and ensure appropriate evidence is captured for assurance and audit. Platforms & Technology Scope End-user devices including Windows, macOS, tablets, and peripherals. Microsoft 365 including Entra ID, Exchange, SharePoint, Defender, and endpoint protection. Identity and Access Management including privileged and service accounts. On-premises and cloud-hosted servers. Network infrastructure including firewalls, switches, wireless, and WAN connectivity. Cloud-hosted and supplier-managed applications. Documentation, Audit & Continuous Improvement Produce clear, technically accurate documentation covering incidents, root cause analysis, and corrective actions. Support governance, customer assurance, and audit requirements. Contribute to post-incident reviews and lessons learned. Identify recurring issues and recommend long-term improvements. Ensure incidents and vulnerabilities are correctly logged and tracked within ITSM systems. Collaboration & Escalation Work closely with Incident Managers, Security specialists, and Level 3 Infrastructure and Network teams. Act as a senior escalation point for Level 1 and Level 2 teams. Engage third-party suppliers to progress investigation and remediation. Participate in out-of-hours response as required. Knowledge, Skills & Experience - Essential Proven experience in a Level 3 or Senior Security Analyst or Incident Response role. Hands-on experience investigating and resolving incidents across endpoints, identity platforms, networks, and cloud services. Strong understanding of malware and ransomware response, identity compromise, and vulnerability remediation. Experience working within formal Security Incident and Major Incident processes. Strong written documentation and stakeholder communication skills. Knowledge, Skills & Experience - Desirable Experience supporting multi-site or operationally sensitive environments. Familiarity with Defender, SIEM, EDR, and vulnerability management tools. Understanding of regulated or PCI-adjacent environments. Relevant security certifications or equivalent experience. Behavioural Competencies Takes ownership from detection through to resolution. Investigates thoroughly and challenges incomplete fixes. Calm, methodical, and decisive during live incidents. Understands operational and business impact. Professional and confident when engaging customers and suppliers. Decision Making & Authority Makes technical decisions relating to investigation, containment, and remediation of security incidents. Escalates risk and decision points appropriately to Incident Management and Service Delivery leadership. Key Interfaces Incident Management Security Operations Infrastructure and Network Services Third-party suppliers Customer stakeholders via structured incident communications
May 13, 2026
Full time
Job Title Level 3 Security Analyst - Incident Response & Vulnerability Management Department Service Delivery / Security Reporting To Security Lead / Service Delivery Manager Operates under the direction of the Incident Manager during security incidents Location UK (Hybrid) Office in Cardiff 1-2 days per week, regular client site travel. Working Pattern Monday to Friday with participation in the on-call Security and Major Incident rota as required Role Purpose The Level 3 Security Analyst is responsible for the technical investigation, containment, remediation, and resolution of IT security incidents and vulnerabilities across a complex, multi-site customer estate supported by "the MSP". The role acts as a senior technical authority for security incidents, working alongside Incident Management, Infrastructure, Network, and Application teams to ensure security issues are resolved end-to-end, correctly documented, and do not reoccur. Key Accountabilities - Security Incident Investigation & Response Act as the technical lead for the investigation of security incidents across supported platforms. Investigate malware, ransomware, account compromise, unauthorised access, suspicious activity, and security misconfiguration. Perform detailed root cause analysis across endpoint, identity, network, and application layers. Advise the Incident Manager on incident scope, impact, containment, eradication strategy, and recovery validation. Drive incidents through to full technical resolution, not temporary mitigation. Key Accountabilities - Vulnerability Management Investigate vulnerabilities identified via scanning platforms, endpoint and cloud tooling, supplier disclosures, and audit activity. Assess risk based on exploitability, exposure, and operational impact. Own remediation actions end-to-end, coordinating with Infrastructure, Network, and third-party suppliers. Validate remediation and ensure appropriate evidence is captured for assurance and audit. Platforms & Technology Scope End-user devices including Windows, macOS, tablets, and peripherals. Microsoft 365 including Entra ID, Exchange, SharePoint, Defender, and endpoint protection. Identity and Access Management including privileged and service accounts. On-premises and cloud-hosted servers. Network infrastructure including firewalls, switches, wireless, and WAN connectivity. Cloud-hosted and supplier-managed applications. Documentation, Audit & Continuous Improvement Produce clear, technically accurate documentation covering incidents, root cause analysis, and corrective actions. Support governance, customer assurance, and audit requirements. Contribute to post-incident reviews and lessons learned. Identify recurring issues and recommend long-term improvements. Ensure incidents and vulnerabilities are correctly logged and tracked within ITSM systems. Collaboration & Escalation Work closely with Incident Managers, Security specialists, and Level 3 Infrastructure and Network teams. Act as a senior escalation point for Level 1 and Level 2 teams. Engage third-party suppliers to progress investigation and remediation. Participate in out-of-hours response as required. Knowledge, Skills & Experience - Essential Proven experience in a Level 3 or Senior Security Analyst or Incident Response role. Hands-on experience investigating and resolving incidents across endpoints, identity platforms, networks, and cloud services. Strong understanding of malware and ransomware response, identity compromise, and vulnerability remediation. Experience working within formal Security Incident and Major Incident processes. Strong written documentation and stakeholder communication skills. Knowledge, Skills & Experience - Desirable Experience supporting multi-site or operationally sensitive environments. Familiarity with Defender, SIEM, EDR, and vulnerability management tools. Understanding of regulated or PCI-adjacent environments. Relevant security certifications or equivalent experience. Behavioural Competencies Takes ownership from detection through to resolution. Investigates thoroughly and challenges incomplete fixes. Calm, methodical, and decisive during live incidents. Understands operational and business impact. Professional and confident when engaging customers and suppliers. Decision Making & Authority Makes technical decisions relating to investigation, containment, and remediation of security incidents. Escalates risk and decision points appropriately to Incident Management and Service Delivery leadership. Key Interfaces Incident Management Security Operations Infrastructure and Network Services Third-party suppliers Customer stakeholders via structured incident communications

Modal Window

  • Blog
  • Contact
  • About Us
  • Terms & Conditions
  • Privacy
  • Employer
  • Post a Job
  • Search Resumes
  • Sign in
  • Job Seeker
  • Find Jobs
  • Create Resume
  • Sign in
  • Facebook
  • Twitter
  • Instagram
  • Pinterest
  • Youtube
Parent and Partner sites: IT Job Board | Search Jobs Near Me | RightTalent.co.uk | Quantity Surveyor jobs | Building Surveyor jobs | Construction Recruitment | Talent Recruiter | London Jobs | Property jobs
© 2008-2026 Jobs Hiring Near Me