• Home
  • Search Jobs
  • Register CV
  • Post a Job
  • Employer Pricing
  • Contact Us
  • Sign in
  • Sign up
  • Home
  • Search Jobs
  • Register CV
  • Post a Job
  • Employer Pricing
  • Contact Us
Sorry, that job is no longer available. Here are some results that may be similar to the job you were looking for.

6 jobs found

Email me jobs like this
Refine Search
Current Search
senior technical threat intelligence analyst
Senior EW Trainer
Mass Consultants Ltd
Senior EW Trainer - Permanent - Full Time (Hybrid) Salary: c.£50-55,000 DOE Location: Base at Lincoln- (Likely 3 days at MASS or Customer sites) Benefits include: 25 days annual leave (inclusive of December shutdown) Buy or sell up to 5 days' leave Two pension schemes Private Medical & Dental Insurance Life Assurance (4 x salary) Save and share schemes Electric/Hybrid car leasing Cycle to work Retail discounts Continuous Professional Development Annual Wellness Allowance Why this role matters For over 40 years, MASS's Electronic Warfare Operations Support (EWOS) Group has delivered specialist software, services and training that directly support the UK and allied nations' EW and CEMA capabilities. We operate in a highly trusted, highly secure space, supporting programmes that genuinely shape operational outcomes. As part of our continued growth, we're expanding our training capability from our EW Academy in Lincoln. We're looking for Senior EW Trainers with real-world operational experience who can bring credibility, context and practical insight into the classroom. This is a role for people who have worked with EW, intelligence or CEMA systems in the real world and want to pass that knowledge on to the next generation of operators and analysts. What you'll focus on You'll design, develop and deliver specialist Electronic Warfare training to UK and international customers, ensuring courses are accurate, relevant and aligned to current operational realities. You'll: Design and deliver EW training courseware and supporting materials Provide subject matter expertise into bids, projects and customer engagement Act as a primary point of contact for training-related contract activity Assess students, capture feedback and continuously improve course content Support the wider training team, including deputising for the Training Delivery Manager when required Help shape future training offerings as EWOS grows its international customer base Location & working pattern This role is primarily based at our EW Academy in Lincoln, with hybrid working as standard. In practice, we're looking for someone who can be on site for the majority of the working week (typically around Tuesday to Thursday), with the remainder of time spent working remotely when appropriate. International travel will be required as part of customer programmes, sometimes at short notice. You'll be working alongside experienced EW specialists, engineers, scientists and former military personnel, delivering training in secure, operationally focused environments. How you'll support us You'll bring operational credibility into the training environment, helping customers build real capability, not just theoretical understanding. That means: Delivering high-quality, engaging and technically accurate training Translating operational experience into practical course content Building strong relationships with customers and course participants Supporting bids and growth activity with SME input Maintaining the security, quality and integrity of all training materials The invaluable experience you'll bring, to help us achieve more Essential experience Hands on experience in Electronic Warfare, ELINT, RESM, CEMA or related intelligence disciplines Knowledge of threat systems across air, land and maritime domains Experience working with emitter databases or operational EW tools Strong written and verbal communication skills Eligibility to obtain and maintain UK Government Security Check (SC) clearance (see UK Government guidance) Must be a UK or Five Eyes national Willingness to travel overseas as required Desirable experience Previous experience delivering training or instructional activity MOD, defence or military background Experience with Test & Evaluation or platform protection environments Knowledge of DSAT or equivalent training frameworks Experience with Learning Management Systems or project based environments Who is MASS? MASS is an independent, global technology company, trusted by highly secure organisations to provide advanced digital services that manage data and keep information safe. With a strong heritage in defence, we deliver robust solutions into environments where security expertise is essential. We work in close partnership with our customers, combining deep technical expertise with innovative thinking to deliver agile, resilient solutions that secure advantage and enable digital transformation. MASS is an equal opportunities employer. We value smart, skilled and motivated people, and in return we offer a supportive, friendly workplace where everyone has the opportunity to make a real impact. Apply today to see how working for MASS could work for you.
Mar 08, 2026
Full time
Senior EW Trainer - Permanent - Full Time (Hybrid) Salary: c.£50-55,000 DOE Location: Base at Lincoln- (Likely 3 days at MASS or Customer sites) Benefits include: 25 days annual leave (inclusive of December shutdown) Buy or sell up to 5 days' leave Two pension schemes Private Medical & Dental Insurance Life Assurance (4 x salary) Save and share schemes Electric/Hybrid car leasing Cycle to work Retail discounts Continuous Professional Development Annual Wellness Allowance Why this role matters For over 40 years, MASS's Electronic Warfare Operations Support (EWOS) Group has delivered specialist software, services and training that directly support the UK and allied nations' EW and CEMA capabilities. We operate in a highly trusted, highly secure space, supporting programmes that genuinely shape operational outcomes. As part of our continued growth, we're expanding our training capability from our EW Academy in Lincoln. We're looking for Senior EW Trainers with real-world operational experience who can bring credibility, context and practical insight into the classroom. This is a role for people who have worked with EW, intelligence or CEMA systems in the real world and want to pass that knowledge on to the next generation of operators and analysts. What you'll focus on You'll design, develop and deliver specialist Electronic Warfare training to UK and international customers, ensuring courses are accurate, relevant and aligned to current operational realities. You'll: Design and deliver EW training courseware and supporting materials Provide subject matter expertise into bids, projects and customer engagement Act as a primary point of contact for training-related contract activity Assess students, capture feedback and continuously improve course content Support the wider training team, including deputising for the Training Delivery Manager when required Help shape future training offerings as EWOS grows its international customer base Location & working pattern This role is primarily based at our EW Academy in Lincoln, with hybrid working as standard. In practice, we're looking for someone who can be on site for the majority of the working week (typically around Tuesday to Thursday), with the remainder of time spent working remotely when appropriate. International travel will be required as part of customer programmes, sometimes at short notice. You'll be working alongside experienced EW specialists, engineers, scientists and former military personnel, delivering training in secure, operationally focused environments. How you'll support us You'll bring operational credibility into the training environment, helping customers build real capability, not just theoretical understanding. That means: Delivering high-quality, engaging and technically accurate training Translating operational experience into practical course content Building strong relationships with customers and course participants Supporting bids and growth activity with SME input Maintaining the security, quality and integrity of all training materials The invaluable experience you'll bring, to help us achieve more Essential experience Hands on experience in Electronic Warfare, ELINT, RESM, CEMA or related intelligence disciplines Knowledge of threat systems across air, land and maritime domains Experience working with emitter databases or operational EW tools Strong written and verbal communication skills Eligibility to obtain and maintain UK Government Security Check (SC) clearance (see UK Government guidance) Must be a UK or Five Eyes national Willingness to travel overseas as required Desirable experience Previous experience delivering training or instructional activity MOD, defence or military background Experience with Test & Evaluation or platform protection environments Knowledge of DSAT or equivalent training frameworks Experience with Learning Management Systems or project based environments Who is MASS? MASS is an independent, global technology company, trusted by highly secure organisations to provide advanced digital services that manage data and keep information safe. With a strong heritage in defence, we deliver robust solutions into environments where security expertise is essential. We work in close partnership with our customers, combining deep technical expertise with innovative thinking to deliver agile, resilient solutions that secure advantage and enable digital transformation. MASS is an equal opportunities employer. We value smart, skilled and motivated people, and in return we offer a supportive, friendly workplace where everyone has the opportunity to make a real impact. Apply today to see how working for MASS could work for you.
Senior Cyber Security Content Engineer, Blue Team
TryHackMe Ltd
The Role We're looking for a Senior Content Engineer to help us research, plan, and create advanced content and virtual labs for our online courses. The ideal candidate has extensive experience in blue team cyber security roles and a strong background in training content development. Technical Skills & Experience To be considered for this opportunity, you must have at least 5 years of relevant cyber security industry experience in roles such as L3/L4 SOC Analyst, Security Engineer, Incident Responder, Threat Hunter or Digital Forensics Investigator. You should also demonstrate: Strong expertise in core blue team areas: incident detection and response, threat intelligence, log analysis, security monitoring, and digital forensics. A deep understanding of networking, computing, and operating systems as they relate to security practices. Familiarity with blue team tooling (e.g., SIEM, EDR, IDS/IPS, forensic tools) and methodologies (e.g., MITRE ATT&CK framework, log analysis, malware analysis). Proven ability to research and adapt to emerging threats and technologies and translate that knowledge into engaging training content. Strong verbal and written English communication skills, essential for conveying complex technical concepts. Job Responsibilities Research, design, and develop defensive cyber security training material with supporting hands-on lab exercises (such as virtual machines and datasets for analysis). Collaborate with the Content Engineering Team to support security training coverage and identify content development opportunities. Experience developing and configuring virtual machines and sample datasets for realistic cybersecurity labs. Provide guidance and support to other Content Engineering Team members in areas of expertise. Take charge of planning and designing portions of the content development roadmap. Collaborate with the Head of Content Engineering to continuously improve the content development process. Analyze industry trends in tooling and techniques and recreate them as teachable content. Strategically plan, review, and schedule content with our blue team content engineering team. Preferred Skills (nice-to-have): Creating challenges for capture the flags (CTFs) Programming experience in any of the following: Python, PHP, Bash, Powershell Experience leading/ coaching/ mentoring others Certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Enterprise Defender (GCED), Certified SOC Analyst (CSA), Certified Forensic Analyst (GCFA), CompTIA CySA+, BTL2 Benefits & Perks 100% Remote - In a fully digital world, work from anywhere you want! Flexi Time - Choose your own hours as long as you have at least 4 hours of overlap with the UK timezone (from 8am - 6pm) Tools - a dedicated work laptop + any accessories you need to do your best work. Swag Pack - start your TryHackMe journey with a branded swag bundle! Personal Development - £2,500 training budget to acquire certifications, and more. Company Retreat - an annual company retreat, fully paid for by us! Lunch on us - whether you're a pizza-lover, salad obsessed or a big sushi fan, TryHackMe will cover the cost of your lunch order during our recurring company virtual lunches. Health Insurance - if you're in a country that doesn't have public health care. Enhanced Maternity & Paternity - an enhanced package on top of statutory requirements. 401k / Pension - TryHackMe makes it easy to save money for your retirement. Our Hiring Process Stage 1: Short introduction call (30 mins) Stage 2: Technical Take Home Exercise (part 1 & 2) Stage 3: Interview with our Head of Content Engineering (one hour) Stage 4: Final call with a Co-Founder (30 mins) At this time, we are unable to provide sponsorship.
Mar 07, 2026
Full time
The Role We're looking for a Senior Content Engineer to help us research, plan, and create advanced content and virtual labs for our online courses. The ideal candidate has extensive experience in blue team cyber security roles and a strong background in training content development. Technical Skills & Experience To be considered for this opportunity, you must have at least 5 years of relevant cyber security industry experience in roles such as L3/L4 SOC Analyst, Security Engineer, Incident Responder, Threat Hunter or Digital Forensics Investigator. You should also demonstrate: Strong expertise in core blue team areas: incident detection and response, threat intelligence, log analysis, security monitoring, and digital forensics. A deep understanding of networking, computing, and operating systems as they relate to security practices. Familiarity with blue team tooling (e.g., SIEM, EDR, IDS/IPS, forensic tools) and methodologies (e.g., MITRE ATT&CK framework, log analysis, malware analysis). Proven ability to research and adapt to emerging threats and technologies and translate that knowledge into engaging training content. Strong verbal and written English communication skills, essential for conveying complex technical concepts. Job Responsibilities Research, design, and develop defensive cyber security training material with supporting hands-on lab exercises (such as virtual machines and datasets for analysis). Collaborate with the Content Engineering Team to support security training coverage and identify content development opportunities. Experience developing and configuring virtual machines and sample datasets for realistic cybersecurity labs. Provide guidance and support to other Content Engineering Team members in areas of expertise. Take charge of planning and designing portions of the content development roadmap. Collaborate with the Head of Content Engineering to continuously improve the content development process. Analyze industry trends in tooling and techniques and recreate them as teachable content. Strategically plan, review, and schedule content with our blue team content engineering team. Preferred Skills (nice-to-have): Creating challenges for capture the flags (CTFs) Programming experience in any of the following: Python, PHP, Bash, Powershell Experience leading/ coaching/ mentoring others Certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Enterprise Defender (GCED), Certified SOC Analyst (CSA), Certified Forensic Analyst (GCFA), CompTIA CySA+, BTL2 Benefits & Perks 100% Remote - In a fully digital world, work from anywhere you want! Flexi Time - Choose your own hours as long as you have at least 4 hours of overlap with the UK timezone (from 8am - 6pm) Tools - a dedicated work laptop + any accessories you need to do your best work. Swag Pack - start your TryHackMe journey with a branded swag bundle! Personal Development - £2,500 training budget to acquire certifications, and more. Company Retreat - an annual company retreat, fully paid for by us! Lunch on us - whether you're a pizza-lover, salad obsessed or a big sushi fan, TryHackMe will cover the cost of your lunch order during our recurring company virtual lunches. Health Insurance - if you're in a country that doesn't have public health care. Enhanced Maternity & Paternity - an enhanced package on top of statutory requirements. 401k / Pension - TryHackMe makes it easy to save money for your retirement. Our Hiring Process Stage 1: Short introduction call (30 mins) Stage 2: Technical Take Home Exercise (part 1 & 2) Stage 3: Interview with our Head of Content Engineering (one hour) Stage 4: Final call with a Co-Founder (30 mins) At this time, we are unable to provide sponsorship.
Chief Information Security Officer
Ipsen Group
Cookie Notice Chief Information Security Officer Title: Chief Information Security Officer Company: Ipsen Pharma (SAS) About Ipsen: Ipsen is a mid-sized global biopharmaceutical company with a focus on transformative medicines in three therapeutic areas: Oncology, Rare Disease and Neuroscience. Supported by nearly 100 years of development experience, with global hubs in the U.S., France and the U.K, we tackle areas of high unmet medical need through research and innovation. Our passionate teams in more than 40 countries are focused on what matters and endeavor every day to bring medicines to patients in 88 countries. We build a workplace that champions human-centric leadership and fosters a culture of collaboration, excellence and impact. At Ipsen, every individual is empowered to be their true selves, grow and thrive alongside the company's success. Join us on our journey towards sustainable growth, creating real impact on patients and society!For more information, visit us at and follow our latest news on and . Job Description: The Chief Information Security Officer (CISO) is a strategic executive responsible for protecting the company's physical, digital, and intellectual assets. In a pharmaceutical context, this includes safeguarding sensitive R&D data, clinical trial information, patient privacy, and proprietary technologies. The CISO leads the development and execution of a comprehensive security strategy encompassing cybersecurity, regulatory compliance, physical security, and internal investigations. This role includes building and managing a multidisciplinary security and investigations team, ensuring alignment with business goals and regulatory requirements. WHAT - Main Responsibilities & Technical Competencies Strategic Leadership Develop and execute a forward-looking security strategy aligned with corporate objectives and industry trends. Advise executive leadership and the board on risk posture, threat landscape, and investment priorities. Lead cross-functional initiatives to embed security into digital transformation, innovation, and operational excellence. Establish KPIs and performance metrics to measure and improve security effectiveness. Cybersecurity & IT Security Oversee the design and implementation of cybersecurity architecture and controls. Ensure protection of IT infrastructure, cloud environments, and sensitive data. Lead incident response, threat intelligence, and vulnerability management programs. Maintain compliance with global standards (e.g., ISO 27001, NIST, GDPR, HIPAA). Governance, Risk & Compliance Develop and enforce enterprise-wide security policies and procedures. In alignment with the business ethics team, ensure compliance with pharmaceutical regulations (e.g., FDA, EMA, GxP). Conduct risk assessments, internal audits, and third-party security evaluations. Report regularly to senior leadership on risk mitigation and compliance status. Investigations & Incident Management Establish and lead an internal investigations function to address security breaches, misconduct, and regulatory violations. Build and manage a team of investigators and analysts with expertise in digital forensics, compliance, and legal coordination. Collaborate with HR, Legal, and external agencies on sensitive investigations and disciplinary actions. Ensure thorough documentation, reporting, and resolution of incidents in line with legal and regulatory standards. Fraud Management Develop and implement a fraud prevention and detection framework across the organization. Lead investigations into suspected fraud, misconduct, and financial irregularities. Collaborate with Finance, Legal, and Compliance to ensure timely resolution and reporting of fraud cases. Maintain a whistleblower program and ensure confidentiality and integrity in handling reports. Monitor fraud trends and proactively adjust controls and training programs. Team Management & Development Build and lead a multidisciplinary security team (cybersecurity, physical security, investigations, risk management). Define roles, responsibilities, and career development paths for team members. Foster a culture of accountability, agility, and continuous learning. Manage vendor relationships and external consultants as needed. Physical & Operational Security Oversee facility security, access control, and surveillance systems. Coordinate with facilities and operations on emergency preparedness and response. Develop and test business continuity and disaster recovery plans. Stakeholder Engagement Partner with various functions & business leaders including Legal, Regulatory Affairs, R&D, and Medical Affairs to align security with business needs. Lead security awareness and training programs across the organization. Represent the company in external forums, industry groups, and regulatory engagements. HOW - Knowledge & Experience Skills: Technical depth in cybersecurity and investigations Leadership and team development Fraud detection and prevention expertise Regulatory and compliance acumen Communication and stakeholder management Crisis and incident responseKnowledge & Experience: 15+ years of experience in security leadership, preferably in pharma or life sciences. Proven track record in strategic planning, investigations, fraud management, and team leadership. Certifications such as CISSP, CISM, CISA, CRISC, or CFE (Certified Fraud Examiner) are highly desirable. Strong understanding of regulatory environments and risk management frameworks.Education / Certifications : Bachelor's or Master's degree in Information Security, Computer Science, or related field.Language(s) : Fluency in English. Knowledge of European language is a plus for global roles.Nous nous engageons à créer un lieu de travail où chacun se sent écouté, valorisé et soutenu, où nous incarnons " The Real Us ". La valeur que nous accordons aux différentes perspectives et expériences motive notre engagement en faveur de l'inclusion et de l'égalité des chances. Lorsque nous intégrons des modes de pensée diversifiés, nous prenons des décisions plus réfléchies et découvrons des solutions plus innovantes. Ensemble, nous nous efforçons de mieux comprendre les communautés que nous servons. Cela signifie que nous voulons également vous aider à donner le meilleur de vous-même lorsque vous postulez à un poste chez nous. Si vous avez besoin d'aménagements ou d'aide pendant le processus de candidature, veuillez en informer l'équipe de recrutement. Ces informations seront traitées avec soin et n'auront aucune incidence sur le résultat de votre candidature. Soyons nous-même Get In TouchIntroduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
Mar 01, 2026
Full time
Cookie Notice Chief Information Security Officer Title: Chief Information Security Officer Company: Ipsen Pharma (SAS) About Ipsen: Ipsen is a mid-sized global biopharmaceutical company with a focus on transformative medicines in three therapeutic areas: Oncology, Rare Disease and Neuroscience. Supported by nearly 100 years of development experience, with global hubs in the U.S., France and the U.K, we tackle areas of high unmet medical need through research and innovation. Our passionate teams in more than 40 countries are focused on what matters and endeavor every day to bring medicines to patients in 88 countries. We build a workplace that champions human-centric leadership and fosters a culture of collaboration, excellence and impact. At Ipsen, every individual is empowered to be their true selves, grow and thrive alongside the company's success. Join us on our journey towards sustainable growth, creating real impact on patients and society!For more information, visit us at and follow our latest news on and . Job Description: The Chief Information Security Officer (CISO) is a strategic executive responsible for protecting the company's physical, digital, and intellectual assets. In a pharmaceutical context, this includes safeguarding sensitive R&D data, clinical trial information, patient privacy, and proprietary technologies. The CISO leads the development and execution of a comprehensive security strategy encompassing cybersecurity, regulatory compliance, physical security, and internal investigations. This role includes building and managing a multidisciplinary security and investigations team, ensuring alignment with business goals and regulatory requirements. WHAT - Main Responsibilities & Technical Competencies Strategic Leadership Develop and execute a forward-looking security strategy aligned with corporate objectives and industry trends. Advise executive leadership and the board on risk posture, threat landscape, and investment priorities. Lead cross-functional initiatives to embed security into digital transformation, innovation, and operational excellence. Establish KPIs and performance metrics to measure and improve security effectiveness. Cybersecurity & IT Security Oversee the design and implementation of cybersecurity architecture and controls. Ensure protection of IT infrastructure, cloud environments, and sensitive data. Lead incident response, threat intelligence, and vulnerability management programs. Maintain compliance with global standards (e.g., ISO 27001, NIST, GDPR, HIPAA). Governance, Risk & Compliance Develop and enforce enterprise-wide security policies and procedures. In alignment with the business ethics team, ensure compliance with pharmaceutical regulations (e.g., FDA, EMA, GxP). Conduct risk assessments, internal audits, and third-party security evaluations. Report regularly to senior leadership on risk mitigation and compliance status. Investigations & Incident Management Establish and lead an internal investigations function to address security breaches, misconduct, and regulatory violations. Build and manage a team of investigators and analysts with expertise in digital forensics, compliance, and legal coordination. Collaborate with HR, Legal, and external agencies on sensitive investigations and disciplinary actions. Ensure thorough documentation, reporting, and resolution of incidents in line with legal and regulatory standards. Fraud Management Develop and implement a fraud prevention and detection framework across the organization. Lead investigations into suspected fraud, misconduct, and financial irregularities. Collaborate with Finance, Legal, and Compliance to ensure timely resolution and reporting of fraud cases. Maintain a whistleblower program and ensure confidentiality and integrity in handling reports. Monitor fraud trends and proactively adjust controls and training programs. Team Management & Development Build and lead a multidisciplinary security team (cybersecurity, physical security, investigations, risk management). Define roles, responsibilities, and career development paths for team members. Foster a culture of accountability, agility, and continuous learning. Manage vendor relationships and external consultants as needed. Physical & Operational Security Oversee facility security, access control, and surveillance systems. Coordinate with facilities and operations on emergency preparedness and response. Develop and test business continuity and disaster recovery plans. Stakeholder Engagement Partner with various functions & business leaders including Legal, Regulatory Affairs, R&D, and Medical Affairs to align security with business needs. Lead security awareness and training programs across the organization. Represent the company in external forums, industry groups, and regulatory engagements. HOW - Knowledge & Experience Skills: Technical depth in cybersecurity and investigations Leadership and team development Fraud detection and prevention expertise Regulatory and compliance acumen Communication and stakeholder management Crisis and incident responseKnowledge & Experience: 15+ years of experience in security leadership, preferably in pharma or life sciences. Proven track record in strategic planning, investigations, fraud management, and team leadership. Certifications such as CISSP, CISM, CISA, CRISC, or CFE (Certified Fraud Examiner) are highly desirable. Strong understanding of regulatory environments and risk management frameworks.Education / Certifications : Bachelor's or Master's degree in Information Security, Computer Science, or related field.Language(s) : Fluency in English. Knowledge of European language is a plus for global roles.Nous nous engageons à créer un lieu de travail où chacun se sent écouté, valorisé et soutenu, où nous incarnons " The Real Us ". La valeur que nous accordons aux différentes perspectives et expériences motive notre engagement en faveur de l'inclusion et de l'égalité des chances. Lorsque nous intégrons des modes de pensée diversifiés, nous prenons des décisions plus réfléchies et découvrons des solutions plus innovantes. Ensemble, nous nous efforçons de mieux comprendre les communautés que nous servons. Cela signifie que nous voulons également vous aider à donner le meilleur de vous-même lorsque vous postulez à un poste chez nous. Si vous avez besoin d'aménagements ou d'aide pendant le processus de candidature, veuillez en informer l'équipe de recrutement. Ces informations seront traitées avec soin et n'auront aucune incidence sur le résultat de votre candidature. Soyons nous-même Get In TouchIntroduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
La Fosse Associates
Incident Response Lead
La Fosse Associates
We're looking for a hands-on senior security professional to join a growing entertainment agency, acting as an international incident focal point as the function expands globally. This role will focus on triaging, investigating, and closing security events while continuously enhancing detection and response capabilities across a modern, cloud-first environment. Location: London (Ideally 2 days PW but open to flex) Pay rate: £600-650 Inside IR35 Duration: 6 Months initially If you're passionate about Threat Detection, Threat Hunting, and Incident Response, and enjoy working in a fast-paced, collaborative environment - this could be a great fit. Key Responsibilities Lead day-to-day Incident Response activities across a global environment Conduct proactive Threat Hunting using cyber threat intelligence sources Design and implement IR runbooks and playbooks Coordinate technical and business stakeholders during incidents Perform host, cloud, network, memory and log-based investigations and forensics Develop and enhance security monitoring, detection logic and reporting Create dashboards and visualisations to contextualise security data Drive continuous improvement of technical security controls and response processes Mentor junior analysts and support wider SOC capability development Experience Required Security operations background with experience in Incident Response, Threat Hunting or technical investigations Strong experience in cloud-based IR within hybrid environments Ability to develop scripts, tools and methodologies to enhance investigations Strong technical understanding of servers, OS, networks, firewalls and cloud infrastructure Experience building IR workflows and playbooks Confident communicator with the ability to build and maintain relationships Sound like you? Please apply directly for more detail.
Feb 27, 2026
Full time
We're looking for a hands-on senior security professional to join a growing entertainment agency, acting as an international incident focal point as the function expands globally. This role will focus on triaging, investigating, and closing security events while continuously enhancing detection and response capabilities across a modern, cloud-first environment. Location: London (Ideally 2 days PW but open to flex) Pay rate: £600-650 Inside IR35 Duration: 6 Months initially If you're passionate about Threat Detection, Threat Hunting, and Incident Response, and enjoy working in a fast-paced, collaborative environment - this could be a great fit. Key Responsibilities Lead day-to-day Incident Response activities across a global environment Conduct proactive Threat Hunting using cyber threat intelligence sources Design and implement IR runbooks and playbooks Coordinate technical and business stakeholders during incidents Perform host, cloud, network, memory and log-based investigations and forensics Develop and enhance security monitoring, detection logic and reporting Create dashboards and visualisations to contextualise security data Drive continuous improvement of technical security controls and response processes Mentor junior analysts and support wider SOC capability development Experience Required Security operations background with experience in Incident Response, Threat Hunting or technical investigations Strong experience in cloud-based IR within hybrid environments Ability to develop scripts, tools and methodologies to enhance investigations Strong technical understanding of servers, OS, networks, firewalls and cloud infrastructure Experience building IR workflows and playbooks Confident communicator with the ability to build and maintain relationships Sound like you? Please apply directly for more detail.
Senior Security Consultant
DNV Germany Holding GmbH
Overview We're seeking a Senior Security Consultant to support our SOC operations as part of customer delivery team in DNV Cyber's (formerly Nixu) Managed Services. In this customer-facing role, you will be working with the Microsoft Defender and Palo Alto Cortex XDRs, managing customers' environments, designing and deploying security operations infrastructure, and consulting customers on threat detection & response and exposure management. To excel in this role, we expect you to collaborate effectively with teammates, as well as customer technical and non-technical personnel. Responsibilities Operate & optimize: Manage, tune, and maintain Microsoft Defender XDR and Palo Alto Cortex XDR platforms on behalf of customers, including configuration, alerting, and automation. Lead end-to-end security projects: Run end-to-end cyber consulting engagements and technical deployment projects - scoping, execution, reporting, and handover, aligned with customer business goals. Investigate & advise: Conduct periodic security posture reviews, threat hunts, and incident investigations using XDR and other data available. Translate findings into actionable recommendations. Customer engagement & reporting: Meet regularly with customer stakeholders (security teams, IT personnel), present findings, and drive adoption of security best practices. Maintain strong relationships and trust. Support sales & solution design: Participate in bid responses, architect SOC/XDR solutions, and help position DNV's offerings, translating technical capabilities into customer value. Collaborate across teams: Work closely with SOC analysts, security architects, delivery managers, and sales to ensure seamless service delivery. Apply now We're reviewing applications on a rolling basis, so don't wait to submit yours. DNV Cyber At DNV Cyber, we are passionate about cybersecurity and take pride in the way we are impacting the society we live in. We encourage you to excel professionally through knowledge sharing and demanding cases. At DNV Cyber, you'll have 500 colleagues who share an interest in cyber security with you. With us, you will be surrounded by the most talented people in the cybersecurity field. Join us on an exciting adventure of growth, meaningful work, and shaping the future through cybersecurity! Visit our website to get to know more about us! DNV is an Equal Opportunity Employer and gives consideration for employment to qualified applicants without regard to gender, religion, race, national or ethnic origin, cultural background, social group, disability, sexual orientation, gender identity, marital status, age or political opinion. Diversity is fundamental to our culture and we invite you to be part of this diversity. You're a seasoned cybersecurity professional with 3+ years of hands-on experience in technical security services or consulting, ready to deliver impact through customer-focused solutions. You bring Strong working knowledge of managing Microsoft Defender or Palo Alto Cortex XDR. While expertise for both XDR platforms is not required, you must have willingness to learn them both on the job, shadowing colleagues and taking training. Experience in customer-facing security projects, consultations, and reporting. Strong analytical skills - able to interpret XDR data, threat intelligence, customer's business context, and derive security insights. Ability to configure and act within customer environments. Excellent communication skills - comfortable presenting to technical and non-technical audiences. Fluency in Finnish and English (written and spoken). You will stand out if you also have Experience with SIEM, EDR, NDR, or SOAR platforms - or cloud-native security tools (Azure Sentinel, AWS GuardDuty, etc.) Knowledge of hybrid or multi-cloud security architectures (Azure, AWS, GCP). Hands-on experience of leveraging artificial intelligence in your workflows. Relevant trainings and certifications (e.g., SC-200, AZ-500, Palo Alto Networks, GCP certs). Familiarity with security standards and regulations (e.g., ISO 27001, NIS2) Security and compliance with statutory requirements in the countries in which we operate is essential for DNV. Background checks will be conducted on all final candidates as part of the offer process, in accordance with applicable country-specific laws and practices. Please note: A SUPO (Finnish Security and Intelligence Service) security background check will be part of the recruitment process.
Feb 25, 2026
Full time
Overview We're seeking a Senior Security Consultant to support our SOC operations as part of customer delivery team in DNV Cyber's (formerly Nixu) Managed Services. In this customer-facing role, you will be working with the Microsoft Defender and Palo Alto Cortex XDRs, managing customers' environments, designing and deploying security operations infrastructure, and consulting customers on threat detection & response and exposure management. To excel in this role, we expect you to collaborate effectively with teammates, as well as customer technical and non-technical personnel. Responsibilities Operate & optimize: Manage, tune, and maintain Microsoft Defender XDR and Palo Alto Cortex XDR platforms on behalf of customers, including configuration, alerting, and automation. Lead end-to-end security projects: Run end-to-end cyber consulting engagements and technical deployment projects - scoping, execution, reporting, and handover, aligned with customer business goals. Investigate & advise: Conduct periodic security posture reviews, threat hunts, and incident investigations using XDR and other data available. Translate findings into actionable recommendations. Customer engagement & reporting: Meet regularly with customer stakeholders (security teams, IT personnel), present findings, and drive adoption of security best practices. Maintain strong relationships and trust. Support sales & solution design: Participate in bid responses, architect SOC/XDR solutions, and help position DNV's offerings, translating technical capabilities into customer value. Collaborate across teams: Work closely with SOC analysts, security architects, delivery managers, and sales to ensure seamless service delivery. Apply now We're reviewing applications on a rolling basis, so don't wait to submit yours. DNV Cyber At DNV Cyber, we are passionate about cybersecurity and take pride in the way we are impacting the society we live in. We encourage you to excel professionally through knowledge sharing and demanding cases. At DNV Cyber, you'll have 500 colleagues who share an interest in cyber security with you. With us, you will be surrounded by the most talented people in the cybersecurity field. Join us on an exciting adventure of growth, meaningful work, and shaping the future through cybersecurity! Visit our website to get to know more about us! DNV is an Equal Opportunity Employer and gives consideration for employment to qualified applicants without regard to gender, religion, race, national or ethnic origin, cultural background, social group, disability, sexual orientation, gender identity, marital status, age or political opinion. Diversity is fundamental to our culture and we invite you to be part of this diversity. You're a seasoned cybersecurity professional with 3+ years of hands-on experience in technical security services or consulting, ready to deliver impact through customer-focused solutions. You bring Strong working knowledge of managing Microsoft Defender or Palo Alto Cortex XDR. While expertise for both XDR platforms is not required, you must have willingness to learn them both on the job, shadowing colleagues and taking training. Experience in customer-facing security projects, consultations, and reporting. Strong analytical skills - able to interpret XDR data, threat intelligence, customer's business context, and derive security insights. Ability to configure and act within customer environments. Excellent communication skills - comfortable presenting to technical and non-technical audiences. Fluency in Finnish and English (written and spoken). You will stand out if you also have Experience with SIEM, EDR, NDR, or SOAR platforms - or cloud-native security tools (Azure Sentinel, AWS GuardDuty, etc.) Knowledge of hybrid or multi-cloud security architectures (Azure, AWS, GCP). Hands-on experience of leveraging artificial intelligence in your workflows. Relevant trainings and certifications (e.g., SC-200, AZ-500, Palo Alto Networks, GCP certs). Familiarity with security standards and regulations (e.g., ISO 27001, NIS2) Security and compliance with statutory requirements in the countries in which we operate is essential for DNV. Background checks will be conducted on all final candidates as part of the offer process, in accordance with applicable country-specific laws and practices. Please note: A SUPO (Finnish Security and Intelligence Service) security background check will be part of the recruitment process.
Director - cyber defence operations
Colt Technology Services Group Ltd.
Select how often (in days) to receive an alert: Colt provides network, voice and data centre services to thousands of businesses around the world, allowing them to focus on delivering their business goals instead of the underlying infrastructure. Why we need this role We're looking for a visionary cybersecurity leader to drive the transformation of our global Security Operations Center. Reporting to the Chief Security Officer, you will architect and scale a next generation SOC - advancing incident response, integrating cutting edge threat intelligence, and strengthening the systems that protect and sustain our digital operations. This is an opportunity to build something exceptional and lead a team that redefines how we approach cyber defence and resilience. What you will do Lead, develop, and inspire a high performing team of SOC analysts and engineers. Define and implement cyber defence strategies aligned with business priorities and risk posture. Act as the senior escalation point for complex security incidents and coordinate cross functional responses. Threat and Vulnerability Management Integrate advanced threat intelligence into detection and response workflows to identify emerging threats proactively. Develop an automated, risk based vulnerability management programme to reduce attack surface. Collaborate with intelligence sharing communities to enhance situational awareness. Translate threat intelligence into actionable security measures for stakeholders. Oversee monitoring and analysis of network traffic, IDS alerts, and security logs. Ensure accurate prioritisation and build high fidelity alerting. Lead escalation and resolution efforts across internal and external partners. Build a proactive threat hunting capability and partner with industry experts. Enhance security monitoring tools, processes, and detection logic. Stay ahead of current vulnerabilities, attack techniques, and countermeasures. Ensure thorough documentation of cases, procedures, and investigations. What we're looking for Technical Expertise Deep understanding of security operations, threat intelligence and incident response frameworks. Knowledge of intrusion detection, operating systems (Windows/UNIX), web technologies and telco networks.Hands on experience developing custom detections and leading threat hunting. Familiarity with cloud security operations and automation/orchestration. Telecoms experience is a strong advantage. Leadership Skills Excellent communication skills with the ability to simplify complex concepts. Proven experience leading global teams and making decisions in high ambiguity environments. Strong analytical and problem solving skills for complex security challenges. Ability to build strong, collaborative relationships across a global organisation. A growth mindset - resilient, curious, and solutions oriented. Preferred Experience 8+ years in cybersecurity operations, with at least 3 in a leadership role. Experience integrating threat intelligence into SOC workflows. Certifications such as CISSP, GIAC or equivalent are a plus. What we offer you: Looking to make a mark? At Colt, you'll make a difference. Because around here, we empower people. We don't tell you what to do. Instead, we employ people we trust, who come together across the globe to create intelligent solutions. Our global teams are full of ambitious, driven people, all working together towards one shared purpose: to put the power of the digital universe in the hands of our customers wherever, whenever and however they want. We give our people the opportunity to inspire and lead teams, and work on projects that connect people, cities, businesses, and ideas. We want you to help us change the world, for the better. Diversity and inclusion Inclusion and valuing diversity of thought and experience are at the heart of our culture here at Colt. From day one, you'll be encouraged to be yourself because we believe that's what helps our people to thrive. We welcome people with diverse backgrounds and experiences, regardless of their gender identity or expression, sexual orientation, race, religion, disability, neurodiversity, age, marital status, pregnancy status, or place of birth. Most recently we have: Signed the UN Women Empowerment Principles which guide our Gender Action Plan Trained 60 (and growing) Colties to be Mental Health First Aiders Please speak with a member of our recruitment team if you require adjustments to our recruitment process to support you. For more information about our Inclusion and Diversity agenda, visit our DEI pages. Our benefits support you through all parts of life, for both physical and mental health. Flexible working hours and the option to work from home. Extensive induction program with experienced mentors and buddies. Opportunities for further development and educational opportunities. Global Family Leave Policy. Employee Assistance Program. Internal inclusion & diversity employee networks. A global network When you join Colt you become part of our global network. We are proud of our colleagues and the stories and experience they bring - take a look at 'Our People' site including our Empowered Women in Tech. Job Segment: Operations Manager, Data Center, Cyber Security, Work from Home, Unix, Operations, Technology, Security, Contract
Feb 12, 2026
Full time
Select how often (in days) to receive an alert: Colt provides network, voice and data centre services to thousands of businesses around the world, allowing them to focus on delivering their business goals instead of the underlying infrastructure. Why we need this role We're looking for a visionary cybersecurity leader to drive the transformation of our global Security Operations Center. Reporting to the Chief Security Officer, you will architect and scale a next generation SOC - advancing incident response, integrating cutting edge threat intelligence, and strengthening the systems that protect and sustain our digital operations. This is an opportunity to build something exceptional and lead a team that redefines how we approach cyber defence and resilience. What you will do Lead, develop, and inspire a high performing team of SOC analysts and engineers. Define and implement cyber defence strategies aligned with business priorities and risk posture. Act as the senior escalation point for complex security incidents and coordinate cross functional responses. Threat and Vulnerability Management Integrate advanced threat intelligence into detection and response workflows to identify emerging threats proactively. Develop an automated, risk based vulnerability management programme to reduce attack surface. Collaborate with intelligence sharing communities to enhance situational awareness. Translate threat intelligence into actionable security measures for stakeholders. Oversee monitoring and analysis of network traffic, IDS alerts, and security logs. Ensure accurate prioritisation and build high fidelity alerting. Lead escalation and resolution efforts across internal and external partners. Build a proactive threat hunting capability and partner with industry experts. Enhance security monitoring tools, processes, and detection logic. Stay ahead of current vulnerabilities, attack techniques, and countermeasures. Ensure thorough documentation of cases, procedures, and investigations. What we're looking for Technical Expertise Deep understanding of security operations, threat intelligence and incident response frameworks. Knowledge of intrusion detection, operating systems (Windows/UNIX), web technologies and telco networks.Hands on experience developing custom detections and leading threat hunting. Familiarity with cloud security operations and automation/orchestration. Telecoms experience is a strong advantage. Leadership Skills Excellent communication skills with the ability to simplify complex concepts. Proven experience leading global teams and making decisions in high ambiguity environments. Strong analytical and problem solving skills for complex security challenges. Ability to build strong, collaborative relationships across a global organisation. A growth mindset - resilient, curious, and solutions oriented. Preferred Experience 8+ years in cybersecurity operations, with at least 3 in a leadership role. Experience integrating threat intelligence into SOC workflows. Certifications such as CISSP, GIAC or equivalent are a plus. What we offer you: Looking to make a mark? At Colt, you'll make a difference. Because around here, we empower people. We don't tell you what to do. Instead, we employ people we trust, who come together across the globe to create intelligent solutions. Our global teams are full of ambitious, driven people, all working together towards one shared purpose: to put the power of the digital universe in the hands of our customers wherever, whenever and however they want. We give our people the opportunity to inspire and lead teams, and work on projects that connect people, cities, businesses, and ideas. We want you to help us change the world, for the better. Diversity and inclusion Inclusion and valuing diversity of thought and experience are at the heart of our culture here at Colt. From day one, you'll be encouraged to be yourself because we believe that's what helps our people to thrive. We welcome people with diverse backgrounds and experiences, regardless of their gender identity or expression, sexual orientation, race, religion, disability, neurodiversity, age, marital status, pregnancy status, or place of birth. Most recently we have: Signed the UN Women Empowerment Principles which guide our Gender Action Plan Trained 60 (and growing) Colties to be Mental Health First Aiders Please speak with a member of our recruitment team if you require adjustments to our recruitment process to support you. For more information about our Inclusion and Diversity agenda, visit our DEI pages. Our benefits support you through all parts of life, for both physical and mental health. Flexible working hours and the option to work from home. Extensive induction program with experienced mentors and buddies. Opportunities for further development and educational opportunities. Global Family Leave Policy. Employee Assistance Program. Internal inclusion & diversity employee networks. A global network When you join Colt you become part of our global network. We are proud of our colleagues and the stories and experience they bring - take a look at 'Our People' site including our Empowered Women in Tech. Job Segment: Operations Manager, Data Center, Cyber Security, Work from Home, Unix, Operations, Technology, Security, Contract

Modal Window

  • Home
  • Contact
  • About Us
  • Terms & Conditions
  • Privacy
  • Employer
  • Post a Job
  • Search Resumes
  • Sign in
  • Job Seeker
  • Find Jobs
  • Create Resume
  • Sign in
  • Facebook
  • Twitter
  • Google Plus
  • LinkedIn
Parent and Partner sites: IT Job Board | Jobs Near Me | RightTalent.co.uk | Quantity Surveyor jobs | Building Surveyor jobs | Construction Recruitment | Talent Recruiter | Construction Job Board | Property jobs | myJobsnearme.com | Jobs near me
© 2008-2026 Jobsite Jobs | Designed by Web Design Agency