Job Title: Cloud Security Engineer Location: Remote (25% Weekly on-site - West Midlands and South East England) Clearance: Active SC required; DV eligibility needed post-probation. Company Overview: Atreides helps organizations transform large and complex multi-modal datasets into information-rich geo-spatial data subscriptions that can be used across a wide spectrum of use cases. Currently, Atreides focuses on providing high-fidelity data solutions to enable customers to derive insights quickly. We are a fast-moving, high-performance startup. We value a diverse team and believe inclusion drives better performance. We trust our team with autonomy, believing it leads to better results and job satisfaction. With a mission-driven mindset and entrepreneurial spirit, we are building something new and helping unlock the power of massive-scale data to make the world safer, stronger, and more prosperous. Team Overview: We are a passionate team of technologists, data scientists, and analysts with backgrounds in operational intelligence, law enforcement, large multinationals, and cybersecurity operations. We obsess about designing products that will change the way global companies, governments and nonprofits protect themselves from external threats and global adversaries. Position Overview: Atreides is seeking a motivated and proactive Cloud Security Engineer with a strong focus on Microsoft Azure security to join our growing team. This role is ideal for a security engineer or SecOps professional who understands the critical importance of maintaining a highly secure environment and is eager to work across cloud, endpoint, and infrastructure domains. While the primary focus will be Azure security engineering, experience with hardware and traditional infrastructure security will be considered a strong plus. Team Principles: Remain curious and passionate in all aspects of our work Promote clear, direct, and transparent communication Embrace the 'measure twice, cut once' philosophy Value and encourage diverse ideas and technologies Lead with empathy in all interactions Responsibilities: Security Engineering & Automation: Design, build, and maintain security automation and tooling to enforce controls and simplify compliance. Build and manage identity & access management controls across cloud platforms and applications. Write and review Infrastructure-as-Code (Bicep/Terraform) for secure cloud configuration. Implement preventative and detective controls in Azure; automate remediation of alerts. Secure CI/CD pipelines, integrating results from SAST/DAST/SCA tools and ensuring supply chain integrity. Engineer solutions for Kubernetes security, focusing on RBAC, network policies, and runtime protection. Detection, Monitoring & Incident Response: Perform triage, containment, eradication, and recovery activities as part of incident response, ensuring threats are effectively mitigated. Develop and optimise security detections (Sentinel, KQL, YARA). Manage log sources, ingestion pipelines, and monitoring infrastructure. Conduct threat hunting and analysis to identify emerging risks. Lead and contribute to incident investigations, including post-mortem analysis and remediation actions. Vulnerability & Risk Management: Identify, track, and remediate vulnerabilities across cloud, endpoint, and infrastructure. Implement controls from security assessments, audits, and architecture reviews. Support third-party risk assessments and vendor due diligence. Governance, Documentation & Projects: Maintain documentation of security standards, runbooks, and procedures. Participate in security-related projects and lead implementation of new security solutions. Required Qualifications: 3+ years in security engineering or security operations, ideally in cloud-first environments. Strong understanding of cloud security architecture with hands on experience securing cloud infrastructure and services. Hands on experience with the Azure security stack, including Microsoft Defender for Cloud (recommendations, alerts, Secure Score), Azure Policy, and related security tooling. Proficiency with SIEM platforms (Azure Sentinel preferred), developing detections and alerts, tuning rules, and investigating incidents. Proven incident response capability including triage, investigation, containment, eradication, and recovery. Practical experience integrating security into software and system development lifecycles. Experience with endpoint security solutions and MDM/EMM tools. Experience securing containerised environments (Kubernetes) and CI/CD pipelines. Proficiency in scripting and automation (PowerShell, Python, KQL, Bicep). Strong understanding of network security - protocols, firewalls, IDS/IPS, WAFs, and infrastructure hardening. Familiarity with incident response frameworks (NIST, SANS). Experience configuring and using cloud-native security logging, monitoring, and detection services. In-depth knowledge of security principles, attack vectors (OWASP Top 10, MITRE ATT&CK), and the threat landscape. Desired Qualifications: Azure Security Engineer AZ-500 Security Operations Analyst SC-200 Identity and Access administrator SC-300 GIAC Certified Forensic Analyst GIAC Certified Incident Handler Compensation and Benefits: Competitive salary Comprehensive health, dental, and vision insurance plans Flexible hybrid work environment Additional benefits like flexible hours, work travel opportunities, competitive vacation time and parental leave While meeting all of these criteria would be ideal, we understand that some candidates may meet most, but not all. If you're passionate, curious and ready to "work smart and get things done," we'd love to hear from you. Security Clearance: This role requires a current and active SC clearance at the time of hire. After successful probation, candidates must be willing and eligible to undergo DV, in line with contract requirements. DV is not required at application stage, though DV-cleared candidates are welcome to apply.
Dec 13, 2025
Full time
Job Title: Cloud Security Engineer Location: Remote (25% Weekly on-site - West Midlands and South East England) Clearance: Active SC required; DV eligibility needed post-probation. Company Overview: Atreides helps organizations transform large and complex multi-modal datasets into information-rich geo-spatial data subscriptions that can be used across a wide spectrum of use cases. Currently, Atreides focuses on providing high-fidelity data solutions to enable customers to derive insights quickly. We are a fast-moving, high-performance startup. We value a diverse team and believe inclusion drives better performance. We trust our team with autonomy, believing it leads to better results and job satisfaction. With a mission-driven mindset and entrepreneurial spirit, we are building something new and helping unlock the power of massive-scale data to make the world safer, stronger, and more prosperous. Team Overview: We are a passionate team of technologists, data scientists, and analysts with backgrounds in operational intelligence, law enforcement, large multinationals, and cybersecurity operations. We obsess about designing products that will change the way global companies, governments and nonprofits protect themselves from external threats and global adversaries. Position Overview: Atreides is seeking a motivated and proactive Cloud Security Engineer with a strong focus on Microsoft Azure security to join our growing team. This role is ideal for a security engineer or SecOps professional who understands the critical importance of maintaining a highly secure environment and is eager to work across cloud, endpoint, and infrastructure domains. While the primary focus will be Azure security engineering, experience with hardware and traditional infrastructure security will be considered a strong plus. Team Principles: Remain curious and passionate in all aspects of our work Promote clear, direct, and transparent communication Embrace the 'measure twice, cut once' philosophy Value and encourage diverse ideas and technologies Lead with empathy in all interactions Responsibilities: Security Engineering & Automation: Design, build, and maintain security automation and tooling to enforce controls and simplify compliance. Build and manage identity & access management controls across cloud platforms and applications. Write and review Infrastructure-as-Code (Bicep/Terraform) for secure cloud configuration. Implement preventative and detective controls in Azure; automate remediation of alerts. Secure CI/CD pipelines, integrating results from SAST/DAST/SCA tools and ensuring supply chain integrity. Engineer solutions for Kubernetes security, focusing on RBAC, network policies, and runtime protection. Detection, Monitoring & Incident Response: Perform triage, containment, eradication, and recovery activities as part of incident response, ensuring threats are effectively mitigated. Develop and optimise security detections (Sentinel, KQL, YARA). Manage log sources, ingestion pipelines, and monitoring infrastructure. Conduct threat hunting and analysis to identify emerging risks. Lead and contribute to incident investigations, including post-mortem analysis and remediation actions. Vulnerability & Risk Management: Identify, track, and remediate vulnerabilities across cloud, endpoint, and infrastructure. Implement controls from security assessments, audits, and architecture reviews. Support third-party risk assessments and vendor due diligence. Governance, Documentation & Projects: Maintain documentation of security standards, runbooks, and procedures. Participate in security-related projects and lead implementation of new security solutions. Required Qualifications: 3+ years in security engineering or security operations, ideally in cloud-first environments. Strong understanding of cloud security architecture with hands on experience securing cloud infrastructure and services. Hands on experience with the Azure security stack, including Microsoft Defender for Cloud (recommendations, alerts, Secure Score), Azure Policy, and related security tooling. Proficiency with SIEM platforms (Azure Sentinel preferred), developing detections and alerts, tuning rules, and investigating incidents. Proven incident response capability including triage, investigation, containment, eradication, and recovery. Practical experience integrating security into software and system development lifecycles. Experience with endpoint security solutions and MDM/EMM tools. Experience securing containerised environments (Kubernetes) and CI/CD pipelines. Proficiency in scripting and automation (PowerShell, Python, KQL, Bicep). Strong understanding of network security - protocols, firewalls, IDS/IPS, WAFs, and infrastructure hardening. Familiarity with incident response frameworks (NIST, SANS). Experience configuring and using cloud-native security logging, monitoring, and detection services. In-depth knowledge of security principles, attack vectors (OWASP Top 10, MITRE ATT&CK), and the threat landscape. Desired Qualifications: Azure Security Engineer AZ-500 Security Operations Analyst SC-200 Identity and Access administrator SC-300 GIAC Certified Forensic Analyst GIAC Certified Incident Handler Compensation and Benefits: Competitive salary Comprehensive health, dental, and vision insurance plans Flexible hybrid work environment Additional benefits like flexible hours, work travel opportunities, competitive vacation time and parental leave While meeting all of these criteria would be ideal, we understand that some candidates may meet most, but not all. If you're passionate, curious and ready to "work smart and get things done," we'd love to hear from you. Security Clearance: This role requires a current and active SC clearance at the time of hire. After successful probation, candidates must be willing and eligible to undergo DV, in line with contract requirements. DV is not required at application stage, though DV-cleared candidates are welcome to apply.
About the job We currently have an exciting opportunity for a Detection Engineer to join our existing experienced team. Tasks / Responsibilities Design, implement, and optimise detection logic, rules, and use cases in SIEM, EDR, and related platforms. Tune existing alerts and rules to reduce false positives and enhance detection fidelity. Monitor, analyse, and investigate security alerts to identify potential threats and malicious activity. Conduct threat hunting activities to proactively discover hidden or advanced threats. Collaborate with Incident Response teams to provide detection insights and support investigations. Maintain and improve detection coverage based on emerging threats, adversary tactics (MITRE ATT&CK), and threat intelligence. Develop automation scripts and playbooks to streamline detection and alert triage processes. Document detection processes, use cases, and provide knowledge transfer to SOC analysts. Qualifications Relevant qualification(s) in Cyber Security, or other related technical roles Examples: Degree in Cyber Security, Computer Science, Networks etc. Professional Qualifications from organisations such as CompTIA, ISACA etc. Technical qualifications in security and technology such as (but not limited to) cloud computing, SIEM, Vulnerability Scanning/Management etc. Experience (essential) Strong experience with Security Information and Event Management (SIEM) tools, in order of preference: Elastic Security (Mandatory) Sentinel (Optional) Splunk (Optional) Hands on knowledge of Endpoint Detection & Response (EDR) solutions (e.g., Elastic XDR, Microsoft Defender, CrowdStrike, Carbon Black, SentinelOne). Practical understanding of log sources across network, endpoint, cloud, and identity platforms. Solid knowledge of MITRE ATT&CK framework and application in detection engineering. Proficiency in detection rule development using query languages (e.g., ESQL, KQL, Lucene). Experience in incident detection, triage, and analysis in SOC or related environments. Understanding of malware techniques, lateral movement, persistence mechanisms, and threat actor TTPs. Experience (nice to have) Exposure to cloud security monitoring (AWS, Azure, GCP logging and detections). Knowledge of SOAR platforms and automation playbook creation. Experience with YARA, Sigma, or Snort/Suricata rule writing. Familiarity with container and Kubernetes security monitoring. Threat intelligence analysis and integrating threat intel into detection workflows. Knowledge of offensive security/red teaming methodologies to improve detection coverage. Familiarity with scripting/programming (Python, PowerShell, or similar) for automation and detection enrichment. About SiXworks SiXworks is a leading provider of secure digital solutions, specialising in digital experimentation and focused on fail safe fast cutting edge technology solutions deployed in highly secure environments. We are unified in our mission to accelerate innovation and adoption of secure, digital technology to improve the operational agility of Defence and National Security. This is an exciting time for us, we have ambitious plans for continued growth and development, and we are seeking to add brilliant, experienced, motivated, and passionate people to our team to work with us on this journey. Why join SiXworks? Our team is a fusion of brilliance, featuring senior operational, technical, and business leaders from various industries and the armed forces. We're also powered by a league of extraordinary IT engineers, architects, developers, and project managers. Together, we're an unstoppable force of digital innovation! What can we offer in return? SiXworks offers a unique work culture around our core principles Agility, Security, Innovation, Quality, Collaboration and Inclusivity. Together, these six principles form SiXworks'NORTH STAR, guiding the organisation towards success. This is reflected in the raft of benefits available to all our employees. Benefits 25 days annual leave + bank holidays Private Medical Insurance Life Assurance Scheme Pension scheme Professional Development opportunities Cycle to Work scheme Perks at Work scheme Discretionary Bonus scheme A word on UK Security Clearance Due to the secure nature of the position and working environment, you must have, or be eligible to obtain Security Clearance. More details relating to UK Security Clearance can be found here: United Kingdom Security Vetting: clearance levels - GOV.UK () SiXworks is an IBM subsidiary which has been acquired by IBM and will be integrated into the IBM organisation. SiXworks will be the hiring entity. By proceeding with this application, you understand that SiXworks will share your personal information with other IBM subsidiaries involved in your recruitment process, wherever these are located. More Information on how IBM protects your personal information, including the safeguards in case of cross border data transfer, are available here:
Dec 13, 2025
Full time
About the job We currently have an exciting opportunity for a Detection Engineer to join our existing experienced team. Tasks / Responsibilities Design, implement, and optimise detection logic, rules, and use cases in SIEM, EDR, and related platforms. Tune existing alerts and rules to reduce false positives and enhance detection fidelity. Monitor, analyse, and investigate security alerts to identify potential threats and malicious activity. Conduct threat hunting activities to proactively discover hidden or advanced threats. Collaborate with Incident Response teams to provide detection insights and support investigations. Maintain and improve detection coverage based on emerging threats, adversary tactics (MITRE ATT&CK), and threat intelligence. Develop automation scripts and playbooks to streamline detection and alert triage processes. Document detection processes, use cases, and provide knowledge transfer to SOC analysts. Qualifications Relevant qualification(s) in Cyber Security, or other related technical roles Examples: Degree in Cyber Security, Computer Science, Networks etc. Professional Qualifications from organisations such as CompTIA, ISACA etc. Technical qualifications in security and technology such as (but not limited to) cloud computing, SIEM, Vulnerability Scanning/Management etc. Experience (essential) Strong experience with Security Information and Event Management (SIEM) tools, in order of preference: Elastic Security (Mandatory) Sentinel (Optional) Splunk (Optional) Hands on knowledge of Endpoint Detection & Response (EDR) solutions (e.g., Elastic XDR, Microsoft Defender, CrowdStrike, Carbon Black, SentinelOne). Practical understanding of log sources across network, endpoint, cloud, and identity platforms. Solid knowledge of MITRE ATT&CK framework and application in detection engineering. Proficiency in detection rule development using query languages (e.g., ESQL, KQL, Lucene). Experience in incident detection, triage, and analysis in SOC or related environments. Understanding of malware techniques, lateral movement, persistence mechanisms, and threat actor TTPs. Experience (nice to have) Exposure to cloud security monitoring (AWS, Azure, GCP logging and detections). Knowledge of SOAR platforms and automation playbook creation. Experience with YARA, Sigma, or Snort/Suricata rule writing. Familiarity with container and Kubernetes security monitoring. Threat intelligence analysis and integrating threat intel into detection workflows. Knowledge of offensive security/red teaming methodologies to improve detection coverage. Familiarity with scripting/programming (Python, PowerShell, or similar) for automation and detection enrichment. About SiXworks SiXworks is a leading provider of secure digital solutions, specialising in digital experimentation and focused on fail safe fast cutting edge technology solutions deployed in highly secure environments. We are unified in our mission to accelerate innovation and adoption of secure, digital technology to improve the operational agility of Defence and National Security. This is an exciting time for us, we have ambitious plans for continued growth and development, and we are seeking to add brilliant, experienced, motivated, and passionate people to our team to work with us on this journey. Why join SiXworks? Our team is a fusion of brilliance, featuring senior operational, technical, and business leaders from various industries and the armed forces. We're also powered by a league of extraordinary IT engineers, architects, developers, and project managers. Together, we're an unstoppable force of digital innovation! What can we offer in return? SiXworks offers a unique work culture around our core principles Agility, Security, Innovation, Quality, Collaboration and Inclusivity. Together, these six principles form SiXworks'NORTH STAR, guiding the organisation towards success. This is reflected in the raft of benefits available to all our employees. Benefits 25 days annual leave + bank holidays Private Medical Insurance Life Assurance Scheme Pension scheme Professional Development opportunities Cycle to Work scheme Perks at Work scheme Discretionary Bonus scheme A word on UK Security Clearance Due to the secure nature of the position and working environment, you must have, or be eligible to obtain Security Clearance. More details relating to UK Security Clearance can be found here: United Kingdom Security Vetting: clearance levels - GOV.UK () SiXworks is an IBM subsidiary which has been acquired by IBM and will be integrated into the IBM organisation. SiXworks will be the hiring entity. By proceeding with this application, you understand that SiXworks will share your personal information with other IBM subsidiaries involved in your recruitment process, wherever these are located. More Information on how IBM protects your personal information, including the safeguards in case of cross border data transfer, are available here:
Technical Operations Analyst Preston / Remote (onsite when needed) 12 months initially £41.94ph inside IR35 / Umbrella Working as part of a team safeguarding against cyber threats by developing and enhancing the Technical Operations capability across People, Process, and Technology, ensuring an efficient approach to all Cyber Operations. Proactively protecting the client through continual automation and testing of security controls. Continuously working toward organisational, departmental, and individual objectives and upholding security standards and principles. Providing assurance to the Head of Cyber Operations and Technical Operations Manager that the SOC is operating efficiently through the use of orchestration and automation. Core Duties Typical duties include (but are not limited to): Identification of process that can be automated to make the SOC more effective. Responsible for the overall delivery of the Technical Operations function by providing support to other members of the team to protect the client's systems against cyber threats. Lead in the identification and the creation, maintenance and troubleshooting of SOAR playbooks, automations and enrichments. Apply critical thinking to solve unique problems in the information security space. Enhancing the processes around interacting with large datasets to construct actionable information to enhance the detection of suspicious activity within the business. On boarding new data sources to increase the visibility of security event information across multiple technologies. Creating security use cases to enable the wider SOC to respond to a wider array of threats. Identify where automation can assist the Incident Response team when investigating suspicious activity. Creation of analytic content to enable quantifiable metrics on SOC performance. Additional Accountabilities Able to lead a small Data project or support a larger project Work as a fully contributory member of the Cyber Security Team with the ability to delivery with limited guidance from the Line Manager. Expected to provide technical support to team members and provide support to individuals within specialist areas. Guides others in application of IM&T and Cyber processes. Manage own development including participating in on the job training and attending training programmes as appropriate. Provide support to others development, including the development of people within specialist areas. Responsible for training members of the team, monitoring their quality of work and contributing to pay decisions Knowledge, Skills and Qualifications A strong technical background with a detailed knowledge of cyber security, computer networks and operating systems. Broad and detailed experience of technologies including but not limited to firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, Linux, TCP/IP, Networks, Cloud, CDNs and Vulnerability Management. Analytical background, comfortable analysing and interpreting large and complex data sets and articulating the story behind any observations along with providing conclusions and recommendations. Detailed knowledge of the current threat landscape, the TTPs frequently employed in those attacks and how we can investigate and mitigate these. Knowledge and demonstrable experience of the MITRE ATT&CK framework. Good knowledge of enterprise computing technologies. Skills Understanding of enterprise networking and computing Knowledge of Python 3 programming language Demonstrable experience in using SOAR tooling and its application Application of data science against large datasets involving unstructured data and designing data models Knowledge of using SIEM platforms to identify suspected security events and creating content to enhance the platform Knowledge of custom API's to leverage the SOAR's functionality Ability to communicate to other stakeholders across the business Technical documentation creation Mentoring junior members of the team The ability to obtain UK Government security clearance to SC Relevant industry and vendor qualifications such as CISSP, CISM, CompTIA security+ Cyber security framework knowledge such as MITRE ATT&CK Organisational, departmental, and individual objectives and upholding security standards and principles. Providing assurance to the Head of Cyber Operations and Technical Operations Manager that the SOC is operating efficiently through the use of orchestration and automation. JBRP1_UKTJ
Dec 13, 2025
Full time
Technical Operations Analyst Preston / Remote (onsite when needed) 12 months initially £41.94ph inside IR35 / Umbrella Working as part of a team safeguarding against cyber threats by developing and enhancing the Technical Operations capability across People, Process, and Technology, ensuring an efficient approach to all Cyber Operations. Proactively protecting the client through continual automation and testing of security controls. Continuously working toward organisational, departmental, and individual objectives and upholding security standards and principles. Providing assurance to the Head of Cyber Operations and Technical Operations Manager that the SOC is operating efficiently through the use of orchestration and automation. Core Duties Typical duties include (but are not limited to): Identification of process that can be automated to make the SOC more effective. Responsible for the overall delivery of the Technical Operations function by providing support to other members of the team to protect the client's systems against cyber threats. Lead in the identification and the creation, maintenance and troubleshooting of SOAR playbooks, automations and enrichments. Apply critical thinking to solve unique problems in the information security space. Enhancing the processes around interacting with large datasets to construct actionable information to enhance the detection of suspicious activity within the business. On boarding new data sources to increase the visibility of security event information across multiple technologies. Creating security use cases to enable the wider SOC to respond to a wider array of threats. Identify where automation can assist the Incident Response team when investigating suspicious activity. Creation of analytic content to enable quantifiable metrics on SOC performance. Additional Accountabilities Able to lead a small Data project or support a larger project Work as a fully contributory member of the Cyber Security Team with the ability to delivery with limited guidance from the Line Manager. Expected to provide technical support to team members and provide support to individuals within specialist areas. Guides others in application of IM&T and Cyber processes. Manage own development including participating in on the job training and attending training programmes as appropriate. Provide support to others development, including the development of people within specialist areas. Responsible for training members of the team, monitoring their quality of work and contributing to pay decisions Knowledge, Skills and Qualifications A strong technical background with a detailed knowledge of cyber security, computer networks and operating systems. Broad and detailed experience of technologies including but not limited to firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, Linux, TCP/IP, Networks, Cloud, CDNs and Vulnerability Management. Analytical background, comfortable analysing and interpreting large and complex data sets and articulating the story behind any observations along with providing conclusions and recommendations. Detailed knowledge of the current threat landscape, the TTPs frequently employed in those attacks and how we can investigate and mitigate these. Knowledge and demonstrable experience of the MITRE ATT&CK framework. Good knowledge of enterprise computing technologies. Skills Understanding of enterprise networking and computing Knowledge of Python 3 programming language Demonstrable experience in using SOAR tooling and its application Application of data science against large datasets involving unstructured data and designing data models Knowledge of using SIEM platforms to identify suspected security events and creating content to enhance the platform Knowledge of custom API's to leverage the SOAR's functionality Ability to communicate to other stakeholders across the business Technical documentation creation Mentoring junior members of the team The ability to obtain UK Government security clearance to SC Relevant industry and vendor qualifications such as CISSP, CISM, CompTIA security+ Cyber security framework knowledge such as MITRE ATT&CK Organisational, departmental, and individual objectives and upholding security standards and principles. Providing assurance to the Head of Cyber Operations and Technical Operations Manager that the SOC is operating efficiently through the use of orchestration and automation. JBRP1_UKTJ
A financial services firm in London is seeking an L2 SOC Analyst to join their SOC team. In this role, you will be responsible for leading the response to escalated security incidents and managing the incident lifecycle. The ideal candidate should have experience with Splunk and threat detection, working in a fast-paced environment with opportunities for growth. The position offers a competitive salary of £70,000 plus excellent benefits and a hybrid work model.
Dec 13, 2025
Full time
A financial services firm in London is seeking an L2 SOC Analyst to join their SOC team. In this role, you will be responsible for leading the response to escalated security incidents and managing the incident lifecycle. The ideal candidate should have experience with Splunk and threat detection, working in a fast-paced environment with opportunities for growth. The position offers a competitive salary of £70,000 plus excellent benefits and a hybrid work model.
Your new company Our client is seeking a SOC Analyst to join a 24/7 team based on-site in Milton Keynes. As part of the first line of defence, you'll be responsible for monitoring systems, identifying potential threats, and ensuring rapid incident response to safeguard critical services. Responsibilities Keep a close watch on SIEM platforms and other monitoring tools to spot unusual activity click apply for full job details
Dec 13, 2025
Contractor
Your new company Our client is seeking a SOC Analyst to join a 24/7 team based on-site in Milton Keynes. As part of the first line of defence, you'll be responsible for monitoring systems, identifying potential threats, and ensuring rapid incident response to safeguard critical services. Responsibilities Keep a close watch on SIEM platforms and other monitoring tools to spot unusual activity click apply for full job details
A leading cybersecurity company is seeking a Senior SOC Analyst with DV clearance to join their government client's security team. The role involves monitoring systems for potential security incidents, analyzing alerts, and initiating response procedures. Essential skills include experience with SPLUNK, problem-solving abilities, and knowledge of networking concepts. Successful candidates will demonstrate a methodical approach to incident management within a dynamic 24/7 team environment. Competitive daily rate of £600 offered for this 12-month contract.
Dec 12, 2025
Full time
A leading cybersecurity company is seeking a Senior SOC Analyst with DV clearance to join their government client's security team. The role involves monitoring systems for potential security incidents, analyzing alerts, and initiating response procedures. Essential skills include experience with SPLUNK, problem-solving abilities, and knowledge of networking concepts. Successful candidates will demonstrate a methodical approach to incident management within a dynamic 24/7 team environment. Competitive daily rate of £600 offered for this 12-month contract.
Senior Analyst Operational Resilience & Incident Management page is loaded Senior Analyst Operational Resilience & Incident Managementlocations: London, United Kingdom: Frankfurt, Germanytime type: Full timeposted on: Posted Yesterdayjob requisition id: R93139# Wellington Management offers comprehensive investment management capabilities that span nearly all segments of the global capital markets. Our investment solutions, tailored to the unique return and risk objectives of institutional clients in more than 60 countries, draw on a robust body of proprietary research and a collaborative culture that encourages independent thought and healthy debate. As a private partnership, we believe our ownership structure fosters a long-term view that aligns our perspectives with those of our clients. About the Role Senior Analyst - Operational Resilience & Incident Management Position Overview The Senior Analyst, Operational Resilience & Incident Management will serve as the primary representative of the EMEA-based Operational Resilience & Incident Management team within Enterprise Risk. This role is responsible for maintaining the firm's Operational Resilience program, including designing and facilitating scenario tests, conducting resilience assessments across Important Business Services and Pillars, and equipping stakeholders with critical information to make informed decisions during disruptions.The position also plays an integral role in supporting the firm's Error Resolution Council (ERC), Fund Error Resolution Group (FERG), and Market Crisis Management. Acting as a frontline resource, the Senior Analyst will respond to operational incidents, business continuity events, and market crises impacting the firm's global operations. This position reports to the Senior Officer, Enterprise Resilience & Risk Intelligence, based in Boston. Key Responsibilities Incident Management Facilitate resolution of operational incidents by interviewing key personnel, analyzing facts, reviewing documentation, and liaising with the ERC on error determinations. Instruct investment teams and traders to take corrective action when necessary, calculate financial impact, coordinate reimbursements, and assist relationship teams with client communications. Execute incident response plans and playbooks for major incidents. Monitor operating events related to operational resilience, including near misses, and escalate or remediate as required. Operational Resilience Design and facilitate scenario tests and resilience assessments across Important Business Services. Support business functions in identifying, documenting, and maintaining key business services, impact tolerances, and reporting metrics in line with global standards and regulations. Ensure resilience activities are embedded into business operations and management processes. Represent the firm in operational resilience engagements with regulators, clients, suppliers, and industry bodies. Governance & Reporting Provide guidance to global ERC Support colleagues and thoughtfully challenge conclusions drawn by ERC Support and Council members. Participate in strategic initiatives involving the ERC, including process, technology, and reporting enhancements. Evolve error reporting and identify opportunities for risk assessments and remediation. Participate in Legal & Enterprise Risk and firmwide initiatives. Manage program changes driven by business, regulatory, or industry initiatives, providing feedback from an operational resilience perspective. Stakeholder Engagement Serve as a key interface with the Error Resolution Council, Fund Error Resolution Group, Risk Committees, and business team leaders. Communicate the importance of ERC through periodic training sessions. Meet with clients during Operational Due Diligence meetings. Qualifications At least 5 years of industry experience with strong knowledge of trading, securities markets, and investment products. Inquisitive mindset with appropriate skepticism and curiosity. Ability to manage multiple initiatives and projects simultaneously. Strong business judgment and discretion with sensitive information. Highly detail-oriented, process-driven, and comfortable working with data. Excellent written and oral communication skills. Proactive, self-motivated, and well-organized. Collaborative approach; works well in a matrix team environment. Experience in developing and implementing standards and policies. Expertise in program governance, including board presentations and framework documentation. Resilience-related certifications (BCP, DR, MBCI, CISM) are a plus. Availability during off-hours for emergencies or incidents may be required. Ability to articulate complex issues clearly and concisely. Why This Role Matters This position is critical to ensuring the firm's ability to operate globally during disruptions, maintain regulatory compliance, and uphold client confidence through robust operational resilience and incident management practices.Not sure you meet 100% of our That's ok. If you believe that you could excel in this role, we encourage you to apply and welcome a chance to review your background. We are dedicated to building and maintaining a diversified workforce and considering a broad array of candidates with a variety of skill, workplace experiences, and backgrounds. As an equal opportunity employer, Wellington Management ensures that all qualified applicants will receive equal consideration for employment without regard to race, color, sex, sexual orientation, gender identity, gender expression, religion, creed, national origin, age, ancestry, disability (physical or mental), medical condition, citizenship, marital status, pregnancy, veteran or military status, genetic information or any other characteristic protected by applicable law . If you are a candidate with a disability, or are assisting a candidate with a disability, and require an accommodation to apply for one of our jobs, please email us at . We believe that in person interactions inspire and energize our community and are essential to our culture. In support of this commitment, our employees work from our offices 4 days a week with flexibility to work remotely 1 day a week. We believe that this approach ultimately supports our mission to deliver investment excellence to our clients and their beneficiaries over the long term.
Dec 12, 2025
Full time
Senior Analyst Operational Resilience & Incident Management page is loaded Senior Analyst Operational Resilience & Incident Managementlocations: London, United Kingdom: Frankfurt, Germanytime type: Full timeposted on: Posted Yesterdayjob requisition id: R93139# Wellington Management offers comprehensive investment management capabilities that span nearly all segments of the global capital markets. Our investment solutions, tailored to the unique return and risk objectives of institutional clients in more than 60 countries, draw on a robust body of proprietary research and a collaborative culture that encourages independent thought and healthy debate. As a private partnership, we believe our ownership structure fosters a long-term view that aligns our perspectives with those of our clients. About the Role Senior Analyst - Operational Resilience & Incident Management Position Overview The Senior Analyst, Operational Resilience & Incident Management will serve as the primary representative of the EMEA-based Operational Resilience & Incident Management team within Enterprise Risk. This role is responsible for maintaining the firm's Operational Resilience program, including designing and facilitating scenario tests, conducting resilience assessments across Important Business Services and Pillars, and equipping stakeholders with critical information to make informed decisions during disruptions.The position also plays an integral role in supporting the firm's Error Resolution Council (ERC), Fund Error Resolution Group (FERG), and Market Crisis Management. Acting as a frontline resource, the Senior Analyst will respond to operational incidents, business continuity events, and market crises impacting the firm's global operations. This position reports to the Senior Officer, Enterprise Resilience & Risk Intelligence, based in Boston. Key Responsibilities Incident Management Facilitate resolution of operational incidents by interviewing key personnel, analyzing facts, reviewing documentation, and liaising with the ERC on error determinations. Instruct investment teams and traders to take corrective action when necessary, calculate financial impact, coordinate reimbursements, and assist relationship teams with client communications. Execute incident response plans and playbooks for major incidents. Monitor operating events related to operational resilience, including near misses, and escalate or remediate as required. Operational Resilience Design and facilitate scenario tests and resilience assessments across Important Business Services. Support business functions in identifying, documenting, and maintaining key business services, impact tolerances, and reporting metrics in line with global standards and regulations. Ensure resilience activities are embedded into business operations and management processes. Represent the firm in operational resilience engagements with regulators, clients, suppliers, and industry bodies. Governance & Reporting Provide guidance to global ERC Support colleagues and thoughtfully challenge conclusions drawn by ERC Support and Council members. Participate in strategic initiatives involving the ERC, including process, technology, and reporting enhancements. Evolve error reporting and identify opportunities for risk assessments and remediation. Participate in Legal & Enterprise Risk and firmwide initiatives. Manage program changes driven by business, regulatory, or industry initiatives, providing feedback from an operational resilience perspective. Stakeholder Engagement Serve as a key interface with the Error Resolution Council, Fund Error Resolution Group, Risk Committees, and business team leaders. Communicate the importance of ERC through periodic training sessions. Meet with clients during Operational Due Diligence meetings. Qualifications At least 5 years of industry experience with strong knowledge of trading, securities markets, and investment products. Inquisitive mindset with appropriate skepticism and curiosity. Ability to manage multiple initiatives and projects simultaneously. Strong business judgment and discretion with sensitive information. Highly detail-oriented, process-driven, and comfortable working with data. Excellent written and oral communication skills. Proactive, self-motivated, and well-organized. Collaborative approach; works well in a matrix team environment. Experience in developing and implementing standards and policies. Expertise in program governance, including board presentations and framework documentation. Resilience-related certifications (BCP, DR, MBCI, CISM) are a plus. Availability during off-hours for emergencies or incidents may be required. Ability to articulate complex issues clearly and concisely. Why This Role Matters This position is critical to ensuring the firm's ability to operate globally during disruptions, maintain regulatory compliance, and uphold client confidence through robust operational resilience and incident management practices.Not sure you meet 100% of our That's ok. If you believe that you could excel in this role, we encourage you to apply and welcome a chance to review your background. We are dedicated to building and maintaining a diversified workforce and considering a broad array of candidates with a variety of skill, workplace experiences, and backgrounds. As an equal opportunity employer, Wellington Management ensures that all qualified applicants will receive equal consideration for employment without regard to race, color, sex, sexual orientation, gender identity, gender expression, religion, creed, national origin, age, ancestry, disability (physical or mental), medical condition, citizenship, marital status, pregnancy, veteran or military status, genetic information or any other characteristic protected by applicable law . If you are a candidate with a disability, or are assisting a candidate with a disability, and require an accommodation to apply for one of our jobs, please email us at . We believe that in person interactions inspire and energize our community and are essential to our culture. In support of this commitment, our employees work from our offices 4 days a week with flexibility to work remotely 1 day a week. We believe that this approach ultimately supports our mission to deliver investment excellence to our clients and their beneficiaries over the long term.
Certes IT Service Solutions
Milton Keynes, Buckinghamshire
Senior SOC Analyst (DV Cleared) Duration: 12 Months Location: Milton Keynes Rate: £600-£650 per day IR35 Status: Inside Start: ASAP A Senior SOC Analyst (DV Cleared) is required for our Government client to be part of their security team providing a 24x7 service helping to protect the organisation from cyber threats. You will be part of a 24x7 team responsible for monitoring their systems, detecting potential security incidents and initiating the incident response process. Essential skills & experience required: As the Senior SOC Analyst you will possess current security clearance to DV Level together with experience of SPLUNK within a security operations centre (SOC) Possess excellent problem solving abilities, attention to detail and the capacity to work under pressure and comfortable working within a team environment. Have a good understanding of networking concepts (TCP/IP, DNS etc ) Windows and Linux O/Systems Common cyber attack techniques Any Cyber security certifications would be desirable. Responsibilities include: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. Analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritise incidents. For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Create detailed tickets and reports for all detected incidents, documenting your findings and the steps you have taken as this is crucial for tracking incidents and for future analysis. Also to assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively. To apply for this role please email your CV to: Certes IT Service Solutions welcomes applications from all sections of the community and from people with diverse experience and backgrounds Certes Computing (and all of its subsidiary companies) is committed to promoting equality and diversity in its business operations. JBRP1_UKTJ
Dec 12, 2025
Full time
Senior SOC Analyst (DV Cleared) Duration: 12 Months Location: Milton Keynes Rate: £600-£650 per day IR35 Status: Inside Start: ASAP A Senior SOC Analyst (DV Cleared) is required for our Government client to be part of their security team providing a 24x7 service helping to protect the organisation from cyber threats. You will be part of a 24x7 team responsible for monitoring their systems, detecting potential security incidents and initiating the incident response process. Essential skills & experience required: As the Senior SOC Analyst you will possess current security clearance to DV Level together with experience of SPLUNK within a security operations centre (SOC) Possess excellent problem solving abilities, attention to detail and the capacity to work under pressure and comfortable working within a team environment. Have a good understanding of networking concepts (TCP/IP, DNS etc ) Windows and Linux O/Systems Common cyber attack techniques Any Cyber security certifications would be desirable. Responsibilities include: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. Analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritise incidents. For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Create detailed tickets and reports for all detected incidents, documenting your findings and the steps you have taken as this is crucial for tracking incidents and for future analysis. Also to assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively. To apply for this role please email your CV to: Certes IT Service Solutions welcomes applications from all sections of the community and from people with diverse experience and backgrounds Certes Computing (and all of its subsidiary companies) is committed to promoting equality and diversity in its business operations. JBRP1_UKTJ
A leading asset management firm in the UK seeks a Senior Cyber Defence Operations Analyst to join their CISO function. Responsibilities include leading incident response, maintaining monitoring solutions, and enhancing operational security. The ideal candidate has extensive experience in cybersecurity operations and a strong knowledge of SIEM tools. This role offers opportunities to innovate security processes and practices within the firm.
Dec 12, 2025
Full time
A leading asset management firm in the UK seeks a Senior Cyber Defence Operations Analyst to join their CISO function. Responsibilities include leading incident response, maintaining monitoring solutions, and enhancing operational security. The ideal candidate has extensive experience in cybersecurity operations and a strong knowledge of SIEM tools. This role offers opportunities to innovate security processes and practices within the firm.
Insight Investment are seeking a Senior Cyber Defence Operations Analyst to be a part of the CISO function reporting to the Cyber Defence Operations Lead. The role will be to maintain and update alerts/rules within Insight Investment's monitoring solution, conduct vulnerability management with various stakeholders, continually ensure compliance with regulatory requirements, generate new security controls as required, and be responsible for incident response within the firm. The candidate will lead incident response activity as required. Role Responsibilities Lead, investigate, record and respond to SIEM alerts, determine scope and severity of incidents, and coordinate containment and remediation efforts. Define, implement and continuously improve operational security processes and runbooks to align with compliance standards and evolving threats. Assist with integrating and configuring security tooling, ensuring effective data ingestion, enrichment and alerting across the environment. Lead threat hunting activities to proactively identify suspicious behaviour and improve detection coverage. Deliver effective vulnerability management: analyse scanning outputs, coordinate with technology teams and ensure timely notification and remediation tracking. Participate in the out-of-hours, on-call rotation, supporting incident response efforts during non-core hours. Enforce security processes and requirements across the business. Experience Required Previous ownership of the incident response, vulnerability management or SIEM monitoring solution processes and procedures. Knowledge of SIEM tooling, designing and implementing use cases & documenting KBAs. Strong knowledge of KQL. Proven experience in incident response and handling. Experience contributing to cybersecurity operations in a professional or structured environment. Demonstrated commitment to continuous self-study. Experience working with an MSSP. Technical knowledge of access management and security controls. Strong collaboration skills with the ability to work across teams and stakeholders. A strong desire to drive security innovation across the firm. Advantageous Relevant technical cyber security certifications are desirable. Knowledge on task automation/scripting would be hugely beneficial. Experience with Microsoft suite (Defender/Azure), query-based SIEM (e.g. Sentinel, Splunk) and orchestration platforms. Experience in financial services or other highly regulated environments. Prior involvement in threat hunting activities. About Insight Investment Insight Investment is a leading asset manager focused on designing investment solutions to meet its clients' needs. Founded in 2002, Insight's collaborative approach has delivered both investment performance and growth in assets under management. Insight manages assets across its core liability-driven investment, risk management, full-spectrum fixed income, currency and absolute return capabilities. Insight has a global network of operations in the UK, Ireland, Germany, US, Japan and Australia. More information about Insight Investment can be found at:
Dec 12, 2025
Full time
Insight Investment are seeking a Senior Cyber Defence Operations Analyst to be a part of the CISO function reporting to the Cyber Defence Operations Lead. The role will be to maintain and update alerts/rules within Insight Investment's monitoring solution, conduct vulnerability management with various stakeholders, continually ensure compliance with regulatory requirements, generate new security controls as required, and be responsible for incident response within the firm. The candidate will lead incident response activity as required. Role Responsibilities Lead, investigate, record and respond to SIEM alerts, determine scope and severity of incidents, and coordinate containment and remediation efforts. Define, implement and continuously improve operational security processes and runbooks to align with compliance standards and evolving threats. Assist with integrating and configuring security tooling, ensuring effective data ingestion, enrichment and alerting across the environment. Lead threat hunting activities to proactively identify suspicious behaviour and improve detection coverage. Deliver effective vulnerability management: analyse scanning outputs, coordinate with technology teams and ensure timely notification and remediation tracking. Participate in the out-of-hours, on-call rotation, supporting incident response efforts during non-core hours. Enforce security processes and requirements across the business. Experience Required Previous ownership of the incident response, vulnerability management or SIEM monitoring solution processes and procedures. Knowledge of SIEM tooling, designing and implementing use cases & documenting KBAs. Strong knowledge of KQL. Proven experience in incident response and handling. Experience contributing to cybersecurity operations in a professional or structured environment. Demonstrated commitment to continuous self-study. Experience working with an MSSP. Technical knowledge of access management and security controls. Strong collaboration skills with the ability to work across teams and stakeholders. A strong desire to drive security innovation across the firm. Advantageous Relevant technical cyber security certifications are desirable. Knowledge on task automation/scripting would be hugely beneficial. Experience with Microsoft suite (Defender/Azure), query-based SIEM (e.g. Sentinel, Splunk) and orchestration platforms. Experience in financial services or other highly regulated environments. Prior involvement in threat hunting activities. About Insight Investment Insight Investment is a leading asset manager focused on designing investment solutions to meet its clients' needs. Founded in 2002, Insight's collaborative approach has delivered both investment performance and growth in assets under management. Insight manages assets across its core liability-driven investment, risk management, full-spectrum fixed income, currency and absolute return capabilities. Insight has a global network of operations in the UK, Ireland, Germany, US, Japan and Australia. More information about Insight Investment can be found at:
Sorry, applications for this particular Job have now closed. Location: Hybrid-WFH/Surrey 3 days a week Salary: Salary Negotiable Job type: Permanent Sector: Professional Services SOC lead required for innovative MSP. You will lead the strategic direction, performance, and day-to-day operations. Job Opportunities CTI Analyst Financial Services firm seeks an Operational CTI Analyst to join its Threat Intelligence team. Location: London Job type: Permanent Purple Team Specialist Financial Services firm seeks a Purple Team Analyst to join its Security Operations function. Location: London Job type: Permanent Senior SOC Analyst Financial Services firm seeks an L2 SOC Analyst to join their SOC team. Location: London Job type: Permanent Business Continuity & Operational Resilience Manager - FTC Business Continuity & Operational Resilience Manager required. Location: Hybrid-WFH/London 3 days a week Job type: Permanent Sector: Professional Services MD - Cyber Security This established security consultancy firm is entering a new growth phase. Location: London - hybrid Job type: Permanent Sector: Professional Services Cryptography Analyst Leading banking group seeks a Cryptography Analyst to join their security team. Location: Manchester area - hybrid Job type: Permanent Associate Director - Digital Forensics and Incident Response Leading Consultancy continues to expand its EMEA presence and seek an Associate Director to join. As an Associate Director, you'll lead technical investigations involving cybersecurity breaches, digital forensics, and eDiscovery. Your work will span both hands-on investigation and strategic leadership. This role is open in background but you must have strong experience across DFIR investigation work, and have a brilliant technical acumen coupled with strong communication skills. This is a hybrid role - London based, offering up to £110k on the base. We seek individuals from a diverse talent pool and encourage applicants from underrepresented groups to apply to our vacancies. Our commitment to fair recruitment processes means that we welcome applicants from all backgrounds, regardless of their lived experience or personal characteristics. We also invite applicants who meet most of the listed requirements, even if not all, to apply. If you require any adjustments to the application process, please let us know. Barclay Simpson acts as an Employment Agency for permanent positions and an Employment Business for temporary/contract engagements.
Dec 11, 2025
Full time
Sorry, applications for this particular Job have now closed. Location: Hybrid-WFH/Surrey 3 days a week Salary: Salary Negotiable Job type: Permanent Sector: Professional Services SOC lead required for innovative MSP. You will lead the strategic direction, performance, and day-to-day operations. Job Opportunities CTI Analyst Financial Services firm seeks an Operational CTI Analyst to join its Threat Intelligence team. Location: London Job type: Permanent Purple Team Specialist Financial Services firm seeks a Purple Team Analyst to join its Security Operations function. Location: London Job type: Permanent Senior SOC Analyst Financial Services firm seeks an L2 SOC Analyst to join their SOC team. Location: London Job type: Permanent Business Continuity & Operational Resilience Manager - FTC Business Continuity & Operational Resilience Manager required. Location: Hybrid-WFH/London 3 days a week Job type: Permanent Sector: Professional Services MD - Cyber Security This established security consultancy firm is entering a new growth phase. Location: London - hybrid Job type: Permanent Sector: Professional Services Cryptography Analyst Leading banking group seeks a Cryptography Analyst to join their security team. Location: Manchester area - hybrid Job type: Permanent Associate Director - Digital Forensics and Incident Response Leading Consultancy continues to expand its EMEA presence and seek an Associate Director to join. As an Associate Director, you'll lead technical investigations involving cybersecurity breaches, digital forensics, and eDiscovery. Your work will span both hands-on investigation and strategic leadership. This role is open in background but you must have strong experience across DFIR investigation work, and have a brilliant technical acumen coupled with strong communication skills. This is a hybrid role - London based, offering up to £110k on the base. We seek individuals from a diverse talent pool and encourage applicants from underrepresented groups to apply to our vacancies. Our commitment to fair recruitment processes means that we welcome applicants from all backgrounds, regardless of their lived experience or personal characteristics. We also invite applicants who meet most of the listed requirements, even if not all, to apply. If you require any adjustments to the application process, please let us know. Barclay Simpson acts as an Employment Agency for permanent positions and an Employment Business for temporary/contract engagements.
Sorry, applications for this particular Job have now closed. Location: Hybrid-WFH/Surrey 3 days a week Salary: Salary Negotiable Job type: Permanent Sector: Professional Services SOC lead required for innovative MSP. You will lead the strategic direction, performance, and day-to-day operations. Job Opportunities CTI Analyst Financial Services firm seeks an Operational CTI Analyst to join its Threat Intelligence team. Location: London Job type: Permanent Purple Team Specialist Financial Services firm seeks a Purple Team Analyst to join its Security Operations function. Location: London Job type: Permanent Senior SOC Analyst Financial Services firm seeks an L2 SOC Analyst to join their SOC team. Location: London Job type: Permanent Business Continuity & Operational Resilience Manager - FTC Business Continuity & Operational Resilience Manager required. Location: Hybrid-WFH/London 3 days a week Job type: Permanent Sector: Professional Services MD - Cyber Security This established security consultancy firm is entering a new growth phase. Location: London - hybrid Job type: Permanent Sector: Professional Services Cryptography Analyst Leading banking group seeks a Cryptography Analyst to join their security team. Location: Manchester area - hybrid Job type: Permanent Associate Director - Digital Forensics and Incident Response Leading Consultancy continues to expand its EMEA presence and seek an Associate Director to join. As an Associate Director, you'll lead technical investigations involving cybersecurity breaches, digital forensics, and eDiscovery. Your work will span both hands-on investigation and strategic leadership. This role is open in background but you must have strong experience across DFIR investigation work, and have a brilliant technical acumen coupled with strong communication skills. This is a hybrid role - London based, offering up to £110k on the base. We seek individuals from a diverse talent pool and encourage applicants from underrepresented groups to apply to our vacancies. Our commitment to fair recruitment processes means that we welcome applicants from all backgrounds, regardless of their lived experience or personal characteristics. We also invite applicants who meet most of the listed requirements, even if not all, to apply. If you require any adjustments to the application process, please let us know. Barclay Simpson acts as an Employment Agency for permanent positions and an Employment Business for temporary/contract engagements.
Dec 11, 2025
Full time
Sorry, applications for this particular Job have now closed. Location: Hybrid-WFH/Surrey 3 days a week Salary: Salary Negotiable Job type: Permanent Sector: Professional Services SOC lead required for innovative MSP. You will lead the strategic direction, performance, and day-to-day operations. Job Opportunities CTI Analyst Financial Services firm seeks an Operational CTI Analyst to join its Threat Intelligence team. Location: London Job type: Permanent Purple Team Specialist Financial Services firm seeks a Purple Team Analyst to join its Security Operations function. Location: London Job type: Permanent Senior SOC Analyst Financial Services firm seeks an L2 SOC Analyst to join their SOC team. Location: London Job type: Permanent Business Continuity & Operational Resilience Manager - FTC Business Continuity & Operational Resilience Manager required. Location: Hybrid-WFH/London 3 days a week Job type: Permanent Sector: Professional Services MD - Cyber Security This established security consultancy firm is entering a new growth phase. Location: London - hybrid Job type: Permanent Sector: Professional Services Cryptography Analyst Leading banking group seeks a Cryptography Analyst to join their security team. Location: Manchester area - hybrid Job type: Permanent Associate Director - Digital Forensics and Incident Response Leading Consultancy continues to expand its EMEA presence and seek an Associate Director to join. As an Associate Director, you'll lead technical investigations involving cybersecurity breaches, digital forensics, and eDiscovery. Your work will span both hands-on investigation and strategic leadership. This role is open in background but you must have strong experience across DFIR investigation work, and have a brilliant technical acumen coupled with strong communication skills. This is a hybrid role - London based, offering up to £110k on the base. We seek individuals from a diverse talent pool and encourage applicants from underrepresented groups to apply to our vacancies. Our commitment to fair recruitment processes means that we welcome applicants from all backgrounds, regardless of their lived experience or personal characteristics. We also invite applicants who meet most of the listed requirements, even if not all, to apply. If you require any adjustments to the application process, please let us know. Barclay Simpson acts as an Employment Agency for permanent positions and an Employment Business for temporary/contract engagements.
Senior Incident Response Analyst When registering to this job board you will be redirected to the online application form. Please ensure that this is completed in full in order that your application can be reviewed. Come and join the Littlefish team! Work location: Remote Salary: Up to: £70,000 Must be eligible for SC Clearance (UK resident for the last 5 years) and NPPV2 clearance Here at Littlefish, w click apply for full job details
Dec 11, 2025
Full time
Senior Incident Response Analyst When registering to this job board you will be redirected to the online application form. Please ensure that this is completed in full in order that your application can be reviewed. Come and join the Littlefish team! Work location: Remote Salary: Up to: £70,000 Must be eligible for SC Clearance (UK resident for the last 5 years) and NPPV2 clearance Here at Littlefish, w click apply for full job details
Take a look at our current vacancies. If you see a vacancy that is right for you, we encourage you to apply! Senior Applications Support Analyst (Workday) As part of our Application Operations team, you'll be the go-to person for resolving complex issues, managing third-party relationships, and supporting key platforms like Workday Financials - If you're passionate about service excellence, confident working with finance systems, and thrive in a collaborative environment, we'd love to hear from you. Contract : Permanent Working hours : 35 hours per week is full time. Salary: £53,300 - £64,786 (Dependent on experience) Reporting to : Applications Operations Manager Location: London, docklands. O ur permanent hybrid policy sees us all working at least four days across a fortnight in the office .The last few years have seen the Financial Ombudsman Service embark on an organisation-wide transformation journey. With the customer at the heart of everything we do, we have already delivered significant improvements in the service we offer and 2025 will see us continue with our ambitious transformation agenda.As part of the application operations team, you'll be a pivotal point of contact for our customers, suppliers and third-party managed service partners. As well as managing relationships you'll also be triaging issues and requests - ensuring our customers get timely responses. You'll be responsible for making the decision to escalate tickets to the relevant suppliers or address the issues yourself.As an operation support analyst, you'll be supporting our main HR and Finance System: Workday . You will provide a high quality, customer focused service. You'll be liaising with other CIO functions, suppliers and front-end users to ensure that the incidents and requests you receive are resolved within the agreed SLAs. You'll also undertake routine upgrades, maintenance and, daily checks on a range of applications to maintain availability and functionality. Key responsibilities Liaising with internal customers and third-party suppliers to provide technical support across our business applications including Workday. Ensuring our third-party supplier adhere to governance and change control. Utilising your Finance experience and knowledge of Workday to identify potential improvements to streamline core processes for the Finance team and wider business. Building and maintaining relationships with a full range of stakeholders to make sure that that the services you provide meet their needs Proactively taking personal responsibility for delivering on your objectives in line with our values Co-ordinating UAT and helping to manage system changes in collaboration with our AMS providers Making sure that all tickets are logged, progressed and resolved according to our agreed standards and procedures. Monitoring the progress of tickets that have been escalated to suppliers. Managing customer expectations with realistic timeframes and outcomes, ensuring that they're kept updated of any outstanding tickets Spotting trends in any reoccurring issues raised and working collaboratively with your team, the wider CIO functions and our third-party suppliers to find a solution To be considered for this role, you'll need to show us that you've got the skills and capabilities. You'll have to meet the following minimum criteria: Minimum Criteria Experience working with Workday as an analyst or subject matter expert, or demonstrable experience specialising in Finance or Payroll as a Workday end user working with large data sets. Significant experience of providing technical support across a range of business applications with ownership of managing customer queries on an end to end basis. Demonstrate an understanding of Accounts Receivable, Accounts Payable and the General Ledger Basic working knowledge of ITIL processes relating to technical support, ideally whilst using a service desk ticketing system. Knowledge of Workday Financials or payroll, reporting, tenant management and good governance practices Proven ability to build and maintain relationships with a full range of technical and non-technical stakeholders, including the ability to manage expectations with realistic outcomes. Experience of working with working with 3rd party suppliers Desirable Criteria Knowledge of SSMS and SQLWe are a values led organisation. Our values define our culture, influence our decisions, and underpin our vision and strategy. They set out how we play our PART through Purpose, Ambition, Respect and Trust. You can learn more about our values here:We also offer an attractive, competitive salary and flexible benefits to suit our people. Here's a list of some of the many benefits and perks you can get for working with us: 25 days holiday entitlement, with the option to buy extra or sell days Generous pension Various Family Friendly Policies, including enhanced maternity pay, carers and dependants leave Employer provided benefits such as Private medical insurance, virtual GP, Critical illness cover, Life assurance cover, to name a few Choice of voluntary benefits including Technology scheme, Cycle to work scheme, Will-writing service amongst others Employee Assistance Programme Extensive opportunities for personal and career development Nationwide gym membership discounts, and a fully equipped on-site gym open 24/7 in London Extensive Well-being resources including on-site therapists (London office only) Beautiful and bright London office looking over the Thames and near to mainline stations Our Manchester office is 7 minutes' walk from the Oxford Road station Our employee led networks (a couple of examples being our Women's Network, Carers network, and Neurodiverse Network) do fantastic work in educating and raising awareness across a range of experiences and support us in being an inclusive employer and a great place to work. You can get involved, too! Please apply with an up to date CV, This advert will close on 20th November 2025. Due to high application numbers this advert may end earlier than the date specified, so please don't delay and apply now! A full job profile is available on request and will be provided to candidates shortlisted. We're proud to be an inclusive employer We view diversity as fundamental to our success and welcome applications from underrepresented groups across all communities.We're committed to being a great place to work- attracting and developing people from the widest possible range of backgrounds. We want everyone to perform at their best and feel able to be themselves. We understand that if we're diverse and inclusive, we'll better understand different perspectives, which is fundamental to our job resolving financial complaints.We welcome applications from Black and other ethnic minority candidates, and female candidates, for all positions and particularly so for senior leader positions as they are under-represented within the Financial Ombudsman Service at this level. We are proud to be a Disability Confident Leader. This means that we will put disabled candidates entering under the scheme through to the next stage of the recruitment process should they meet the minimum criteria for a role. A minimum criterion needs to be measurable from reviewing a candidate's CV/supporting statement. Exceptions may apply if due to the volume of applications, we are not able to interview all eligible candidates who qualify under the scheme. If you would like to speak to a member of our team about any reasonable adjustments you need, please email and let us know your preferred method of contact. Find out more Check out below channels to find out more about everyday life at the Financial Ombudsman Service - and don't forget to follow us while you're there! LinkedIn: Our careers page:Good luck
Dec 09, 2025
Full time
Take a look at our current vacancies. If you see a vacancy that is right for you, we encourage you to apply! Senior Applications Support Analyst (Workday) As part of our Application Operations team, you'll be the go-to person for resolving complex issues, managing third-party relationships, and supporting key platforms like Workday Financials - If you're passionate about service excellence, confident working with finance systems, and thrive in a collaborative environment, we'd love to hear from you. Contract : Permanent Working hours : 35 hours per week is full time. Salary: £53,300 - £64,786 (Dependent on experience) Reporting to : Applications Operations Manager Location: London, docklands. O ur permanent hybrid policy sees us all working at least four days across a fortnight in the office .The last few years have seen the Financial Ombudsman Service embark on an organisation-wide transformation journey. With the customer at the heart of everything we do, we have already delivered significant improvements in the service we offer and 2025 will see us continue with our ambitious transformation agenda.As part of the application operations team, you'll be a pivotal point of contact for our customers, suppliers and third-party managed service partners. As well as managing relationships you'll also be triaging issues and requests - ensuring our customers get timely responses. You'll be responsible for making the decision to escalate tickets to the relevant suppliers or address the issues yourself.As an operation support analyst, you'll be supporting our main HR and Finance System: Workday . You will provide a high quality, customer focused service. You'll be liaising with other CIO functions, suppliers and front-end users to ensure that the incidents and requests you receive are resolved within the agreed SLAs. You'll also undertake routine upgrades, maintenance and, daily checks on a range of applications to maintain availability and functionality. Key responsibilities Liaising with internal customers and third-party suppliers to provide technical support across our business applications including Workday. Ensuring our third-party supplier adhere to governance and change control. Utilising your Finance experience and knowledge of Workday to identify potential improvements to streamline core processes for the Finance team and wider business. Building and maintaining relationships with a full range of stakeholders to make sure that that the services you provide meet their needs Proactively taking personal responsibility for delivering on your objectives in line with our values Co-ordinating UAT and helping to manage system changes in collaboration with our AMS providers Making sure that all tickets are logged, progressed and resolved according to our agreed standards and procedures. Monitoring the progress of tickets that have been escalated to suppliers. Managing customer expectations with realistic timeframes and outcomes, ensuring that they're kept updated of any outstanding tickets Spotting trends in any reoccurring issues raised and working collaboratively with your team, the wider CIO functions and our third-party suppliers to find a solution To be considered for this role, you'll need to show us that you've got the skills and capabilities. You'll have to meet the following minimum criteria: Minimum Criteria Experience working with Workday as an analyst or subject matter expert, or demonstrable experience specialising in Finance or Payroll as a Workday end user working with large data sets. Significant experience of providing technical support across a range of business applications with ownership of managing customer queries on an end to end basis. Demonstrate an understanding of Accounts Receivable, Accounts Payable and the General Ledger Basic working knowledge of ITIL processes relating to technical support, ideally whilst using a service desk ticketing system. Knowledge of Workday Financials or payroll, reporting, tenant management and good governance practices Proven ability to build and maintain relationships with a full range of technical and non-technical stakeholders, including the ability to manage expectations with realistic outcomes. Experience of working with working with 3rd party suppliers Desirable Criteria Knowledge of SSMS and SQLWe are a values led organisation. Our values define our culture, influence our decisions, and underpin our vision and strategy. They set out how we play our PART through Purpose, Ambition, Respect and Trust. You can learn more about our values here:We also offer an attractive, competitive salary and flexible benefits to suit our people. Here's a list of some of the many benefits and perks you can get for working with us: 25 days holiday entitlement, with the option to buy extra or sell days Generous pension Various Family Friendly Policies, including enhanced maternity pay, carers and dependants leave Employer provided benefits such as Private medical insurance, virtual GP, Critical illness cover, Life assurance cover, to name a few Choice of voluntary benefits including Technology scheme, Cycle to work scheme, Will-writing service amongst others Employee Assistance Programme Extensive opportunities for personal and career development Nationwide gym membership discounts, and a fully equipped on-site gym open 24/7 in London Extensive Well-being resources including on-site therapists (London office only) Beautiful and bright London office looking over the Thames and near to mainline stations Our Manchester office is 7 minutes' walk from the Oxford Road station Our employee led networks (a couple of examples being our Women's Network, Carers network, and Neurodiverse Network) do fantastic work in educating and raising awareness across a range of experiences and support us in being an inclusive employer and a great place to work. You can get involved, too! Please apply with an up to date CV, This advert will close on 20th November 2025. Due to high application numbers this advert may end earlier than the date specified, so please don't delay and apply now! A full job profile is available on request and will be provided to candidates shortlisted. We're proud to be an inclusive employer We view diversity as fundamental to our success and welcome applications from underrepresented groups across all communities.We're committed to being a great place to work- attracting and developing people from the widest possible range of backgrounds. We want everyone to perform at their best and feel able to be themselves. We understand that if we're diverse and inclusive, we'll better understand different perspectives, which is fundamental to our job resolving financial complaints.We welcome applications from Black and other ethnic minority candidates, and female candidates, for all positions and particularly so for senior leader positions as they are under-represented within the Financial Ombudsman Service at this level. We are proud to be a Disability Confident Leader. This means that we will put disabled candidates entering under the scheme through to the next stage of the recruitment process should they meet the minimum criteria for a role. A minimum criterion needs to be measurable from reviewing a candidate's CV/supporting statement. Exceptions may apply if due to the volume of applications, we are not able to interview all eligible candidates who qualify under the scheme. If you would like to speak to a member of our team about any reasonable adjustments you need, please email and let us know your preferred method of contact. Find out more Check out below channels to find out more about everyday life at the Financial Ombudsman Service - and don't forget to follow us while you're there! LinkedIn: Our careers page:Good luck
View our cookie policy . Job Description At Aberdeen, our ambition is to be the UK's leading Wealth & Investments group.Strengthening talent and culture is one of our strategic priorities. We strive to make Aberdeen a great place to work so that we can attract and retain the industry's best talent.Our people put our stakeholders at the heart of everything they do by helping us to make a positive difference to the lives of our clients, customers, colleagues, shareholders, and society.We are focused on growing our direct and advised wealth platforms and repositioning our specialist asset management business to meet client demand. We are committed to providing excellent client service, supported by leading technology and talent.Aberdeen comprises three businesses, interactive investor (ii), Investments, and Adviser, each of which focuses on meeting and adapting to our clients' evolving needs: interactive investor, the UK's second largest direct-to-consumer investment platform, enables individuals in the UK to plan, save, and invest in the way that works for them. Our Adviser business provides financial planning solutions and technology for UK financial advisers, enabling them to create value for their customers. Our Investments business is a specialist asset manager that focuses on areas where we have both strength and scale to capitalise on the key themes shaping the market, through either public markets or alternative asset classes. About the Department The Third Party Risk Management Team ('TPRM') sits within the Chief Operating Office (COO), which was established earlier this year as part of a strategic restructure. The COO function includes a range of teams, including, Operational Resilience, Cyber Security, and Incident Management, all central to ensuring our people and data are safe and we understand and manage risk, including third party risk, within our risk appetite. About the Role Occupying an important position within the Third Party Risk Management function, your work will focus on supporting the assessment and ongoing monitoring of third-party suppliers through structured due diligence activities. You will play a key role in identifying risks, reviewing documentation, and ensuring suppliers meet Aberdeen's standards for compliance, security, and operational resilience. The analyst position works closely with Aberdeen's Supplier Risk Managers ('SRMs'), domain owners, risk and procurement. The role ensures that third-party engagements meet internal risk standards and regulatory requirements, supporting the organisation's TPRM framework and risk appetite. Key Responsibilities Conduct initial and periodic due diligence assessments of suppliers across risk domains (e.g., information security, data protection, operational resilience). Review suppliers' documentation such as questionnaires, certifications, audit reports, and policies. Identify gaps or risks in suppliers' responses and escalate findings to senior team members. Maintain accurate records of assessments and ensure timely updates in suppliers management systems. Collaborate with internal stakeholders to support suppliers onboarding and renewal processes. About the Candidate The ideal candidate will possess the following: Strong analytical and organisational skills. Experience in risk, compliance, procurement, or supplier management preferred. Ability to interpret and summarise technical and non-technical documentation. Clear written and verbal communication skills.We are proud to be a Disability Confident Committed employer. If you have a disability and would like to apply to one of our UK roles under the Disability Confident Scheme, please notify us by completing the relevant section in our candidate questionnaire. One of our team will reach out to support you through your application process. Our benefits There's more to working life than coming home with a good salary. We have an environment where you can learn, get involved and be supported.When you join us, your reward will be one of the best around. This includes 40 days' annual leave, a 16% employer pension contribution, a discretionary performance-based bonus (where applicable), private healthcare and a range of flexible benefits - including gym discounts, season ticket loans and access to an employee discount portal. You can read more about our benefits Our business Enabling our clients to be better investors drives everything we do. Our business is structured around three distinct areas - our vectors of growth - focused on our clients' changing needs. You can find out more about what we do . An inclusive way of working Whatever way you like to work, if you have the talent and commitment to join our team, we'd like to hear from you.At Aberdeen we've adopted a 'blended working' approach. This approach combines the benefits of face-to-face collaboration, coaching and connecting in our offices with the flexibility of working from home. It enables colleagues to find a balance that works for their roles, their teams, our clients and our business., where diverse perspectives drive our actions, is at the core of who we are and what we do. If you need assistance with your application, or a reasonable adjustment to your interview arrangements - for example, because you are neurodivergent, or have a physical, sensory, cognitive, mental, visible or invisible disability - please let us know and we'll be happy to help. We're committed to providing an inclusive workplace where all forms of difference are valued and which is free from any form of unfair or unlawful treatment. We define diversity in its broadest sense - this includes but is not limited to our diversity of educational and professional backgrounds, experience, cognitive and neurodiversity, age, gender, gender identity, sexual orientation, disability, religion or belief and ethnicity and geographical provenance. We support a culture that values meritocracy, fairness and transparency and welcomes enquiries from everyone. If you need assistance or an adjustment due to a disability please let us know as part of your application and we will assist.
Dec 09, 2025
Full time
View our cookie policy . Job Description At Aberdeen, our ambition is to be the UK's leading Wealth & Investments group.Strengthening talent and culture is one of our strategic priorities. We strive to make Aberdeen a great place to work so that we can attract and retain the industry's best talent.Our people put our stakeholders at the heart of everything they do by helping us to make a positive difference to the lives of our clients, customers, colleagues, shareholders, and society.We are focused on growing our direct and advised wealth platforms and repositioning our specialist asset management business to meet client demand. We are committed to providing excellent client service, supported by leading technology and talent.Aberdeen comprises three businesses, interactive investor (ii), Investments, and Adviser, each of which focuses on meeting and adapting to our clients' evolving needs: interactive investor, the UK's second largest direct-to-consumer investment platform, enables individuals in the UK to plan, save, and invest in the way that works for them. Our Adviser business provides financial planning solutions and technology for UK financial advisers, enabling them to create value for their customers. Our Investments business is a specialist asset manager that focuses on areas where we have both strength and scale to capitalise on the key themes shaping the market, through either public markets or alternative asset classes. About the Department The Third Party Risk Management Team ('TPRM') sits within the Chief Operating Office (COO), which was established earlier this year as part of a strategic restructure. The COO function includes a range of teams, including, Operational Resilience, Cyber Security, and Incident Management, all central to ensuring our people and data are safe and we understand and manage risk, including third party risk, within our risk appetite. About the Role Occupying an important position within the Third Party Risk Management function, your work will focus on supporting the assessment and ongoing monitoring of third-party suppliers through structured due diligence activities. You will play a key role in identifying risks, reviewing documentation, and ensuring suppliers meet Aberdeen's standards for compliance, security, and operational resilience. The analyst position works closely with Aberdeen's Supplier Risk Managers ('SRMs'), domain owners, risk and procurement. The role ensures that third-party engagements meet internal risk standards and regulatory requirements, supporting the organisation's TPRM framework and risk appetite. Key Responsibilities Conduct initial and periodic due diligence assessments of suppliers across risk domains (e.g., information security, data protection, operational resilience). Review suppliers' documentation such as questionnaires, certifications, audit reports, and policies. Identify gaps or risks in suppliers' responses and escalate findings to senior team members. Maintain accurate records of assessments and ensure timely updates in suppliers management systems. Collaborate with internal stakeholders to support suppliers onboarding and renewal processes. About the Candidate The ideal candidate will possess the following: Strong analytical and organisational skills. Experience in risk, compliance, procurement, or supplier management preferred. Ability to interpret and summarise technical and non-technical documentation. Clear written and verbal communication skills.We are proud to be a Disability Confident Committed employer. If you have a disability and would like to apply to one of our UK roles under the Disability Confident Scheme, please notify us by completing the relevant section in our candidate questionnaire. One of our team will reach out to support you through your application process. Our benefits There's more to working life than coming home with a good salary. We have an environment where you can learn, get involved and be supported.When you join us, your reward will be one of the best around. This includes 40 days' annual leave, a 16% employer pension contribution, a discretionary performance-based bonus (where applicable), private healthcare and a range of flexible benefits - including gym discounts, season ticket loans and access to an employee discount portal. You can read more about our benefits Our business Enabling our clients to be better investors drives everything we do. Our business is structured around three distinct areas - our vectors of growth - focused on our clients' changing needs. You can find out more about what we do . An inclusive way of working Whatever way you like to work, if you have the talent and commitment to join our team, we'd like to hear from you.At Aberdeen we've adopted a 'blended working' approach. This approach combines the benefits of face-to-face collaboration, coaching and connecting in our offices with the flexibility of working from home. It enables colleagues to find a balance that works for their roles, their teams, our clients and our business., where diverse perspectives drive our actions, is at the core of who we are and what we do. If you need assistance with your application, or a reasonable adjustment to your interview arrangements - for example, because you are neurodivergent, or have a physical, sensory, cognitive, mental, visible or invisible disability - please let us know and we'll be happy to help. We're committed to providing an inclusive workplace where all forms of difference are valued and which is free from any form of unfair or unlawful treatment. We define diversity in its broadest sense - this includes but is not limited to our diversity of educational and professional backgrounds, experience, cognitive and neurodiversity, age, gender, gender identity, sexual orientation, disability, religion or belief and ethnicity and geographical provenance. We support a culture that values meritocracy, fairness and transparency and welcomes enquiries from everyone. If you need assistance or an adjustment due to a disability please let us know as part of your application and we will assist.
Insight Investment are seeking a Senior Cyber Defence Operations Analyst to be a part of the CISO function reporting to the Cyber Defence Operations Lead. The role will be to maintain and update alerts/rules within Insight Investment's monitoring solution, conduct vulnerability management with various stakeholders, continually ensure compliance with regulatory requirements, generate new security controls as required, and be responsible for incident response within the firm. The candidate will lead incident response activity as required. Role Responsibilities Lead, investigate, record and respond to SIEM alerts, determine scope and severity of incidents, and coordinate containment and remediation efforts. Define, implement and continuously improve operational security processes and runbooks to align with compliance standards and evolving threats. Assist with integrating and configuring security tooling, ensuring effective data ingestion, enrichment and alerting across the environment. Lead threat hunting activities to proactively identify suspicious behaviour and improve detection coverage. Deliver effective vulnerability management: analyse scanning outputs, coordinate with technology teams and ensure timely notification and remediation tracking. Participate in the out-of-hours, on-call rotation, supporting incident response efforts during non-core hours. Enforce security processes and requirements across the business. Experience Required Previous ownership of the incident response, vulnerability management or SIEM monitoring solution processes and procedures. Knowledge of SIEM tooling, designing and implementing use cases & documenting KBAs. Strong knowledge of KQL. Proven experience in incident response and handling. Experience contributing to cybersecurity operations in a professional or structured environment. Demonstrated commitment to continuous self-study. Experience working with an MSSP. Technical knowledge of access management and security controls. Strong collaboration skills with the ability to work across teams and stakeholders. A strong desire to drive security innovation across the firm. Advantageous Relevant technical cyber security certifications are desirable. Knowledge on task automation/scripting would be hugely beneficial. Experience with Microsoft suite (Defender/Azure), query-based SIEM (e.g. Sentinel, Splunk) and orchestration platforms. Experience in financial services or other highly regulated environments. Prior involvement in threat hunting activities. About Insight Investment Insight Investment is a leading asset manager focused on designing investment solutions to meet its clients' needs. Founded in 2002, Insight's collaborative approach has delivered both investment performance and growth in assets under management. Insight manages assets across its core liability-driven investment, risk management, full-spectrum fixed income, currency and absolute return capabilities. Insight has a global network of operations in the UK, Ireland, Germany, US, Japan and Australia. More information about Insight Investment can be found at:
Dec 08, 2025
Full time
Insight Investment are seeking a Senior Cyber Defence Operations Analyst to be a part of the CISO function reporting to the Cyber Defence Operations Lead. The role will be to maintain and update alerts/rules within Insight Investment's monitoring solution, conduct vulnerability management with various stakeholders, continually ensure compliance with regulatory requirements, generate new security controls as required, and be responsible for incident response within the firm. The candidate will lead incident response activity as required. Role Responsibilities Lead, investigate, record and respond to SIEM alerts, determine scope and severity of incidents, and coordinate containment and remediation efforts. Define, implement and continuously improve operational security processes and runbooks to align with compliance standards and evolving threats. Assist with integrating and configuring security tooling, ensuring effective data ingestion, enrichment and alerting across the environment. Lead threat hunting activities to proactively identify suspicious behaviour and improve detection coverage. Deliver effective vulnerability management: analyse scanning outputs, coordinate with technology teams and ensure timely notification and remediation tracking. Participate in the out-of-hours, on-call rotation, supporting incident response efforts during non-core hours. Enforce security processes and requirements across the business. Experience Required Previous ownership of the incident response, vulnerability management or SIEM monitoring solution processes and procedures. Knowledge of SIEM tooling, designing and implementing use cases & documenting KBAs. Strong knowledge of KQL. Proven experience in incident response and handling. Experience contributing to cybersecurity operations in a professional or structured environment. Demonstrated commitment to continuous self-study. Experience working with an MSSP. Technical knowledge of access management and security controls. Strong collaboration skills with the ability to work across teams and stakeholders. A strong desire to drive security innovation across the firm. Advantageous Relevant technical cyber security certifications are desirable. Knowledge on task automation/scripting would be hugely beneficial. Experience with Microsoft suite (Defender/Azure), query-based SIEM (e.g. Sentinel, Splunk) and orchestration platforms. Experience in financial services or other highly regulated environments. Prior involvement in threat hunting activities. About Insight Investment Insight Investment is a leading asset manager focused on designing investment solutions to meet its clients' needs. Founded in 2002, Insight's collaborative approach has delivered both investment performance and growth in assets under management. Insight manages assets across its core liability-driven investment, risk management, full-spectrum fixed income, currency and absolute return capabilities. Insight has a global network of operations in the UK, Ireland, Germany, US, Japan and Australia. More information about Insight Investment can be found at:
A leading asset management firm in Greater London is seeking a Senior Cyber Defence Operations Analyst to lead incident response and vulnerability management efforts. The role includes maintaining alerts in the monitoring solution, coordinating with stakeholders for compliance, and enhancing operational security processes. Candidates should have a strong background in incident response, knowledge of SIEM tools, and effective collaboration skills. Relevant cyber security certifications are advantageous. This position offers opportunities for innovation in security practices.
Dec 05, 2025
Full time
A leading asset management firm in Greater London is seeking a Senior Cyber Defence Operations Analyst to lead incident response and vulnerability management efforts. The role includes maintaining alerts in the monitoring solution, coordinating with stakeholders for compliance, and enhancing operational security processes. Candidates should have a strong background in incident response, knowledge of SIEM tools, and effective collaboration skills. Relevant cyber security certifications are advantageous. This position offers opportunities for innovation in security practices.