Insight Investment are looking for a Cyber Defence Specialist to join our Cyber Security team. This role will maintain the Sentinel Threat Detection capability for Insight's bespoke application. The successful candidate will maintain and optimise the Microsoft Sentinel platform, ensuring its stability, performance, and integration with other security tools, as well as developing use cases for the SOC team. Alongside this, the candidate will support the 24/7 SOC team, providing incident response, and continuously improving detection and automation capabilities. Role Responsibilities Maintain and optimise the Microsoft Sentinel environment, including configuration, performance tuning, and health monitoring. Onboard new data sources, connectors, and log streams to support evolving security requirements. Develop and enhance analytics rules, workbooks, and playbooks to improve detection and response. Monitor security alerts alongside the 24/7 SOC team, providing advanced analysis and escalation support. Troubleshoot and resolve issues related to Sentinel ingestion, queries, and automation workflows. Collaborate with SOC analysts, application and development teams, security engineers and security architects to ensure effective threat detection and incident response. Document configurations, processes, and improvements for operational continuity. Experience Required Experience developing, testing and implementing use cases/detection rules for the Sentinel SIEM environment. Strong hands on experience with Microsoft Sentinel and related Azure security services. Proficiency in Kusto Query Language (KQL) for creating and tuning detection rules and dashboards. Solid understanding of SIEM concepts, log ingestion, and security monitoring practices. Experience with incident response workflows and SOC operations. Ability to work collaboratively with development, engineering and monitoring teams. Excellent problem solving and communication skills. Advantageous Experience with SOAR automation and playbook development. Familiarity with cloud security monitoring across Azure, AWS, or GCP. Knowledge of MITRE ATT&CK framework and threat detection methodologies. Exposure to compliance driven environments and security best practices. Relevant certifications (e.g., SC-200, AZ-500, Security+). About Insight Investment Insight Investment is a leading asset manager focused on designing investment solutions to meet its clients' needs. Founded in 2002, Insight's collaborative approach has delivered both investment performance and growth in assets under management. Insight manages assets across its core liability driven investment, risk management, full spectre fixed income, currency and absolute return capabilities. Insight has a global network of operations in the UK, Ireland, Germany, US, Japan and Australia. More information about Insight Investment can be found at:
Dec 07, 2025
Full time
Insight Investment are looking for a Cyber Defence Specialist to join our Cyber Security team. This role will maintain the Sentinel Threat Detection capability for Insight's bespoke application. The successful candidate will maintain and optimise the Microsoft Sentinel platform, ensuring its stability, performance, and integration with other security tools, as well as developing use cases for the SOC team. Alongside this, the candidate will support the 24/7 SOC team, providing incident response, and continuously improving detection and automation capabilities. Role Responsibilities Maintain and optimise the Microsoft Sentinel environment, including configuration, performance tuning, and health monitoring. Onboard new data sources, connectors, and log streams to support evolving security requirements. Develop and enhance analytics rules, workbooks, and playbooks to improve detection and response. Monitor security alerts alongside the 24/7 SOC team, providing advanced analysis and escalation support. Troubleshoot and resolve issues related to Sentinel ingestion, queries, and automation workflows. Collaborate with SOC analysts, application and development teams, security engineers and security architects to ensure effective threat detection and incident response. Document configurations, processes, and improvements for operational continuity. Experience Required Experience developing, testing and implementing use cases/detection rules for the Sentinel SIEM environment. Strong hands on experience with Microsoft Sentinel and related Azure security services. Proficiency in Kusto Query Language (KQL) for creating and tuning detection rules and dashboards. Solid understanding of SIEM concepts, log ingestion, and security monitoring practices. Experience with incident response workflows and SOC operations. Ability to work collaboratively with development, engineering and monitoring teams. Excellent problem solving and communication skills. Advantageous Experience with SOAR automation and playbook development. Familiarity with cloud security monitoring across Azure, AWS, or GCP. Knowledge of MITRE ATT&CK framework and threat detection methodologies. Exposure to compliance driven environments and security best practices. Relevant certifications (e.g., SC-200, AZ-500, Security+). About Insight Investment Insight Investment is a leading asset manager focused on designing investment solutions to meet its clients' needs. Founded in 2002, Insight's collaborative approach has delivered both investment performance and growth in assets under management. Insight manages assets across its core liability driven investment, risk management, full spectre fixed income, currency and absolute return capabilities. Insight has a global network of operations in the UK, Ireland, Germany, US, Japan and Australia. More information about Insight Investment can be found at:
This job is brought to you by Jobs/Redefined, the UK's leading over-50s age inclusive jobs board. Location: Remote or Hybrid Team: Cyber Defence - Blue Team Type: Full-time Lead the Charge in Securing Global Animal Health Are you ready to take the lead in defending a global veterinary business from evolving cyber threats? As our Cyber Defense Manager, you'll head up the Cyber Defence "Blue Team," driving operational excellence and strategic resilience across a complex, distributed digital landscape. Your leadership will directly support the secure delivery of veterinary care and innovation worldwide-protecting the systems that help animals live healthier lives. What You'll Do This is a hands-on leadership role where you'll shape and execute our cybersecurity strategy, working across IT, digital, and regional teams to embed a strong cyber culture and robust defenses. Key responsibilities include: Strategic Leadership: Own and evolve the security roadmap, including tooling optimisation and risk management. Secure Design & Architecture: Provide expert guidance across IT projects and infrastructure. Operational Oversight: Define and deploy control baselines, templates, and standards. Tooling & Effectiveness: Manage and monitor security operations tools such as Defender, Sentinel, Tenable, and CASB. Incident Response: Lead triage, coordinate crisis responses, and oversee post-incident reviews. Documentation & Governance: Maintain hardening guides, architecture diagrams, and lead working groups. Cross-Regional Alignment: Foster collaboration and consistency across global cybersecurity efforts. What You Bring Essential: Degree or equivalent experience in Information Security. Certifications such as Security+, CEH, CySA+, or Cloud Security Engineer. Extensive experience in cybersecurity, especially incident response and technical operations. Strong understanding of AWS and Azure cloud platforms. Familiarity with frameworks like NIST, ISO, COBIT, and OWASP. Proven success in leading and delivering security projects. Experience with PowerShell and automation. Consulting experience across IT and digital teams. Flexibility for occasional travel and out-of-hours support. Desirable: Exposure to MxDR/SOC environments and advanced security protocols (SIEM, IDS/IPS, firewalls). Knowledge of GDPR, Cyber Essentials+, PCI-DSS, and other compliance standards. Strong grasp of data protection legislation (e.g., GDPR, Data Protection Act). Why Join Us? Global Impact: Your leadership will help protect the digital infrastructure that supports veterinary care across continents. Strategic Influence: Shape the future of cybersecurity in a business that values innovation and resilience. Collaborative Culture: Work with passionate teams across IT, digital, and operations in a mission-driven environment. Ready to lead a team that defends what matters most? Apply now and help us build a safer, smarter future for global animal health. What We Offer: At IVC Evidensia we recognise that our people are fundamental to the success of our business. Investing in our people, premises and processes is at the heart of what we do. In addition to a competitive base salary, you will benefit from Work-life balance 26 days annual leave Cycle to Work scheme Initiatives focused on employee wellbeing Pension Discretionary Bonus Discounted staff pet care Free Parking available at Head Office At IVC Evidensia we are a committed to Diversity, Equality, Inclusion and Belonging, we are keen to hear from candidates from all minority and diverse groups. As a Disability Confident Employer, we are keen to hear from candidates with disabilities and long-term health conditions and would be happy to discuss any reasonable adjustments needed during the recruitment process.
Dec 07, 2025
Full time
This job is brought to you by Jobs/Redefined, the UK's leading over-50s age inclusive jobs board. Location: Remote or Hybrid Team: Cyber Defence - Blue Team Type: Full-time Lead the Charge in Securing Global Animal Health Are you ready to take the lead in defending a global veterinary business from evolving cyber threats? As our Cyber Defense Manager, you'll head up the Cyber Defence "Blue Team," driving operational excellence and strategic resilience across a complex, distributed digital landscape. Your leadership will directly support the secure delivery of veterinary care and innovation worldwide-protecting the systems that help animals live healthier lives. What You'll Do This is a hands-on leadership role where you'll shape and execute our cybersecurity strategy, working across IT, digital, and regional teams to embed a strong cyber culture and robust defenses. Key responsibilities include: Strategic Leadership: Own and evolve the security roadmap, including tooling optimisation and risk management. Secure Design & Architecture: Provide expert guidance across IT projects and infrastructure. Operational Oversight: Define and deploy control baselines, templates, and standards. Tooling & Effectiveness: Manage and monitor security operations tools such as Defender, Sentinel, Tenable, and CASB. Incident Response: Lead triage, coordinate crisis responses, and oversee post-incident reviews. Documentation & Governance: Maintain hardening guides, architecture diagrams, and lead working groups. Cross-Regional Alignment: Foster collaboration and consistency across global cybersecurity efforts. What You Bring Essential: Degree or equivalent experience in Information Security. Certifications such as Security+, CEH, CySA+, or Cloud Security Engineer. Extensive experience in cybersecurity, especially incident response and technical operations. Strong understanding of AWS and Azure cloud platforms. Familiarity with frameworks like NIST, ISO, COBIT, and OWASP. Proven success in leading and delivering security projects. Experience with PowerShell and automation. Consulting experience across IT and digital teams. Flexibility for occasional travel and out-of-hours support. Desirable: Exposure to MxDR/SOC environments and advanced security protocols (SIEM, IDS/IPS, firewalls). Knowledge of GDPR, Cyber Essentials+, PCI-DSS, and other compliance standards. Strong grasp of data protection legislation (e.g., GDPR, Data Protection Act). Why Join Us? Global Impact: Your leadership will help protect the digital infrastructure that supports veterinary care across continents. Strategic Influence: Shape the future of cybersecurity in a business that values innovation and resilience. Collaborative Culture: Work with passionate teams across IT, digital, and operations in a mission-driven environment. Ready to lead a team that defends what matters most? Apply now and help us build a safer, smarter future for global animal health. What We Offer: At IVC Evidensia we recognise that our people are fundamental to the success of our business. Investing in our people, premises and processes is at the heart of what we do. In addition to a competitive base salary, you will benefit from Work-life balance 26 days annual leave Cycle to Work scheme Initiatives focused on employee wellbeing Pension Discretionary Bonus Discounted staff pet care Free Parking available at Head Office At IVC Evidensia we are a committed to Diversity, Equality, Inclusion and Belonging, we are keen to hear from candidates from all minority and diverse groups. As a Disability Confident Employer, we are keen to hear from candidates with disabilities and long-term health conditions and would be happy to discuss any reasonable adjustments needed during the recruitment process.
Insight Investment are looking for a Cyber Defence Specialist to join our Cyber Security team. This role will maintain the Sentinel Threat Detection capability for Insight's bespoke application. The successful candidate will maintain and optimise the Microsoft Sentinel platform, ensuring its stability, performance, and integration with other security tools, as well as developing use cases for the SOC team. Alongside this, the candidate will support the 24/7 SOC team, providing incident response, and continuously improving detection and automation capabilities. Role Responsibilities Maintain and optimise the Microsoft Sentinel environment, including configuration, performance tuning, and health monitoring. Onboard new data sources, connectors, and log streams to support evolving security requirements. Develop and enhance analytics rules, workbooks, and playbooks to improve detection and response. Monitor security alerts alongside the 24/7 SOC team, providing advanced analysis and escalation support. Troubleshoot and resolve issues related to Sentinel ingestion, queries, and automation workflows. Collaborate with SOC analysts, application and development teams, security engineers and security architects to ensure effective threat detection and incident response. Document configurations, processes, and improvements for operational continuity. Experience Required Experience developing, testing and implementing use cases/detection rules for the Sentinel SIEM environment. Strong hands on experience with Microsoft Sentinel and related Azure security services. Proficiency in Kusto Query Language (KQL) for creating and tuning detection rules and dashboards. Solid understanding of SIEM concepts, log ingestion, and security monitoring practices. Experience with incident response workflows and SOC operations. Ability to work collaboratively with development, engineering and monitoring teams. Excellent problem solving and communication skills. Advantageous Experience with SOAR automation and playbook development. Familiarity with cloud security monitoring across Azure, AWS, or GCP. Knowledge of MITRE ATT&CK framework and threat detection methodologies. Exposure to compliance driven environments and security best practices. Relevant certifications (e.g., SC-200, AZ-500, Security+). About Insight Investment Insight Investment is a leading asset manager focused on designing investment solutions to meet its clients' needs. Founded in 2002, Insight's collaborative approach has delivered both investment performance and growth in assets under management. Insight manages assets across its core liability driven investment, risk management, full spectre fixed income, currency and absolute return capabilities. Insight has a global network of operations in the UK, Ireland, Germany, US, Japan and Australia. More information about Insight Investment can be found at:
Dec 05, 2025
Full time
Insight Investment are looking for a Cyber Defence Specialist to join our Cyber Security team. This role will maintain the Sentinel Threat Detection capability for Insight's bespoke application. The successful candidate will maintain and optimise the Microsoft Sentinel platform, ensuring its stability, performance, and integration with other security tools, as well as developing use cases for the SOC team. Alongside this, the candidate will support the 24/7 SOC team, providing incident response, and continuously improving detection and automation capabilities. Role Responsibilities Maintain and optimise the Microsoft Sentinel environment, including configuration, performance tuning, and health monitoring. Onboard new data sources, connectors, and log streams to support evolving security requirements. Develop and enhance analytics rules, workbooks, and playbooks to improve detection and response. Monitor security alerts alongside the 24/7 SOC team, providing advanced analysis and escalation support. Troubleshoot and resolve issues related to Sentinel ingestion, queries, and automation workflows. Collaborate with SOC analysts, application and development teams, security engineers and security architects to ensure effective threat detection and incident response. Document configurations, processes, and improvements for operational continuity. Experience Required Experience developing, testing and implementing use cases/detection rules for the Sentinel SIEM environment. Strong hands on experience with Microsoft Sentinel and related Azure security services. Proficiency in Kusto Query Language (KQL) for creating and tuning detection rules and dashboards. Solid understanding of SIEM concepts, log ingestion, and security monitoring practices. Experience with incident response workflows and SOC operations. Ability to work collaboratively with development, engineering and monitoring teams. Excellent problem solving and communication skills. Advantageous Experience with SOAR automation and playbook development. Familiarity with cloud security monitoring across Azure, AWS, or GCP. Knowledge of MITRE ATT&CK framework and threat detection methodologies. Exposure to compliance driven environments and security best practices. Relevant certifications (e.g., SC-200, AZ-500, Security+). About Insight Investment Insight Investment is a leading asset manager focused on designing investment solutions to meet its clients' needs. Founded in 2002, Insight's collaborative approach has delivered both investment performance and growth in assets under management. Insight manages assets across its core liability driven investment, risk management, full spectre fixed income, currency and absolute return capabilities. Insight has a global network of operations in the UK, Ireland, Germany, US, Japan and Australia. More information about Insight Investment can be found at: