• Home
  • Search Jobs
  • Register CV
  • Post a Job
  • Employer Pricing
  • Contact Us
  • Sign in
  • Sign up
  • Home
  • Search Jobs
  • Register CV
  • Post a Job
  • Employer Pricing
  • Contact Us
Sorry, that job is no longer available. Here are some results that may be similar to the job you were looking for.

8 jobs found

Email me jobs like this
Refine Search
Current Search
soc threat detection analyst cyber
Senior Internal SOC Analyst
Darktrace Ltd Cambridge, Cambridgeshire
Internal SOC Analyst page is loaded Senior Internal SOC Analystlocations: Cambridge Office: London Officetime type: Full timeposted on: Posted Todayjob requisition id: JR101593Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting nearly 10,000 organizations from unknown threats using its proprietary AI.The Darktrace Active AI Security Platform(TM) delivers a proactive approach to cyber resilience to secure the business across the entire digital estate - from network to cloud to email. Breakthrough innovations from our R&D teams have resulted in over 200 patent applications filed. Darktrace's platform and services are supported by over 2,400 employees around the world. To learn more, visit . Job D escription : As a Senior Internal SOC Analyst, you will play a pivotal role in safeguarding our organisation by leveraging Darktrace's proprietary security technologies across network, cloud, email, endpoint, and zero trust environments. You will lead the triage, investigation, and response to security events generated from our security stack, while acting as an escalation point for complex internal security queries raised across the business.This is a hybrid position working 2 days a week from either our London or Cambridge office.Working across a broad range of security domains, you will contribute directly to incident response decision making, help shape processes and playbooks, and support the continued maturity of our SOC. This role offers the opportunity to refine your expertise, mentor junior analysts, and influence best practices in a rapidly evolving threat landscape. Lead the triage and investigation of security alerts across multiple environments using Darktrace and other security tooling. Perform advanced incident analysis and coordinate remediation actions with internal stakeholders. Act as an escalation point for complex security tickets raised within the business. Drive continuous improvement of SOC processes, playbooks, and detection capabilities. Monitor emerging threats and contribute to updating detection and response strategies. Provide training, guidance, and knowledge sharing for junior analysts. Bachelor's degree in Computer Science, Cybersecurity, or a related field - or equivalent practical experience. 1-3 years of experience in a SOC, cybersecurity operations, or similar technical security function. Strong analytical, problem solving, and time management skills, with the ability to prioritise effectively in a dynamic environment. Excellent written and verbal communication skills, including confident presentation ability. Ability to work independently with minimal supervision, while collaborating effectively within a team. Benefits: 23 days' holiday + all public holidays, rising to 25 days after 2 years of service, Additional day off for your birthday, Private medical insurance which covers you, your cohabiting partner and children, Life insurance of 4 times your base salary, Salary sacrifice pension scheme, Enhanced family leave, Confidential Employee Assistance Program, Cycle to work scheme.
Apr 16, 2026
Full time
Internal SOC Analyst page is loaded Senior Internal SOC Analystlocations: Cambridge Office: London Officetime type: Full timeposted on: Posted Todayjob requisition id: JR101593Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting nearly 10,000 organizations from unknown threats using its proprietary AI.The Darktrace Active AI Security Platform(TM) delivers a proactive approach to cyber resilience to secure the business across the entire digital estate - from network to cloud to email. Breakthrough innovations from our R&D teams have resulted in over 200 patent applications filed. Darktrace's platform and services are supported by over 2,400 employees around the world. To learn more, visit . Job D escription : As a Senior Internal SOC Analyst, you will play a pivotal role in safeguarding our organisation by leveraging Darktrace's proprietary security technologies across network, cloud, email, endpoint, and zero trust environments. You will lead the triage, investigation, and response to security events generated from our security stack, while acting as an escalation point for complex internal security queries raised across the business.This is a hybrid position working 2 days a week from either our London or Cambridge office.Working across a broad range of security domains, you will contribute directly to incident response decision making, help shape processes and playbooks, and support the continued maturity of our SOC. This role offers the opportunity to refine your expertise, mentor junior analysts, and influence best practices in a rapidly evolving threat landscape. Lead the triage and investigation of security alerts across multiple environments using Darktrace and other security tooling. Perform advanced incident analysis and coordinate remediation actions with internal stakeholders. Act as an escalation point for complex security tickets raised within the business. Drive continuous improvement of SOC processes, playbooks, and detection capabilities. Monitor emerging threats and contribute to updating detection and response strategies. Provide training, guidance, and knowledge sharing for junior analysts. Bachelor's degree in Computer Science, Cybersecurity, or a related field - or equivalent practical experience. 1-3 years of experience in a SOC, cybersecurity operations, or similar technical security function. Strong analytical, problem solving, and time management skills, with the ability to prioritise effectively in a dynamic environment. Excellent written and verbal communication skills, including confident presentation ability. Ability to work independently with minimal supervision, while collaborating effectively within a team. Benefits: 23 days' holiday + all public holidays, rising to 25 days after 2 years of service, Additional day off for your birthday, Private medical insurance which covers you, your cohabiting partner and children, Life insurance of 4 times your base salary, Salary sacrifice pension scheme, Enhanced family leave, Confidential Employee Assistance Program, Cycle to work scheme.
Cyber Security Specialist
Wood Mackenzie Ltd Edinburgh, Midlothian
Wood Mackenzie is the global leader in analytics, insights and proprietary data across the entire energy and natural resources landscape.For over 50 years our work has guided the decisions of the world's most influential energy producers, utilities companies, financial institutions and governments.Now, with the world's energy system more complex and interconnected than ever before, sector-specific views are no longer enough. That's why we've redefined what's possible with Intelligence Connected.By fusing our unparalleled proprietary data with the sharpest analytical minds, all supercharged by Synoptic AI, we deliver a clear, interconnected view of the entire value chain. Our trusted team of 2,700 experts across 30 countries breaks siloes and connects industries, markets and regions across the globe.This empowers our customers to identify risk sooner, spot opportunities faster and recalibrate strategy with confidence - whether planning days, weeks, months or decades ahead.Wood Mackenzie Intelligence Connected Wood Mackenzie Values Position Overview We are seeking an experienced Cyber Security Lead Analyst to join our cyber security team. The ideal candidate will have a minimum of 5 years cyber security experience and 3+ years in cloud security and/or application security. The candidate will be able to demonstrate a proven track record of protecting enterprise environments against evolving cyber threats. This role requires a technically proficient lead analyst who can lead security initiatives and ensure our cloud and application infrastructure maintains the highest security standards, whilst maintaining business partnerships across the group. Key Responsibilities Monitor and analyze security events across cloud and on-premises environments using SIEM and security analytics tools Conduct thorough investigations of security incidents and provide detailed incident reports Develop and maintain incident response playbooks and procedures Experience with threat intelligence platforms and threat hunting Experience with security orchestration, automation and response (SOAR) platforms Understanding of data protection and encryption technologies Experience in regulated industries (financial services, healthcare, energy) Background in offensive security or penetration testing Design, implement, and maintain security controls across cloud platforms (AWS, Azure, GCP) Conduct cloud security assessments and architecture reviews Ensure compliance with cloud security best practices and frameworks (CIS Benchmarks, CSA CCM, NIST) Manage cloud-native security tools including CSPM, CWPP, and cloud WAF solutions Implement and maintain identity and access management (IAM) policies and controls Lead cyber security programs and coordinate remediation efforts Collaborate with DevOps teams to integrate security into CI/CD pipelines (DevSecOps) Stay current with emerging threats, vulnerabilities, and security technologies Contribute to security awareness training and documentation Facilitate Supplier Management and security input into bids Support compliance initiatives (SOC 2, ISO 27001, PCI-DSS, GDPR, etc.) Develop and enforce security policies, standards, and procedures Conduct security audits and risk assessments Maintain security documentation and metrics reporting Required Qualifications 5+ years of experience in cybersecurity roles 3+ years of hands-on experience with cloud security (AWS, Azure, or GCP) Proven experience leading security incidents and coordinating response efforts Experience with security frameworks such as NIST CSF, MITRE ATT&CK, or Zero Trust architecture Technical Skills Strong expertise in cloud security services and tools (AWS & Azure) Experience working with SIEM platforms (Splunk, Sentinel) Understanding of network security, firewalls, IDS/IPS, and VPN technologies Familiarity with security testing tools (vulnerability scanners, SAST/DAST, penetration testing tools) Experience with endpoint detection and response (EDR) solutions Certifications (one or more preferred) CISSP (Certified Information Systems Security Professional) CCSP (Certified Cloud Security Professional) AWS Certified Security - Specialty Microsoft Certified: Azure Security Engineer Associate Soft Skills Strong analytical and problem-solving abilities Excellent written and verbal communication skills Ability to explain complex security concepts to technical and non-technical audiences Leadership capabilities and experience mentoring team members Strong attention to detail and ability to work under pressure Collaborative mindset with cross-functional teams Business Partnering experience Education Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience) Working Conditions Some flexibility for remote work - 2 days minimum in office (Edinburgh preferred) Equal Opportunities We are an equal opportunities employer. This means we are committed to recruiting the best people regardless of their race, colour, religion, age, sex, national origin, disability or protected veteran status. You can find out more about your rights under the law at If you are applying for a role and have a physical or mental disability, we will support you with your application or through the hiring process. Inclusive - we succeed together Trusting - we choose to trust each other Customer committed - we put customers at the heart of our decisions Future Focused - we accelerate change Curious - we turn knowledge into action
Apr 15, 2026
Full time
Wood Mackenzie is the global leader in analytics, insights and proprietary data across the entire energy and natural resources landscape.For over 50 years our work has guided the decisions of the world's most influential energy producers, utilities companies, financial institutions and governments.Now, with the world's energy system more complex and interconnected than ever before, sector-specific views are no longer enough. That's why we've redefined what's possible with Intelligence Connected.By fusing our unparalleled proprietary data with the sharpest analytical minds, all supercharged by Synoptic AI, we deliver a clear, interconnected view of the entire value chain. Our trusted team of 2,700 experts across 30 countries breaks siloes and connects industries, markets and regions across the globe.This empowers our customers to identify risk sooner, spot opportunities faster and recalibrate strategy with confidence - whether planning days, weeks, months or decades ahead.Wood Mackenzie Intelligence Connected Wood Mackenzie Values Position Overview We are seeking an experienced Cyber Security Lead Analyst to join our cyber security team. The ideal candidate will have a minimum of 5 years cyber security experience and 3+ years in cloud security and/or application security. The candidate will be able to demonstrate a proven track record of protecting enterprise environments against evolving cyber threats. This role requires a technically proficient lead analyst who can lead security initiatives and ensure our cloud and application infrastructure maintains the highest security standards, whilst maintaining business partnerships across the group. Key Responsibilities Monitor and analyze security events across cloud and on-premises environments using SIEM and security analytics tools Conduct thorough investigations of security incidents and provide detailed incident reports Develop and maintain incident response playbooks and procedures Experience with threat intelligence platforms and threat hunting Experience with security orchestration, automation and response (SOAR) platforms Understanding of data protection and encryption technologies Experience in regulated industries (financial services, healthcare, energy) Background in offensive security or penetration testing Design, implement, and maintain security controls across cloud platforms (AWS, Azure, GCP) Conduct cloud security assessments and architecture reviews Ensure compliance with cloud security best practices and frameworks (CIS Benchmarks, CSA CCM, NIST) Manage cloud-native security tools including CSPM, CWPP, and cloud WAF solutions Implement and maintain identity and access management (IAM) policies and controls Lead cyber security programs and coordinate remediation efforts Collaborate with DevOps teams to integrate security into CI/CD pipelines (DevSecOps) Stay current with emerging threats, vulnerabilities, and security technologies Contribute to security awareness training and documentation Facilitate Supplier Management and security input into bids Support compliance initiatives (SOC 2, ISO 27001, PCI-DSS, GDPR, etc.) Develop and enforce security policies, standards, and procedures Conduct security audits and risk assessments Maintain security documentation and metrics reporting Required Qualifications 5+ years of experience in cybersecurity roles 3+ years of hands-on experience with cloud security (AWS, Azure, or GCP) Proven experience leading security incidents and coordinating response efforts Experience with security frameworks such as NIST CSF, MITRE ATT&CK, or Zero Trust architecture Technical Skills Strong expertise in cloud security services and tools (AWS & Azure) Experience working with SIEM platforms (Splunk, Sentinel) Understanding of network security, firewalls, IDS/IPS, and VPN technologies Familiarity with security testing tools (vulnerability scanners, SAST/DAST, penetration testing tools) Experience with endpoint detection and response (EDR) solutions Certifications (one or more preferred) CISSP (Certified Information Systems Security Professional) CCSP (Certified Cloud Security Professional) AWS Certified Security - Specialty Microsoft Certified: Azure Security Engineer Associate Soft Skills Strong analytical and problem-solving abilities Excellent written and verbal communication skills Ability to explain complex security concepts to technical and non-technical audiences Leadership capabilities and experience mentoring team members Strong attention to detail and ability to work under pressure Collaborative mindset with cross-functional teams Business Partnering experience Education Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience) Working Conditions Some flexibility for remote work - 2 days minimum in office (Edinburgh preferred) Equal Opportunities We are an equal opportunities employer. This means we are committed to recruiting the best people regardless of their race, colour, religion, age, sex, national origin, disability or protected veteran status. You can find out more about your rights under the law at If you are applying for a role and have a physical or mental disability, we will support you with your application or through the hiring process. Inclusive - we succeed together Trusting - we choose to trust each other Customer committed - we put customers at the heart of our decisions Future Focused - we accelerate change Curious - we turn knowledge into action
Maxwell Bond
L3 SOC Analyst
Maxwell Bond
L3 SOC Analyst (Cyber Security Consultancy) ? Glasgow (Hybrid) ? Full-time 24/7 SOC Environment (includes occasional out-of-hours work) ? £55,000 - £70,000 + benefits (depending on experience) We're working with a leading cybersecurity consultancy to recruit an experienced L3 SOC Analyst to join their growing Security Operations Centre team. This is a fantastic opportunity to play a key role in defending a diverse client base against advanced cyber threats, while also mentoring junior analysts and shaping SOC capabilities. The Role As an L3 SOC Analyst, you'll act as a senior escalation point within a 24/7 SOC, leading complex investigations and driving incident response activities. You'll work closely with threat intelligence, engineering, and client teams to continuously improve detection and response capabilities. Key Responsibilities Act as the final escalation point for security incidents and alerts Lead and coordinate incident response for high-severity threats Perform advanced threat hunting and forensic investigations Analyse logs from SIEM, EDR, NDR, and cloud security tools Develop and refine detection rules and use cases Support SOC maturity improvements and playbook development Mentor and support L1/L2 analysts Produce detailed incident reports and client-facing communications Skills & Experience Required Proven experience in a SOC environment (L2/L3 level) Strong hands-on experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar) Experience with EDR/XDR tools (e.g., CrowdStrike, Defender, Carbon Black) Solid understanding of threat detection, incident response, and MITRE ATT&CK Experience in threat hunting and log analysis Knowledge of network protocols, endpoints, and cloud environments Scripting skills (Python, PowerShell, or similar) are desirable Relevant certifications such as GCIA, GCIH, CySA+, or CISSP are a plus What's on Offer Competitive salary (£55k-£70k depending on experience) Hybrid working model (Glasgow-based) Exposure to a wide range of clients and industries Opportunity to work with cutting-edge security technologies Clear progression into SOC Lead / Threat Hunting / Incident Response roles Ongoing training and certification support Additional Information This role operates within a 24/7 SOC, so some out-of-hours work and shift flexibility will be required Candidates must have the right to work in the UK
Apr 15, 2026
Full time
L3 SOC Analyst (Cyber Security Consultancy) ? Glasgow (Hybrid) ? Full-time 24/7 SOC Environment (includes occasional out-of-hours work) ? £55,000 - £70,000 + benefits (depending on experience) We're working with a leading cybersecurity consultancy to recruit an experienced L3 SOC Analyst to join their growing Security Operations Centre team. This is a fantastic opportunity to play a key role in defending a diverse client base against advanced cyber threats, while also mentoring junior analysts and shaping SOC capabilities. The Role As an L3 SOC Analyst, you'll act as a senior escalation point within a 24/7 SOC, leading complex investigations and driving incident response activities. You'll work closely with threat intelligence, engineering, and client teams to continuously improve detection and response capabilities. Key Responsibilities Act as the final escalation point for security incidents and alerts Lead and coordinate incident response for high-severity threats Perform advanced threat hunting and forensic investigations Analyse logs from SIEM, EDR, NDR, and cloud security tools Develop and refine detection rules and use cases Support SOC maturity improvements and playbook development Mentor and support L1/L2 analysts Produce detailed incident reports and client-facing communications Skills & Experience Required Proven experience in a SOC environment (L2/L3 level) Strong hands-on experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar) Experience with EDR/XDR tools (e.g., CrowdStrike, Defender, Carbon Black) Solid understanding of threat detection, incident response, and MITRE ATT&CK Experience in threat hunting and log analysis Knowledge of network protocols, endpoints, and cloud environments Scripting skills (Python, PowerShell, or similar) are desirable Relevant certifications such as GCIA, GCIH, CySA+, or CISSP are a plus What's on Offer Competitive salary (£55k-£70k depending on experience) Hybrid working model (Glasgow-based) Exposure to a wide range of clients and industries Opportunity to work with cutting-edge security technologies Clear progression into SOC Lead / Threat Hunting / Incident Response roles Ongoing training and certification support Additional Information This role operates within a 24/7 SOC, so some out-of-hours work and shift flexibility will be required Candidates must have the right to work in the UK
Solos Consultants Ltd
Senior SOC Engineer (DV Cleared / Eligible)
Solos Consultants Ltd Milton Keynes, Buckinghamshire
Senior SOC Engineer (DV Cleared / Eligible) PAYE Rate: £364.65 per day Umbrella Rate: £467.08 per day Contract Inside IR35 Duration: 6 months initially (with potential extensions) Hybrid - Milton Keynes (approx. 60% onsite) We are supporting a confidential UK Government organisation in the recruitment of a Senior SOC Engineer to join an established Security Operations Centre. This is an excellent opportunity to work within a high performing Cyber Security team, supporting critical national infrastructure and contributing to the enhancement of SOC capability, monitoring, and detection engineering. The Role You will work alongside Cyber SOC Engineers and Analysts to maintain and enhance protective monitoring and detection capability. This is a hands on engineering role with exposure to SIEM, security tooling, and incident investigation support. Key responsibilities Monitoring and improving performance of SOC protective controls and tooling Investigating, resolving or escalating technical issues within the SOC environment Supporting security incident investigations alongside SOC Analysts Analysing and interpreting system logs to improve logging, alerting and tool utilisation Developing installation guides, administration procedures, and detection rules Supporting integration of new systems into SOC tooling and monitoring frameworks Maintaining the integrity and quality of security data within the toolset Liaising with technology vendors where required Skills & Experience Required Strong analytical capability with experience handling and interrogating large data sets Experience working with SIEM platforms (essential) IPS experience (desirable) Solid understanding of Cyber Security Operations Good awareness of current cyber threats and attack techniques Advanced IT technical skills, including support and systems troubleshooting Ability to produce clear and structured technical documentation Strong team collaboration and communication skills Clearance & Eligibility Due to the nature of the work: Candidates must be British nationals only (no dual nationality) Must have resided in the UK for at least 5 of the last 10 years Must be eligible to obtain Developed Vetting (DV) clearance Existing DV clearance is advantageous but not essential Note: DV clearance can take 6-8 weeks to process. Candidates who do not currently hold clearance must be able to obtain the appropriate level of clearance. Short listed candidates will be submitted for vetting procedures before being formally offered the position. This process can take 6-8 weeks. Application If this role is of interest and you meet the above criteria, please apply immediately.
Apr 13, 2026
Full time
Senior SOC Engineer (DV Cleared / Eligible) PAYE Rate: £364.65 per day Umbrella Rate: £467.08 per day Contract Inside IR35 Duration: 6 months initially (with potential extensions) Hybrid - Milton Keynes (approx. 60% onsite) We are supporting a confidential UK Government organisation in the recruitment of a Senior SOC Engineer to join an established Security Operations Centre. This is an excellent opportunity to work within a high performing Cyber Security team, supporting critical national infrastructure and contributing to the enhancement of SOC capability, monitoring, and detection engineering. The Role You will work alongside Cyber SOC Engineers and Analysts to maintain and enhance protective monitoring and detection capability. This is a hands on engineering role with exposure to SIEM, security tooling, and incident investigation support. Key responsibilities Monitoring and improving performance of SOC protective controls and tooling Investigating, resolving or escalating technical issues within the SOC environment Supporting security incident investigations alongside SOC Analysts Analysing and interpreting system logs to improve logging, alerting and tool utilisation Developing installation guides, administration procedures, and detection rules Supporting integration of new systems into SOC tooling and monitoring frameworks Maintaining the integrity and quality of security data within the toolset Liaising with technology vendors where required Skills & Experience Required Strong analytical capability with experience handling and interrogating large data sets Experience working with SIEM platforms (essential) IPS experience (desirable) Solid understanding of Cyber Security Operations Good awareness of current cyber threats and attack techniques Advanced IT technical skills, including support and systems troubleshooting Ability to produce clear and structured technical documentation Strong team collaboration and communication skills Clearance & Eligibility Due to the nature of the work: Candidates must be British nationals only (no dual nationality) Must have resided in the UK for at least 5 of the last 10 years Must be eligible to obtain Developed Vetting (DV) clearance Existing DV clearance is advantageous but not essential Note: DV clearance can take 6-8 weeks to process. Candidates who do not currently hold clearance must be able to obtain the appropriate level of clearance. Short listed candidates will be submitted for vetting procedures before being formally offered the position. This process can take 6-8 weeks. Application If this role is of interest and you meet the above criteria, please apply immediately.
Chief Information Security Officer & Chief Security Officer
Ipsen Group
Cookie Notice Chief Information Security Officer Title: Chief Information Security Officer Company: Ipsen Pharma (SAS) About Ipsen: Ipsen is a mid-sized global biopharmaceutical company with a focus on transformative medicines in three therapeutic areas: Oncology, Rare Disease and Neuroscience. Supported by nearly 100 years of development experience, with global hubs in the U.S., France and the U.K, we tackle areas of high unmet medical need through research and innovation. Our passionate teams in more than 40 countries are focused on what matters and endeavor every day to bring medicines to patients in 88 countries. We build a workplace that champions human-centric leadership and fosters a culture of collaboration, excellence and impact. At Ipsen, every individual is empowered to be their true selves, grow and thrive alongside the company's success. Join us on our journey towards sustainable growth, creating real impact on patients and society!For more information, visit us at and follow our latest news on and . Job Description: The Chief Information Security Officer (CISO) is a strategic executive responsible for protecting the company's physical, digital, and intellectual assets. In a pharmaceutical context, this includes safeguarding sensitive R&D data, clinical trial information, patient privacy, and proprietary technologies. The CISO leads the development and execution of a comprehensive security strategy encompassing cybersecurity, regulatory compliance, physical security, and internal investigations. This role includes building and managing a multidisciplinary security and investigations team, ensuring alignment with business goals and regulatory requirements. WHAT - Main Responsibilities & Technical Competencies Strategic Leadership Develop and execute a forward-looking security strategy aligned with corporate objectives and industry trends. Advise executive leadership and the board on risk posture, threat landscape, and investment priorities. Lead cross-functional initiatives to embed security into digital transformation, innovation, and operational excellence. Establish KPIs and performance metrics to measure and improve security effectiveness. Cybersecurity & IT Security Oversee the design and implementation of cybersecurity architecture and controls. Ensure protection of IT infrastructure, cloud environments, and sensitive data. Lead incident response, threat intelligence, and vulnerability management programs. Maintain compliance with global standards (e.g., ISO 27001, NIST, GDPR, HIPAA). Governance, Risk & Compliance Develop and enforce enterprise-wide security policies and procedures. In alignment with the business ethics team, ensure compliance with pharmaceutical regulations (e.g., FDA, EMA, GxP). Conduct risk assessments, internal audits, and third-party security evaluations. Report regularly to senior leadership on risk mitigation and compliance status. Investigations & Incident Management Establish and lead an internal investigations function to address security breaches, misconduct, and regulatory violations. Build and manage a team of investigators and analysts with expertise in digital forensics, compliance, and legal coordination. Collaborate with HR, Legal, and external agencies on sensitive investigations and disciplinary actions. Ensure thorough documentation, reporting, and resolution of incidents in line with legal and regulatory standards. Fraud Management Develop and implement a fraud prevention and detection framework across the organization. Lead investigations into suspected fraud, misconduct, and financial irregularities. Collaborate with Finance, Legal, and Compliance to ensure timely resolution and reporting of fraud cases. Maintain a whistleblower program and ensure confidentiality and integrity in handling reports. Monitor fraud trends and proactively adjust controls and training programs. Team Management & Development Build and lead a multidisciplinary security team (cybersecurity, physical security, investigations, risk management). Define roles, responsibilities, and career development paths for team members. Foster a culture of accountability, agility, and continuous learning. Manage vendor relationships and external consultants as needed. Physical & Operational Security Oversee facility security, access control, and surveillance systems. Coordinate with facilities and operations on emergency preparedness and response. Develop and test business continuity and disaster recovery plans. Stakeholder Engagement Partner with various functions & business leaders including Legal, Regulatory Affairs, R&D, and Medical Affairs to align security with business needs. Lead security awareness and training programs across the organization. Represent the company in external forums, industry groups, and regulatory engagements. HOW - Knowledge & Experience Skills: Technical depth in cybersecurity and investigations Leadership and team development Fraud detection and prevention expertise Regulatory and compliance acumen Communication and stakeholder management Crisis and incident responseKnowledge & Experience: 15+ years of experience in security leadership, preferably in pharma or life sciences. Proven track record in strategic planning, investigations, fraud management, and team leadership. Certifications such as CISSP, CISM, CISA, CRISC, or CFE (Certified Fraud Examiner) are highly desirable. Strong understanding of regulatory environments and risk management frameworks.Education / Certifications : Bachelor's or Master's degree in Information Security, Computer Science, or related field.Language(s) : Fluency in English. Knowledge of European language is a plus for global roles.Nous nous engageons à créer un lieu de travail où chacun se sent écouté, valorisé et soutenu, où nous incarnons " The Real Us ". La valeur que nous accordons aux différentes perspectives et expériences motive notre engagement en faveur de l'inclusion et de l'égalité des chances. Lorsque nous intégrons des modes de pensée diversifiés, nous prenons des décisions plus réfléchies et découvrons des solutions plus innovantes. Ensemble, nous nous efforçons de mieux comprendre les communautés que nous servons. Cela signifie que nous voulons également vous aider à donner le meilleur de vous-même lorsque vous postulez à un poste chez nous. Si vous avez besoin d'aménagements ou d'aide pendant le processus de candidature, veuillez en informer l'équipe de recrutement. Ces informations seront traitées avec soin et n'auront aucune incidence sur le résultat de votre candidature. Soyons nous-même Get In TouchIntroduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
Apr 04, 2026
Full time
Cookie Notice Chief Information Security Officer Title: Chief Information Security Officer Company: Ipsen Pharma (SAS) About Ipsen: Ipsen is a mid-sized global biopharmaceutical company with a focus on transformative medicines in three therapeutic areas: Oncology, Rare Disease and Neuroscience. Supported by nearly 100 years of development experience, with global hubs in the U.S., France and the U.K, we tackle areas of high unmet medical need through research and innovation. Our passionate teams in more than 40 countries are focused on what matters and endeavor every day to bring medicines to patients in 88 countries. We build a workplace that champions human-centric leadership and fosters a culture of collaboration, excellence and impact. At Ipsen, every individual is empowered to be their true selves, grow and thrive alongside the company's success. Join us on our journey towards sustainable growth, creating real impact on patients and society!For more information, visit us at and follow our latest news on and . Job Description: The Chief Information Security Officer (CISO) is a strategic executive responsible for protecting the company's physical, digital, and intellectual assets. In a pharmaceutical context, this includes safeguarding sensitive R&D data, clinical trial information, patient privacy, and proprietary technologies. The CISO leads the development and execution of a comprehensive security strategy encompassing cybersecurity, regulatory compliance, physical security, and internal investigations. This role includes building and managing a multidisciplinary security and investigations team, ensuring alignment with business goals and regulatory requirements. WHAT - Main Responsibilities & Technical Competencies Strategic Leadership Develop and execute a forward-looking security strategy aligned with corporate objectives and industry trends. Advise executive leadership and the board on risk posture, threat landscape, and investment priorities. Lead cross-functional initiatives to embed security into digital transformation, innovation, and operational excellence. Establish KPIs and performance metrics to measure and improve security effectiveness. Cybersecurity & IT Security Oversee the design and implementation of cybersecurity architecture and controls. Ensure protection of IT infrastructure, cloud environments, and sensitive data. Lead incident response, threat intelligence, and vulnerability management programs. Maintain compliance with global standards (e.g., ISO 27001, NIST, GDPR, HIPAA). Governance, Risk & Compliance Develop and enforce enterprise-wide security policies and procedures. In alignment with the business ethics team, ensure compliance with pharmaceutical regulations (e.g., FDA, EMA, GxP). Conduct risk assessments, internal audits, and third-party security evaluations. Report regularly to senior leadership on risk mitigation and compliance status. Investigations & Incident Management Establish and lead an internal investigations function to address security breaches, misconduct, and regulatory violations. Build and manage a team of investigators and analysts with expertise in digital forensics, compliance, and legal coordination. Collaborate with HR, Legal, and external agencies on sensitive investigations and disciplinary actions. Ensure thorough documentation, reporting, and resolution of incidents in line with legal and regulatory standards. Fraud Management Develop and implement a fraud prevention and detection framework across the organization. Lead investigations into suspected fraud, misconduct, and financial irregularities. Collaborate with Finance, Legal, and Compliance to ensure timely resolution and reporting of fraud cases. Maintain a whistleblower program and ensure confidentiality and integrity in handling reports. Monitor fraud trends and proactively adjust controls and training programs. Team Management & Development Build and lead a multidisciplinary security team (cybersecurity, physical security, investigations, risk management). Define roles, responsibilities, and career development paths for team members. Foster a culture of accountability, agility, and continuous learning. Manage vendor relationships and external consultants as needed. Physical & Operational Security Oversee facility security, access control, and surveillance systems. Coordinate with facilities and operations on emergency preparedness and response. Develop and test business continuity and disaster recovery plans. Stakeholder Engagement Partner with various functions & business leaders including Legal, Regulatory Affairs, R&D, and Medical Affairs to align security with business needs. Lead security awareness and training programs across the organization. Represent the company in external forums, industry groups, and regulatory engagements. HOW - Knowledge & Experience Skills: Technical depth in cybersecurity and investigations Leadership and team development Fraud detection and prevention expertise Regulatory and compliance acumen Communication and stakeholder management Crisis and incident responseKnowledge & Experience: 15+ years of experience in security leadership, preferably in pharma or life sciences. Proven track record in strategic planning, investigations, fraud management, and team leadership. Certifications such as CISSP, CISM, CISA, CRISC, or CFE (Certified Fraud Examiner) are highly desirable. Strong understanding of regulatory environments and risk management frameworks.Education / Certifications : Bachelor's or Master's degree in Information Security, Computer Science, or related field.Language(s) : Fluency in English. Knowledge of European language is a plus for global roles.Nous nous engageons à créer un lieu de travail où chacun se sent écouté, valorisé et soutenu, où nous incarnons " The Real Us ". La valeur que nous accordons aux différentes perspectives et expériences motive notre engagement en faveur de l'inclusion et de l'égalité des chances. Lorsque nous intégrons des modes de pensée diversifiés, nous prenons des décisions plus réfléchies et découvrons des solutions plus innovantes. Ensemble, nous nous efforçons de mieux comprendre les communautés que nous servons. Cela signifie que nous voulons également vous aider à donner le meilleur de vous-même lorsque vous postulez à un poste chez nous. Si vous avez besoin d'aménagements ou d'aide pendant le processus de candidature, veuillez en informer l'équipe de recrutement. Ces informations seront traitées avec soin et n'auront aucune incidence sur le résultat de votre candidature. Soyons nous-même Get In TouchIntroduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
Franklin Fitch
Senior Security Analyst
Franklin Fitch Fareham, Hampshire
Detection & Response Analyst (SOC / Security Engineering Pathway) Portsmouth (Hybrid) Why this role is different Most SOC roles are alert-heavy and repetitive. This isn't one of them. You'll be joining a team that's actively moving beyond traditional SOC work-focusing on threat detection, automation, and security engineering , not just ticket handling. If you're looking to step up from SOC OR move closer to engineering / threat hunting , this is a genuine pathway role. What you'll be doing Investigating and responding to security incidents across enterprise environments Building and improving SIEM detection rules / use cases Working with security tooling (EDR, SIEM, cloud security platforms) Supporting threat hunting and proactive detection activities Collaborating with engineering teams to improve automation and response Contributing to continuous improvement of security operations What we're looking for We're open to people from a range of backgrounds, including SOC, SecOps, or infrastructure with security exposure. You might have: Experience in a SOC, SecOps, or similar security-focused role Exposure to tools like SIEM (Splunk, Sentinel, QRadar, etc.) or EDR Understanding of common attack techniques (MITRE ATT&CK, incident response basics) An interest in detection engineering, automation, or threat hunting Not ticking every box? That's fine-we're hiring for potential as well as experience . Progression & development This role is designed as a stepping stone into more advanced security work , including: Threat Hunting Detection Engineering Security Engineering / Automation Incident Response You'll be supported with training, certifications, and hands-on exposure to modern tooling. Working setup Hybrid Flexible working environment Portsmouth office for collaboration when needed Why join? Clear progression beyond traditional SOC work Opportunity to work on modern security tooling and detection engineering Supportive team environment with real development focus Chance to build skills that are highly in demand across cyber security
Apr 01, 2026
Full time
Detection & Response Analyst (SOC / Security Engineering Pathway) Portsmouth (Hybrid) Why this role is different Most SOC roles are alert-heavy and repetitive. This isn't one of them. You'll be joining a team that's actively moving beyond traditional SOC work-focusing on threat detection, automation, and security engineering , not just ticket handling. If you're looking to step up from SOC OR move closer to engineering / threat hunting , this is a genuine pathway role. What you'll be doing Investigating and responding to security incidents across enterprise environments Building and improving SIEM detection rules / use cases Working with security tooling (EDR, SIEM, cloud security platforms) Supporting threat hunting and proactive detection activities Collaborating with engineering teams to improve automation and response Contributing to continuous improvement of security operations What we're looking for We're open to people from a range of backgrounds, including SOC, SecOps, or infrastructure with security exposure. You might have: Experience in a SOC, SecOps, or similar security-focused role Exposure to tools like SIEM (Splunk, Sentinel, QRadar, etc.) or EDR Understanding of common attack techniques (MITRE ATT&CK, incident response basics) An interest in detection engineering, automation, or threat hunting Not ticking every box? That's fine-we're hiring for potential as well as experience . Progression & development This role is designed as a stepping stone into more advanced security work , including: Threat Hunting Detection Engineering Security Engineering / Automation Incident Response You'll be supported with training, certifications, and hands-on exposure to modern tooling. Working setup Hybrid Flexible working environment Portsmouth office for collaboration when needed Why join? Clear progression beyond traditional SOC work Opportunity to work on modern security tooling and detection engineering Supportive team environment with real development focus Chance to build skills that are highly in demand across cyber security
Searchability NS&D
SOC Engineer
Searchability NS&D Farnborough, Hampshire
SOC Engineer - Farnborough or Hemel Hempstead, UK Up to £65,000 Depending on Experience + Night Shift allowance Onsite in Farnborough or Hemel Hempstead Active SC required, with willingness to go through DV ABOUT THE CLIENT Our client is a highly respected technology consultancy working across complex and security critical environments. They deliver cutting edge digital and cybersecurity solutions to major public sector organisations. Due to continued growth, they are looking to appoint a SOC Engineer to strengthen their security capability. THE BENEFITS 25 days annual leave Health cash plan Life assurance Pension scheme Structured training and development Career progression opportunities Collaborative and supportive environment THE SOC ENGINEER ROLE: As a SOC Engineer, you will play a key role in ensuring security monitoring and protective tooling is deployed and operating effectively. You will support SOC operations by enabling analysts to detect and respond to threats quickly and efficiently. Install, configure and maintain security monitoring tools Ensure SOC tooling is optimised and operating effectively Support SIEM platforms and threat intelligence tooling Work with teams to assess risk and design security controls Apply updates, patches and follow change processes Stay current with emerging threats and recommend improvements SOC ENGINEER ESSENTIAL SKILLS Strong understanding of information security fundamentals Experience with SIEM tools such as Sentinel or Splunk Familiarity with security monitoring technologies Analytical mindset with strong problem solving skills Ability to manage multiple priorities and meet deadlines Strong communication and collaboration skills TO BE CONSIDERED: Please either apply through this advert or email me directly to discuss. By applying for this role, you give consent for your application to be submitted to our client in connection with this vacancy. KEY SKILLS SOC Engineer, SIEM, Sentinel, Splunk, Cyber Security, Security Monitoring, Threat Detection, Azure, AWS, Network Security, NSD
Apr 01, 2026
Full time
SOC Engineer - Farnborough or Hemel Hempstead, UK Up to £65,000 Depending on Experience + Night Shift allowance Onsite in Farnborough or Hemel Hempstead Active SC required, with willingness to go through DV ABOUT THE CLIENT Our client is a highly respected technology consultancy working across complex and security critical environments. They deliver cutting edge digital and cybersecurity solutions to major public sector organisations. Due to continued growth, they are looking to appoint a SOC Engineer to strengthen their security capability. THE BENEFITS 25 days annual leave Health cash plan Life assurance Pension scheme Structured training and development Career progression opportunities Collaborative and supportive environment THE SOC ENGINEER ROLE: As a SOC Engineer, you will play a key role in ensuring security monitoring and protective tooling is deployed and operating effectively. You will support SOC operations by enabling analysts to detect and respond to threats quickly and efficiently. Install, configure and maintain security monitoring tools Ensure SOC tooling is optimised and operating effectively Support SIEM platforms and threat intelligence tooling Work with teams to assess risk and design security controls Apply updates, patches and follow change processes Stay current with emerging threats and recommend improvements SOC ENGINEER ESSENTIAL SKILLS Strong understanding of information security fundamentals Experience with SIEM tools such as Sentinel or Splunk Familiarity with security monitoring technologies Analytical mindset with strong problem solving skills Ability to manage multiple priorities and meet deadlines Strong communication and collaboration skills TO BE CONSIDERED: Please either apply through this advert or email me directly to discuss. By applying for this role, you give consent for your application to be submitted to our client in connection with this vacancy. KEY SKILLS SOC Engineer, SIEM, Sentinel, Splunk, Cyber Security, Security Monitoring, Threat Detection, Azure, AWS, Network Security, NSD
Chapman Tate Associates
SOC Analyst (L2)
Chapman Tate Associates Aylesbury, Buckinghamshire
SOC Analyst (Level 2) Location: Aylesbury (Hybrid) Salary: Up to £45,000 (depending on experience) CTA are working with a Cyber Security company who are for a SOC Analyst (L2) to join their growing Security Operations Centre. This role is ideal for a junior analyst looking to build hands-on experience in monitoring, triaging, and responding to security incidents in a fast-paced, shift-based environment. Key Responsibilities Advanced Security Monitoring: Analyse SIEM alerts, logs, and security events to identify and respond to complex threats. Incident Response: Lead investigations, perform deep analysis, determine impact, and coordinate response activities. Threat Detection & Analysis: Develop and refine detection rules and use cases to improve threat visibility. Threat Hunting: Proactively hunt for advanced threats and indicators of compromise across the environment. Vulnerability Management: Identify, assess, and prioritise vulnerabilities and recommend remediation actions. Security Reporting: Produce detailed reports on incidents, trends, and overall security posture. Process Improvement & Automation: Enhance SOC processes, playbooks, and automation capabilities. Skills & Experience Strong experience with SIEM platforms (e.g., Microsoft Sentinel, Sumo Logic) Hands-on experience with EDR/XDR tools (e.g., CrowdStrike, Microsoft Defender) Solid understanding of: Incident response lifecycle Threat detection methodologies Networking protocols (TCP/IP, DNS, HTTP/S) Experience analysing logs from multiple sources (endpoints, network, cloud) Ability to independently investigate and resolve security incidents Scripting or automation experience (e.g., Python, PowerShell) is a plus Strong communication and stakeholder management skills What You'll Be Doing Acting as an escalation point for Level 1 analysts Working closely with customers and internal teams on incident investigations Tuning detection rules and improving alert quality Staying up to date with emerging threats, vulnerabilities, and attack techniques Supporting and mentoring junior analysts Requirements UK Citizenship (required due to the nature of the role) If you are looking for a progressive move with an established Cyber company, please do send your application through for consideration.
Apr 01, 2026
Full time
SOC Analyst (Level 2) Location: Aylesbury (Hybrid) Salary: Up to £45,000 (depending on experience) CTA are working with a Cyber Security company who are for a SOC Analyst (L2) to join their growing Security Operations Centre. This role is ideal for a junior analyst looking to build hands-on experience in monitoring, triaging, and responding to security incidents in a fast-paced, shift-based environment. Key Responsibilities Advanced Security Monitoring: Analyse SIEM alerts, logs, and security events to identify and respond to complex threats. Incident Response: Lead investigations, perform deep analysis, determine impact, and coordinate response activities. Threat Detection & Analysis: Develop and refine detection rules and use cases to improve threat visibility. Threat Hunting: Proactively hunt for advanced threats and indicators of compromise across the environment. Vulnerability Management: Identify, assess, and prioritise vulnerabilities and recommend remediation actions. Security Reporting: Produce detailed reports on incidents, trends, and overall security posture. Process Improvement & Automation: Enhance SOC processes, playbooks, and automation capabilities. Skills & Experience Strong experience with SIEM platforms (e.g., Microsoft Sentinel, Sumo Logic) Hands-on experience with EDR/XDR tools (e.g., CrowdStrike, Microsoft Defender) Solid understanding of: Incident response lifecycle Threat detection methodologies Networking protocols (TCP/IP, DNS, HTTP/S) Experience analysing logs from multiple sources (endpoints, network, cloud) Ability to independently investigate and resolve security incidents Scripting or automation experience (e.g., Python, PowerShell) is a plus Strong communication and stakeholder management skills What You'll Be Doing Acting as an escalation point for Level 1 analysts Working closely with customers and internal teams on incident investigations Tuning detection rules and improving alert quality Staying up to date with emerging threats, vulnerabilities, and attack techniques Supporting and mentoring junior analysts Requirements UK Citizenship (required due to the nature of the role) If you are looking for a progressive move with an established Cyber company, please do send your application through for consideration.

Modal Window

  • Home
  • Contact
  • About Us
  • Terms & Conditions
  • Privacy
  • Employer
  • Post a Job
  • Search Resumes
  • Sign in
  • Job Seeker
  • Find Jobs
  • Create Resume
  • Sign in
  • Facebook
  • Twitter
  • Google Plus
  • LinkedIn
Parent and Partner sites: IT Job Board | Jobs Near Me | RightTalent.co.uk | Quantity Surveyor jobs | Building Surveyor jobs | Construction Recruitment | Talent Recruiter | Construction Job Board | Property jobs | myJobsnearme.com | Jobs near me
© 2008-2026 Jobsite Jobs | Designed by Web Design Agency