145 Security Operations jobs in London
Senior Security Operations Analyst - Threat Intelligence
Posted 17 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and events using SIEM, IDS/IPS, and other security tools.
- Investigate and respond to security incidents in a timely and effective manner.
- Conduct threat hunting activities to proactively identify and mitigate risks.
- Analyze threat intelligence feeds and assess their relevance to the organization.
- Develop and refine incident response playbooks and procedures.
- Perform vulnerability assessments and assist in remediation efforts.
- Stay current with the latest cybersecurity threats, trends, and technologies.
- Collaborate with IT and development teams to implement security controls.
- Provide reporting on security posture and incident trends to management.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, or a related field, or equivalent work experience.
- 5+ years of experience in a Security Operations Center (SOC) or similar cybersecurity role.
- Strong understanding of networking protocols, TCP/IP, and common attack vectors.
- Experience with SIEM tools (e.g., Splunk, QRadar, ELK Stack).
- Familiarity with EDR, antivirus, and other endpoint security solutions.
- Knowledge of threat intelligence platforms and methodologies.
- Relevant certifications such as CompTIA Security+, CEH, GIAC, or CISSP are highly desirable.
- Excellent analytical, problem-solving, and communication skills.
- Ability to work under pressure in a fast-paced environment.
Security Operations Manager
Posted today
Job Viewed
Job Description
Security Operations Manager - Central London
Hybrid Working:
A market leading professional services company based in London are looking for a Security Operations Manager to join their Information Security department on a permanent basis.
The post holder will work closely with the Group Chief Information Security Officer on the companies Information Security Strategy.
The role will see you splitting your time between being technically hands on and leading a team of security specialists.
Responsibilities:
- Design, build and manage the security operations systems.
- Help maintain, support and improve systems, tools and processes.
- Manage and mentor a team of Security Specialists.
- Create detailed Security documentation and best practise material.
- Develop incident response procedures.
- Be the escalation point for high level security issues.
- Work closely with Security Architecture, GRC and Technology teams.
Experience Required:
- Extensive experience in the information security field.
- Extensive experience leading and motivating teams of Security Engineers.
- Deep understanding of Security Operations, DevOps, Automation, Cloud and Incident Response Tools.
- A degree in Computer Science or Information Security would be beneficial but not essential.
In line with the Conduct Regulations 2003, when advertising permanent vacancies JNC Recruitment are acting as an Employment Agency, and when advertising temporary/contract vacancies JNC Recruitment are acting as an Employment Business
Senior Security Operations Analyst

Posted 13 days ago
Job Viewed
Job Description
Pearson is looking for an experienced Security Operations Center (SOC) analyst. This role is responsible for performing day-to-day security operations, continuous process improvement, detection engineering and project work related to SOC functions.
Responsibilities:
+ Identify, triage and contain security events, using automation and AI capabilities to reduce mean time to containment.
+ Perform in-depth investigation into the underlying root cause of issues.
+ Identify new detection opportunities and refine existing playbooks.
+ Implement and improve security processes and procedures within the SOC.
+ Ability and willingness to engage in a collaborative and high-performing team environment.
+ Maintain awareness and understanding of the current threat landscape. Analyze threat intelligence with an aim to mitigate emerging risks.
Qualifications:
+ Hands on experience and understanding of fundamental security concepts, SOAR, EDR, NDR and SIEM technologies.
+ Hands on experience with one or more Cloud Service Providers (AWS, Azure, GCP, etc).
+ Demonstrate the ability to multitask, adapt and thrive within a fast-paced environment.
+ Have excellent communication skills and stakeholder management.
+ SANS GCIH certification or equivalent.
+ +4 years' experience working in a Security Operations role.
**Who we are:**
At Pearson, our purpose is simple: to help people realize the life they imagine through learning. We believe that every learning opportunity is a chance for a personal breakthrough. We are the world's lifelong learning company. For us, learning isn't just what we do. It's who we are. To learn more: We are Pearson.
Pearson is an Equal Opportunity Employer and a member of E-Verify. Employment decisions are based on qualifications, merit and business need. Qualified applicants will receive consideration for employment without regard to race, ethnicity, color, religion, sex, sexual orientation, gender identity, gender expression, age, national origin, protected veteran status, disability status or any other group protected by law. We actively seek qualified candidates who are protected veterans and individuals with disabilities as defined under VEVRAA and Section 503 of the Rehabilitation Act.
If you are an individual with a disability and are unable or limited in your ability to use or access our career site as a result of your disability, you may request reasonable accommodations by emailing
**Job:** Security
**Job Family:** TECHNOLOGY
**Organization:** Corporate Strategy & Technology
**Schedule:** FULL_TIME
**Workplace Type:**
**Req ID:** 20801
Aviation Security Operations Manager
Posted 15 days ago
Job Viewed
Job Description
Responsibilities:
- Develop, implement, and manage comprehensive aviation security programs.
- Lead, train, and manage a team of security personnel.
- Ensure compliance with all relevant aviation security regulations (e.g., DfT, TSA, ICAO).
- Oversee passenger, baggage, cargo, and personnel screening operations.
- Conduct risk assessments and develop mitigation strategies.
- Respond to and manage security incidents and emergencies.
- Liaise with regulatory authorities, law enforcement, and airline stakeholders.
- Conduct regular security audits and inspections.
- Develop and deliver security awareness training.
- Manage security budgets and resources effectively.
- Extensive experience in aviation security management.
- In-depth knowledge of aviation security legislation and best practices.
- Proven leadership and team management skills.
- Strong understanding of threat assessment and risk management principles.
- Experience with security screening technologies and procedures.
- Excellent communication, reporting, and stakeholder management skills.
- Ability to make critical decisions in high-pressure situations.
- Relevant security management certifications are highly desirable.
- Experience in crisis management and incident response.
Security Engineer, Security Operations
Posted 1 day ago
Job Viewed
Job Description
Security Operations Engineer
to join our dedicated security team.nAt Blockchain.com, security is more than a set of policies—it's a core mindset. As we continue to innovate in the crypto space, you will tackle some of the most complex problems around securing a distributed financial platform. The Security team is responsible for guiding the design and implementation of secure systems across the company. Using a comprehensive range of tools and methodologies, we identify and mitigate security risks proactively, ensuring the protection of our users, stakeholders, and systems.nWHAT YOU WILL DOnDevelop tooling to aggregate and analyze various security feeds and logsnBuild systems to automate responses to security events and alerts.nManage endpoint protection software, including reviewing, testing, and deploying updates to employee laptops.nReview and manage access permissions for third-party vendors.nDevelop tooling to streamline and automate the management of third-party vendor access.nContribute to the development of incident response tools and processes, ensuring compliance with DORA and other regulatory frameworks.nIdentify opportunities to restrict data access while optimizing customer success operations.nPromote and enforce safe practices regarding the use of logging services among engineering teams.nConduct threat intelligence and analysis of attacks targeting employees.nIssue takedown requests for domains and individuals impersonating the company.nParticipate in red team assessments targeting employees and security operations functions.nMonitor and respond to security incidents, escalating as needed.nMaintain and update security documentation and procedures.nParticipate in security training and awareness programs for employees.nAssist in the evaluation and implementation of new security technologies.nWHAT YOU WILL NEEDnExperience with scripting and programming languages (e.g., Python, Bash).nFamiliarity with security monitoring and analysis tools.nUnderstanding of endpoint protection concepts and tools.nKnowledge of network security principles.nExperience with incident response processes.nStrong analytical and problem-solving skills.nGood communication and collaboration skills.nA passion for learning and staying up-to-date with the latest security trends.nA commitment to integrity, transparency, and excellence in all aspects of work.nINDICATIVE CERTIFICATIONSnCompTIA Security+nCertified Ethical Hacker (CEH)nOther relevant security certificationnCOMPENSATION & PERKSnCompetitive salary based on experience with meaningful equity in a leading industry company.nApple equipment for your work setup.nComprehensive benefits package, including private medical insurance (BUPA), dental, pension, life insurance, short- and long-term disability coverage.nWork from a modern, accessible office in the heart of London 4 days a week + 1 day from homenThe opportunity to contribute to a fast-growing, global technology company at the forefront of the industrynWork from Anywhere PolicynHOW TO APPLYnProvide links to your GitHub, Stack Overflow, personal website, or blog (if applicable).n#LI-Hybrid
Blockchain is committed to diversity and inclusion in the workplace and is proud to be an equal opportunity employer. We prohibit discrimination and harassment of any kind based on race, religion, color, national origin, gender, gender expression, sex, sexual orientation, age, marital status, veteran status, disability status or any other characteristic protected by law. This policy applies to all employment practices within our organization, including hiring, recruiting, promotion, termination, layoff, recall, leave of absence, and apprenticeship. Blockchain makes hiring decisions based solely on qualifications, merit, and business needs at the time.nYou may contact our Data Protection Officer by email at Your personal data will be processed for the purposes of managing Controller’s recruitment related activities, which include setting up and conducting interviews and tests for applicants, evaluating and assessing the results thereto, and as is otherwise needed in the recruitment and hiring processes. Such processing is legally permissible under Art. 6(1)(f) of Regulation (EU) 2016/679 (General Data Protection Regulation) as necessary for the purposes of the legitimate interests pursued by the Controller, which are the solicitation, evaluation, and selection of applicants for employment.nYour personal data will be shared with Greenhouse Software, Inc., a cloud services provider located in the United States of America and engaged by Controller to help manage its recruitment and hiring process on Controller’s behalf. Accordingly, if you are located outside of the United States, your personal data will be transferred to the United States once you submit it through this site. Because the European Union Commission has determined that United States data privacy laws do not ensure an adequate level of protection for personal data collected from EU data subjects, the transfer will be subject to appropriate additional safeguards under the standard contractual clauses.nYour personal data will be retained by Controller as long as Controller determines it is necessary to evaluate your application for employment. Under the GDPR, you have the right to request access to your personal data, to request that your personal data be rectified or erased, and to request that processing of your personal data be restricted. You also have the right to data portability. In addition, you may lodge a complaint with an EU supervisory authority.nCreate a Job AlertnInterested in building your career at Blockchain.com? Get future opportunities sent straight to your email.nApply for this job
*nindicates a required fieldnFirst Name *nLast Name *nEmail *nPhonenResume/CVnEnter manuallynAccepted file types: pdf, doc, docx, txt, rtfnEnter manuallynAccepted file types: pdf, doc, docx, txt, rtfnLinkedIn ProfilenWebsitenDo you have the legal right to work in the UK? * Select.nThis role requires working from our London office four days a week. Can you accommodate this hybrid schedule? * Select.
#J-18808-Ljbffrn
Security Engineer, Security Operations
Posted 1 day ago
Job Viewed
Job Description
As we scale our platform to serve millions of people each day, we seek a
Security Operations Engineer
to join our dedicated security team.
At Blockchain.com, security is more than a set of policies—it's a core mindset. As we continue to innovate in the crypto space, you will tackle some of the most complex problems around securing a distributed financial platform. The Security team is responsible for guiding the design and implementation of secure systems across the company. Using a comprehensive range of tools and methodologies, we identify and mitigate security risks proactively, ensuring the protection of our users, stakeholders, and systems.
WHAT YOU WILL DO
Develop tooling to aggregate and analyze various security feeds and logsnBuild systems to automate responses to security events and alerts.nManage endpoint protection software, including reviewing, testing, and deploying updates to employee laptops.nReview and manage access permissions for third-party vendors.nDevelop tooling to streamline and automate the management of third-party vendor access.nContribute to the development of incident response tools and processes, ensuring compliance with DORA and other regulatory frameworks.nIdentify opportunities to restrict data access while optimizing customer success operations.nPromote and enforce safe practices regarding the use of logging services among engineering teams.nConduct threat intelligence and analysis of attacks targeting employees.nIssue takedown requests for domains and individuals impersonating the company.nParticipate in red team assessments targeting employees and security operations functions.nMonitor and respond to security incidents, escalating as needed.nMaintain and update security documentation and procedures.nParticipate in security training and awareness programs for employees.nAssist in the evaluation and implementation of new security technologies.
WHAT YOU WILL NEED
Experience with scripting and programming languages (e.g., Python, Bash).nFamiliarity with security monitoring and analysis tools.nUnderstanding of endpoint protection concepts and tools.nKnowledge of network security principles.nExperience with incident response processes.nStrong analytical and problem-solving skills.nGood communication and collaboration skills.nA passion for learning and staying up-to-date with the latest security trends.nA commitment to integrity, transparency, and excellence in all aspects of work.
INDICATIVE CERTIFICATIONS
CompTIA Security+nCertified Ethical Hacker (CEH)nOther relevant security certification
COMPENSATION & PERKS
Competitive salary based on experience with meaningful equity in a leading industry company.nApple equipment for your work setup.nComprehensive benefits package, including private medical insurance (BUPA), dental, pension, life insurance, short- and long-term disability coverage.nWork from a modern, accessible office in the heart of London 4 days a week + 1 day from homenThe opportunity to contribute to a fast-growing, global technology company at the forefront of the industrynWork from Anywhere Policy
How To Apply
Submit your LinkedIn profile.nProvide links to your GitHub, Stack Overflow, personal website, or blog (if applicable).
Blockchain is committed to diversity and inclusion in the workplace and is proud to be an equal opportunity employer. We prohibit discrimination and harassment of any kind based on race, religion, color, national origin, gender, gender expression, sex, sexual orientation, age, marital status, veteran status, disability status or any other characteristic protected by law. This policy applies to all employment practices within our organization, including hiring, recruiting, promotion, termination, layoff, recall, leave of absence, and apprenticeship. Blockchain makes hiring decisions based solely on qualifications, merit, and business needs at the time.
You may contact our Data Protection Officer by email at Your personal data will be processed for the purposes of managing Controller’s recruitment related activities, which include setting up and conducting interviews and tests for applicants, evaluating and assessing the results thereto, and as is otherwise needed in the recruitment and hiring processes. Such processing is legally permissible under Art. 6(1)(f) of Regulation (EU) 2016/679 (General Data Protection Regulation) as necessary for the purposes of the legitimate interests pursued by the Controller, which are the solicitation, evaluation, and selection of applicants for employment.
Your personal data will be shared with Greenhouse Software, Inc., a cloud services provider located in the United States of America and engaged by Controller to help manage its recruitment and hiring process on Controller’s behalf. Accordingly, if you are located outside of the United States, your personal data will be transferred to the United States once you submit it through this site. Because the European Union Commission has determined that United States data privacy laws do not ensure an adequate level of protection for personal data collected from EU data subjects, the transfer will be subject to appropriate additional safeguards under the standard contractual clauses.
Your personal data will be retained by Controller as long as Controller determines it is necessary to evaluate your application for employment. Under the GDPR, you have the right to request access to your personal data, to request that your personal data be rectified or erased, and to request that processing of your personal data be restricted. You also have the right to data portability. In addition, you may lodge a complaint with an EU supervisory authority.
Seniority level
Seniority level Entry levelnEmployment type
Employment type Full-timenJob function
Job function Information Technology and EngineeringnIndustries IT Services and IT Consulting, Technology, Information and Internet, and Financial ServicesnReferrals increase your chances of interviewing at Blockchain.com by 2xnGet notified about new Security Engineer jobs in
London, England, United Kingdom .nSlough, England, United Kingdom 3 weeks agonIsleworth, England, United Kingdom 3 weeks agonLondon, England, United Kingdom 3 months agonLondon, England, United Kingdom 1 month agonTwickenham, England, United Kingdom 4 weeks agonLondon, England, United Kingdom 1 month agonLondon, England, United Kingdom £41,000.00-£45,000.00 1 month agonLondon, England, United Kingdom 1 month agonLondon, England, United Kingdom 3 days agonService Delivery Engineer CyberSecurity - Graduate
London, England, United Kingdom 1 month agonLondon, England, United Kingdom 22 hours agonLondon, England, United Kingdom 2 weeks agonLondon, England, United Kingdom 6 days agonKingston Upon Thames, England, United Kingdom 3 weeks agonLondon, England, United Kingdom 5 days agonLondon, England, United Kingdom 5 months agonHemel Hempstead, England, United Kingdom 2 weeks agonLondon, England, United Kingdom 2 weeks agonOffensive Security Engineer, Workvivo - UK
London, England, United Kingdom 2 days agonLondon, England, United Kingdom 1 month agonLondon, England, United Kingdom 2 weeks agonLondon, England, United Kingdom 2 weeks agonLondon, England, United Kingdom 2 weeks agonCyber Security Data Engineer, Contract Capabilities
London, England, United Kingdom 2 weeks agonTottenham, England, United Kingdom 1 month agonLondon, England, United Kingdom 1 week agonLinux Cryptography and Security Engineer
London, England, United Kingdom 3 days agonLondon, England, United Kingdom 1 week agonWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffrn
Senior Security Operations Engineer
Posted 1 day ago
Job Viewed
Job Description
Direct message the job poster from La FossenPrincipal Consultant (Cyber) at La Fosse
We're looking for a Cyber Security Engineer to help to build our SecOps function. You'll serve as the technical lead, drive key security initiatives, play a pivotal role in mentoring junior team members and increasing our overall security posture.nKey Responsibilities include managing CrowdStrike SIEM/SOAR/EDR (alert response), vulnerability scans/remediation, security certificates, IDS/IPS, PAM. Remediate penetration test findings and contribute to ad-hoc projects. Work with the network engineers to implement posture management i.e. ICE/NAC segmentation/ lateral movement control and firewalls.nMonitor, manage, and respond to threats via CrowdStrikenConduct vulnerability scans and support remediation and risk mitigation effortsnOversee WAF, DDoS, VPN, and perimeter firewallsnManage Email and Web Security GatewaysnWork with Endpoints team to administer MFA, SSO, PAM, MDM/MAM, and Conditional Access systemsnMaintain security certificates, encryption keys, and IDS/IPS systemsnLead ad-hoc security projectsnSupport and resolve issues identified during penetration testingnThe role requires 2 or 3 days per week in the London office and the rest from home.nSeniority level
Mid-Senior levelnEmployment type
Full-timenJob function
Information TechnologynIndustries
Law Practice
#J-18808-Ljbffrn
Be The First To Know
About the latest Security operations Jobs in London !
Global Cybersecurity Director - Security Operations
Posted today
Job Viewed
Job Description
Boston Consulting Group partners with leaders in business and society to tackle their most important challenges and capture their greatest opportunities. BCG was the pioneer in business strategy when it was founded in 1963. Today, we help clients with total transformation-inspiring complex change, enabling organizations to grow, building competitive advantage, and driving bottom-line impact.
To succeed, organizations must blend digital and human capabilities. Our diverse, global teams bring deep industry and functional expertise and a range of perspectives to spark change. BCG delivers solutions through leading-edge management consulting along with technology and design, corporate and digital ventures—and business purpose. We work in a uniquely collaborative model across the firm and throughout all levels of the client organization, generating results that allow our clients to thrive.
What You'll Do
Security Continuous Monitoring Oversight
* Establish and lead BCG’s first enterprise-wide Cybersecurity Continuous Monitoring (CSCM) program, ensuring continuous visibility into system, endpoint, network, and cloud activity.
* Define and implement governance models, including ownership of monitoring metrics (e.g., MTTD, MTTR, false positive rate, coverage completeness).
* Stand up monitoring processes and integrate telemetry sources across SIEM, EDR, identity, network, and cloud platforms.
* Ensure monitoring outputs are actionable, enriching detection and response activities and informing risk and compliance stakeholders.
Technical Architecture & Integration
* Design and implement a continuous monitoring reference architecture, leveraging SIEM, SOAR, UEBA, and threat intelligence.
* Establish enterprise logging standards covering log coverage, retention, encryption, access, and integrity requirements.
* Drive automation of monitoring workflows and correlation logic to reduce dwell time and improve detection accuracy.
* Collaborate with threat intelligence teams to ensure real-time enrichment of event data and alignment with MITRE ATT&CK adversary tactics.
Program & Capability Development
* Build the CCM capability from the ground up, defining the operating model, reporting cadence, and engagement with SOC, risk, and compliance.
* Develop and track KPIs, ensuring CCM effectiveness is measurable and communicated to senior stakeholders.
* Prioritize creation of top 5–10 operational dashboards and reports that provide critical enterprise visibility.
* Mature the function from initial operational capability (M1) toward advanced maturity, embedding continuous improvement cycles.
STRATEGIC LEADERSHIP
* Serve as the founding leader for the CCM function, creating the strategy, roadmap, and tactical build plan.
* Partner with enterprise stakeholders across IT, Risk, and Security to align monitoring with business risk tolerance and resilience objectives.
* Influence senior leaders by translating technical telemetry insights into business-relevant intelligence.
* Build, inspire, and retain a high-performing team of analysts and engineers over time, leveraging both full-time staff and contractors.
* Advise senior leadership (via SecOPS) on monitoring-driven insights, risks, and mitigation recommendations.
What You'll Bring
* Bachelor’s degree (or equivalent). Master’s preferred.
* 10+ years in cybersecurity operations, with at least 5 years in security monitoring, SOC leadership, or equivalent detection & response functions.
* Proven track record of building or maturing monitoring capabilities (SIEM, SOAR, telemetry pipelines, UEBA, threat intel integration).
* Knowledge of log ingestion, normalization, correlation, and enrichment processes.
* Familiarity with leading monitoring technologies: Splunk, DataDog, Microsoft Defender, CrowdStrike Falcon, Azure/AWS/GCP telemetry, threat intelligence platforms.
* Expertise in metrics-driven monitoring: defining, tracking, and reporting MTTD, MTTR, false positive rates, and coverage completeness.
* Familiarity with frameworks like NIST CSF, MITRE ATT&CK, and ISO 27001, with experience applying these to monitoring.
* Experience in threat hunting, anomaly detection, and behavioral analytics.
* Strong leadership skills: able to recruit, mentor, and develop a high-performing team in a newly established function.
* Executive presence: able to present complex monitoring data and risks to senior leadership in clear, concise business terms.
Additional info
COMPETENCIES: Director, Cybersecurity Continuous Monitoring
Leads a critical security function with measurable business impact. Establishes foundational capabilities, manages delivery, and develops a growing team to support BCG’s enterprise security posture.
Technical & Functional Expertise
* Develops and executes the continuous monitoring strategy, aligned to enterprise security goals and SecOPS direction.
* Demonstrates deep technical expertise in telemetry ingestion, SIEM/SOAR integration, log management, and threat intelligence enrichment.
* Serves as a recognized expert in monitoring and detection, providing guidance to peers and influencing related security domains.
* Codifies monitoring practices and standards into repeatable processes and playbooks, reducing reliance on ad hoc approaches.
* Evaluates and pilots emerging monitoring technologies; ensures adoption of digital tools to scale efficiency and coverage.
Problem Solving & Insight
* Frames monitoring and detection challenges in business-relevant terms (risk, resilience, compliance).
* Uses data-driven methods (metrics such as MTTD, MTTR, false positives) to identify control gaps and inform improvements.
* Translates complex monitoring outputs into actionable insights for stakeholders across IT, Risk, and Security.
* Innovates in detection methodologies, leveraging behavioral analytics, anomaly detection, and adversary simulations.
* Acts as a problem-solver during incidents, ensuring monitoring outputs guide rapid containment and response.
Effectiveness & Value Creation
* Leads the build-out of the CCM function from the ground up, establishing governance, processes, and reporting.
* Structures, plans, and executes monitoring programs and initiatives, balancing near-term needs with long-term maturity goals.
* Delivers measurable outcomes (visibility, faster detection, reduced dwell time) that directly enhance business resilience.
* Proactively manages resources, balancing full-time staff and contractors to deliver capability within deadlines.
* Prioritizes actions with the highest impact on reducing enterprise cyber risk.
Role Model
* Operates with integrity, safeguarding BCG and client data through responsible monitoring practices.
* Promotes a culture of transparency, accountability, and data-driven decision-making in the team.
* Demonstrates perseverance and adaptability in building a new function with high visibility and expectations.
* Creates an inclusive working environment that values diverse technical and analytical perspectives.
* Leads by example, modeling sustainable workload practices even under incident-driven pressure.
Communication, Presence & Influence
* Develops and delivers clear dashboards, reports, and executive communications on monitoring outputs.
* Shapes perspectives by translating technical monitoring metrics into risk- and business-relevant insights.
* Communicates effectively across technical and non-technical audiences, ensuring alignment with IT and business leaders.
* Leads conversations in operational reviews, incident post-mortems, and governance forums.
* Encourages open dialogue within the team, and fosters credibility with cross-functional partners.
Teaming & Collaboration
* Builds strong partnerships with SOC, Offensive Security, IT Operations, and Security Architecture teams.
* Develops productive relationships across regions and business units to expand telemetry coverage.
* Works collaboratively with compliance, risk, and audit to align monitoring with enterprise governance.
* Anticipates and manages conflicts in data ownership, tool coverage, and priorities, resolving them constructively.
* Promotes knowledge-sharing across security teams, reducing silos and strengthening collective defense.
People Development & Leadership
* Defines the vision and purpose of the CCM function, instilling clarity and purpose for the team.
* Coaches and mentors analysts, engineers, and contractors to expand monitoring expertise.
* Provides stretch opportunities for team members to develop technical and leadership skills.
* Balances empowerment and oversight — ensuring autonomy in monitoring activities while maintaining governance discipline.
* Leads quality team meetings, defines clear objectives, and ensures alignment to SecOPS priorities.
* Provides frequent developmental feedback, fostering a culture of continuous learning and improvement.
Boston Consulting Group is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, age, religion, sex, sexual orientation, gender identity / expression, national origin, disability, protected veteran status, or any other characteristic protected under national, provincial, or local law, where applicable, and those with criminal histories will be considered in a manner consistent with applicable state and local laws.
BCG is an E - Verify Employer. (Click here )( for more information on E-Verify.
Threat Intelligence Expert
Posted 3 days ago
Job Viewed
Job Description
We are actively seeking an experienced Threat Intelligence Expert to join a leading cybersecurity function within a fast-paced enterprise environment. You’ll play a key role in identifying emerging threats , analysing adversary tactics , and translating intelligence into actionable security measures to protect the organization’s digital assets.
This is a hands-on technical and analytical role ideal for candidates with deep expertise in cyber threat intelligence (CTI) , threat hunting , open-source intelligence (OSINT) , and MITRE ATT&CK framework .
Job Responsibilities
Collect, analyse, and interpret threat data from internal and external intelligence sourcesProduce actionable intelligence reports on indicators of compromise (IOCs) , TTPs , and threat actor behaviourMonitor dark web and underground forums for threat actor activity relevant to the organizationCollaborate with SOC and incident response teams to provide context and enrichment during investigationsDevelop and maintain intelligence requirements aligned with business and security goalsMaintain threat intelligence platforms (TIPs) and use tools like MISP , Anomali , or Recorded Future Track and communicate emerging threats, vulnerabilities, and geopolitical risksMap adversary behaviour to the MITRE ATT&CK framework for detection improvementsRequirementsRequired Skills
Deep knowledge of cyber threat intelligence methodologies Familiarity with frameworks such as MITRE ATT&CK , STIX/TAXII , Diamond Model Proficiency in using threat intelligence platforms (TIPs) Strong analytical skills and ability to interpret large datasetsExcellent written and verbal communication skills for report writing and stakeholder updatesExperience with OSINT tools (e.g., Maltego, Shodan, SpiderFoot)9. Desired Skills
Certifications: GCTI , GCIA , GCFA , CISSP , or Security+ Programming/scripting knowledge (Python, PowerShell)Exposure to threat modelling techniques and risk assessmentsUnderstanding of APT groups , malware families , and nation-state threats Experience working in regulated environments (e.g., finance, healthcare) BenefitsJob Benefits
Competitive salary and annual bonusHybrid/remote working flexibilityCompany-sponsored certifications and training (SANS, GIAC, etc.)Private health and dental insurancePension scheme and generous annual leaveAccess to cutting-edge threat intel tools and platformsCareer development in one of the fastest-growing areas of cybersecuritySecurity Operations Manager - Full Time - London
Posted 2 days ago
Job Viewed
Job Description
Regional Security Manager – Healthcare Medirest
Salary: Competitive plus benefits
Are you an experienced Security Leader with a passion for protecting people, property, and patient care? Do you thrive in high-pressure environments where no two days are the same? We are looking for a Security Operations Manager to join our Healthcare division, leading Security Services across NHS Trusts.
This is a pivotal role where you’ll combine leadership, compliance, and innovation to deliver a safe, effective, and high-performing Security operation.
What you’ll be doingLeading, motivating, and developing Security teams across your region, ensuring they are well-trained, compliant, and delivering a first-class service.
Overseeing security audits, risk assessments, and compliance with SIA, Health & Safety, CQC, Mental Health Act and wider NHS security standards.
Delivering security training programmes to frontline and clinical staff, supporting violence and aggression management.
Building strong relationships with NHS Trusts, clients, and stakeholders, promoting security awareness and best practice.
Driving continuous improvement and operational excellence across services.
Supporting succession planning, people development, and talent pipelines to future-proof our security function.
Providing performance management data and representing Medirest at key meetings and working groups.
Extensive knowledge of the Security industry and NHS security procedures.
Frontline SIA licence (essential) – CCTV licence desirable.
Proven leadership experience managing large or regional teams.
Strong knowledge of compliance and regulatory requirements.
Experience delivering training and supporting professional development.
Excellent communication, organisational, and stakeholder engagement skills.
Flexible to travel nationally with some overnight stays.
Competitive salary and benefits package.
Opportunities for training, development, and progression.
The chance to make a real impact on patient care and staff safety.
Be part of Compass Group, a global organisation committed to excellence in support services.