Be at the heart of actionFly remote-controlled drones into enemy territory to gather vital information.

Apply Now

Cyber Operations Lead/ Principle Engineer

Leap29
Newcastle upon Tyne
1 year ago
Applications closed

Related Jobs

View all jobs

Senior Structural Engineer

SailPoint ISC (Identity Security Cloud

IT Infrastructure Engineer

Security Engineer - Cloud / Soc 2 / ISO 27001

Network Engineer

Controls Systems Engineer

Job Title:Principle Engineer - Cyber Security Operations Lead

Location:Tyneside, Newcastle

Type:Full-Time, Permanent

Salary:£ 55.7k

We are seeking a Principle Engineer to join the Cyber Security team, who will be instrumental in managing and improving our technical cyber security defences. They will lead efforts in endpoint security, vulnerability management, alert triage, secure software development lifecycle, and network security. This role demands a proactive individual with a deep understanding of security technologies and a strategic approach to threat management.

Key Responsibilities:

Endpoint Security:

Lead the deployment, configuration, and management of endpoint security solutions. Monitor and respond to endpoint security incidents and threats. Conduct regular endpoint security assessments and audits to ensure compliance with security policies.

Vulnerability Management:

Perform regular vulnerability scans and assessments across all systems. Prioritise and remediate vulnerabilities in collaboration with IT and development teams. Develop and maintain a comprehensive vulnerability management program.

Alert Triage:

Monitor security alerts and incidents from various sources, including SIEM, IDS/IPS, and other security tools. Perform initial triage and analysis of security events to determine their severity and impact. Escalate and coordinate response efforts for high-priority incidents.

Secure SDLC:

Integrate security best practices into the software development lifecycle. Conduct security reviews and assessments of applications and code. Collaborate with development teams to ensure secure coding practices and design.

Network Security:

Monitor and protect the organisation's network infrastructure. Implement and manage network security measures, including firewalls, VPNs, and intrusion detection/prevention systems. Conduct network security assessments and penetration tests.

Qualifications:

Minimum of 4 years of experience in a SOC or technical cyber security role. Relevant certifications (e.g., CISSP, CISM, CEH, GIAC) are highly desirable. Strong knowledge of endpoint security technologies (e.g., EDR, antivirus). Proficiency in vulnerability management tools and processes. Experience with SIEM platforms and security alert triage. Strong understanding of secure SDLC practices and tools. Solid grasp of network security principles and technologies. Excellent analytical and problem-solving skills. Strong communication and collaboration abilities.

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Recruitment Trends 2025 (UK): What Job Seekers Must Know About Today’s Hiring Process

Summary: UK cyber security hiring has shifted from title‑led CV screens to capability‑driven assessments that emphasise incident readiness, cloud & identity security, detection engineering, governance/risk/compliance (GRC), measurable MTTR/coverage gains & secure‑by‑default engineering. This guide explains what’s changed, what to expect in interviews, & how to prepare—especially for SOC analysts, detection engineers, blue/purple teamers, penetration testers, cloud security engineers, DFIR, AppSec, GRC & security architecture. Who this is for: SOC & detection engineers, security operations leads, DFIR analysts, penetration testers/red teamers, purple teamers, AppSec/DevSecOps engineers, security architects, cloud security engineers, identity/IAM engineers, vulnerability managers, GRC/compliance specialists, product security & security programme managers targeting roles in the UK.

Why Cyber Security Careers in the UK Are Becoming More Multidisciplinary

Cyber security used to be viewed primarily as a technical discipline: firewalls, encryption, intrusion detection, penetration testing. In the UK today, it’s far broader. Organisations now face complex legal frameworks, ethical dilemmas, human-behaviour risks, communication challenges & usability hurdles. This shift means cyber security careers are becoming more multidisciplinary. From protecting NHS patient records to defending financial services, securing supply chains & safeguarding national infrastructure, cyber security now touches every sector. Employers increasingly want professionals who understand law, ethics, psychology, linguistics & design alongside traditional technical skills. In this article, we’ll explore why UK cyber security careers are expanding in this way, how these five disciplines shape the profession, and what job-seekers & employers need to know to thrive in this new landscape.

Cyber Security Team Structures Explained: Who Does What in a Modern Cyber Security Department

Cyber security has become a top priority for UK organisations of all sizes. From small businesses to financial institutions, healthcare providers, and government bodies, the risk of cyber attack is now a constant concern. Threats are more sophisticated, regulations more demanding, and customers more aware of data privacy than ever before. But defending against cyber threats isn’t simply about having the right tools — it’s about having the right team. A modern cyber security department relies on clearly defined roles and responsibilities to ensure that defences are proactive, incidents are managed swiftly, and compliance is maintained. This article explains the structure of a modern cyber security team, the roles you’ll typically find within it, how they collaborate, and what skills, qualifications, and salaries are expected in the UK job market.