National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Cyber Security Engineer

Luton
4 days ago
Create job alert

The Cybersecurity team, within the IT department, is responsible for information and Cybersecurity. Responsibilities include information and cybersecurity risk management, and ensuring compliance to CAA, NIS and ISO27001 standards. The team also works closely with our majority shareholders, and partners, such as retailers, ground handlers, as well as suppliers, to ensure a joined-up approach to information and cyber security.

We are seeking a highly skilled and motivated IT Cyber Security Engineer, with a passion for protecting digital assets against cyber threats, to join our dynamic team. The successful candidate will have a strong technical background and a thorough understanding of IT systems, which is essential for effectively securing our infrastructure, systems, and networks. Expertise in information security, risk management and compliance is essential, as is a commitment to defending against cyber threats and integrating security across all layers of our IT environment to protect organisational data and technology.

This role focuses on detecting, investigating, and responding to cybersecurity threats and incidents, while also managing BAU security tasks, ongoing maintenance, supporting projects, and assisting with regulatory compliance to encourage continual enhancement of our IT security environment.

Key responsibilities and accountabilities:

  • Endpoint monitoring and analysis.

  • Malware analysis and forensics research.

  • Understanding/ differentiation of intrusion attempts and false positives.

  • Lead investigations into security breaches, incidents, or suspicious activities and provide incident reports to stakeholders.

  • Enforce security policies, procedures, and guidelines for all IT systems and operations.

  • Provide recommendations for improving security practices to meet evolving regulatory and organisational needs.

  • Vulnerability identification & mitigation/remediation.

  • Advise incident responders & other teams on cybersecurity threats.

  • Triage security events and incidents and apply containment and mitigation/remediation strategies.

  • Collaborate with other IT teams to ensure seamless security integration with infrastructure, applications, and services.

  • Maintain comprehensive documentation related to security configurations, incident reports, audits, and compliance activities.

  • Proactively monitor the performance of systems and make regular routine inspections of installed equipment, and take corrective avoidance actions to prevent wider problems.

  • Function as the point of escalation for the Service Desk for security-related tickets.

  • Analysis of weekly vulnerability scans and update relevant records.

  • Incident readiness and handling as part of the Computer Security Incident Response team (CSIRT).

  • Monitor and analyse security logs from various systems (including SIEM) and network devices to identify potential threats and vulnerabilities.

    Knowledge, skills & experience required:

    Essential

  • Bachelor's degree in computer science, Information Technology, Cyber Security, or a related field.

  • 5+ years of experience in cybersecurity, with a strong understanding of network protocols and security tools.

  • A well-organised and structured approach to work planning, time allocation to tasks, and a flexible approach to daily routines to deliver the desired results.

  • An ambition to constantly learn new skills and develop knowledge, with an understanding that study time outside of working hours may be required for career development.

  • Credible knowledge/experience of Microsoft Windows operating systems, Active Directory, Exchange Server, Group policies, TCP/IP, DNS, DHCP and MS Azure/EntraID.

  • Capable of effectively multi-tasking, prioritising work, and managing competing interests.

  • Capable of analysing information technology logs and events sources preferred.

  • Working knowledge of data storage systems, data backup and restoration methods.

  • Understanding of cybersecurity tooling, its purpose and functionality (Anti-Malware, IDS/IPS, Web and Email Gateways, security analysis tools, web security tools, next generation firewalls/UTMs)

  • A collaborator with excellent work ethic, communication skills and a professional who maintains customer-service based approach.

  • Ability to work independently while managing support to a high standard.

  • Strong problem-solving and analytical skills, with the ability to work under pressure.

  • Contribute credibly to IT department's delivery of SLAs and other support targets.

  • Ability to analyse vulnerabilities, threats, designs, architectures, procedures, and ability to produce reports and communicate security intelligence.

  • Advanced knowledge of computer forensics; legal, government and jurisprudence as they relate to cybersecurity.

  • Knowledge of Cloud computing, computer network defence, identity management, privileged access management, incident management and network security.

  • Extensive experience within a NOC/SOC environment.

    Desirable

  • IT certifications such as CompTIA A+, Network+

  • Cyber certifications such as CISM, CISA, CEH, or CompTIA Security+

  • Understanding of regulatory frameworks and industry standards (e.g., NIS, NIST, ISO 27001, GDPR).

  • Experience in scripting or programming languages including PowerShell for automating security tasks.

    Person Specification:

  • Communication. Structures and conveys information and ideas effectively. Communicates to ensure they are understood by others, that they understand others and share information with colleagues at all levels.

  • Customer Focus. Understands what the customer needs and then works to exceed their expectations and meeting their individual needs.

  • Achieving results. Knows what needs to be achieved by when. Anticipates obstacles. Motivates self and others to overcome barriers and achieve results.

  • Personal Responsibility & Credibility. Take personal responsibility for making things happen and achieving results, working with their line manager. Displays commitment, accountability and conscientiousness.

  • Planning & organising. Identifies a goal and puts in place a sequence of steps to ensure priorities are delivered on time.

  • Team Focus. Develops effective working relationships inside and outside traditional boundaries to achieve organisational goals.

    Connect2Employment is a trading style of Luton & Kent Commercial Services LLP - A joint venture between Luton Borough Council & Commercial Services Kent Ltd. Connect2Employment is an equal opportunities Employment Agency & Business. It positively encourages applications from all suitably qualified and eligible candidates

Related Jobs

View all jobs

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Find Hidden Cyber Security Jobs in the UK Using Professional Bodies like BCS, CIISec & More

The demand for skilled cyber security professionals in the UK has never been higher. With threats increasing in sophistication and frequency, organisations are urgently hiring ethical hackers, threat analysts, GRC specialists, and security architects. But many of the most valuable roles—particularly in government, defence, and critical infrastructure—are never publicly advertised. Instead, these jobs are shared behind the scenes through trusted networks, private communities, and professional bodies. In this article, we explore how to uncover hidden cyber security jobs in the UK using organisations like the BCS (The Chartered Institute for IT), CIISec (The Chartered Institute of Information Security), ISACA, and ISC² UK Chapter. We’ll show you how to use membership directories, special interest groups, CPD events and informal networks to gain early access to roles most people never see.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.