at least 5 years in security monitoring, SOC leadership, or equivalent detection & response functions. * Proven track record of building or maturing monitoring capabilities (SIEM, SOAR, telemetry pipelines, UEBA, threat intel integration). * Knowledge of log ingestion, normalization, correlation, and enrichment processes. * Familiarity with leading monitoring technologies: Splunk, DataDog, Microsoft Defender, CrowdStrike Falcon, Azure/AWS/GCP telemetry, threat More ❯
solutions, regardless of industry or size. Our global team of over 100 professionals includes former federal law enforcement personnel, in-house security experts, Big 4 consultants, federal regulators, threat intel and dark web experts, etc. We have helped clients and partners for 10+ years across industries and geographies with the following services: Incident Response, Intelligence, and Investigations. End Point More ❯
platforms You will become an expert advisor. We will help you gain an expert level of subject matter knowledge within your market, and encourage you to proactively share insight, intel and use your knowledge to strengthen your relationships with your network Responsibilities As an Associate Consultant you will initially be candidate focused, working closely with Senior Consultants and help More ❯
generative AI that automatically regenerates real-time Live Event Briefs as events unfold. Learn more here . we recently launched our Agentic AI capability, what we’re calling our Intel Agents, that autonomously generates critical context for our clients on real-time events, threats, and risks allowing them to see the clearest, most accurate view of what’s happening More ❯
East London, London, United Kingdom Hybrid/Remote Options
A&O Shearman
continually evolving threat landscape, in support of A&O Shearmans strategy to lead where global complexity creates opportunity. In addition, you will have the opportunity to share and gain intel from the firms cybersecurity lawyers. The global team have experience advising clients on hundreds of incidents. Leveraging this experience, they feedback practical lessons learned into clients cyber risk management More ❯
Requirements Strong hands-on Linux administration experience (Red Hat, CentOS, or similar). Full server build capability - from hardware provisioning to OS installation and configuration. Understanding of AMD/Intel server hardware and common failure types. Solid networking fundamentals (TCP/UDP, LAN/WAN concepts). Experience with automation tooling, ideally Ansible. Scripting familiarity (Bash or Python) for More ❯
operational excellence. DPO-as-a-Service: Run DPIAs, maintain/advise on ROPA, oversee DSARs, and act as the liaison for regulator communications when needed. vCISO services: Provide threat-intel updates, board-level briefings, security roadmaps, and control-gap remediation plans for select clients. Client assurance: Complete security questionnaires, policy/evidence reviews, and guide clients through BCP/ More ❯