Greater Bristol Area, United Kingdom Hybrid / WFH Options
Orbis Group
for you! The role: A cloud security scale-up, founded by cyber security SME's, are searching for a Threat Intelligence Lead to conduct malwareanalysis, lead threat intelligence research, and build internal tooling for security projects. You will be of the research team that specifically focuses on … team if/when needed. Desirable experience: 6+ months of experience working in a public cloud environment (AWS, GCP or Azure) Proven experience in malware reverse engineering Experience with static/dynamic malwareanalysis tools Evidence of giving back to the security community via blogs, podcasts, or more »
point on monitoring of corporate environment to identify security issues or incidents (Threat Hunting) Manage and mentor the security analyst, (monitoring, Investigation, root cause analysis of Security alerts from multiple information sources. Including, but not limited to Darktrace, LogPoint, WithSecure, Mimecast, while ensuring the team stays relevant to the … analyse escalated security matters, identify methods and solutions in response to security related queries including the ones, submitted by end users. Perform root cause analysis of security incidents and participate in post-incident reviews to provide practical recommendations for improving the organisation's threat detection and incident response capabilities … and overall security posture Perform malwareanalysis and digital forensics where appropriate Drive internal phishing campaigns (KnowBe4 platform) and work with management and HR - Training to raise Cyber awareness within the corporate environment, (new hire inductions, periodic training, etc) Own maintenance, renewal and distribution of SSL Certificates Manage more »
Professional certifications in information security (e.g., ISACA, BCS, CIPP, ITIL, ISC2). Experience with scripting and programming languages. Expertise in threat hunting methodologies and malware analysis. If you feel like this is a good match for your skill set and experience, please apply to the role for an initial more »
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
depth security assessments across a variety of products and services. Your next project could be anything from a secure systems design, static and dynamic analysis of a multi-node microservice infrastructure, to writing a fuzzer for an undocumented network protocol or the grammar of a new programming language, or … analysis and reverse engineering of firmware used in the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for security Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing … years industry experience in software development Ability to perform manual source code reviews in one of the aforementioned languages, or assisted review with code analysis tools Hands-on experience in one or more of the following with an interest in doing full time research: cybersecurity consulting, security engineering, vulnerability more »
mentor other team members both technically and professional. Experience/essential and desired for successful job performance 4-6 years ‘hands-on’ IT Security analysis and engineering experience including securing systems, networks and infrastructure; operational support, including on-call experience.3+ years’ experience including combination of intrusion detection, malwareanalysis, forensics and/or incident response, particularly in cloud environments. Working knowledge of cloud environments such as AWS. Monitor, tune and develop technical IT Security controls and frameworks to ensure appropriate preparation, monitoring and response to threats Ensure a risk-based approach to IT Security is adopted more »
Herndon, Virginia, United States Hybrid / WFH Options
Sierra Nevada Corporation
response to any cyber threats against the organization. This person will work as part of a team of geographically dispersed analysts who support the analysis and investigations of cyber related incidents to include forensic level of data. Job location is any SNC office (Herndon, VA, Englewood, CO, Sparks, NV … Participate in an on-call rotation. Knowledge of various querying and programming languages such as KQL, SQL, PowerShell, and Python. Be able to interpret malwareanalysis output to determine indicators. Investigate and respond to cyber security incidents and implement forensic investigations. Research and evaluate emerging cyber security threats more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Sopra Steria Limited
need for escalation It would be great if you had: Knowledge of; Cloud, on-prem, SaaS, PaaS, IaaS environments Security incident response, code/malwareanalysis Strong coding skills CISSP-ISSEP (Information Systems Security Engineering Professional) Other Cyber/information Security qualification (e.g. CISSP, CCSP, CCNA, SABSA) If more »
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Lorien
business and its customers would also be an advantage. On top of this, you’ll bring: • Experience of end-to-end security response, including analysis of security events and incident escalation • The ability to perform triage and response activities along with root cause analysis on security incidents and … A background in cyber security and experience in security operations, including incident and event management experience • Knowledge of networking protocols and routing which includes malwareanalysis techniques • Excellent stakeholder management and interpersonal skills more »
Leeds, England, United Kingdom Hybrid / WFH Options
Anson McCade
team, focusing on supporting the defence of a major UK Critical National Infrastructure (CNI) organization. In this role, you will oversee the collation and analysis of Threat Intelligence (TI), ensuring the SOC (Security Operations Centre) is equipped with the necessary insights to proactively defend against cyber threats. The ideal … profiles and threat modelling, detailing detection and mitigation strategies. • Gather and maintain a set of TI requirements defining monitored threats and tracking criteria. • Conduct analysis and research to identify threat groups, motivations, capabilities, and infrastructure. Requirements: Technical: • Experience in developing threat intelligence products and conducting malware analysis. • Proficiency … threat assessments and defining threat intelligence requirements. • Advanced knowledge of Windows and Linux operating systems, networking concepts, and command-line usage. • Intermediate knowledge of malware behaviour, evasion techniques, and reverse engineering. Non-Technical: • Strong client-side consulting skills, including stakeholder engagement and effective communication. • Ability to adapt to different more »