developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
Leatherhead, England, United Kingdom Hybrid / WFH Options
Zest
are essential in demonstrating our commitment to information security to our clients. Security Training: Deliver information security awareness training for all employees. Security Operations ThreatIntelligence: Stay abreast of the latest cybersecurity threats and trends to inform strategic security planning. Security Infrastructure: Oversee the installation and maintenance of more »
designing, developing, and maintaining our security information and event management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threat detection, incident response, and overall security posture. What you’ll be doing • Data Ingestion and Enrichment: o Configure Elasticsearch pipelines for data ingestion from … various sources, primarily from Kafka o Enhance data enrichment by integrating threatintelligence feeds and contextual information. • SIEM Solution Development: o Collaborate with security analysts and architects to design and implement SIEM solutions using Elasticsearch. o Optimize SIEM rules, alerts, and dashboards for efficient threat detection. • Query more »
audits, certifications, and provide consultancy support. Utilise automation to enhance security posture and response capabilities. Liaise with stakeholders to enforce network security policies. Utilise threatintelligence to proactively defend against threats. Mentor junior security professionals and support incident response. Qualifications/Skills Required: Bachelor’s degree in Computer more »
role as this vendor looks to expand their offerings across the UK and Central Europe. We are looking for someone with experience in cyber threatintelligence sales who has taken ownership of the entire sales process, from cradle to grave. We are looking to speak with problem solvers … business growth Your sales experience is from dealing with leading enterprise companies or organisations, communicating and closing deals with CISOs, CSOs, CIOs, Heads of Intelligence or equivalent level of seniority Positive, energetic and driven by achieving personal and company/team success You enjoy working in a fast-paced more »
of security tools such as SIEM, Firewalls and Cloud Security to monitor systems Providing Windows Server and Network Support Assess and respond to external threatintelligence reports Support ISO27001, Cyber Essentials Plus and other internal and external audit programme Implement and improve technical processes to create efficient and more »
City of London, London, United Kingdom Hybrid / WFH Options
Robert Half
tools for affirmative and non-affirmative coverages. The role includes responsibility for: Lead the gathering of information and analysis of material for insurance market intelligence, collaborating closely with the Senior Cyber Specialist Help deliver cyber training to our cyber insurance and cyber risk community. Monitor and maintain an understanding … governance forums for our community. Stakeholder management including regular communication measures appropriate for the target groups. Desired Skills: Ability to collect, analyse, and disseminate threatintelligence, both actionable and strategic Fundamental knowledge of cyber insurance At least three years' relevant professional experience Excellent Microsoft Office Skills, being able more »
point for Cyber Security across BAE Systems PLC’s global business, with members of the team working across GRC, Training and Awareness, Security Architecture, ThreatIntelligence and Incident Response.Why BAE Systems?This is a place where you’ll be able to make a real difference. You’ll be more »
teamIdentifying vulnerabilities, building exploits, developing reusable attack componentsWriting reports after each engagementTake ownership for mentoring, coaching and leading this new teamOperations will emulate real threat actors and target cutting-edge technology in Starling Bank’s platform as well as ranging across the endpoint estate. You will use emerging threatintelligence to inform and develop effective attacks.You will be an early member of the team and will take a lead role in shaping the growth and evolution of the team.RequirementsYou will have:Relevant certification (e.g. CSSAS, CSSAM, OSCP, OSCE, CRT, CCT, or similar)Significant Red Team experience and more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
have a broad remit ensuring high availability and performance, and currently have a particular focus on security system efficiency, monitoring and sustainability, looking at threatintelligence, IAM, data and application security across the Kubernetes and Linux based environments. They are very open to background, but tend to look more »
s largest networks with data centers in 102 cities worldwide.What you'll doTackling real world security problems that affect our customers, building & leveraging massive threatintelligence data, with the help of data science and machine learning, and finally building scalable & performant distributed software that runs on thousands of more »
forensic data and physical equipment Act as incident responder for potential incident identified Ability to work under pressure In-depth understanding of the cyber threat landscape and advances adversary tactics Conduct security assessments regularly to identify vulnerabilities and performing risk analysis. Analyse the breach to reach the root cause. … Monitoring/SOC documentation, processes and procedures and ensure currency. Skills and Experiences Ability to work under pressure In-depth understanding of the cyber threat landscape and advances adversary tactics The role requires an intermediate knowledge and experience of Linux; Windows; Azure; AWS; Elastic Stack; Tennable; Threat Intel more »
of enterprise security systems including shift rotations and hand-offs.Work closely with Managed Security Providers (MSP) to maintain runbooks, escalation procedures, and consume available threat intelligence.Utilize detective controls to develop rules and alerts to drive security monitoring.Perform hunt activities across our log aggregation and SIEM platforms.Recommend, test, tune and … Security Incident Response activities for the Firm’s environment.Enforce security policies and procedures by administering and monitoring appropriate systems, events and answering client queries.Perform threat and vulnerability management functions including vulnerability scans and/or analyze results of scans and assist with remediation as required.Collaborate with the Information Security more »
Harlow, London, United Kingdom Hybrid / WFH Options
Raytheon
Operations Centre. Main Duties Responding to requests from SOC to tune SIEM, IDS and associated tooling in an effective and timely manner. Working with threat management teams and liaising directly with Network and Data Centre teams to ensure Network architecture, Security Zone configuration and deployment of sensors and remediation … or Python. Experience of working in MOD and/or other regulated industries i.e. banking, telecommunications. Experience of use case development and implementation, leveraging threat intelligence. An understanding of designing and implementing secure systems to HMG security requirements. You will be a self-starter with the ability to prioritise more »
forensic data and physical equipment Act as incident responder for potential incident identified Ability to work under pressure In-depth understanding of the cyber threat landscape and advances adversary tactics Conduct security assessments regularly to identify vulnerabilities and performing risk analysis. Analyse the breach to reach the root cause. … Monitoring/SOC documentation, processes and procedures and ensure currency. Skills and Experiences Ability to work under pressure In-depth understanding of the cyber threat landscape and advances adversary tactics The role requires an intermediate knowledge and experience of Linux; Windows; Azure; AWS; Elastic Stack; Tennable; Threat Intel more »
firms enterprise estate. Responsibilities Own and consistently develop the monitoring detection and response tooling, automating and fine-tuning wherever possible. Utilize and ingest relevant threat intel feeds mapped out against their estate and MITRE ATT&CK framework Perform hands-on security threat modelling, risk assessment and vulnerability remediation more »
ourselves faced with a whole host of new security threats. So wouldn't being part of one of the first AI Security Analytics/intelligence software would be awesome?We are over the moon to be working with this self-funded, highly profitable start-up whose main focus is … and maintaining the core of this brand-new AI platform.As a Snr Java Engineer, you can expect to;Work heavily within the product squad (Threat/market intelligence)Be a key figure within the core platform teamDesign and develop Java & Python-based web appsDrive new features and improvements more »
Manchester Area, United Kingdom Hybrid / WFH Options
esure Group
on financial crime to inform strategic priorities and minimize financial loss. This includes delivering regular reports to Executive Management and relevant risk committees. Monitoring threat and risk trends to direct financial crime strategy, prioritise initiatives, and advise risk discussions. Leading projects to improve the company's ability to mitigate … crime. Improving detection solutions and operational procedures to enhance fraud detection rates and reduce financial loss. Developing team capabilities and processes for utilising external intelligence to increase fraud detection and inform strategy. Ensuring efficient procedures for responding to law enforcement inquiries to minimise operational impact and derive financial benefits. … regulatory and reputational compliance risks. Maintaining high-quality communications with Financial Crime business leaders Designing and implementing procedures to handle a large volume of intelligence items. Managing data collation and analysis from multiple departments and data sources across the company. Identifying financial crime threats, trends, or gap closures and more »