Leeds, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
scalable, agnostic testing frameworks for use across agile delivery teams. Promote best practices including Test-Driven Development (TDD) , Behaviour-Driven Development (BDD) , and AI/ML-based testing for anomalydetection and performance validation. Mentor and upskill test and engineering teams in modern, automation-first testing approaches. Collaborate across teams to ensure quality and consistency throughout the More ❯
of different data sources into our Lakehouse (Databricks on Azure Data Lake) and its architecture. Be responsible for the reliability and quality of data in the Data Lake (including anomalydetection, data quality checks, reconciliations, access, permission, and retention management, PII treatment, and back-up/restoration plans). Set up and manage platform technologies to support More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
BAE Systems Digital Intelligence
improvements and delivering them Be a point of contact for intrusion analysis, forensics and Incident Response queries. Able to provide root cause analysis of non-standard analytic findings and anomaly detections for which a playbook does not yet exist. Responsible for ensuring that during times of reduced capacity that all ADHOC and regular products are completed and are at … used within the Cyber Threat Intelligence Domain, Including the Cyber Kill Chain and MITRE ATT&CK Development of new analytics and playbooks that result in creation of new detection rules/analytics Requirements Technical 3+ years’ experience in Cyber Threat Intelligence, and conducting research and investigating cyber threats in a technical capacity Experience in technical incident response and More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
Babcock
improvements and delivering them Be a point of contact for intrusion analysis, forensics and Incident Response queries. Able to provide root cause analysis of non-standard analytic findings and anomaly detections for which a playbook does not yet exist. Responsible for ensuring that during times of reduced capacity that all ADHOC and regular products are completed and are at … used within the Cyber Threat Intelligence Domain, Including the Cyber Kill Chain and MITRE ATT&CK Development of new analytics and playbooks that result in creation of new detection rules/analytics Requirements Technical 3+ years' experience in Cyber Threat Intelligence, and conducting research and investigating cyber threats in a technical capacity Experience in technical incident response and More ❯
other SOCs and cybersecurity researchers to identify analytics, threat intelligence, and tradecraft that benefit the Blue Team. Communicate funding and prioritization suggestions and lead implementation when needed. Develop complex, anomaly-based KQL analytics and playbooks for detection in M365, Linux, and Windows environments. Review open-source research on threats affecting cloud services and VMs, prioritizing and implementing … relevant findings. Research vulnerabilities, produce proof-of-concept exploits, and emulate adversary TTPs for training and detection evaluation. Review red team and pentest findings to improve detection rules. Provide forensic support and threat emulation to improve alert triage and accuracy. Identify gaps in SOC processes, data collection, and analysis, demonstrating the need for improvements through scenarios … AWS knowledge preferred. Understanding of Windows Active Directory and Windows OS fundamentals. Networking fundamentals experience. Experience with CI/CD and source control systems. Experience in developing malware and anomaly detections. Use of statistical methods for anomaly detection. Proficiency with Microsoft Sentinel and/or XDR. Strong skills in writing complex KQL analytics/searches. Awareness of current More ❯
months, with a high likelihood of extension Start date: Ideally immediate (they may wait up to 4 weeks for the right candidate) Skills required: NLP, Modelling, Python, SQL, Databricks, AnomalyDetection You will be joining their customer security team, which uses machine learning to detect anomalies and erroneous activity on customer accounts. Your role will involve building More ❯