Warwick, Warwickshire, West Midlands, United Kingdom
La Fosse
CyberThreat Intelligence Analyst We are helping a household name that impacts all of our lives to develop new cyber capabilities from the ground up. They're looking for a CyberThreat Intelligence analyst to help out with their Threat Intell … function and keep them ahead of the curve when it comes to threat management and security automation. This is a rare opportunity to join a large organisation and play a pivotal role in building new capabilities with no legacy systems in place and you'll have the chance to … shape the future of their cybersecurity operations from the very beginning. We're looking for candidates with experience in: Threat management and modelling TTPs Cyberthreat intelligence tools and technologies. Staying up to date with new and emerging threats Details: Location: West Midlands – 2x a month More ❯
worcester, midlands, United Kingdom Hybrid / WFH Options
Cloud Decisions
security previews, and frontline support. You'll work at the sharp end of cyber defence, directly contributing to investigations involving nation-state threat actors (including IR, CH, and NK based campaigns) while refining your craft across enterprise-scale log ingestion and customised Sentinel integration engineering that will … wide log onboarding into Microsoft Sentinel – deploying standard and custom connectors, Function Apps, and parsers to build tailored SIEM solutions that drive real-world threat detection and response. Log ingestion at scale across numerous hybrid and multi-cloud environments Enhance custom Function Apps and ingestion pipelines Parse, normalise, and … optimise log telemetry to ensure precision and cost control Partner with IR teams on real attacks – tuning rules against live threat actor activity Sync closely with Microsoft teams to build cutting-edge detection capabilities Contribute to internal knowledge base and help shape engineering standards What's needed? Experience building More ❯
birmingham, midlands, United Kingdom Hybrid / WFH Options
Cloud Decisions
security previews, and frontline support. You'll work at the sharp end of cyber defence, directly contributing to investigations involving nation-state threat actors (including IR, CH, and NK based campaigns) while refining your craft across enterprise-scale log ingestion and customised Sentinel integration engineering that will … wide log onboarding into Microsoft Sentinel – deploying standard and custom connectors, Function Apps, and parsers to build tailored SIEM solutions that drive real-world threat detection and response. Log ingestion at scale across numerous hybrid and multi-cloud environments Enhance custom Function Apps and ingestion pipelines Parse, normalise, and … optimise log telemetry to ensure precision and cost control Partner with IR teams on real attacks – tuning rules against live threat actor activity Sync closely with Microsoft teams to build cutting-edge detection capabilities Contribute to internal knowledge base and help shape engineering standards What's needed? Experience building More ❯
shrewsbury, midlands, United Kingdom Hybrid / WFH Options
Cloud Decisions
security previews, and frontline support. You'll work at the sharp end of cyber defence, directly contributing to investigations involving nation-state threat actors (including IR, CH, and NK based campaigns) while refining your craft across enterprise-scale log ingestion and customised Sentinel integration engineering that will … wide log onboarding into Microsoft Sentinel – deploying standard and custom connectors, Function Apps, and parsers to build tailored SIEM solutions that drive real-world threat detection and response. Log ingestion at scale across numerous hybrid and multi-cloud environments Enhance custom Function Apps and ingestion pipelines Parse, normalise, and … optimise log telemetry to ensure precision and cost control Partner with IR teams on real attacks – tuning rules against live threat actor activity Sync closely with Microsoft teams to build cutting-edge detection capabilities Contribute to internal knowledge base and help shape engineering standards What's needed? Experience building More ❯
west midlands, midlands, United Kingdom Hybrid / WFH Options
Cloud Decisions
security previews, and frontline support. You'll work at the sharp end of cyber defence, directly contributing to investigations involving nation-state threat actors (including IR, CH, and NK based campaigns) while refining your craft across enterprise-scale log ingestion and customised Sentinel integration engineering that will … wide log onboarding into Microsoft Sentinel – deploying standard and custom connectors, Function Apps, and parsers to build tailored SIEM solutions that drive real-world threat detection and response. Log ingestion at scale across numerous hybrid and multi-cloud environments Enhance custom Function Apps and ingestion pipelines Parse, normalise, and … optimise log telemetry to ensure precision and cost control Partner with IR teams on real attacks – tuning rules against live threat actor activity Sync closely with Microsoft teams to build cutting-edge detection capabilities Contribute to internal knowledge base and help shape engineering standards What's needed? Experience building More ❯
coventry, midlands, United Kingdom Hybrid / WFH Options
Cloud Decisions
security previews, and frontline support. You'll work at the sharp end of cyber defence, directly contributing to investigations involving nation-state threat actors (including IR, CH, and NK based campaigns) while refining your craft across enterprise-scale log ingestion and customised Sentinel integration engineering that will … wide log onboarding into Microsoft Sentinel – deploying standard and custom connectors, Function Apps, and parsers to build tailored SIEM solutions that drive real-world threat detection and response. Log ingestion at scale across numerous hybrid and multi-cloud environments Enhance custom Function Apps and ingestion pipelines Parse, normalise, and … optimise log telemetry to ensure precision and cost control Partner with IR teams on real attacks – tuning rules against live threat actor activity Sync closely with Microsoft teams to build cutting-edge detection capabilities Contribute to internal knowledge base and help shape engineering standards What's needed? Experience building More ❯
telford, midlands, United Kingdom Hybrid / WFH Options
Cloud Decisions
security previews, and frontline support. You'll work at the sharp end of cyber defence, directly contributing to investigations involving nation-state threat actors (including IR, CH, and NK based campaigns) while refining your craft across enterprise-scale log ingestion and customised Sentinel integration engineering that will … wide log onboarding into Microsoft Sentinel – deploying standard and custom connectors, Function Apps, and parsers to build tailored SIEM solutions that drive real-world threat detection and response. Log ingestion at scale across numerous hybrid and multi-cloud environments Enhance custom Function Apps and ingestion pipelines Parse, normalise, and … optimise log telemetry to ensure precision and cost control Partner with IR teams on real attacks – tuning rules against live threat actor activity Sync closely with Microsoft teams to build cutting-edge detection capabilities Contribute to internal knowledge base and help shape engineering standards What's needed? Experience building More ❯
wolverhampton, midlands, United Kingdom Hybrid / WFH Options
Cloud Decisions
security previews, and frontline support. You'll work at the sharp end of cyber defence, directly contributing to investigations involving nation-state threat actors (including IR, CH, and NK based campaigns) while refining your craft across enterprise-scale log ingestion and customised Sentinel integration engineering that will … wide log onboarding into Microsoft Sentinel – deploying standard and custom connectors, Function Apps, and parsers to build tailored SIEM solutions that drive real-world threat detection and response. Log ingestion at scale across numerous hybrid and multi-cloud environments Enhance custom Function Apps and ingestion pipelines Parse, normalise, and … optimise log telemetry to ensure precision and cost control Partner with IR teams on real attacks – tuning rules against live threat actor activity Sync closely with Microsoft teams to build cutting-edge detection capabilities Contribute to internal knowledge base and help shape engineering standards What's needed? Experience building More ❯
stoke-on-trent, midlands, United Kingdom Hybrid / WFH Options
Cloud Decisions
security previews, and frontline support. You'll work at the sharp end of cyber defence, directly contributing to investigations involving nation-state threat actors (including IR, CH, and NK based campaigns) while refining your craft across enterprise-scale log ingestion and customised Sentinel integration engineering that will … wide log onboarding into Microsoft Sentinel – deploying standard and custom connectors, Function Apps, and parsers to build tailored SIEM solutions that drive real-world threat detection and response. Log ingestion at scale across numerous hybrid and multi-cloud environments Enhance custom Function Apps and ingestion pipelines Parse, normalise, and … optimise log telemetry to ensure precision and cost control Partner with IR teams on real attacks – tuning rules against live threat actor activity Sync closely with Microsoft teams to build cutting-edge detection capabilities Contribute to internal knowledge base and help shape engineering standards What's needed? Experience building More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯
within the Microsoft 365 ecosystem. The ideal candidate will have deep technical expertise in M365 security capabilities and a strong understanding of modern cyberthreats, compliance requirements, and enterprise security architecture. Key Responsibilities: Design and implement security controls across E5 Microsoft 365 services (e.g., Endpoints; Exchange Online, SharePoint More ❯
Element has an opportunity for a Senior Cyber Engineer to become part of our growing Cyber Engineering Services. A successful candidate for the Cyber Engineer role will possess a solid foundation as a security engineer, responsible for ensuring the security of complex global environments … expertise in application, cloud, and infrastructure domains. In this hybrid role you will design and implement highly secure technical solutions to protect against cyberthreats and potential cyber-attacks. The role will be focused on detection engineering within the strategic Element security tooling. Core Responsibilities Assist … in the design and implementation of technical solutions and security toolsets to address security vulnerabilities, mitigate cyberthreats, and automate tasks. Contribute to the planning, implementation, and management of the security operations tooling roadmap. Collaborate on the engineering, implementation, management, monitoring, and upgrades of cyber security More ❯
Element has an opportunity for a Senior Cyber Engineer to become part of our growing Cyber Engineering Services. A successful candidate for the Cyber Engineer role will possess a solid foundation as a security engineer, responsible for ensuring the security of complex global environments … expertise in application, cloud, and infrastructure domains. In this hybrid role you will design and implement highly secure technical solutions to protect against cyberthreats and potential cyber-attacks. The role will be focused on detection engineering within the strategic Element security tooling. Core Responsibilities Assist … in the design and implementation of technical solutions and security toolsets to address security vulnerabilities, mitigate cyberthreats, and automate tasks. Contribute to the planning, implementation, and management of the security operations tooling roadmap. Collaborate on the engineering, implementation, management, monitoring, and upgrades of cyber security More ❯
Element has an opportunity for a Senior Cyber Engineer to become part of our growing Cyber Engineering Services. A successful candidate for the Cyber Engineer role will possess a solid foundation as a security engineer, responsible for ensuring the security of complex global environments … expertise in application, cloud, and infrastructure domains. In this hybrid role you will design and implement highly secure technical solutions to protect against cyberthreats and potential cyber-attacks. The role will be focused on detection engineering within the strategic Element security tooling. Core Responsibilities Assist … in the design and implementation of technical solutions and security toolsets to address security vulnerabilities, mitigate cyberthreats, and automate tasks. Contribute to the planning, implementation, and management of the security operations tooling roadmap. Collaborate on the engineering, implementation, management, monitoring, and upgrades of cyber security More ❯
Element has an opportunity for a Senior Cyber Engineer to become part of our growing Cyber Engineering Services. A successful candidate for the Cyber Engineer role will possess a solid foundation as a security engineer, responsible for ensuring the security of complex global environments … expertise in application, cloud, and infrastructure domains. In this hybrid role you will design and implement highly secure technical solutions to protect against cyberthreats and potential cyber-attacks. The role will be focused on detection engineering within the strategic Element security tooling. Core Responsibilities Assist … in the design and implementation of technical solutions and security toolsets to address security vulnerabilities, mitigate cyberthreats, and automate tasks. Contribute to the planning, implementation, and management of the security operations tooling roadmap. Collaborate on the engineering, implementation, management, monitoring, and upgrades of cyber security More ❯
Element has an opportunity for a Senior Cyber Engineer to become part of our growing Cyber Engineering Services. A successful candidate for the Cyber Engineer role will possess a solid foundation as a security engineer, responsible for ensuring the security of complex global environments … expertise in application, cloud, and infrastructure domains. In this hybrid role you will design and implement highly secure technical solutions to protect against cyberthreats and potential cyber-attacks. The role will be focused on detection engineering within the strategic Element security tooling. Core Responsibilities Assist … in the design and implementation of technical solutions and security toolsets to address security vulnerabilities, mitigate cyberthreats, and automate tasks. Contribute to the planning, implementation, and management of the security operations tooling roadmap. Collaborate on the engineering, implementation, management, monitoring, and upgrades of cyber security More ❯
Element has an opportunity for a Senior Cyber Engineer to become part of our growing Cyber Engineering Services. A successful candidate for the Cyber Engineer role will possess a solid foundation as a security engineer, responsible for ensuring the security of complex global environments … expertise in application, cloud, and infrastructure domains. In this hybrid role you will design and implement highly secure technical solutions to protect against cyberthreats and potential cyber-attacks. The role will be focused on detection engineering within the strategic Element security tooling. Core Responsibilities Assist … in the design and implementation of technical solutions and security toolsets to address security vulnerabilities, mitigate cyberthreats, and automate tasks. Contribute to the planning, implementation, and management of the security operations tooling roadmap. Collaborate on the engineering, implementation, management, monitoring, and upgrades of cyber security More ❯
Element has an opportunity for a Senior Cyber Engineer to become part of our growing Cyber Engineering Services. A successful candidate for the Cyber Engineer role will possess a solid foundation as a security engineer, responsible for ensuring the security of complex global environments … expertise in application, cloud, and infrastructure domains. In this hybrid role you will design and implement highly secure technical solutions to protect against cyberthreats and potential cyber-attacks. The role will be focused on detection engineering within the strategic Element security tooling. Core Responsibilities Assist … in the design and implementation of technical solutions and security toolsets to address security vulnerabilities, mitigate cyberthreats, and automate tasks. Contribute to the planning, implementation, and management of the security operations tooling roadmap. Collaborate on the engineering, implementation, management, monitoring, and upgrades of cyber security More ❯
Element has an opportunity for a Senior Cyber Engineer to become part of our growing Cyber Engineering Services. A successful candidate for the Cyber Engineer role will possess a solid foundation as a security engineer, responsible for ensuring the security of complex global environments … expertise in application, cloud, and infrastructure domains. In this hybrid role you will design and implement highly secure technical solutions to protect against cyberthreats and potential cyber-attacks. The role will be focused on detection engineering within the strategic Element security tooling. Core Responsibilities Assist … in the design and implementation of technical solutions and security toolsets to address security vulnerabilities, mitigate cyberthreats, and automate tasks. Contribute to the planning, implementation, and management of the security operations tooling roadmap. Collaborate on the engineering, implementation, management, monitoring, and upgrades of cyber security More ❯