Malware Analysis Jobs in the South East

1 to 25 of 41 Malware Analysis Jobs in the South East

Senior SOC Analyst

Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
you can flex to meet your needs and training and development opportunities. What you will be doing: Monitor, triage, and investigate security incidents on critical client infrastructure. In-depth analysis of network traffic, logs, and system events to identify potential security threats and vulnerabilities. Provide Incident Response support. Maintain, improve and develop team knowledge of SOC tools, security operations … triage. Prepare reports for managed clients to both technical and non-technical audiences and continuously improve their content and presentation. Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. What you will bring : Experience in Security Operations Centre. Demonstrable experience of Managing Microsoft Sentinel or Splunk implementations. Knowledge and experience with Mitre Att … ck Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusion detection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Posted:

SOC Shift Lead

Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
you do need to be eligible for DV Clearance for this role. What you'll be doing: Monitor, triage, and investigate security incidents on critical client infrastructure. In depth analysis of network traffic, logs, and system events to identify potential security threats and vulnerabilities. Line Management. Maintain, improve and develop team knowledge of SOC tools, security operations and triage. … Analyse and improve detection rules and use cases in line with Mitre Att&ck and threat-informed defence. Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. Represent the SOC within Partners meetings. Ability to work shift from our office in Hemel Hempstead. What youll bring: Demonstrable experience in Security Operations Centre. People … of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Static malware analysis and reverse engineering. DV Clearance. Programming and scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Posted:

Security Operations Centre Shift Lead

Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/IP, WAN, LAN, SMTP, HTTP … FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malware analysis and reverse engineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity with additional SIEM technologies, especially QRadar Role & Responsibilities As a SOC Shift Lead , you will ensure … protecting client systems and guiding the team through sophisticated cyber defence challenges. Your responsibilities will include: Monitoring, triaging, and investigating alerts across host and network security systems Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities Providing line management to SOC Analysts developing capability and supporting career progression Enhancing team knowledge across SOC tooling More ❯
Employment Type: Permanent
Posted:

Cyber Security SOC Lead

Emsworth, Hampshire, United Kingdom
FINTEC recruit Ltd
sectors. The position involves driving operational improvements, working onsite, leading, and mentoring a small team. Responsibilities: Monitoring, triaging, and investigating alerts across host and network security systems Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities Providing mentoring and line management to SOC Analysts Enhancing team knowledge across SOC tooling, detection methodologies, and threat … environment Qualified at SOC Level 2 Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MITRE ATT&CK Framework for detection and threat analysis Experience of static malware analysis and reverse engineering (desirable) Scripting or programming with Python, Perl, Bash, PowerShell or C++ (desirable but not essential) SIEM technologies knowledge such More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Technical Incident Response Lead

Reading, England, United Kingdom
Hybrid / WFH Options
Liberty Global
will you be doing? Incident Response & Threat Handling Technical Lead for Incidents: Act as the go-to expert during complex cyber incidents, guiding containment, eradication, and recovery efforts. Forensic & Malware Analysis: Perform deep-dive investigations, including advanced malware analysis, extraction of Indicators of Compromise (IoCs), and mapping out Tactics, Techniques, and Procedures (TTPs). Cross-Functional … improve SOC efficiency and help pre-empt potential attacks. Security Architecture: Collaborate with cross-functional teams to enhance security controls and suggest improvements to our overall security architecture. Data Analysis: Leverage tools like Splunk, Elastic, and other analytical platforms to analyse diverse log sources, normalise data, and identify emerging threats across our infrastructure. Documentation & Reporting Incident Reporting: Create comprehensive More ❯
Posted:

Security Operations Centre (SOC) Manager

Chelmsford, Essex, South East, United Kingdom
Hybrid / WFH Options
Keystream Group Limited
into the corporate risk register and advising on appropriate mitigation strategies. Oversee the planning and execution of cyber audits and present findings to senior leadership. Provide expert guidance on malware analysis, secure access, identity management, and digital estate safeguarding. Build strong partnerships across Essex and beyond, working closely with peers, vendors, and regional bodies to stay ahead of More ❯
Employment Type: Permanent, Work From Home
Salary: £75,000
Posted:

Cyber Security Incident Responder

Slough, England, United Kingdom
JR United Kingdom
lead incident management, conduct investigations, identify root causes, and recommend remediation Collaborate with IT, Privacy, Legal teams, and stakeholders; report incident status Conduct post-incident reviews and digital forensics, malware analysis Develop cyber defence metrics and KPIs with senior management Stay updated on cyber threats and technologies Maintain relationships with law enforcement, vendors, and industry peers Key Skills … managing serious cyber incidents as a digital forensic responder Experience in large, complex enterprise environments Knowledge of security monitoring, intrusion detection, firewalls, antivirus, web proxies Technical expertise in networks, malware analysis, digital forensics Effective communication with senior stakeholders Company Overview: Element is a global testing, inspection, and certification company with over 9,000 employees across 30 countries. Our More ❯
Posted:

Cyber Security Incident Responder

Brighton, England, United Kingdom
JR United Kingdom
determine root causes, and recommend remediation. Collaborate with IT, Privacy, Legal teams, and senior stakeholders; report incident statuses. Conduct post-incident reviews for continuous improvement. Perform digital forensics and malware analysis on artefacts. Contribute to cyber defence metrics and KPIs. Stay updated on cyber threats and technologies. Develop relationships with external agencies and vendors for information sharing. Key … Incidents as a Digital Forensic Incident Responder. Working successfully in large, complex enterprise environments. Understanding security monitoring, intrusion detection, firewalls, anti-virus, and web proxies. Technical expertise in networks, malware analysis, digital forensics. Effective communication with senior stakeholders. Company Overview: Element is a rapidly growing testing, inspection, and certification company with over 9,000 employees across 270 sites More ❯
Posted:

Security Operations Center Analyst - L2 / L3

london, south east england, united kingdom
Bangura Solutions
operations key risk indicators and will be able to identify data points required to measure them. This role will suit a SOC Analyst with a strong technology background, advanced malware analysis, reverse engineering skills, and complex forensic investigations experience. The ideal candidate will be a Senior SOC Analyst within another Banking organisation. Minorities, women, LGBTQ+ candidates, and individuals More ❯
Posted:

Security Operations Center Analyst - L2 / L3

london (city of london), south east england, united kingdom
Bangura Solutions
operations key risk indicators and will be able to identify data points required to measure them. This role will suit a SOC Analyst with a strong technology background, advanced malware analysis, reverse engineering skills, and complex forensic investigations experience. The ideal candidate will be a Senior SOC Analyst within another Banking organisation. Minorities, women, LGBTQ+ candidates, and individuals More ❯
Posted:

Cyber Security Incident Responder

Milton Keynes, England, United Kingdom
JR United Kingdom
causes, impacts, and remediation steps. Collaborate with IT, Privacy, Legal teams, and senior stakeholders; prepare incident reports. Conduct post-incident reviews and continuous improvement initiatives. Perform digital forensics and malware analysis to assess incident impact. Contribute to developing cyber defence metrics and KPIs. Stay updated on cyber threats and security technologies. Develop relationships with external stakeholders such as … cyber incidents as a digital forensic responder. Proven success working within large, complex enterprise environments. Understanding of security monitoring tools, intrusion detection, and prevention systems. Technical expertise in networks, malware analysis, and digital forensics. Effective communication with senior stakeholders. Company Overview Element is a rapidly growing testing, inspection, and certification company with over 9,000 employees across More ❯
Posted:

Cyber Security Incident Responder

High Wycombe, England, United Kingdom
JR United Kingdom
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malware analysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware analysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
Posted:

Cyber Security Incident Responder

Reading, England, United Kingdom
JR United Kingdom
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malware analysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware analysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
Posted:

Cyber Security Incident Responder

Basingstoke, England, United Kingdom
JR United Kingdom
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malware analysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware analysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
Posted:

Cyber Security Incident Responder

Oxford, England, United Kingdom
JR United Kingdom
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malware analysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware analysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

South East London, England, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

london, south east england, united kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

slough, south east england, united kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

london (city of london), south east england, united kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

london (west end), south east england, united kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

Cyber Security Incident Responder

Portsmouth, England, United Kingdom
JR United Kingdom
investigations, identifying root causes, impacts, and remediation. Collaborate with IT, Privacy, Legal, and senior stakeholders; report incident statuses. Conduct post-incident reviews for continuous improvement. Perform digital forensics and malware analysis. Contribute to developing cyber defence metrics and KPIs. Stay updated on cyber threats and technologies. Maintain relationships with external stakeholders such as law enforcement and cybersecurity vendors. Key … Needed: Managing serious cyber incidents as a digital forensic incident responder. Working successfully in large, complex environments. Understanding security monitoring, intrusion detection, and prevention systems. Technical expertise in networks, malware analysis, and digital forensics. Effective communication with senior stakeholders. Company Overview: Element is a rapidly growing testing, inspection, and certification company with over 9,000 employees across More ❯
Posted:

Cyber Security Incident Responder

Dartford, England, United Kingdom
JR United Kingdom
investigations, determining root causes, and recommending remediation. Collaborate with IT, Privacy, Legal teams, and stakeholders; prepare incident reports. Conduct post-incident reviews for continuous improvement. Perform digital forensics and malware analysis. Contribute to developing cyber defence metrics and KPIs. Stay updated on cyber threats and security technologies. Build relationships with external stakeholders such as law enforcement and cybersecurity vendors. … queries. Experience Needed: Managing serious cyber incidents as a digital forensic responder. Operating within large, complex enterprise environments. Understanding security monitoring, intrusion detection, prevention systems. Technical expertise in networks, malware analysis, digital forensics. Strong communication skills with senior stakeholders. Company Overview: Element is a leading testing, inspection, and certification company with over 9,000 employees worldwide. We aim More ❯
Posted:

Cyber Security Incident Responder

Maidstone, England, United Kingdom
JR United Kingdom
management, conducting investigations, determining root causes, and recommending remediation. Collaborate with IT, Privacy, Legal teams, and senior stakeholders; report incident statuses. Conduct post-incident reviews and digital forensics, including malware analysis. Contribute to developing cyber defense metrics and KPIs. Stay informed about cyber threats and technologies to enhance incident response. Build relationships with external stakeholders for information sharing and … serious cyber incidents as a digital forensic responder. Operating within large, complex enterprise environments. Understanding of security monitoring, intrusion detection/prevention, and control systems. Technical expertise in networks, malware analysis, and digital forensics. Effective communication with senior stakeholders. Company Overview: Element is a leading testing, inspection, and certification company with over 9,000 employees across 30 countries. More ❯
Posted:

Cyber Security Incident Responder

Guildford, England, United Kingdom
JR United Kingdom
determine root causes, and recommend remediation. Collaborate with IT, Privacy, Legal teams, and senior stakeholders; report incident statuses. Perform post-incident reviews for continuous improvement. Conduct digital forensics and malware analysis. Contribute to developing cyber defence metrics and KPIs. Stay updated on cyber threats and technologies. Establish relationships with law enforcement, vendors, and industry peers for information sharing. Key … Managing serious cyber incidents as a digital forensic responder. Working successfully in large, complex enterprise environments. Understanding security monitoring, intrusion detection, prevention, and control systems. Technical expertise in networks, malware analysis, and digital forensics. Effective communication with senior stakeholders. Company Overview: Element is a rapidly expanding testing, inspection, and certification company, with over 9,000 employees across More ❯
Posted:

Senior Cyber Analyst

Thatcham, England, United Kingdom
Roc Technologies
Cyber Security Analyst and help us protect our customers from cyber threats while shaping our cutting-edge service. As a Senior Cyber Security Analyst, your responsibilities will include: Threat Analysis: Analyze detections and alerts from SOC tools, including SIEM. Incident Mitigation: Lead threat mitigation efforts and post-attack remediations. Operational Efficiency: Ensure the smooth and effective operation of SOC … and implement automations and playbooks using SOAR tools. Key Skills, Knowledge & Experience Strong understanding of advanced Cyber Security concepts Expertise in Cyber Security tools and technologies Solid knowledge of Malware types and concepts Strong grasp of Cyber risk management Ability to effectively communicate complex analysis and cyber concepts to customers Proficiency with SIEM tools like Azure Sentinel, Splunk … LogRhythm, and Google SecOps (preferred) Experience with SOAR and Playbooks Desirable Skills Scripting skills (e.g., Python, PowerShell) Experience in Malware analysis Knowledge of “Kill Chain” analysis Familiarity with Penetration Testing Proficient in detailed log and packet analysis Understanding of cloud infrastructure Interest in geopolitical influences on Cyber Security Experience with Operational Technology This role will be More ❯
Posted: