Malware Analysis Jobs in the Thames Valley

12 of 12 Malware Analysis Jobs in the Thames Valley

Technical Incident Response Lead

Reading, England, United Kingdom
Hybrid / WFH Options
Liberty Global
will you be doing? Incident Response & Threat Handling Technical Lead for Incidents: Act as the go-to expert during complex cyber incidents, guiding containment, eradication, and recovery efforts. Forensic & Malware Analysis: Perform deep-dive investigations, including advanced malware analysis, extraction of Indicators of Compromise (IoCs), and mapping out Tactics, Techniques, and Procedures (TTPs). Cross-Functional … improve SOC efficiency and help pre-empt potential attacks. Security Architecture: Collaborate with cross-functional teams to enhance security controls and suggest improvements to our overall security architecture. Data Analysis: Leverage tools like Splunk, Elastic, and other analytical platforms to analyse diverse log sources, normalise data, and identify emerging threats across our infrastructure. Documentation & Reporting Incident Reporting: Create comprehensive More ❯
Posted:

Cyber Security Incident Responder

Slough, England, United Kingdom
JR United Kingdom
lead incident management, conduct investigations, identify root causes, and recommend remediation Collaborate with IT, Privacy, Legal teams, and stakeholders; report incident status Conduct post-incident reviews and digital forensics, malware analysis Develop cyber defence metrics and KPIs with senior management Stay updated on cyber threats and technologies Maintain relationships with law enforcement, vendors, and industry peers Key Skills … managing serious cyber incidents as a digital forensic responder Experience in large, complex enterprise environments Knowledge of security monitoring, intrusion detection, firewalls, antivirus, web proxies Technical expertise in networks, malware analysis, digital forensics Effective communication with senior stakeholders Company Overview: Element is a global testing, inspection, and certification company with over 9,000 employees across 30 countries. Our More ❯
Posted:

Cyber Security Incident Responder

Milton Keynes, England, United Kingdom
JR United Kingdom
causes, impacts, and remediation steps. Collaborate with IT, Privacy, Legal teams, and senior stakeholders; prepare incident reports. Conduct post-incident reviews and continuous improvement initiatives. Perform digital forensics and malware analysis to assess incident impact. Contribute to developing cyber defence metrics and KPIs. Stay updated on cyber threats and security technologies. Develop relationships with external stakeholders such as … cyber incidents as a digital forensic responder. Proven success working within large, complex enterprise environments. Understanding of security monitoring tools, intrusion detection, and prevention systems. Technical expertise in networks, malware analysis, and digital forensics. Effective communication with senior stakeholders. Company Overview Element is a rapidly growing testing, inspection, and certification company with over 9,000 employees across More ❯
Posted:

Cyber Security Incident Responder

High Wycombe, England, United Kingdom
JR United Kingdom
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malware analysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware analysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
Posted:

Cyber Security Incident Responder

Reading, England, United Kingdom
JR United Kingdom
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malware analysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware analysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
Posted:

Cyber Security Incident Responder

Oxford, England, United Kingdom
JR United Kingdom
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malware analysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware analysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
Posted:

Senior Cyber Analyst

Thatcham, England, United Kingdom
Roc Technologies
Cyber Security Analyst and help us protect our customers from cyber threats while shaping our cutting-edge service. As a Senior Cyber Security Analyst, your responsibilities will include: Threat Analysis: Analyze detections and alerts from SOC tools, including SIEM. Incident Mitigation: Lead threat mitigation efforts and post-attack remediations. Operational Efficiency: Ensure the smooth and effective operation of SOC … and implement automations and playbooks using SOAR tools. Key Skills, Knowledge & Experience Strong understanding of advanced Cyber Security concepts Expertise in Cyber Security tools and technologies Solid knowledge of Malware types and concepts Strong grasp of Cyber risk management Ability to effectively communicate complex analysis and cyber concepts to customers Proficiency with SIEM tools like Azure Sentinel, Splunk … LogRhythm, and Google SecOps (preferred) Experience with SOAR and Playbooks Desirable Skills Scripting skills (e.g., Python, PowerShell) Experience in Malware analysis Knowledge of “Kill Chain” analysis Familiarity with Penetration Testing Proficient in detailed log and packet analysis Understanding of cloud infrastructure Interest in geopolitical influences on Cyber Security Experience with Operational Technology This role will be More ❯
Posted:

Senior Offensive Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
you will be responsible for planning and delivering in depth security assessments across a variety of products and services. Your next project could be anything from static and dynamic analysis of a multi-node infrastructure, to writing a fuzzer for an undocumented network protocol or the grammar of a new programming language. Other responsibilities includes as below Scope and … depth security assessments and vulnerability research across a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help teams identify security-related weaknesses Collaborate with teams to help them triage and fix security issues What You’ll Bring Bachelor’s or Master … or C/C++ 5+ years industry experience in software development Ability to perform manual source code reviews in one of the aforementioned languages, or assisted review with code analysis tools Hands-on experience in one or more of the following with an interest in doing full time research: cybersecurity consulting, security engineering, vulnerability management, risk assessments, bug bounty More ❯
Posted:

Analyst I, Falcon Complete (Remote, GBR)

Reading, England, United Kingdom
Hybrid / WFH Options
CrowdStrike
minded people in a world class team who you can both learn from and mentor on a daily basis? What You'll Do Conduct monitoring and perform in-depth analysis of security alerts using the CrowdStrike platform. Exercise incident handling processes across Windows, Mac, and Linux platforms. Perform malware analysis. Perform remote remediation of malware or malicious … of the following areas: Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists. Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise. Systems Administration: an understanding of system internals … is required to understand how to implement and execute countermeasures and remediation. Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware. Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations. Programming/Scripting: experience coding in Powershell, C More ❯
Posted:

Principal Offensive Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
you will be responsible for planning and delivering in depth security assessments across a variety of products and services. Your next project could be anything from static and dynamic analysis of a multi-node infrastructure, to writing a fuzzer for an undocumented network protocol or the grammar of a new programming language. Other responsibilities includes as below Scope and … depth security assessments and vulnerability research across a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help teams identify security-related weaknesses Collaborate with teams to help them triage and fix security issues What You’ll Bring Bachelor’s or Master … or C/C++ 5+ years industry experience in software development Ability to perform manual source code reviews in one of the aforementioned languages, or assisted review with code analysis tools Hands-on experience in one or more of the following with an interest in doing full time research: cybersecurity consulting, security engineering, vulnerability management, risk assessments, bug bounty More ❯
Posted:

Principal Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
of our team, you will be responsible for planning and delivering in-depth security assessments across a variety of products and services. Your projects could include static and dynamic analysis of infrastructure, writing fuzzers for undocumented protocols, or developing new programming language grammars. Responsibilities include: Scope and execute security assessments and vulnerability research across on-premise software, cloud services … and infrastructure. Perform security assessments using static and dynamic analysis results. Create testing tools to identify security weaknesses. Collaborate with teams to triage and fix security issues. What You’ll Bring Bachelor’s or Master’s degree in Computer Science, Electrical Engineering, or related field. 7+ years of experience in security assessments, penetration testing, red teaming, or web application … Proficiency in Go, Java, Python, or C/C++. 5+ years of software development experience. Manual source code review skills. Experience in cybersecurity consulting, vulnerability management, bug bounty hunting, malware analysis, or forensics. Certifications like OSCP, OSWE, or interest in obtaining them. Experience with large codebases and security assessment tools for mobile, reverse engineering, fuzzing, or web assessments. More ❯
Posted:

Principal Offensive Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
you will be responsible for planning and delivering in depth security assessments across a variety of products and services. Your next project could be anything from static and dynamic analysis of a multi-node infrastructure, to writing a fuzzer for an undocumented network protocol or the grammar of a new programming language. Other responsibilities includes as below Scope and … depth security assessments and vulnerability research across a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help teams identify security-related weaknesses Collaborate with teams to help them triage and fix security issues What You’ll Bring Bachelor’s or Master … or C/C++ 5+ years industry experience in software development Ability to perform manual source code reviews in one of the aforementioned languages, or assisted review with code analysis tools Hands-on experience in one or more of the following with an interest in doing full time research: cybersecurity consulting, security engineering, vulnerability management, risk assessments, bug bounty More ❯
Posted: