potential security incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or malicious activity. Use OSINT (Open-Source Intelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats. Monitor the threat landscape and … tools such as basic XDR platforms. Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate clearly and efficiently with team members and More ❯
manage all aspects of project delivery, including forecasting, change management, and risk management. Oversee deliverables from cross-functional teams, vendors, and business resources. Foster open communication across teams to identify cross-team development dependencies and risks early on. Work with project accountants to manage project finances. Experience of working … includes Secure-by-Design, cloud computing, advanced network and infrastructure design, rapid application development, cross-security domain systems, multi-tenanted High-Performance Compute, multi-source data platforms, cyber vulnerability mitigation, and intelligence systems. We provide supplier-agnostic, technical, and business consultancy to customers while championing open-sourceMore ❯
manage all aspects of project delivery, including forecasting, change management, and risk management. Oversee deliverables from cross-functional teams, vendors, and business resources. Foster open communication across teams to identify cross-team development dependencies and risks early on. Work with project accountants to manage project finances. Experience of working … includes Secure-by-Design, cloud computing, advanced network and infrastructure design, rapid application development, cross-security domain systems, multi-tenanted High-Performance Compute, multi-source data platforms, cyber vulnerability mitigation, and intelligence systems. We provide supplier-agnostic, technical, and business consultancy to customers while championing open-sourceMore ❯
areas like Secure-by-Design, cloud computing, network design, rapid application development, cyber vulnerability mitigation, and intelligence systems. We offer independent consultancy and champion open-source technologies. A word on UK Security Clearance Due to the secure nature of the role, candidates must have or be eligible for More ❯