improvement of incident response processes. Key Responsibilities: Lead complex investigations into security incidents and breaches. Perform root cause analysis and provide actionable recommendations. Conduct static and dynamic malware analysis; reverse engineer to identify IOCs. Monitor, tune, and optimise SIEM tools Develop and refine SOC use cases, runbooks, and playbooks. Integrate emerging threat intelligence into monitoring and detection workflows. Liaise More ❯
improvement of incident response processes. Key Responsibilities: Lead complex investigations into security incidents and breaches. Perform root cause analysis and provide actionable recommendations. Conduct static and dynamic malware analysis; reverse engineer to identify IOCs. Monitor, tune, and optimise SIEM tools Develop and refine SOC use cases, runbooks, and playbooks. Integrate emerging threat intelligence into monitoring and detection workflows. Liaise More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Crimson
on data tools, analytical techniques, and data utilization within the organization. Advanced understanding of data modelling concepts and principles, with the ability to produce relevant models across multiple domains, reverse-engineer models from live systems, and apply industry-recognized data modelling standards and patterns as appropriate. Capable of aligning and comparing various data models. Successful track record of collaboration More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Crimson
on data tools, analytical techniques, and data utilization within the organization. Advanced understanding of data modelling concepts and principles, with the ability to produce relevant models across multiple domains, reverse-engineer models from live systems, and apply industry-recognized data modelling standards and patterns as appropriate. Capable of aligning and comparing various data models. Successful track record of collaboration More ❯
Bring: Proven experience in vulnerability research roles. Strong understanding of hardware/software development lifecycles and security implications. Applied knowledge of cryptographic algorithms and secure systems design. Expertise in reverseengineering tools (e.g. Ghidra, IDA Pro) and debugging (e.g. GDB). Familiarity with Linux internals, embedded systems, and exploitation techniques. Passion for learning, testing systems, and uncovering security More ❯