severity incidents. Create and update security event investigation notes, report on open cases, and maintain case data in the Incident Response Management platform. Monitor threat and vulnerability news services for any relevant information that may impact installed infrastructure. Analyse reports to understand threat campaign(s) techniques, lateral movements … and extract indicators of compromise (IOCs). Continuous engagement with the Threat Intelligence and 24x7 Monitoring teams. Provide ad-hoc on-call support to review threats and response actions for off-hour critical incident response. What you'll need Job Complexity: Works on and may lead projects or a … education or equivalent in Information Security, Forensics, or Computer Science; related experience and/or training in the field of IT security monitoring and analysis, cyber threatanalysis, and vulnerability analysis. A Global Information Assurance Certification (GIAC) Certified Incident Handler (GCIH), GIAC Certified Intrusion Analyst (GCIA), or More ❯
Redscan (a trading name of Redscan Cyber Security Limited)
threats utilising a number of different SIEM & EDR tools. Responsibilities To be a key member of Security Operations Centre (SOC) and provide real-time threatanalysis and detection. Respond to system generated alerts, analyse logs and traffic patterns. Provide analysis and trending of security log data from … possibility of system breaches. Other duties as assigned. About You Requirements A passion for Cyber Security and enjoys solving problems. Knowledge of the security threat landscape. Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusion detection systems). Knowledge of TCP/IP Protocols … network analysis, and network/security applications. Knowledge of common Internet protocols and applications. Ability to multi-task, prioritize, and manage time effectively. Ability to cope successfully under pressure and with shifting priorities. Ability to work on a shift rota. Strong attention to detail. Excellent interpersonal skills and professional More ❯
best practices. Proficiency with security technologies and tools (e.g., SIEM, vulnerability scanners, encryption tools). Hands-on experience with incident response, penetration testing, and threat analysis. Familiarity with secure software development practices and DevSecOps principles. Certifications such as CISSP, CISM, CEH, or equivalent are strongly preferred. Key Skills: Strong More ❯
best practices. Proficiency with security technologies and tools (e.g., SIEM, vulnerability scanners, encryption tools). Hands-on experience with incident response, penetration testing, and threat analysis. Familiarity with secure software development practices and DevSecOps principles. Certifications such as CISSP, CISM, CEH, or equivalent are strongly preferred. Key Skills: Strong More ❯
best practices. Proficiency with security technologies and tools (e.g., SIEM, vulnerability scanners, encryption tools). Hands-on experience with incident response, penetration testing, and threat analysis. Familiarity with secure software development practices and DevSecOps principles. Certifications such as CISSP, CISM, CEH, or equivalent are strongly preferred. Key Skills: Strong More ❯
strategy of enhancing the bank's IT security further. Using a combination of third-party tooling and custom solutions to assist you with security threatanalysis and detection, you will help drive the security strategy for current and future product implementations. With good mentoring and coaching capabilities, you … to monitor, detect, and respond to potential threats in real-time. Lead the establishment of a Security Operations Center (SOC) for continuous monitoring and threat intelligence. Continuously evaluate and enhance security tools, technologies, and processes to stay ahead of evolving threats. Application and Cloud Security Implement best practices for … Incident Response Plans (CSIRP) and Disaster Recovery Plans (DRP). Lead the response to cybersecurity incidents, ensuring rapid containment and recovery. Conduct post-incident analysis along with the incident team to identify root causes and enhance defenses. Third-Party Security and Due Diligence Conduct risk assessments and due diligence More ❯
vulnerability testing and penetration testing: Using various tools and techniques (like Nessus, Burp Suite, Metasploit), you'll simulate attacks to uncover exploitable flaws. Developing threatanalysis schedules and staying updated on emerging threats: Keeping abreast of the latest attack vectors, malware, and security trends is crucial. Developing and More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Global TechForce
vulnerability testing and penetration testing: Using various tools and techniques (like Nessus, Burp Suite, Metasploit), you'll simulate attacks to uncover exploitable flaws. Developing threatanalysis schedules and staying updated on emerging threats: Keeping abreast of the latest attack vectors, malware, and security trends is crucial. Developing and More ❯
you will be responsible for designing and implementing robust risk and vulnerability management processes, ensuring alignment with key stakeholders, and conducting thorough risk and threat analyses to maintain the security of our OT assets. In this role you will Lead the OT risk management lifecycle, including risk identification, assessment More ❯
you will be responsible for designing and implementing robust risk and vulnerability management processes, ensuring alignment with key stakeholders, and conducting thorough risk and threat analyses to maintain the security of our OT assets. In this role you will Lead the OT risk management lifecycle, including risk identification, assessment More ❯
to help secure our foundational platforms such as OS kernels, virtualization, device emulation, firmware, and hardware. You will be responsible for conducting security reviews, threat modeling, developing tooling that will help detect security issues at scale, and hands-on security evaluations (pen-testing). The successful candidate must be … comfortable diving into complex engineering discussions and leveraging deep security expertise to ensure proper risk assessment and threatanalysis is performed. You will provide crystal-clear technical direction and risk mitigation guidance for diverse engineering and business leaders at all levels. By applying your hard-earned years of … new security skills in the course of your duties. Key job responsibilities Security reviews for hardware including servers and devices. Penetration testing & vulnerability research. Threat modeling. Security training and outreach to internal development teams. Security guidance documentation. Assistance with recruiting activities. BASIC QUALIFICATIONS BS in Computer Science or related More ❯
working practices. Working closely with IT security, engineering peers and architecture, the role will ensure that key security controls, toolchain automation, and risk/threatanalysis is carried out at every stage of the work done by the team. Drives User Experience : The Associate ensures that services which … experience in this area includes but is not limited to: • Perimeter Security, including firewalls, intrusion detection/prevention (IDS/IPS), anti-malware and threat prevention (Check Point, Palo Alto Networks and Cisco). • Cloud network security (Check Point and Microsoft Azure). • Web Application Firewalls (WAFs) - SaaS/ More ❯
scale. And if something doesn't go to plan, this role will be accountable alongside the executive team to contain, control and disrupt any threat-and restore normal operations. Responsibilities will include: Championing our security culture-training our team to be the best form of defence. Conducting threat … and frameworks in practise (e.g. ISO 27001, NIST CSF, SP 800-53, NCSC CAF, Cyber Essentials). Has a thorough understanding of cyber security threat and risk with the ability to think like an attacker and design controls that make a real difference. Has proven ability to enable a … us to achieve objectives, whilst also keeping us safe. Has good research and analytical skills utilising a variety of sources: online research, industry forums, threat intel feeds etc. using these to maintain oversight of current and future threats and opportunities to mitigate them. Has an enthusiastic 'roll up your More ❯