Initial We are looking for a highly capable and technically skilled Security Analyst (Network & Endpoint) to join our cybersecurity team. This role focuses on network and endpoint security operations, threat intelligence, and incident response within a Security Operations Centre (SOC) environment. The successful candidate will have hands-on experience with leading security platforms and demonstrate the ability to operate … Network & Endpoint) Location: England/Remote Contract Type: Contract Duration: Contract till 31st Mar 26 Sector: Healthcare . Key Responsibilities: Network Detection & Response: Administer and optimise Darktrace for network threat detection, model tuning, and behavioural analysis. Investigate anomalies and escalate incidents based on network telemetry. Endpoint Protection: Deploy and manage CrowdStrike Falcon agents across enterprise endpoints. Maintain and update … detection rules, ensuring alignment with threat intelligence. Security Operations Centre (SOC): Act as a Level 2 SOC Analyst and Incident Handler. Triage, investigate, and respond to security alerts and incidents. Collaborate with other SOC team members to ensure timely resolution and documentation. Threat Intelligence & Insider Threat Monitoring: Monitor threat feeds and manage Indicators of Compromise (IOCs More ❯
SOC Analysts while performing advanced investigations and, when required, first-line triage to maintain queue health and SLA compliance. You are responsible for high-quality service delivery through detailed analysis, evidence-led response actions, and operational leadership. In addition to handling escalated alerts, you provide line management, oversee ticket quality, contribute to training and onboarding, and drive continual improvement. … Customer Communications - You provide timely incident updates and lead bridging calls with customers during high-priority incidents, ensuring that communications are clear, evidence-led, and aligned to customer expectations. • Threat Hunting Oversight - You lead and coordinate proactive threat hunting across customer environments, using hypothesis-based approaches to identify undetected threats and validate detection coverage. Essential Duties • Advanced Investigation … all available tooling. o Reconstruct attack chains and identify root causes using MITRE ATT&CK. o Recommend and coordinate response actions to mitigate impact during active incidents. • IOC and ThreatAnalysis o Investigate indicators of compromise using commercial and open-source threat intelligence. o Validate alerts and determine their relevance to customer environments, providing context on adversary More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Talent Locker
investigations Reviewing, tuning and enhancing detection rules, alerts and playbooks in SIEM/SOAR tools Providing mentorship and technical guidance to SOC analysts Driving post-incident reviews, root cause analysis and continuous improvement Conducting proactive threat hunting and supporting compliance/audit requirements Collaborating with wider IT/security teams to improve detection and response capability What you … ll bring 3+ years' experience in a SOC or security operations role Strong knowledge of incident detection, response and threatanalysis Hands-on experience with SIEM, SOAR and endpoint detection tools Excellent problem-solving, analytical and communication skills A degree in a relevant subject or equivalent experience Relevant certifications such as GCIA, GCIH, CEH or CompTIA CySA+ (desirable More ❯
Defender for Endpoint, and related security tools Responding to security incidents, analysing alerts, and improving detection capabilities Working closely with IT and infrastructure teams to enhance security configurations Conducting threatanalysis, vulnerability management, and system hardening Supporting compliance and best practice across the organisation 🧠 What we’re looking for: Solid experience with Microsoft security tools (Sentinel, Defender, Intune … Entra) Knowledge of SIEM, incident response, and threat detection Familiarity with Azure and general cloud security principles Strong problem-solving mindset and attention to detail Great communication skills — you can explain security to non-technical colleagues too More ❯
and secure environment. Incident Detection & Response: Analyze security events to determine if they represent legitimate threats, and initiate an appropriate incident response to contain and mitigate any detected issues. ThreatAnalysis: Conduct in-depth analysis of potential and active security threats, including malware, phishing, and network intrusions, and recommend appropriate remediation steps. Detection Engineering : Design, build, and More ❯
and secure environment. Incident Detection & Response: Analyze security events to determine if they represent legitimate threats, and initiate an appropriate incident response to contain and mitigate any detected issues. ThreatAnalysis: Conduct in-depth analysis of potential and active security threats, including malware, phishing, and network intrusions, and recommend appropriate remediation steps. Detection Engineering : Design, build, and More ❯
and secure environment. Incident Detection & Response: Analyze security events to determine if they represent legitimate threats, and initiate an appropriate incident response to contain and mitigate any detected issues. ThreatAnalysis: Conduct in-depth analysis of potential and active security threats, including malware, phishing, and network intrusions, and recommend appropriate remediation steps. Detection Engineering : Design, build, and More ❯
and secure environment. Incident Detection & Response: Analyze security events to determine if they represent legitimate threats, and initiate an appropriate incident response to contain and mitigate any detected issues. ThreatAnalysis: Conduct in-depth analysis of potential and active security threats, including malware, phishing, and network intrusions, and recommend appropriate remediation steps. Detection Engineering : Design, build, and More ❯
london (city of london), south east england, united kingdom
Global Fintech
and secure environment. Incident Detection & Response: Analyze security events to determine if they represent legitimate threats, and initiate an appropriate incident response to contain and mitigate any detected issues. ThreatAnalysis: Conduct in-depth analysis of potential and active security threats, including malware, phishing, and network intrusions, and recommend appropriate remediation steps. Detection Engineering : Design, build, and More ❯
Systems (ICS) Operational Technology (OT) Cyber Security Engineer to join their Service and Support team. The role involves designing and securing OT networks across various critical industries, conducting advanced threatanalysis, penetration testing, and vulnerability assessments. The engineer will develop and implement cybersecurity solutions, lead risk mitigation efforts, mentor junior team members, and support project management and business More ❯
clients’ data, ensuring the confidentiality, integrity, and availability of systems across the firm. What you’ll do: Detect, investigate, and respond to security events across systems and networks. Conduct threatanalysis on malware, phishing, network intrusions, and other cybersecurity risks. Build and improve detection rules, analytics, and automation to enhance Security Operations workflows. Integrate modern tools, including AI More ❯
clients’ data, ensuring the confidentiality, integrity, and availability of systems across the firm. What you’ll do: Detect, investigate, and respond to security events across systems and networks. Conduct threatanalysis on malware, phishing, network intrusions, and other cybersecurity risks. Build and improve detection rules, analytics, and automation to enhance Security Operations workflows. Integrate modern tools, including AI More ❯
clients’ data, ensuring the confidentiality, integrity, and availability of systems across the firm. What you’ll do: Detect, investigate, and respond to security events across systems and networks. Conduct threatanalysis on malware, phishing, network intrusions, and other cybersecurity risks. Build and improve detection rules, analytics, and automation to enhance Security Operations workflows. Integrate modern tools, including AI More ❯
clients’ data, ensuring the confidentiality, integrity, and availability of systems across the firm. What you’ll do: Detect, investigate, and respond to security events across systems and networks. Conduct threatanalysis on malware, phishing, network intrusions, and other cybersecurity risks. Build and improve detection rules, analytics, and automation to enhance Security Operations workflows. Integrate modern tools, including AI More ❯
london (city of london), south east england, united kingdom
Radley James
clients’ data, ensuring the confidentiality, integrity, and availability of systems across the firm. What you’ll do: Detect, investigate, and respond to security events across systems and networks. Conduct threatanalysis on malware, phishing, network intrusions, and other cybersecurity risks. Build and improve detection rules, analytics, and automation to enhance Security Operations workflows. Integrate modern tools, including AI More ❯
embed a DevSecOps culture and working practices. Working closely with IT security, engineering peers and architecture, the role will ensure that key security controls, toolchain automation, and risk/threatanalysis is carried out at every stage of the work done by the team. Drives User Experience : The Associate ensures that services which are being developed and supported … Qualifications Networks -Network Security Technology experience in this area includes but is not limited to: • Perimeter Security, including firewalls, intrusion detection/prevention (IDS/IPS), anti-malware and threat prevention (Check Point, Palo Alto Networks and Cisco). • Cloud network security (Check Point and Microsoft Azure). • Web Application Firewalls (WAFs) - SaaS/on Prem/Azure. • SSL More ❯
IT Consultancy delivering digital transformation to Defence and National Security end clients. Overview: The PKI Engineer will be responsible for applying security best practices and industry standards derived from threatanalysis to implement PKI technology according to Design requirements. The position requires strong theoretical knowledge as well as industry experience in applying advanced cryptography schemes to secure complex More ❯
s Cyber Incident Response Plan (CIRP) and Security Strategy. You will also work on and be actively involved with the development, implementation and maintenance of cyber security policies, controls, threatanalysis, testing, assessments, auditing, reporting, detailed documentation, training, and other security activities. You'll be promoting cyber security awareness, good practice and compliance amidst end users, Trust service More ❯
West Bridgford, Nottinghamshire, United Kingdom Hybrid / WFH Options
Rebel Recruitment Limited
automate mundane tasks, make software and systems that are scalable, highly available, and robust, and making sure whatever you’re working on is secure, through things like vulnerability scanning, threatanalysis, and patching, is high on your priority list. Whilst you love new shiny tech and always make a point of having a play around with the latest More ❯
NG1, Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Rebel Recruitment Limited
someone who loves to automate mundane tasks, make scalable, highly available, and robust solutions, and making sure whatever you’re working on is secure, through things like vulnerability scanning, threatanalysis, and patching, is high on your priority list. Whilst you love new shiny tech and always make a point of having a play around with the latest More ❯
NG2, West Bridgford, Nottinghamshire, United Kingdom Hybrid / WFH Options
Rebel Recruitment Limited
someone who loves to automate mundane tasks, create scalable, highly available, and robust solutions, and ensure that whatever you’re working on is secure, through measures like vulnerability scanning, threatanalysis, and patching, is high on your priority list. Whilst you love new shiny tech and always make a point of having a play around with the latest More ❯
Stevenage, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
MBDA
The EW Group supports activities on relevant weapon system and missile programmes, with specific responsibilities for the weapon system design and verification, system and equipment integration, RF system design, threatanalysis, and modelling & simulation activities associated with EW capability and performance. We are recruiting an EW Systems Engineer who will be responsible for ensuring that various aspects of More ❯