Defence Operation's efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threatintelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve … operational efficiency. Collaborate with ThreatIntelligence, Incident Response, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary. Collaborate with third-party vendors and service providers to More ❯
of the organization's security posture. Responsibilities: Lead complex incident investigations, coordinating with internal and external stakeholders to resolve critical security issues. Perform advanced threat hunting, identifying sophisticated attack vectors and emerging threat patterns. Develop and refine incident response playbooks, integrating threatintelligence and proactive defense … for high-severity incidents to prevent recurrence. Provide mentorship and guidance to junior analysts, promoting best practices in incident detection and response. Collaborate with threatintelligence teams to enhance detection capabilities and improve threat modeling. Oversee the continuous tuning and optimization of SIEM platforms and other security More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Microsoft Corporation
development, or equivalent experience. Experience managing cross-functional and/or cross-team projects. Experience with network, identity, or identity technologies, digital forensics and threat hunting, threatintelligence, and/or managed security services. Strong technical program management and organizational skills, including the ability to manage multiple More ❯
development, or equivalent experience. - Experience managing cross-functional and/or cross-team projects. - Experience with network, identity, or identity technologies, digital forensics and threat hunting, threatintelligence, and/or managed security services. - Strong technical program management and organizational skills, including the ability to manage multiple More ❯
fulfilling life. YOUR CANDIDATE JOURNEY Discover what to expect during your journey as a candidate with us. The Opportunity: Are you looking for a threat hunter role, detecting cyber threats in support of active forensic investigations? Cyber threats are evolving, and when perimeter security and automated protection aren't … enough, networks are compromised, information is accessed, data is exfiltrated, backups are wiped, and ransomware is deployed, locking up an entire organization. Join our threat detection and response team to perform active threat hunting and assist organizations in recovering from cyber incidents. We're seeking CND and CNO … SentinelOne, CrowdStrike, or Defender for Endpoint Experience with network- and host-based intrusion analysis, digital forensics, or malware handling Experience with hunt teams, cyber threatintelligence, incident response, or security operations teams Knowledge of security principles, including MITRE ATT&CK framework, threat landscapes, or attacker TTPs Knowledge More ❯