newcastle-upon-tyne, tyne and wear, north east england, United Kingdom
Network IT Recruitment Limited
this could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands on experience: - Threat Detection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct … forensic investigations, and support remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threatintelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication – Work closely and collaborate with senior analysts and clients … and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threatintelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration More ❯
newcastle-upon-tyne, tyne and wear, north east england, United Kingdom
Pentest People
testing merges the benefits of consultant-led penetration testing with ongoing vulnerability assurance through our advanced SecurePortal. This provides clients with a continuous, living threat management system throughout the duration of the contract, rather than a single point-in-time assessment. We’re expanding our Incident Response team and … responsibilities include: Conducting initial incident assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threatintelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis … the ability to manage and coordinate various incidents whilst remaining calm under pressure. Ability to align client deliverables with industry best practices. Experience in threatintelligence and analysis to support proactive IR. Capable of taking ownership of tasks, ensuring quality delivery and supporting the IR's team growth. More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
across government to deliver holistic, customer centric cyber security services. This includes consultancy support that continually evolves to emerging technologies and the ever-changing threat and risk landscape. It is an exciting time to be part of our active and encouraging Cybersecurity and Architecture communities, working within HMRC and … adoption such as those in NIST 2.0. Security Tooling Roadmaps: Create detailed roadmaps for security tooling, incorporating vendor investment tracking, horizon scanning, and global threat landscape changes, and communicate these to stakeholders. Baseline Establishment and Design Patterns: Establish baselines for current security technologies and develop design patterns to support … like SASE and Zero Trust. Application Security: Experience with SAST, DAST, RAST, IAST tools, integrating security into SDLC processes, OWASP, API security design, robust threat modelling, and containerization security. Data Security: Skilled in implementing information protection tools, key and secrets management, data loss prevention, and protective marking and classification More ❯
newcastle-upon-tyne, tyne and wear, north east england, United Kingdom Hybrid / WFH Options
Logiq
help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model … We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP More ❯
newcastle-upon-tyne, tyne and wear, north east england, United Kingdom
Iceberg
a focus on realism and impact Creating or modifying tools, exploits, and payloads as needed — not relying solely on off-the-shelf frameworks Supporting threat-led testing programs and integrating threatintelligence into operations Maintaining strict operational security and professional discipline in all activities What we’re More ❯