solid foundation in hands-on cyber defence Proficiency with tools such as SIEM, PAM, web/email filtering (e.g. Mimecast), IDS/IPS, antivirus, endpoint protection, Microsoft Sentinel, and vulnerabilityassessment tools (e.g. Tenable) Strong analytical mindset and attention to detail, with a passion for detecting and mitigating threats Excellent problem-solving skills and the ability to respond More ❯
enhance the security of IT systems both on-prem and cloud. Creation of reports, dashboards, metrics for SOC operations and presentation to senior management. Oversight, planning and execution of vulnerability assessments, penetration tests, audits or related security assessment exercises (eg Red Team) to improve the security posture of the infrastructure, applications and services. Manage the remediation of identified … networks and operating systems including firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, networks and cloud services Comprehensive knowledge or experience of information security principles, including risk assessment, intrusion detection, Security Incident and Event Management (SIEM) tools, threat and vulnerability management Detailed knowledge or experience of application or network based penetration testing tools and methodologies Experience More ❯
cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: • Lead the development and delivery of threat intelligence and … vulnerability products. • Select and profile key threat actors posing the greatest risk to the client’s estate. • Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. • Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. • Provide in-depth contextual threat analysis, including actor capability and intent. • Maintain and improve internal documentation and … reporting processes. • Lead, mentor, and support a multidisciplinary team of cyber analysts. • Identify and implement improvements to mature threat intelligence and vulnerability functions. Requirements of the Threat Intelligence Lead: • 5+ years of experience in Threat Intelligence, Vulnerability Management, or cyber research. • Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. • Experience in More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
Eames Consulting
team, purple team, or adversary emulation experience. Programming/scripting skills (Python, PowerShell, Bash). Cloud pentesting experience (AWS, Azure, GCP). Familiarity with threat modeling or risk-based vulnerability assessments. Advanced certifications such as OSCE, OSEP, OSWE, CRTP, CREST CRT/CCT . Join us if you want to make a real impact, tackle diverse challenges, and grow More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating complex More ❯