fulfilling life. YOUR CANDIDATE JOURNEY Discover what to expect during your journey as a candidate with us. The Opportunity: Are you looking for a threat hunter role, detecting cyber threats in support of active forensic investigations? Cyber threats are evolving, and when perimeter security and automated protection aren't … enough, networks are compromised, information is accessed, data is exfiltrated, backups are wiped, and ransomware is deployed, locking up an entire organization. Join our threatdetection and response team to perform active threat hunting and assist organizations in recovering from cyber incidents. We're seeking CND and … think like cyber attackers to understand how security measures were circumvented. This role offers an opportunity to use your analytical skills and gain endpoint detection and response experience to identify indicators of compromise. You will collaborate with incident response analysts engaged in forensic investigations. Join us. The world can More ❯
cross-functionally and broadly together. Introduction to role Identity and Access Management are among the most critical aspects of any modern cyber security program. Threat actors increasingly leverage identity-based attacks for intrusion and lateral movement, and this trend will only accelerate as AI-based attack techniques are adopted … capability roadmaps, and execution plans across all key IAM domains-including workforce, consumer and machine identity, authentication and authorization platforms and access governance, identity threat management, and IAM-related policies and standards. As a key member of our security leadership team, you will lead a team of IAM capability … strategy and capability roadmap for core IAM focus areas: Authentication and Federation Access Management Privileged Access Management (PAM) Identity Governance and Administration (IGA) Identity ThreatDetection & Response IAM Policies, Standards, and Lifecycle Management Development & Execution: Define multiyear IAM capability roadmaps aligned with business and security goals. Lead the More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
TieTalent
This makes this a unique role where you will be able to utilize a broad skill set. Role Requirements Experience in cybersecurity matters (e.g., threatdetection, malware intelligence, cloud security posture management, or identity and access management systems). Understanding of the following functions: TCP/IP stack More ❯