Job Title: SOC Incident Response & Threat Hunting Manager Location: Remote Salary: 75k - 85k plus 10% bonus and 6k car allowance Mon Fri as well as an on-call rota - 1 week in 4. Candidates must be willing and eligible to go through SC security clearance for this role Job Description: We are seeking a highly skilled and experienced SOC … Incident Response & Threat Hunting Manager to join our growing Security Operations Centre. This pivotal role will be responsible for leading our Tier 3 Security and Incident Response Analysts, overseeing advanced incident response activities, driving proactive threat hunting initiatives, and providing strategic direction for the CyberThreatIntelligence (CTI) capability. This is a hands-on leadership … role demands a unique blend of strategic leadership, deep technical expertise in digital forensics and incident response (DFIR), and a proactive mindset to anticipate and neutralise sophisticated and evolving cyber threats. Key Responsibilities: Provide expert guidance and technical oversight on complex security incidents and threat hunting operations. Lead and coordinate high-severity incident response engagements, acting as the More ❯
Our client is seeking a curious and motivated Senior Threat Detection & Response Engineer to build state-of-the-art threat detection, investigation and response (TDIR) capabilities. This role will work with enterprise clients, and internally, to perform threat-informed detection engineering and threat research, implement security data lakes, SIEM and data pipelines strategies and transform response … architecture and services to our company culture, while working on innovative detection engineering challenges. Core Requirements 5+ years in cybersecurity, 3+ years focusedon detection engineering Proven ability to operationalise threatintelligence into actionable, high-delity detections Demonstratable experience with detection-as-code using multiple detection languages - Sigma, YAML, SPL, KQL, YARA-L, CoreTIDE. Procient with Python, Git/ More ❯
LYNK has partnered with a leading Cybersecurity services provider to recruit as part of their Service Delivery team. This role is hands on and technical. This company delivers advanced Cyber services across critical sectors supporting clients through offerings such as 24/7 SOC operations, Security Assurance, ThreatIntelligence, Third-Party Risk, and Crisis Simulations . About … Strong knowledge of segmentation, security protocols, and secure network design Ability to engage technically with clients and manage end-to-end delivery Understanding of CVEs, vulnerability management , and broader cyber risk Customer-facing experience in sectors such as healthcare, manufacturing, or critical infrastructure Excellent documentation and reporting skills able to communicate clearly to both technical and non-technical audiences … GCP Provide guidance on hybrid and multi-cloud security best practices Qualifications & Experience Certifications such as Cisco CCNA/CCNP , Fortinet NSE , or CompTIA Security+ (advantageous) Demonstrable experience delivering Cyber services in: Threat & Vulnerability Management Penetration Testing/Offensive Security SOC/MDR operations Third-Party Risk or Compliance (ISO, NIST, GDPR) Additional Information Must have the right More ❯
LYNK has partnered with a Cybersecurity services provider who have a Cyber Simulation function within the business, and are looking for support with design and delivery. The company supports a diverse client base across critical sectors, offering multiple services including: 24/7 SOC, Security Assurance, ThreatIntelligence, 3rd Party Risk, and Crisis Sims. The work here … is potentially repetitive, however it does offer the opportunity to create meaningful Cyber Security content, and interface directly with C-suite and Senior level execs within the space. Role Overview This role is responsible for the end-to-end delivery of a Crisis Simulation Service - a structured, scenario-based exercise designed to assess and strengthen an organisations readiness to … respond to major cyber incidents. This role will involve collaborating closely with clients, internal consultants, and third-party partners to design, build, deliver, and report on pre-defined and bespoke crisis simulation exercises. The successful candidate will have a strong understanding of incident response, business continuity, and crisis management processes, with excellent organisational and communication skills to manage multiple More ❯
As aRed Team Specialist , you'll be at the frontlines of BreachLocks offensive security operations, conducting advanced adversary emulation, bypassing modern defenses, and helping Fortune 500 clients improve their cyber resilience. What Youll Do: Plan and execute full-scope red team engagements (TIBER-style, MITRE ATT&CK aligned) Perform focused penetration tests on web applications, mobile apps (iOS/… offensive security Proficiency with C2 frameworks (Cobalt Strike, Sliver, Mythic) Deep understanding of Windows/Linux internals, AD, and cloud (AWS/Azure) Knowledge of OPSEC, evasive TTPs, and threatintelligence integration Strong scripting skills (Python, PowerShell, Bash) OSCP, CRTO, OSCE, or similar certs Published exploits or open-source tools Why BreachLock: 100% remote-first culture Cutting-edge More ❯