the world, including defence, intelligence, and commercial applications. We are trusted by our customers to protect their mission-critical information in the face of advancedpersistent threats. Our offensive security engineers emulate these real-world threats and provide critical signal on attack vectors to help improve our security … opportunities to work with our Protect team to identify vulnerabilities in our product infrastructure and help define relevant security controls. Help defend a unique threat environment. Palantir offers an unparalleled opportunity to ply your craft on the bleeding edge of technology, software … and AI. With a wide range of customers and global impact, our software is under constant threat from advancedpersistent threats (APT). You get to think like an attacker and provide outside-the-box thinking on how to misuse our products. Core Responsibilities Perform offensive security More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
All the top bananas UK
and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Cyber Threat Hunter Job Title: Cyber Threat Analyst Requisition ID: 121703 Location: Leeds and surrounding area Grade: GG08 - GG09 Referral Bonus: £5,000 Role Description … The customer is committed to development of this improved SOC to be a benchmark of best practice and excellence in reflection of the significant threat that the protected systems are subject to. This role requires a minimum of SC clearance with the potential for DV Clearance in the future. … This role reports to the Delivery Lead/PMO. The Role You will be/have: Responsible for and capable of independently creating Threat Hunt Hypotheses, running Threat Hunts at a regular cadence Responsible for and capable of translating Threat Hunt Hypotheses into KQL Queries, running those More ❯
and implementing governance & risk management processes Design implementation and testing of security tooling BC/DR & Incident response capability building and testing Production of threat intelligence reports and research Supply Chain Risk Management Consultants must possess and be able to demonstrate credibility and experience as well as currency in … experts, and capabilities to protect and defend client organizations and their people, intellectual property, and technology against wide-ranging threats, including nation states and AdvancedPersistentThreat groups that act on their behalf. Consultants must be proactive, and able to lead, manage, and problem-solve on multiple … colleagues across the globe, specifically Digital Forensics, Incident Response and Penetration Testing specialists as well as wider BlueVoyant service offerings when appropriate, to produce threat-aware products, services and outputs that are impactful, efficient, cohesive, and are enhanced with intelligence and automation. BlueVoyant are trusted cyber-security partners and More ❯
in these positions - at the high end we are looking for deep experience defending highly contested critical assets and high-value cyber targets against advancedpersistent threats and state-level actors. We have more junior roles for exceptional individuals with a proven personal interest and engagement in cyber … also to contribute to the security of the wider open source ecosystem. They might share knowledge through public presentations and industry events, and share threat intelligence with the wider community or represent Canonical in sector-specific governance bodies. What you will do in this role: Implement and evolve Canonical … and guide the remediation of security threats and cyber attacks Grow the presence and thought leadership of Canonical SecOps practice Contribute to open source threat intelligence initiatives Drive threat modelling, table top exercises and other SecOps practices across Engineering, IS and Canonical Develop Canonical SecOps learning and development More ❯
to a business and an ability to effectively communicate those risks to stakeholders Preferred Qualifications: Direct experience with current advancedpersistent threats (APT) Undergraduate degree or equivalent experience Deep expertise with EnCase Experience with NetWitness, FireEye, Splunk, and/or RSA Security Analytics Knowledge of Volatility, Rekall and More ❯
corporate systems, while avoiding detection from common security tools. Demonstrated knowledge of tactics related to malicious insider activity, organized crime/fraud groups, and threat actors, both state and non-state sponsored. Solid understanding of offensive and pentest technologies. Ability to provide remediations recommendation based on test and automated … security testing result. Deep understanding of how an advance persistentthreat and their tactics, procedure and technics. Solid understanding of Enterprise Backend to Frontend system architecture. Familiarity with defender techniques, security monitoring and SIEM tools. Strong ability to analyse and distil complex issues and present succinct updates to More ❯