governance and identity lifecycle processes in a highly View job & apply CTI Analyst Location: London Job type: Permanent Financial Services firm seeks an Operational CTI Analyst to join its Threat Intelligence team. Th View job & apply Senior Manager - BCM Second Line Location: Frankfurt Salary: 125,000 + Benefits Job type: Permanent Sector: Banking We are seeking a Senior Manager … type: Permanent Leading banking group seeks a Cryptography Analyst to join their security team. As an Analyst in We are seeking a highly motivated and skilled InsiderThreat Investigations Lead to join a newly formed InsiderThreat Team. This role focuses on identifying, preventing, and responding to risks posed by individuals with authorized access … suits someone with strong investigative skills, an analytical mindset, the ability to interpret and act on data, and the capability to execute initiatives that strengthen the insiderthreat programme. Key Responsibilities Support the delivery of the insiderthreat programme, including developing tools, standards, and procedures to detect, prevent, and respond to insiderMore ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
UKRI
professionals to deliver impact across the organisation and the wider UK research and innovation system. Join us for this rare opportunity to apply your experience in offensive security and threat intelligence in a dynamic, fast-paced security operational and strategic role in an organisation at the heart of research and innovation in the UK. Leading the Red Team of … proactive advice to teams on the most effective remediation strategies. The role encompasses the full scope and delivery of penetration testing, including black box network assessments, insiderthreat evaluations, credentialed application exploitation, and rigorous testing of human and physical security controls across the UKRI estate. In addition to these offensive security responsibilities, the specialist manages the external … check Key Responsibilities: Execute targeted penetration tests and red team exercises to identify exploitable vulnerabilities. Develop and maintain offensive tooling to simulate adversary tactics and techniques. Monitor and analyse threat intelligence feeds to identify emerging threats and relevant TTPs. Produce technical threat reports and briefings to inform security posture and decision-making. Conduct proactive threat hunting based More ❯
Keyworth, Nottinghamshire, United Kingdom Hybrid / WFH Options
UK Research and Innovation (UKRI)
professionals to deliver impact across the organisation and the wider UK research and innovation system. Join us for this rare opportunity to apply your experience in offensive security and threat intelligence in a dynamic, fast-paced security operational and strategic role in an organisation at the heart of research and innovation in the UK. Leading the Red Team of … proactive advice to teams on the most effective remediation strategies. The role encompasses the full scope and delivery of penetration testing, including Black Box network assessments, insiderthreat evaluations, credentialed application exploitation, and rigorous testing of human and physical security controls across the UKRI estate. In addition to these offensive security responsibilities, the specialist manages the external … check Key Responsibilities: Execute targeted penetration tests and red team exercises to identify exploitable vulnerabilities. Develop and maintain offensive tooling to simulate adversary tactics and techniques. Monitor and analyse threat intelligence feeds to identify emerging threats and relevant TTPs. Produce technical threat reports and briefings to inform security posture and decision-making. Conduct proactive threat hunting based More ❯
configuration, and administration of privileged access management (PAM) solution such as Delinea , CyberArk. Knowledge on cybersecurity principles and best practices, with focus on securing privileged access and preventing insider threats. Strong knowledge of privileged access management concepts and best practices. Hands on experience on integration of privileged management solutions with tools such as Active Directory, Azure/OKTA More ❯
configuration, and administration of privileged access management (PAM) solution such as Delinea , CyberArk. Knowledge on cybersecurity principles and best practices, with focus on securing privileged access and preventing insider threats. Strong knowledge of privileged access management concepts and best practices. Hands on experience on integration of privileged management solutions with tools such as Active Directory, Azure/OKTA More ❯
configuration, and administration of privileged access management (PAM) solution such as Delinea , CyberArk. Knowledge on cybersecurity principles and best practices, with focus on securing privileged access and preventing insider threats. Strong knowledge of privileged access management concepts and best practices. Hands on experience on integration of privileged management solutions with tools such as Active Directory, Azure/OKTA More ❯
london (city of london), south east england, united kingdom
Persistent Systems
configuration, and administration of privileged access management (PAM) solution such as Delinea , CyberArk. Knowledge on cybersecurity principles and best practices, with focus on securing privileged access and preventing insider threats. Strong knowledge of privileged access management concepts and best practices. Hands on experience on integration of privileged management solutions with tools such as Active Directory, Azure/OKTA More ❯
configuration, and administration of privileged access management (PAM) solution such as Delinea , CyberArk. Knowledge on cybersecurity principles and best practices, with focus on securing privileged access and preventing insider threats. Strong knowledge of privileged access management concepts and best practices. Hands on experience on integration of privileged management solutions with tools such as Active Directory, Azure/OKTA More ❯
digital forensics team. This is a client-facing role where you'll lead DFIR (Digital Forensics & Incident Response) investigations, guide executives through cyber incidents, and help organisations strengthen their threat detection, response, and resilience. If you're an expert in incident response, threat hunting, and forensic analysis and thrive under pressure, this is your opportunity to work on … from breach triage and containment to full recovery. Client Engagement: Act as a trusted advisor to CISOs, boards, and regulators, providing executive-level briefings during and after incidents. Forensics & Threat Hunting: Conduct advanced forensic investigations across endpoints, servers, networks, cloud platforms, and SaaS. Adversary Analysis: Use threat intelligence and MITRE ATT&CK to attribute attacks and inform proactive … digital forensics. Industry Contribution: Publish thought leadership, speak at conferences, and represent the business at NCSC CIR and key cybersecurity forums. Required Skills & Experience Proven experience in incident response, threat hunting, or digital forensics (DFIR), ideally in consulting or client-facing roles. Hands-on leadership of large-scale incidents such as ransomware, insiderthreats, or advanced persistent More ❯
/DFIR Consultant) to join their team. As an Incident Responder, you'll take the lead on active engagements involving real-world attacks such as ransomware, data breaches, insiderthreats, and more. You'll conduct forensic investigations, advise clients on containment and recovery strategies, work on delivery and implementation, and produce detailed post-incident reports. This is a … incident response for a diverse client base, ensuring effective containment, investigation, and recovery. Conduct in-depth digital forensic analysis of relevant incident data Monitor and interpret the evolving cyber threat landscape, providing clients with timely, relevant insights into emerging threats, tactics, and vulnerabilities that may impact their organisation. Act as a key point of contact for clients, ensuring clear More ❯
/DFIR Consultant) to join their team. As an Incident Responder, you'll take the lead on active engagements involving real-world attacks such as ransomware, data breaches, insiderthreats, and more. You'll conduct forensic investigations, advise clients on containment and recovery strategies, work on delivery and implementation, and produce detailed post-incident reports. This is a … incident response for a diverse client base, ensuring effective containment, investigation, and recovery. Conduct in-depth digital forensic analysis of relevant incident data Monitor and interpret the evolving cyber threat landscape, providing clients with timely, relevant insights into emerging threats, tactics, and vulnerabilities that may impact their organisation. Act as a key point of contact for clients, ensuring clear More ❯