Permanent Malware Analysis Jobs in London

1 to 25 of 28 Permanent Malware Analysis Jobs in London

Senior Cyber Operations Analyst

London, United Kingdom
Hybrid / WFH Options
GCS
Identification of emerging cyber security threats, attack techniques and technologies to detect/prevent incidents, and collaborate with networks and conferences to gain industry knowledge and expertise. * Management and analysis of security information and event management systems to collect, correlate and analyse security logs, events and alerts/potential threats. * Triage of data loss prevention alerts to identify and … organisation sub-function. * Collaborate with other areas of work, for business aligned support areas to keep up to speed with business activity and the business strategy. * Engage in complex analysis of data from multiple sources of information, internal and external sources such as procedures and practises (in other areas, teams, companies, etc).to solve problems creatively and effectively. * Communicate … play a key role as part of a 24/7 security monitoring team. As Tier 2 Analysts you will handle escalated incidents from Tier 1 analysts, conduct deeper analysis, and work closely with senior security teams to contain and mitigate threats. This role is part of a large global team which operates follow-the-sun. This role requires More ❯
Employment Type: Permanent
Salary: £60000 - £65000/annum
Posted:

Senior Cyber Operations Analyst

London, United Kingdom
Hybrid / WFH Options
慨正橡扯
play a key role as part of a 24/7 security monitoring team. As Tier 2 Analysts you will handle escalated incidents from Tier 1 analysts, conduct deeper analysis, and work closely with senior security teams to contain and mitigate threats. This role is part of a large global team which operates follow-the-sun. This role requires … be successful as a Senior Cyber Operations Analyst you will need the following: Proficiency in SIEM technologies including Splunk Proactively search for potential threats using behavioral analytics, network traffic analysis, and threat intelligence. Incident response skills, including proficiency in PCAP capture, network analysis, and traffic pattern recognition. Knowledge of attack techniques (MITRE ATT&CK framework, malware analysis More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations Analyst

London, United Kingdom
dunnhumby
all are mandatory. You will have strong understanding of as many of the following areas as possible, and be able to demonstrate it: Security Detection and Monitoring Detection Engineering Malware Analysis (Static and Dynamic) Threat Hunting and Threat Intelligence (MITRE ATT&CK) Penetration Testing Security Automation (SOAR) It would help if you had experience with the following: SIEM … tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) Programming (Python, or other languages) What you can expect from us We won't just meet your expectations. We'll defy them. So you'll enjoy the comprehensive rewards package you'd expect from a leading More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Analyst

London, England, United Kingdom
Pentest People
for both technical and non-technical stakeholders. Technical Skills: Experience in incident response and investigation using tools like SIEM, SOAR, and EDR platforms. Proficiency in digital forensics and log analysis across Networking, Windows, Mac, Linux, or Cloud environments. Strong understanding of evidence collection and prioritisation procedures. In-depth knowledge of NIST 800-61 incident response lifecycle, including containment, eradication … digital forensics, including evidence acquisition and chain-of-custody practices. Familiarity with frameworks such as MITRE ATTACK, Lockheed Martin Kill Chain, or the Diamond Model. Ability to perform dynamic malware analysis. Knowledge of open-source IR tools such as Velociraptor, Eric Zimmerman Tools, Chainsaw, Volatility, SOF-ELK, or DFIR-IRIS is preferred. Desirable Qualifications: Industry certifications such as ECIH … disruption. Strong communication skills with the ability to stay calm and effective under pressure. Able to align client deliverables with industry best practices. Skilled in proactive threat intelligence and analysis to support IR operations. Proactive, responsible, and eager to contribute to the growth of the Incident Response team. While this role is advertised as remote, it will require occasional More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

Central London, UK
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

West London, UK
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

City of London, London, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

East London, London, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

London, England, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

South East London, England, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

Central London / West End, London, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst Tier 1

London, England, United Kingdom
Hybrid / WFH Options
Cybereason
MDR) and Managed Extended Detection and Response (MXDR) services to large organisations around the globe. You’ll be working closely with some of the best minds in incident response, malware analysis, and security research, partnering with our customers and partners to defend against the most advanced adversaries. We value our people and empower them to work remotely. As … such as Product, Customer Success, etc.) What We Are Looking For: Previous experience in a CIRT/SOC environment. 1+ years of experience is an advantage. General familiarity with malware and its techniques (e.g., code injection, fileless execution, maintaining persistence) Familiarity with static and behavioral malware analysis methods and tools (e.g., sandbox environments) Background and experience in … at least two of the following is an advantage: Endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse engineering, or digital forensics Familiarity with common operating system concepts (e.g., processes, threads, DLLs, parent-child process relationships, scheduled tasks) Solid foundation in networking protocols and architectures Experience with a scripting language (Python, Bash, PowerShell, etc.) Self-motivated More ❯
Posted:

Security Engineer, Incident Response , AWS Corporate Security

London, United Kingdom
Amazon
monitoring and response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, detection and hunting, and emergent security intelligence. We don't expect you to be an expert in all of the domains mentioned … security incidents. - Proficiency with a programming or scripting language. PREFERRED QUALIFICATIONS - 5+ years experience working in incident response, security operations, security automation tooling, hunting, or threat intelligence. - Familiarity with malware analysis, forensics, SOAR, SIEM platforms, or detection engineering and hunting. Demonstrable subject matter expertise in any of these domains a plus. - Proficiency across a variety of Operating Systems More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Incident Response Engineer, AWS CorpSec Response

London, United Kingdom
Amazon
monitoring and response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of the domains mentioned above, but we … response response, security automation tooling, threat intelligence, or forensics. - Experience with Amazon Web Services. - Experience in Security Incident Response and proficiency in at least one of the following domains: Malware Analysis/Reverse Engineering; Digital Forensics; Security Tool Development & Automation; Programming/Scripting; Network & OS Security; Identity Management Amazon is an equal opportunities employer. We believe passionately that More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer: Detection and Response

London, United Kingdom
Hybrid / WFH Options
Menlo Ventures
scale Kubernetes environments. A high level of proficiency in Python and query languages such as SQL. Experience analyzing attack behavior and prototyping high-quality detections. Experience with threat intelligence, malware analysis, infrastructure as code, detection engineering, or forensics. Experience contributing to a high growth startup environment. Deadline to apply: None. Applications will be reviewed on a rolling basis. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Content Engineer, Blue Team

London, United Kingdom
Hybrid / WFH Options
TryHackMe Ltd
Analyst, Security Engineer, Incident Responder, Threat Hunter or Digital Forensics Investigator. You should also demonstrate: Strong expertise in core blue team areas: incident detection and response, threat intelligence, log analysis, security monitoring, and digital forensics. A deep understanding of networking, computing, and operating systems as they relate to security practices. Familiarity with blue team tooling (e.g., SIEM, EDR, IDS …/IPS, forensic tools) and methodologies (e.g., MITRE ATT&CK framework, log analysis, malware analysis). Proven ability to research and adapt to emerging threats and technologies and translate that knowledge into engaging training content. Strong verbal and written English communication skills, essential for conveying complex technical concepts. Job Responsibilities Research, design, and develop defensive cyber security … training material with supporting hands-on lab exercises (such as virtual machines and datasets for analysis). Collaborate with the Content Engineering Team to support security training coverage and identify content development opportunities. Experience developing and configuring virtual machines and sample datasets for realistic cybersecurity labs. Provide guidance and support to other Content Engineering Team members in areas of More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Security Specialist

London, England, United Kingdom
Credit Agricole CIB
alerts to relevant stakeholders, helping assess potential impacts on organizational assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malware analysis and threat hunting. Collaborate with the CERT team in maintaining an up-to-date threat landscape and contributing to the incident response playbooks. Security Risk Management and More ❯
Posted:

Information Security Specialist

South East London, England, United Kingdom
Credit Agricole CIB
alerts to relevant stakeholders, helping assess potential impacts on organizational assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malware analysis and threat hunting. Collaborate with the CERT team in maintaining an up-to-date threat landscape and contributing to the incident response playbooks. Security Risk Management and More ❯
Posted:

Security Operations Engineer, AWS Security Cloud Response

London, United Kingdom
Amazon
mix of deep technical knowledge and a demonstrated background in information security. We value broad and deep technical knowledge, specifically in the fields of cryptography, network security, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. Key Responsibilities Confidently and intelligently respond to security incidents, and proactively consider how to prevent the same type More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations Engineer - Corporate Security

London, United Kingdom
Amazon
monitoring and response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of the domains mentioned above, but we … to security incidents. Proficiency with one high-level programming or scripting language PREFERRED QUALIFICATIONS 3+ years experience working in security response, security automation tooling, or threat intelligence Familiarity with malware analysis, forensics, SOAR, SIEM platforms, and a variety of Operating Systems (MS Windows, Linux, MacOS) Experience with Amazon Web Services Meets/exceeds Amazon's leadership principles requirements More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cyber Security Analyst

London, United Kingdom
Barclay Simpson
of the firm's information assets. In this role you will also act as the first point of contact for security-related incidents, and do other investigative work including malware analysis, email forensics, and other incident response activities. The successful candidate will be a hands-on, technically skilled security professional with experience across a broad range of cybersecurity More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

AI Engineer

City Of Westminster, London, United Kingdom
Resource Area for Teaching
e s . On top of the latest developments in the industry, and able to advise on new and alt ernative approaches to solving problems. Lead Day 2 monitoring & analysis of models. What you'll need to be successful: Advanced knowledge of machine learning, deep learning, and statistical analysis. Massive bonus points if you have experience applying these skills … to threat detection, malware analysis, phishing, and/or abuse detection. Experience designing and implementing anomaly detection, classification, clustering, and retrieval across vision and language models, ideally for identifying cyber threats (URLs, domains, phishing, botnets, etc.) Hands-on experience building production -grade AI pipelines, including data ingestion, feature engineering, validation, model deployment, and monitoring . Proficient in a More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Artificial Intelligence Engineer

London Area, United Kingdom
Hybrid / WFH Options
Franklin Bates
their capabilities, increase the quality of their offering and evolve their platform. Required experience for the Senior/Principal AI Engineer role: Machine learning (ML), deep learning and statistical analysis skills – even better if these skills have been applied to threat detection, malware analysis, phishing and/or abuse detection. Experience building production-grade AI pipelines, including More ❯
Posted:

Artificial Intelligence Engineer

City of London, London, United Kingdom
Hybrid / WFH Options
Franklin Bates
their capabilities, increase the quality of their offering and evolve their platform. Required experience for the Senior/Principal AI Engineer role: Machine learning (ML), deep learning and statistical analysis skills – even better if these skills have been applied to threat detection, malware analysis, phishing and/or abuse detection. Experience building production-grade AI pipelines, including More ❯
Posted:

Artificial Intelligence Engineer

South East London, England, United Kingdom
Hybrid / WFH Options
Franklin Bates
their capabilities, increase the quality of their offering and evolve their platform. Required experience for the Senior/Principal AI Engineer role: Machine learning (ML), deep learning and statistical analysis skills – even better if these skills have been applied to threat detection, malware analysis, phishing and/or abuse detection. Experience building production-grade AI pipelines, including More ❯
Posted:
Malware Analysis
London
10th Percentile
£69,375
25th Percentile
£78,750
Median
£85,000
75th Percentile
£89,375
90th Percentile
£90,000