Security Research Engineer - Threat Protection The Role As a Security Research Engineer at Mimecast, you will be a pivotal technical expert dedicated to researching, analyzing, and developing detections for both malware and phishing threats. Your work will involve dissecting real-world file and web threats, building and optimizing detection signatures, and driving improvements to our advanced detection systems. This … role combines in-depth threat investigation with a focus on enhancing our capabilities to block evolving attacks and provide actionable insights to our customers and internal teams. Why Join Our Team? At Mimecast, you will be at the forefront of neutralizing diverse phishing and malware threats through comprehensive file analysis and research across web vectors. You will dissect … optimizing detection signatures using industry-standard tools like Yara and ClamAV, as well as Mimecast's advanced proprietary detection technologies. This is an opportunity to leverage vast real-world threat data and transform your technical expertise into tangible protection for millions of users globally. If you're driven to understand and dismantle sophisticated attacks, Mimecast offers a dynamic environment More ❯
advanced, and largest, intelligence company! As an entry-level analyst on Recorded Future's Managed Services team, you'll directly support our global clientele through critical triage, escalation, and threatanalysis activities. In collaboration with our Triage and Senior Research teams, you'll validate alerts, identify platform-level issues, and fine-tune detection mechanisms-all while helping to … strengthen the consistency and quality of our threat response offerings. What Makes This Role Unique? Recorded Future's Managed Services team blends tactical analysis with platform-level insights. You're not just triaging-you're actively shaping how alerts evolve, how SOPs scale, and how we partner with Triage Analysts. It's a launchpad for developing deep threat expertise at scale. What you'll do as an Associate Threat Intelligence Response Analyst: 1) Triage & Analysis Independently triage green/amber alerts and Swimlane cases for assigned accounts Conduct threat research escalated by senior analysts-covering phishing, credential harvesting, fraudulent domains, data leakage, social media monitoring, and malicious infrastructure Identify and report alerting rule issues More ❯
management, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threatanalysis and act as a subject matter expert for mitigating cyber risks. This is an outstanding opportunity for an accomplished Information Security Engineer to join a market leading More ❯
management, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threatanalysis and act as a subject matter expert for mitigating cyber risks. This is an outstanding opportunity for an accomplished Cyber Security Engineer to join a market leading More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Precise Placements
tools. Key Responsibilities: Lead and support incident response (IR) and investigation of security threats across a complex enterprise estate. Manage, tune, and develop SIEM and EDR technologies to enhance threat detection and response capabilities. Implement and refine playbooks , automations , and alerting rules in collaboration with security partners. Contribute to threat hunting and proactive detection strategies. Produce actionable reporting … working in or alongside a 24/7 Security Operations Centre . Strong technical exposure to SIEM (ideally Splunk), EDR (CrowdStrike preferred), and SOAR tools. Expertise in incident handling , threatanalysis , and digital forensics . Scripting or automation experience (Python, PowerShell, etc.) is highly beneficial. Knowledge of MITRE ATT&CK , NIST CSF , and related security frameworks. Legal, financial More ❯
The team you'll be working with: Consultant - Offensive Security Testing Role Overview: We are seeking a highly skilled and experienced Offensive Security Consultant with a strong focus on threat intelligence and attack methods. The ideal candidate will manage and conduct advanced penetration testing engagements, leveraging threat intelligence to simulate real-world attacks across various environments, including OT … provide strategic, actionable recommendations to enhance our clients' security posture. What you'll be doing: Responsibilities: Lead and manage the full lifecycle of complex penetration testing engagements, applying a threat intelligence-led approach. Execute advanced penetration tests across environments such as applications, infrastructure, web, APIs, O365, Azure, AWS, and OT, using current threat landscape knowledge and attacker TTPs. … Develop and maintain detailed test plans and use cases informed by threat intelligence analysis. Identify and prioritize critical OT and IT assets based on potential threats and exposure. Plan and schedule testing engagements based on threat assessments and client needs. Produce clear, detailed reports with technical findings, business impact, and strategic remediation recommendations for diverse audiences. Communicate complex More ❯
Drive the integration of security into every stage of the Software Development Lifecycle (SDLC). Design, implement, and manage security controls to ensure secure product design, development, and deployment. ThreatAnalysis and Mitigation : Collaborate with cross-functional teams to perform threat modelling, identify security risks, and implement effective countermeasures. Proactively assess the security posture of applications through … vulnerability scanning solutions. Strong grasp of secure coding practices and proficiency in integrating security into the Software Development Lifecycle (SDLC). Technical Knowledge and Implementation experience: Direct experience with threat modelling, security reviews, and penetration testing. Proven ability to secure cloud-native architectures, containerization technologies, and Infrastructure as Code (IaC) environments. Familiarity with industry standards and frameworks such as More ❯
West London, London, United Kingdom Hybrid / WFH Options
Walsh Employment
Defender XDR and Microsoft Sentinel (SIEM) Hands-on experience with the Microsoft Defender suite , including Endpoint Detection and Response Solid understanding of Microsoft 365 Cloud Technologies , particularly from a threat landscape perspective Certifications: SC-200 Microsoft Certified: Security Operations Analyst Associate SC-900 Microsoft Certified: Security, Compliance and Identity Fundamentals Personal Attributes: Highly motivated , with a can-do attitude … Communicating with internal stakeholders and clients during active incidents Liaising with third-party suppliers as a single point of contact for incidents Supporting the Cyber Security Team in ongoing threatanalysis and security incident management Maintaining a customer-first approach in all ticket management and communication Benefits & Working Hours Working Hours: 7.5 hours/day on a fortnightly More ❯
findings and intelligence to inform the firm's risk posture and regulatory reporting. Another key aspect of your role will be to manage the intelligence cycle-from collection and analysis to dissemination-ensuring that actionable intelligence is delivered to key stakeholders.Your leadership will ensure the FCIU not only resolves complex cases but also anticipates future threats, safeguarding Checkout. You … ll Make An Impact Lead and develop the strategic direction for the Financial Crime Intelligence Unit (FCIU), establishing it as a centre of excellence for complex investigations and proactive threat intelligence. Serve as a key partner to the MLROs, providing critical insights and comprehensive investigative reports to support SAR/STR decisions and responses to regulatory inquiries. Oversee and … terrorist financing, potential sanctions violations, and proliferation financing, ensuring thorough and timely resolution. Take ownership of the end-to-end investigation process for escalated cases, including evidence gathering, detailed analysis, and the documentation of findings for regulatory and internal purposes. Develop a proactive threatanalysis capability to identify emerging financial crime typologies and vulnerabilities across our platform More ❯
embed a DevSecOps culture and working practices. Working closely with IT security, engineering peers and architecture, the role will ensure that key security controls, toolchain automation, and risk/threatanalysis is carried out at every stage of the work done by the team. Drives User Experience : The Associate ensures that services which are being developed and supported … Qualifications Networks -Network Security Technology experience in this area includes but is not limited to: • Perimeter Security, including firewalls, intrusion detection/prevention (IDS/IPS), anti-malware and threat prevention (Check Point, Palo Alto Networks and Cisco). • Cloud network security (Check Point and Microsoft Azure). • Web Application Firewalls (WAFs) - SaaS/on Prem/Azure. • SSL More ❯
at reducing cyber risk posed by Artificial Intelligence Provide Artificial Intelligence security guidance and subject matter expertise to business and technology teams in areas such as information security assessments, threatanalysis and treatment, security best practices, and secure use of technologies Every single IT colleague is part of our Transformation journey. Join us and pursue your ambitions - our More ❯
landscape, it's important to look at what's actually happening on the ground. Here are the key trends shaping the cybersecurity conversation this year. Ransomware remains a major threat Attackers are becoming more targeted, more professional and more damaging, according to the Nash Squared/Harvey Nash Digital Leadership Report organised crime remains the biggest concern for digital … Zero Trust models. Typical salary: £65,000 to £95,000 DevSecOps Engineer - Combining development, operations and embedded security across the software lifecycle. Typical salary: £75,000 to £110,000 Threat Intelligence Analyst - Providing real-time insight into evolving threats and advising on proactive measures. Typical salary: £50,000 to £85,000 Cybersecurity Analyst - A key all-rounder role, analysts … Employers Are Prioritising Employers are looking for more than technical knowledge, they're searching for people who can make a real impact. Core technical skills include: Incident response and threat hunting Identity and access management Zero Trust architecture Familiarity with UK regulatory standards and NCSC guidance Certifications often requested: CISSP, CISM, CISA CompTIA Security+ ISO 27001 Cloud security credentials More ❯