3 of 3 Permanent Cyber Threat Jobs in Oxfordshire

Domain Abuse Operational Analyst

Hiring Organisation
Jobleads-UK
Location
Oxford, England, United Kingdom
.UK registry and help protect users from online harm. This is an ideal opportunity for someone with a strong interest in cyber threat operations and a desire to build hands‐on experience and develop their skills further. What You’ll Be Doing Investigating domain abuse reports using … ability to summarise investigations clearly and accurately Comfortable following standard operating procedures and suggesting improvements Nice to have Awareness of cyber threat intelligence (CTI) and its application in operational environments Initial understanding and appreciation of regulatory considerations affecting domain abuse (for example, GDPR) and legal requirements around ...

Information Security Engineer - Medical Device

Hiring Organisation
CT19
Location
Kidlington, England, United Kingdom
dose 3D radiography systems that will significantly improve the accessibility and cost of advanced medical imaging. The team are looking for a Product Cyber Security Engineer to support the security of next-generation imaging systems as they move from R&D into commercial deployment. Working with engineering … Join a fast-growing DeepTech medical device start-up Highly varied role across Cloud, Embedded Systems, Infrastructure, Integrations and more Job title: Product Cyber Security Engineer Location: Oxford (Hybrid – 2–3 days onsite) Salary: Competitive + extensive benefits package including pension, flexible benefits allowance, enhanced parental leave ...

Domain Abuse Operations Analyst — Hybrid & Flexible Impact

Hiring Organisation
Jobleads-UK
Location
Oxford, England, United Kingdom
hiring a Domain Abuse Operational Analyst to manage domain abuse reports and support investigations. This hybrid role requires a strong interest in cyber threats and experience with documentation systems. Responsibilities include investigating reports and improving processes. Ideal candidates will have a working knowledge of cyber threats ...