Permanent Malware Analysis Jobs in the South East

6 of 6 Permanent Malware Analysis Jobs in the South East

Security Researcher

london, south east england, united kingdom
Aspiron Search
Aspiron are retained by one of the most exciting London based security startups building an Reverse Engineering and Malware Analysis product. They are building a world class tech hub in the UK, looking for strong security research talent to join them on their mission, building cutting edge tech enabling you to work with the UK and US Gov … and many more. You'll be tasked with creating tooling for building and analysing software created in C/C++, GO, Rust, Java or C# and developing novel program analysis techniques for identifying using AI models. Requirements: Recent and relevant experience in Reverse engineering, Security research, malware analysis and Vulnerability research. Familiar with IDA Pro or Ghidra More ❯
Posted:

Security Researcher

slough, south east england, united kingdom
Aspiron Search
Aspiron are retained by one of the most exciting London based security startups building an Reverse Engineering and Malware Analysis product. They are building a world class tech hub in the UK, looking for strong security research talent to join them on their mission, building cutting edge tech enabling you to work with the UK and US Gov … and many more. You'll be tasked with creating tooling for building and analysing software created in C/C++, GO, Rust, Java or C# and developing novel program analysis techniques for identifying using AI models. Requirements: Recent and relevant experience in Reverse engineering, Security research, malware analysis and Vulnerability research. Familiar with IDA Pro or Ghidra More ❯
Posted:

Security Researcher

london (city of london), south east england, united kingdom
Aspiron Search
Aspiron are retained by one of the most exciting London based security startups building an Reverse Engineering and Malware Analysis product. They are building a world class tech hub in the UK, looking for strong security research talent to join them on their mission, building cutting edge tech enabling you to work with the UK and US Gov … and many more. You'll be tasked with creating tooling for building and analysing software created in C/C++, GO, Rust, Java or C# and developing novel program analysis techniques for identifying using AI models. Requirements: Recent and relevant experience in Reverse engineering, Security research, malware analysis and Vulnerability research. Familiar with IDA Pro or Ghidra More ❯
Posted:

Threat Intelligence Specialist

London, South East, England, United Kingdom
QBE Management Services (UK) Limited
researching, analysing, and reporting on cyber threats targeting QBE’s global operations and technology environment. This role has a strong technical focus, centred on the collection, enrichment, automation, and analysis of adversary tactics, techniques, and procedures (TTPs) across the Unified Kill Chain and MITRE ATT&CK frameworks. You’ll also support strategic intelligence functions, acting as a backup point … of contact when needed to ensure continuity of intelligence delivery across our global CTI capability. Main Responsibilities: Conduct advanced technical analysis of cyber threats using proactive and reactive intelligence methods. Collect, enrich, and disseminate threat intelligence from internal telemetry, commercial sources, and OSINT. Design and maintain automated intelligence workflows and integrations using APIs and scripting. Track and analyse adversary … infrastructure, malware, and campaigns relevant to QBE’s environment. Continuously assess the evolving threat landscape to determine exposure, likelihood, and business impact. Produce actionable intelligence outputs including indicator packages, threat actor profiles, and campaign assessments. Translate complex technical findings into concise, risk-based intelligence for decision-making. Collaborate with SOC, Detection Engineering, and Incident Response teams on purple-team More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

SOC Shift Lead

Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria
you do need to be eligible for DV Clearance for this role. What you'll be doing: Monitor, triage, and investigate security incidents on critical client infrastructure. In depth analysis of network traffic, logs, and system events to identify potential security threats and vulnerabilities. Line Management. Maintain, improve and develop team knowledge of SOC tools, security operations and triage. … Analyse and improve detection rules and use cases in line with Mitre Att&ck and threat-informed defence. Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. Represent the SOC within Partners meetings. Ability to work shift from our office in Hemel Hempstead. What youll bring: Demonstrable experience in Security Operations Centre. People … of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Static malware analysis and reverse engineering. DV Clearance. Programming and scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Posted:

SOC Principal Analyst

London, South East, England, United Kingdom
QBE Management Services (UK) Limited
Global Security Operations team. Your new role This is an exciting hands-on technical role in which the specialist will use their security skills and knowledge to perform advanced analysis on the collection of cyber threats using high-level proactive and reactive threat hunting methods, classifying, analysing, prioritising and remediating security alerts/events. The focus is to provide … resources to correlate suspicious events, providing context around the event, determine root cause and provide regular updates and recommend modifications to existing systems and procedures. Perform deep-dive incident analysis of various data sources by analysing and investigating security related logs against medium-term threats and IOCs Actively manage and apply the phases of Incident Response (preparation, identification, containment … technologies, including: Windows, Linux, Networking, Security Architecture experience and knowledge of packet flow/TCP/UDP traffic, Firewall and proxy technologies, cloud solutions, anti-virus, static and dynamic malware analysis techniques Expert in performing analytics with different types of logs, i.e. network, active directory, database, DNS, firewall, proxies, host-based security, cloud and applications logs etc. Working More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted: