Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Crimson
and manage competing demands. * Experience in analyzing IT logs and event sources is preferred. * Monitor and administer Security Information and Event Management (SIEM). * Malwareanalysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking and threat resolution. * Familiarity with data storage systems … backup solutions, and restoration methods. * Understanding of security tools, their functions, and applications, including Anti-Malware, IPS, Web and Email Gateways, security analysis tools, web security tools, and next-generation firewalls/UTMs. * Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing … and manage competing demands. * Experience in analyzing IT logs and event sources is preferred. * Monitor and administer Security Information and Event Management (SIEM). * Malwareanalysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking and threat resolution. * Familiarity with data storage systems More ❯
into cyber security incidents. * Conduct proactive threat hunting to detect and neutralize emerging threats. * Monitor and analyze logs via SIEM, EDR, and network traffic analysis tools for potential attack indicators. * Investigate security incidents, including malware infections, phishing attacks, and unauthorized access attempts. * Develop and enhance incident response playbooks … ensuring alignment with evolving threats. * Analyze threat intelligence sources to identify new attack vectors and adversary tactics. * Provide forensic analysis and malware reverse engineering to assess security incidents. * Collaborate with IT, Risk, and Compliance teams to ensure regulatory compliance and security best practices. * Produce timely reports on incident … YOU ARE GOOD AT* * Strong verbal and written communication skills for stakeholder engagement and incident reporting. * Deep knowledge of cyber-attack techniques, including phishing, malware, ransomware, lateral movement, and data exfiltration. * Strong hands-on experience with SIEM, EDR, IDS/IPS, and forensic analysis tools. * Expertise in threat More ❯
into cyber security incidents. * Conduct proactive threat hunting to detect and neutralize emerging threats. * Monitor and analyze logs via SIEM, EDR, and network traffic analysis tools for potential attack indicators. * Investigate security incidents, including malware infections, phishing attacks, and unauthorized access attempts. * Develop and enhance incident response playbooks … ensuring alignment with evolving threats. * Analyze threat intelligence sources to identify new attack vectors and adversary tactics. * Provide forensic analysis and malware reverse engineering to assess security incidents. * Collaborate with IT, Risk, and Compliance teams to ensure regulatory compliance and security best practices. * Produce timely reports on incident … YOU ARE GOOD AT* * Strong verbal and written communication skills for stakeholder engagement and incident reporting. * Deep knowledge of cyber-attack techniques, including phishing, malware, ransomware, lateral movement, and data exfiltration. * Strong hands-on experience with SIEM, EDR, IDS/IPS, and forensic analysis tools. * Expertise in threat More ❯
the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malwareanalysis, forensics, security operations, incident response, detection and hunting, and emergent security intelligence. We don't expect you to be an expert in … programming or scripting language. PREFERRED QUALIFICATIONS - 5+ years experience working in incident response, security operations, security automation tooling, hunting, or threat intelligence. - Familiarity with malwareanalysis, forensics, SOAR, SIEM platforms, or detection engineering and hunting. Demonstrable subject matter expertise in any of these domains a plus. - Proficiency across More ❯
the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malwareanalysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of the … one high-level programming or scripting language PREFERRED QUALIFICATIONS - 3+ years experience working in security response, security automation tooling, or threat intelligence - Familiarity with malwareanalysis, forensics, SOAR, SIEM platforms, and a variety of Operating Systems (MS Windows, Linux, MacOS) - Experience with Amazon Web Services - Meets/exceeds More ❯
the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malwareanalysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of the … one high-level programming or scripting language PREFERRED QUALIFICATIONS 3+ years experience working in security response, security automation tooling, or threat intelligence Familiarity with malwareanalysis, forensics, SOAR, SIEM platforms, and a variety of Operating Systems (MS Windows, Linux, MacOS) Experience with Amazon Web Services Meets/exceeds More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
your needs and training and development opportunities. What you'll be doing: Monitor, triage, and investigate security incidents on critical client infrastructure. In-depth analysis of network traffic, logs, and system events to identify potential security threats and vulnerabilities. Provide Incident Response support. Maintain, improve and develop team knowledge … clients to both technical and non-technical audiences and continuously improve their content and presentation. Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. What youll bring: Experience in Security Operations Centre. Demonstrable experience of Managing Microsoft Sentinel and Splunk implementations. Knowledge and … Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusion detection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
dynamic environment. What You'll Be Doing: Actively monitor, triage, and conduct in-depth investigations into security incidents impacting critical client infrastructure. Perform detailed analysis of network traffic, diverse log sources (system, application, network), and other security data to identify threats and vulnerabilities. Provide crucial Incident Response (IR) support … tailored for both technical and non-technical audiences, focusing on continuous improvement of content and delivery. Maintain meticulous security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. What You'll Bring: Proven experience working within a Security Operations Centre (SOC) environment. Demonstrable experience of managing or … infrastructure and security concepts: client-server applications, multi-tier web apps, databases, firewalls, VPNs, enterprise endpoint protection, etc. Deep technical knowledge related to the analysis of log data and intrusion detection systems (IDS). A strong grasp of networking principles: TCP/IP, WANs, LANs, and common internet protocols More ❯
Hemel Hempstead, Felden, Hertfordshire, United Kingdom
FINTEC recruit Ltd
operational improvements, working onsite, leading and mentoring a small team. Responsibilities: Monitoring, triaging, and investigating alerts across host and network security systems Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities Providing mentoring & line management to SOC Analysts Enhancing team knowledge across SOC tooling … Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis Experience of static malwareanalysis and reverse engineering (desirable) Scripting or programming with Python, Perl, Bash, PowerShell or C++ (desirable not an essential More ❯
operational improvements, working onsite, leading and mentoring a small team. Responsibilities: Monitoring, triaging, and investigating alerts across host and network security systems Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities Providing mentoring & line management to SOC Analysts Enhancing team knowledge across SOC tooling … Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis Experience of static malwareanalysis and reverse engineering (desirable) Scripting or programming with Python, Perl, Bash, PowerShell or C++ (desirable not an essential More ❯
experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/… IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malwareanalysis and reverse engineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity with … the team through sophisticated cyber defence challenges. Your responsibilities will include: Monitoring, triaging, and investigating alerts across host and network security systems Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities Providing line management to SOC Analysts—developing capability and supporting career progression Enhancing More ❯
experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/… IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malwareanalysis and reverse engineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity with … the team through sophisticated cyber defence challenges. Your responsibilities will include: Monitoring, triaging, and investigating alerts across host and network security systems Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities Providing line management to SOC Analysts—developing capability and supporting career progression Enhancing More ❯
experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases, firewalls, VPNs, enterprise AntiVirus solutions Networking principles (e.g. TCP/… IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP) It would also be desirable if you were to have Experience in static malwareanalysis and reverse engineering Any scripting or programming with Python, Perl, Bash, PowerShell, or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team … cyber defence challenges. The Soc Shift Leader would be tasked with Monitoring, triaging, and investigating alerts across host and network security systems Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities Providing line management to SOC Analysts—developing their skills and supporting career progression More ❯
Cheltenham, Gloucestershire, United Kingdom Hybrid / WFH Options
MI5
teamwork. The Role As a Senior Cyber Security Analyst, you'll be key to protecting our organisation against a range of cyber threats. From malware outbreaks and insider activity to denial-of-service attacks and phishing, your role will be vital in detecting, responding to, and mitigating risks. On … reviewing notifications from the previous night and prioritising incidents based on severity and impact. About You You'll bring a background in cyber security analysis and a passion for IT. Ideally, you'll have experience with host intrusion detection analysis, but don't worry if that's an … experience of working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malwareanalysis, intrusion detection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
eligible for DV Clearance for this role. What you'll be doing: Monitor, triage, and investigate security incidents on critical client infrastructure. In depth analysis of network traffic, logs, and system events to identify potential security threats and vulnerabilities. Line Management. Maintain, improve and develop team knowledge of SOC … detection rules and use cases in line with Mitre Att&ck and threat-informed defence. Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. Represent the SOC within Partners meetings. Ability to work shift from our office in Hemel Hempstead. What youll bring …/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Static malwareanalysis and reverse engineering. DV Clearance. Programming and scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Luton, England, United Kingdom Hybrid / WFH Options
Crimson
and manage competing demands. • Experience in analyzing IT logs and event sources is preferred. • Monitor and administer Security Information and Event Management (SIEM). • Malwareanalysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data storage systems … backup solutions, and restoration methods. • Understanding of security tools, their functions, and applications, including Anti-Malware, IPS, Web and Email Gateways, security analysis tools, web security tools, and next-generation firewalls/UTMs. • Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing More ❯
Luton, south west england, United Kingdom Hybrid / WFH Options
Crimson
and manage competing demands. • Experience in analyzing IT logs and event sources is preferred. • Monitor and administer Security Information and Event Management (SIEM). • Malwareanalysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data storage systems … backup solutions, and restoration methods. • Understanding of security tools, their functions, and applications, including Anti-Malware, IPS, Web and Email Gateways, security analysis tools, web security tools, and next-generation firewalls/UTMs. • Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing More ❯
luton, bedfordshire, east anglia, United Kingdom Hybrid / WFH Options
Crimson
and manage competing demands. • Experience in analyzing IT logs and event sources is preferred. • Monitor and administer Security Information and Event Management (SIEM). • Malwareanalysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data storage systems … backup solutions, and restoration methods. • Understanding of security tools, their functions, and applications, including Anti-Malware, IPS, Web and Email Gateways, security analysis tools, web security tools, and next-generation firewalls/UTMs. • Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing More ❯
Luton, south east england, United Kingdom Hybrid / WFH Options
Crimson
and manage competing demands. • Experience in analyzing IT logs and event sources is preferred. • Monitor and administer Security Information and Event Management (SIEM). • Malwareanalysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data storage systems … backup solutions, and restoration methods. • Understanding of security tools, their functions, and applications, including Anti-Malware, IPS, Web and Email Gateways, security analysis tools, web security tools, and next-generation firewalls/UTMs. • Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing More ❯
experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/… IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malwareanalysis and reverse engineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity with … the team through sophisticated cyber defence challenges. Your responsibilities will include: Monitoring, triaging, and investigating alerts across host and network security systems Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities Providing line management to SOC Analysts—developing capability and supporting career progression Enhancing More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/… IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malwareanalysis and reverse engineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity with … the team through sophisticated cyber defence challenges. Your responsibilities will include: Monitoring, triaging, and investigating alerts across host and network security systems Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities Providing line management to SOC Analysts developing capability and supporting career progression Enhancing More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/… IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malwareanalysis and reverse engineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity with … the team through sophisticated cyber defence challenges. Your responsibilities will include: Monitoring, triaging, and investigating alerts across host and network security systems Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities Providing line management to SOC Analystsdeveloping capability and supporting career progression Enhancing team More ❯
experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/… IP, WAN, LAN, SMTP, FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malwareanalysis and reverse engineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity with additional … the team through sophisticated cyber defence challenges. Your responsibilities will include: Monitoring, triaging, and investigating alerts across host and network security systems Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities Providing line management to SOC Analysts—developing capability and supporting career progression Enhancing More ❯
understanding of as many of the following areas as possible, and be able to demonstrate it: Security Detection and Monitoring Incident Response Detection Engineering MalwareAnalysis (Static and Dynamic) Threat Hunting and Threat Intelligence (MITRE ATT&CK) Cloud Security Penetration Testing Security Automation (SOAR) It would help if … you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) Intrusion Detection/Prevention Systems (IDS/IPS) (Suricata, Snort, Bro, Cisco, Palo Alto) Web Proxies (Bluecoat, Zscaler, Squid More ❯
to integrate threat intelligence into security operations and incident response processes ️ Using advanced tools and techniques to track and analyze threat actors, APTs, and malware campaigns ️ Developing and presenting actionable intelligence reports to stakeholders to improve proactive defense strategies ️ Collaborating with external partners, industry groups, and threat intelligence vendors … to gather and share threat data What We're Looking For: ️ Proven experience as a Cyber Threat Intelligence Specialist or in a similar threat analysis role ️ Strong knowledge of threat intelligence frameworks (e.g., STIX/TAXII, MITRE ATT&CK) and tools (e.g., SIEM, threat intelligence platforms) ️ Experience with threat … hunting, incident response, and malwareanalysis ️ Familiarity with cyber threat actors, attack methodologies, and geopolitical threat landscapes ️ Certifications such as GIAC Cyber Threat Intelligence (GCTI), CISSP, or CompTIA Security+ are highly desirable More ❯