improvement of incident response processes. Key Responsibilities: Lead complex investigations into security incidents and breaches. Perform root cause analysis and provide actionable recommendations. Conduct static and dynamic malware analysis; reverse engineer to identify IOCs. Monitor, tune, and optimise SIEM tools Develop and refine SOC use cases, runbooks, and playbooks. Integrate emerging threat intelligence into monitoring and detection workflows. Liaise More ❯
improvement of incident response processes. Key Responsibilities: Lead complex investigations into security incidents and breaches. Perform root cause analysis and provide actionable recommendations. Conduct static and dynamic malware analysis; reverse engineer to identify IOCs. Monitor, tune, and optimise SIEM tools Develop and refine SOC use cases, runbooks, and playbooks. Integrate emerging threat intelligence into monitoring and detection workflows. Liaise More ❯
improvement of incident response processes. Key Responsibilities: Lead complex investigations into security incidents and breaches. Perform root cause analysis and provide actionable recommendations. Conduct static and dynamic malware analysis; reverse engineer to identify IOCs. Monitor, tune, and optimise SIEM tools - particularly IBM QRadar , Splunk, and Microsoft Sentinel. Develop and refine SOC use cases, runbooks, and playbooks. Integrate emerging threat More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Crimson
on data tools, analytical techniques, and data utilization within the organization. Advanced understanding of data modelling concepts and principles, with the ability to produce relevant models across multiple domains, reverse-engineer models from live systems, and apply industry-recognized data modelling standards and patterns as appropriate. Capable of aligning and comparing various data models. Successful track record of collaboration More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Crimson
on data tools, analytical techniques, and data utilization within the organization. Advanced understanding of data modelling concepts and principles, with the ability to produce relevant models across multiple domains, reverse-engineer models from live systems, and apply industry-recognized data modelling standards and patterns as appropriate. Capable of aligning and comparing various data models. Successful track record of collaboration More ❯
clear insights to support usage. Apply data governance : Understand governance needs, assure data solutions, and recommend compliance measures. Model data : Explain data modelling principles, create and maintain models, and reverse-engineer from live systems. Implement data standards : Develop standards, assess compliance, and analyze breaches. Manage metadata : Use repositories for complex tasks and maintain accurate metadata. Solve problems : Investigate issues More ❯
Bring: Proven experience in vulnerability research roles. Strong understanding of hardware/software development lifecycles and security implications. Applied knowledge of cryptographic algorithms and secure systems design. Expertise in reverseengineering tools (e.g. Ghidra, IDA Pro) and debugging (e.g. GDB). Familiarity with Linux internals, embedded systems, and exploitation techniques. Passion for learning, testing systems, and uncovering security More ❯