focus on Defense and National Security mission sets. We leverage more than 17 years of support to stakeholders across the federal government, with established and growing capabilities across Intelligence, Analytics, Engineering, Mission Support, and Communications disciplines. Founded in 2008, our mission is to transform the way our customers approach constantly changing and complex problem sets by bringing to bear the More ❯
teams. Passion for social media, including deep familiarity and expertise in major platforms including Twitter (X), Facebook, LinkedIn, and Reddit. Experience in social media monitoring and measurement, including relevant analytics platforms and tools. Experience in consumer tech communications. Ability to work independently and in teams. Self-driven with strong attention to detail with a passion for strategic communications. High EQ. More ❯
focus on Defense and National Security mission sets. We leverage more than 17 years of support to stakeholders across the federal government, with established and growing capabilities across Intelligence, Analytics, Engineering, Mission Support, and Communications disciplines. Founded in 2008, our mission is to transform the way our customers approach constantly changing and complex problem sets by bringing to bear the More ❯
focus on Defense and National Security mission sets. We leverage more than 17 years of support to stakeholders across the federal government, with established and growing capabilities across Intelligence, Analytics, Engineering, Mission Support, and Communications disciplines. Founded in 2008, our mission is to transform the way our customers approach constantly changing and complex problem sets by bringing to bear the More ❯
focus on Defense and National Security mission sets. We leverage more than 17 years of support to stakeholders across the federal government, with established and growing capabilities across Intelligence, Analytics, Engineering, Mission Support, and Communications disciplines. Founded in 2008, our mission is to transform the way our customers approach constantly changing and complex problem sets by bringing to bear the More ❯
focus on Defense and National Security mission sets. We leverage more than 17 years of support to stakeholders across the federal government, with established and growing capabilities across Intelligence, Analytics, Engineering, Mission Support, and Communications disciplines. Founded in 2008, our mission is to transform the way our customers approach constantly changing and complex problem sets by bringing to bear the More ❯
focus on Defense and National Security mission sets. We leverage more than 17 years of support to stakeholders across the federal government, with established and growing capabilities across Intelligence, Analytics, Engineering, Mission Support, and Communications disciplines. Founded in 2008, our mission is to transform the way our customers approach constantly changing and complex problem sets by bringing to bear the More ❯
focus on Defense and National Security mission sets. We leverage more than 17 years of support to stakeholders across the federal government, with established and growing capabilities across Intelligence, Analytics, Engineering, Mission Support, and Communications disciplines. Founded in 2008, our mission is to transform the way our customers approach constantly changing and complex problem sets by bringing to bear the More ❯
focus on Defense and National Security mission sets. We leverage more than 17 years of support to stakeholders across the federal government, with established and growing capabilities across Intelligence, Analytics, Engineering, Mission Support, and Communications disciplines. Founded in 2008, our mission is to transform the way our customers approach constantly changing and complex problem sets by bringing to bear the More ❯
the systems, software and security needed to take the lead in a low carbon world. They provide expertise, advice and day-to-day support in emerging technologies, data and analytics, cyber security and more. Flexible benefits to fit your life Enjoy discounts on private healthcare and gym memberships. Wellbeing benefits like a free online GP and 24/7 counselling More ❯
the systems, software and security needed to take the lead in a low carbon world. They provide expertise, advice and day-to-day support in emerging technologies, data and analytics, cyber security and more. Flexible benefits to fit your life Enjoy discounts on private healthcare and gym memberships. Wellbeing benefits like a free online GP and 24/7 counselling More ❯
SE1, Chaucer, Greater London, United Kingdom Hybrid / WFH Options
Naden Blair
successful candidate will have: Minimum of 3 years’ experience in a client-facing quantitative research role Knowledge of a range of quantitative survey techniques (e.g. MaxDiff, conjoint, segmentation, etc.) Analytics and cross-tab tool experience such as Q, SPSS, etc. Excellent communication skills A proven account leader and highly driven individual A passion for tech/SaaS platforms A desire More ❯
MUST HAVE an active TS/SCI Full Scope Polygraph SIGNING BONUS Job Description: The Software Engineer develops, maintains, and enhances complex and diverse software systems (e.g., processing-intensive analytics, novel algorithm development, manipulation of extremely large data sets, real-time systems, and business management information systems) based upon documented requirements. Works individually or as part of a team. Reviews More ❯
up. You're resilient and creative , energised by fast-moving environments where you need to solve problems quickly. You're data-driven and confident working with spreadsheets, dashboards, and analytics tools. You've worked closely with product and engineering teams , and know how to build or influence internal tools and workflows. Interview Process 30 min screening call with the Talent More ❯
extended detection and response) and SIEM (security information event management) systems. Responsibilities Monitor and analyse security events across endpoints, networks, cloud, and email systems. Use correlation rules and behavioural analytics to identify suspicious activity. Detect multi-stage attacks that span across different layers of infrastructure. Investigate alerts and determine root causes of security incidents. Coordinate automated or manual responses to More ❯
extended detection and response) and SIEM (security information event management) systems. Responsibilities Monitor and analyse security events across endpoints, networks, cloud, and email systems. Use correlation rules and behavioural analytics to identify suspicious activity. Detect multi-stage attacks that span across different layers of infrastructure. Investigate alerts and determine root causes of security incidents. Coordinate automated or manual responses to More ❯
extended detection and response) and SIEM (security information event management) systems. Responsibilities Monitor and analyse security events across endpoints, networks, cloud, and email systems. Use correlation rules and behavioural analytics to identify suspicious activity. Detect multi-stage attacks that span across different layers of infrastructure. Investigate alerts and determine root causes of security incidents. Coordinate automated or manual responses to More ❯
extended detection and response) and SIEM (security information event management) systems. Responsibilities Monitor and analyse security events across endpoints, networks, cloud, and email systems. Use correlation rules and behavioural analytics to identify suspicious activity. Detect multi-stage attacks that span across different layers of infrastructure. Investigate alerts and determine root causes of security incidents. Coordinate automated or manual responses to More ❯
extended detection and response) and SIEM (security information event management) systems. Responsibilities Monitor and analyse security events across endpoints, networks, cloud, and email systems. Use correlation rules and behavioural analytics to identify suspicious activity. Detect multi-stage attacks that span across different layers of infrastructure. Investigate alerts and determine root causes of security incidents. Coordinate automated or manual responses to More ❯
extended detection and response) and SIEM (security information event management) systems. Responsibilities Monitor and analyse security events across endpoints, networks, cloud, and email systems. Use correlation rules and behavioural analytics to identify suspicious activity. Detect multi-stage attacks that span across different layers of infrastructure. Investigate alerts and determine root causes of security incidents. Coordinate automated or manual responses to More ❯
extended detection and response) and SIEM (security information event management) systems. Responsibilities Monitor and analyse security events across endpoints, networks, cloud, and email systems. Use correlation rules and behavioural analytics to identify suspicious activity. Detect multi-stage attacks that span across different layers of infrastructure. Investigate alerts and determine root causes of security incidents. Coordinate automated or manual responses to More ❯
extended detection and response) and SIEM (security information event management) systems. Responsibilities Monitor and analyse security events across endpoints, networks, cloud, and email systems. Use correlation rules and behavioural analytics to identify suspicious activity. Detect multi-stage attacks that span across different layers of infrastructure. Investigate alerts and determine root causes of security incidents. Coordinate automated or manual responses to More ❯
extended detection and response) and SIEM (security information event management) systems. Responsibilities Monitor and analyse security events across endpoints, networks, cloud, and email systems. Use correlation rules and behavioural analytics to identify suspicious activity. Detect multi-stage attacks that span across different layers of infrastructure. Investigate alerts and determine root causes of security incidents. Coordinate automated or manual responses to More ❯
extended detection and response) and SIEM (security information event management) systems. Responsibilities Monitor and analyse security events across endpoints, networks, cloud, and email systems. Use correlation rules and behavioural analytics to identify suspicious activity. Detect multi-stage attacks that span across different layers of infrastructure. Investigate alerts and determine root causes of security incidents. Coordinate automated or manual responses to More ❯
extended detection and response) and SIEM (security information event management) systems. Responsibilities Monitor and analyse security events across endpoints, networks, cloud, and email systems. Use correlation rules and behavioural analytics to identify suspicious activity. Detect multi-stage attacks that span across different layers of infrastructure. Investigate alerts and determine root causes of security incidents. Coordinate automated or manual responses to More ❯