City of London, London, United Kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
london, south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
slough, south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
across networks, systems, and app security Excellent communicator who thrives in client-facing roles SC clearance eligible (DV a bonus)/(OSCP bonus) Bonus Points For: R&D or threat intel experience Application testing or ISO17025 environments That hacker mindset we all love We care about passion and skill, not paper. No degree? No problem. Join us to work More ❯
DLS Engineering is seeking an Intelligence Analyst (OSINT/PAI) supporting the US Space Force in Colorado Springs, CO. The Intelligence Support Analyst is responsible for collecting, analyzing, and reporting on information derived from publicly available sources to support sensitive activities, operations, threat assessments, due diligence, or online research efforts. This role involves leveraging advanced tools, methodologies … and tradecraft to produce actionable intelligence from social media, news media, geospatial data, public records, forums, and other open sources. Intelligence Analyst Key Responsibilities: - Conduct systematic collection and analysis of publicly available information (PAI), including social media platforms, online forums, news outlets, and government databases. - Develop and maintain Online Vulnerability Assessment (OVA) reports, threat assessments, and intelligence briefings tailored to operational or client needs. - Identify emerging threats, trends, or patterns relevant to security, geopolitical risk, cyber threats, fraud, or reputational risk. - Utilize Open-Source Intelligence (OSINT) tools and platforms (e.g., Maltego, Babel Street, Echosec, ShadowDragon, etc.) and adhere to ethical and legal collection standards. - Monitor social media and online platforms for indicators of threatMore ❯
as power-projection platforms to provide Force Protection and Security, combat support maintenance and sustainment, mission enhancements and engineering capability. Integrate warfighting team training evolutions tailored to the latest threatintelligence and combatant commander needs and requirements. EDUCATION/TRAINING Minimum: High School Diploma Preferred: Bachelor's Degree EXPERIENCE Seven or more years working in acquisitions and/ More ❯
Nashville, Tennessee, United States Hybrid / WFH Options
Broadcast Music, Inc
THE JOB Essential Functions: which may be representative but not all inclusive of those commonly associated with this position. Responds to information and cyber security incidents by analyzing logs, threat intel, and other sources of information. Functions as a liaison between the Technical Security team and business units to track and monitor incident response and provide status updates as … deployment of specialized controls, standards, or infrastructure changes, and/or changes in development processes. Identifies and resolves any false positive findings in assessment results. Maintains knowledge of the threat landscape and intelligence feeds to identify and triage new threats and vulnerabilities targeting BMI. Serves as a point of contact on issues, dependencies, and risks related to vulnerability More ❯
The Woodlands, TX Key Responsibilities: Works closely with internal technology teams, business stakeholders, MSSP, and outside vendors to research, analyze and monitor security threats. Mentors other analysts responsible for threat intel, incident response, network, cloud, endpoint and database security. Deploys and manages security solutions to assist with logging, alerting, and threat analysis. Security system monitoring and alerting appropriate … systems administration experience required. 2+ years' EDR management experience required. 1+ years' SIEM management experience required. Other beneficial experience, (i.e., VA, IPS, Cloud Security, Routing and Switching, Vulnerability Management, Threat Reputation/Intel Solution, CASB, Python, or Automation/Orchestration), preferred. Competencies Required: Demonstrated success in managing, analyzing, and solving complex network technical issues. Technical knowledge of security configurations More ❯
Wilmslow, Cheshire, United Kingdom Hybrid / WFH Options
ID Co
issues and own remediations. Knowledge of security operations and incident management, including configuration, operation, and maintenance of secure systems, detection and response to incidents, and collection and use of threat intelligence. Knowledge of security management systems and organisational security controls, including standards, best practices, and approaches to risk assessment and mitigation. Knowledge of human factors, including usable security, social … issues and own remediations. Knowledge of security operations and incident management, including configuration, operation, and maintenance of secure systems, detection and response to incidents, and collection and use of threat intelligence. Knowledge of security management systems and organisational security controls, including standards, best practices, and approaches to risk assessment and mitigation. Knowledge of human factors, including usable security, social More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
highly skilled SOC Solutions Engineer to enhance security operations and strengthen detection & response strategies. This is a hands-on engineering role focused on IBM QRadar, playbook automation, and advanced threat modelling to deliver cutting-edge security solutions. What you'll do: SIEM Engineering & Management: Deploy, configure, and optimise QRadar. Onboard log sources from cloud/on-prem environments. Build … detection and anomaly rules. Playbook Development & Automation: Design and implement automated response playbooks (phishing, lateral movement, exfiltration) with SOAR tools (e.g., Logic Apps, XSOAR). Threat Detection & Response: Investigate alerts, enrich detection logic with threat intel, coordinate incident response. Threat Modelling & Use Case Development: Apply MITRE ATT&CK, STRIDE, and Kill Chain frameworks to build detection use … security (SOC/NOC environment preferred). Strong knowledge of log parsing, SIEM query languages (KQL, SPL, AQL), and automation with Python/PowerShell. Deep understanding of incident response, threat detection, and frameworks (MITRE, NIST, CIS). Knowledge of vulnerability scanning, penetration testing, and network traffic analysis. Familiarity with ITIL processes (Incident, Problem, Change). Excellent stakeholder communication, with More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Crimson
Head of IT Security Incident and Threat Management - Solihull Crimson and IMI have joined forces to build IMI's new security team, and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security and want to be part of a dynamic team that is shaping the future of security … within a successful global company, we want to hear from you! We are seeking a highly skilled and experienced Head of IT Security Incident and Threat Management to join our team. In this role, you will be responsible for leading the strategic efforts to safeguard the company's digital assets against potential threats and incidents. This role requires a … seasoned professional with a deep understanding of cybersecurity, incident response an threat management within a FTSE 100 environment. The salary on offer for this position is between £90,000 and £110,000 per annum plus benefits. Please note this role is based on site for the first 3 months followed by a hybrid working arrangement. Key Responsibilities Develop and More ❯
Bedford, Bedfordshire, South East, United Kingdom Hybrid / WFH Options
Total IT
clients, ensuring their IT environments are resilient against cyber threats. Act as a primary point of contact for clients, providing expert advice on cyber security measures, best practices, and threat management. Develop and maintain documentation, including best practice guides and incident reports, to educate clients and team members on security awareness. Conduct vulnerability assessments and participate in the development … members, fostering a culture of continuous learning and improvement within the security domain. Experience: Proven experience in a Security Consultant Role, with a strong background in incident response and threat intelligence. Familiarity with SIEM tools, CompTIA Security+, and other cyber security certifications are highly desirable. Collaborating with stakeholders and 3 rd parties. Creating security strategies and leading the implementation … skills, with the ability to convey complex information clearly and concisely. Demonstrated ability to manage projects, prioritize tasks, and meet deadlines in a fast-paced environment. Foundational knowledge in threat analysis, forensic investigations, and security countermeasures. The Candidate: We are seeking candidates with a comprehensive IT background, analytical problem-solving skills, and a keen understanding of cyber defence strategies. More ❯
computing. • Experience with security technologies such as SIEM (e.g., Splunk), firewalls, endpoint protection, IDS/IPS, and vulnerability management tools. • Knowledge of security best practices, incident response methodologies, and threat intelligence. • Understanding of common attack vectors, malware analysis, and tactics used by threat actor experience with implemented and managing a CASB solution for a large enterprise. • Experience with More ❯
and Nessus. Regularly scan networks, systems and applications for security vulnerabilities. Must have 3+ years cyber security experience and at least 2 yrs focusing on vulnerability management. Familiar with threat and standards such as CVSS, NIST, MITRE ATT&CK. This is an excellent opportunity working for an award winning MSP working on exciting projects. You will develop and maintain … vulnerability policies, contribute towards security architecture reviews, hardening. Classify and prioritise vulnerabilities on severity, business impact and threat intelligence. You must hold security clearance or be able to obtain security clearance and eventually DV. This is an office based role. More ❯
Customer Communications - You provide timely incident updates and lead bridging calls with customers during high-priority incidents, ensuring that communications are clear, evidence-led, and aligned to customer expectations. • Threat Hunting Oversight - You lead and coordinate proactive threat hunting across customer environments, using hypothesis-based approaches to identify undetected threats and validate detection coverage. Essential Duties • Advanced Investigation … all available tooling. o Reconstruct attack chains and identify root causes using MITRE ATT&CK. o Recommend and coordinate response actions to mitigate impact during active incidents. • IOC and Threat Analysis o Investigate indicators of compromise using commercial and open-source threat intelligence. o Validate alerts and determine their relevance to customer environments, providing context on adversary behaviour … and recommending follow-up actions when threats are confirmed. • Threat Hunting o Lead and participate in threat hunts using hypothesis-driven approaches mapped to TTPs and MITRE ATT&CK. o Leverage telemetry and queries in tooling to identify suspicious indicators not surfaced through existing detection logic. o Document hunting activities, findings, and detection coverage gaps to support tuning More ❯
optimize Elastic stack deployments based on application/customer needs • Design and configure ETL data pipelines to ingest customer defined data sets such as application logs, metrics, and or threat events • Create custom visualizations and dashboards using Kibana • Configure and maintain index templates and information lifecycle management (ILM) policies • Develop Elastic alerting solutions using Watcher and/or Kibana … SIEM is plus • Demonstrated experience with the full Elastic Stack - Elasticsearch, Logstash, Kibana, Beats, Machine Learning, and REST API integration • Experience integrating Elasticsearch with external systems (e.g. SOAR tools, Threat Intel Platforms) • Experience with data management: hot/warm/cold architectures, shard allocation/re-allocation, snapshots & restoration • Strong experience with evaluating existing Elastic clusters, configuration parameters, indexing More ❯
Transnational Organized Crime (CTOC), Sensitive Activities (SA), Joint Combined Exchange Training (JCET), Psychological Operations (PSYOP), Civil Affairs (CA), Medical Readiness Training Exercise (MEDRETE), Subject Matter Expert Exchange (SMEE), Counter Threat Network, Intelligence Signal Reconnaissance (ISR) Support, General Purpose Forces conventional support, and other contingency SOF deployments in the AOR • Develop and maintain GFM guidance and sourcing data that More ❯
Transnational Organized Crime (CTOC), Sensitive Activities (SA), Joint Combined Exchange Training (JCET), Psychological Operations (PSYOP), Civil Affairs (CA), Medical Readiness Training Exercise (MEDRETE), Subject Matter Expert Exchange (SMEE), Counter Threat Network, Intelligence Signal Reconnaissance (ISR) Support, General Purpose Forces conventional support, and other contingency SOF deployments in the AOR • Develop and maintain GFM guidance and sourcing data that More ❯