our digital assets and ensuring compliance with security standards and policies. Key Responsibilities: Design and implement secure network, system, and application architectures. Monitor and respond to security incidents, including forensicanalysis and incident containment. Conduct regular vulnerability assessments and penetration tests. Manage security tools such as firewalls, SIEMs, IDS/IPS, endpoint protection, and encryption solutions. Develop and More ❯
and implement security monitoring and logging strategies. Investigate and analyse security incidents, including identifying root causes, determining the scope of impact, and taking appropriate containment and remediation actions. Perform forensicanalysis to identify and investigate suspicious activity. Automate security tasks and workflows to improve efficiency and effectiveness. Google is proud to be an equal opportunity workplace and is More ❯
from various sources to detect and respond to threats in real-time. Develop and refine detection rules and correlation logic to enhance threat detection. Investigate security incidents thoroughly, perform forensic analyses, and coordinate incident responses. Maintain and optimize security information and event management systems and other SOC tools. Collaborate with teams to improve threat intelligence, incident response procedures, and More ❯
As a Security Engineer , you'll drive high-quality security baselines, ensure robust data for detection engineering, and enhance incident response. You'll manage logging, monitoring, vulnerability tools, and forensicanalysis while strengthening Yolo Group's security posture. Your day-to-day Implement and maintain security logging and monitoring controls to ensure continuous threat detection; Develop and maintain … tools essential for security incident response; Enhance and improve incident detection and response capabilities to strengthen security resilience; Act as a 2nd line incident responder, assisting with forensic collection and analysis; Set up and manage vulnerability management tools to identify and mitigate security risks; Create templated security solutions to support teams across Yolo Group in improving their security More ❯
analyze, and mitigate security threats. Key Skills: Extensive years of experience in incident response, cybersecurity, or a related role. Strong knowledge of incident response frameworks and methodologies. Proficiency in forensicanalysis tools and techniques. Experience with security information and event management (SIEM) systems. Excellent problem-solving and analytical skills. Effective communication and people skills. Relevant certifications such as … CISSP, CISM, or GIAC are a plus. Responsibilities: Leading and managing incident response activities, including detection, analysis, containment, eradication, and recovery. Developing and implementing incident response plans, policies, and procedures. Conducting forensicanalysis and investigations to determine the root cause of security incidents. Collaborating with IT, security, and other teams to improve overall security posture. Providing guidance More ❯
analyse, and mitigate security threats. Key Skills: Extensive years of experience in incident response, cybersecurity, or a related role. Strong knowledge of incident response frameworks and methodologies. Proficiency in forensicanalysis tools and techniques. Experience with security information and event management (SIEM) systems. Excellent problem-solving and analytical skills. Effective communication and people skills. Relevant certifications such as … CISSP, CISM, or GIAC are a plus. Responsibilities: Leading and managing incident response activities, including detection, analysis, containment, eradication, and recovery. Developing and implementing incident response plans, policies, and procedures. Conducting forensicanalysis and investigations to determine the root cause of security incidents. Collaborating with IT, security, and other teams to improve overall security posture. Providing guidance More ❯
analyse, and mitigate security threats. Key Skills: Extensive years of experience in incident response, cybersecurity, or a related role. Strong knowledge of incident response frameworks and methodologies. Proficiency in forensicanalysis tools and techniques. Experience with security information and event management (SIEM) systems. Excellent problem-solving and analytical skills. Effective communication and people skills. Relevant certifications such as … CISSP, CISM, or GIAC are a plus. Responsibilities: Leading and managing incident response activities, including detection, analysis, containment, eradication, and recovery. Developing and implementing incident response plans, policies, and procedures. Conducting forensicanalysis and investigations to determine the root cause of security incidents. Collaborating with IT, security, and other teams to improve overall security posture. Providing guidance More ❯
the cybersecurity team to integrate DLP measures with broader security initiatives. Your responsibilities: Monitor DLP Systems – Oversee and manage DLP alerts to prevent unauthorized data access and leakage. Incident Analysis – Investigate DLP security incidents, provide reports, and recommend corrective actions. Policy Implementation & Maintenance – Assist in deploying and updating DLP policies, configurations, and security controls. User Support & Training – Provide technical … DLP technologies, threats, and security trends. Desirable skills/knowledge/experience: Experience with Cloud Security – Exposure to cloud-based DLP solutions (e.g., Microsoft 365, AWS, Google Cloud). Forensic Investigation Skills – Ability to conduct forensicanalysis of data security incidents and breaches. Project Management & Process Improvement – Ability to optimize DLP workflows and security processes Change Management More ❯
the cybersecurity team to integrate DLP measures with broader security initiatives. Your responsibilities: Monitor DLP Systems – Oversee and manage DLP alerts to prevent unauthorized data access and leakage. Incident Analysis – Investigate DLP security incidents, provide reports, and recommend corrective actions. Policy Implementation & Maintenance – Assist in deploying and updating DLP policies, configurations, and security controls. User Support & Training – Provide technical … DLP technologies, threats, and security trends. Desirable skills/knowledge/experience: Experience with Cloud Security – Exposure to cloud-based DLP solutions (e.g., Microsoft 365, AWS, Google Cloud). Forensic Investigation Skills – Ability to conduct forensicanalysis of data security incidents and breaches. Project Management & Process Improvement – Ability to optimize DLP workflows and security processes Change Management More ❯
network, cloud (Azure), endpoint, and application security. Experience building and running company-wide security programs. Proven ability to handle real and simulated cybersecurity incidents. Familiarity with security operations and forensicanalysis tools. Excellent communication skills, with experience presenting to executive leadership. More ❯
large data sets for reporting, hunting, and anomaly detection Incident Management - Detect, document, investigate, and resolve security incidents in an efficient manner Endpoint Forensics - Construct meaningful incident timelines from forensic artifact analysis Counter Measures - Ability to design and implement preventative and corrective controls to counteract emerging threats Proactive Threat Hunting - Develop and execute focused plans to discover advanced … threats that evade traditional security controls Behavioral Analysis - Develop and implement criteria to identify anomalous user behavior leading indicating insider threat activity Intrusion Detection - Develop and tune network anomaly control capability to produce reliable actionable data Threat Hunting - Proactively search for unknown threats within the environment. Preferred Knowledge And Experience 3+ years of relevant experience Deep understanding of networking More ❯
to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerability assessment tools, penetration testing methodologies and forensicanalysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements such as GDPR, HIPAA, PCI DSS, and More ❯
to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerability assessment tools, penetration testing methodologies and forensicanalysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements such as GDPR, HIPAA, PCI DSS, and More ❯
responds to actual penetration attempts by malicious parties. The Security Operations Analyst must be comfortable working as part of a rotating shift pattern. What will you be doing? Perform forensicanalysis and gather evidence, correlation monitoring using multiple SIEM technologies. Conduct security assessments regularly to identify vulnerabilities and perform risk analysis, analysing breaches to reach the root … security strength of third-party vendors and collaborate with them. Monitor security infrastructure, identifying and reporting real-time attacks and vulnerabilities on the client network. Identify incidents and conduct analysis to determine severity and required responses, ensuring incidents are correctly reported and documented. Provide a Technical Escalation Point during security incidents, establishing the extent of an attack and advising More ❯
large data sets for reporting, hunting, and anomaly detection Incident Management - Detect, document, investigate, and resolve security incidents in an efficient manner Endpoint Forensics - Construct meaningful incident timelines from forensic artifact analysis Counter Measures - Ability to design and implement preventative and corrective controls to counteract emerging threats Proactive Threat Hunting - Develop and execute focused plans to discover advanced … threats that evade traditional security controls Behavioral Analysis - Develop and implement criteria to identify anomalous user behavior leading indicating insider threat activity Intrusion Detection - Develop and tune network anomaly control capability to produce reliable actionable data Threat Hunting - Proactively search for unknown threats within the environment. Preferred Knowledge and Experience 3+ years of relevant experience Deep understanding of networking More ❯
London, England, United Kingdom Hybrid / WFH Options
AltFi Ltd
roles Demonstrated subject matter expertise in Application Security, Web services security, GenAI/LLM security Programming expertise – Java, Python, Agile SDLC processes Experience with threat modeling, design reviews, risk analysis and control design Experience architecting and leading security for Cloud native applications In depth knowledge of network security, authentication and authorization Advanced understanding of vulnerability exploitation chaining, and vulnerability … remediation Demonstrated expertise in product/application security architecture – Service oriented architecture (SOA), Network security, application security, web services, Angular, JavaScript Security audit, Vulnerability assessment and packet analysis skills TCP/IP stack knowledge, Encryption expertise, TLS, DTLS, ECC, PKI/Certificates Identity & Access Management: AD/LDAP Preferred Qualifications: Experience with AI technologies and services (e.g., OpenAI, Bedrock … with SAST/DAST/SCA tools like Fortify, Whitesource Database, datalake knowledge – Postgres, Oracle, Databricks, Snowflake Familiarity with Secure SDLC frameworks such as NIST SSDF, OpenSAMM, BSIMM Security Forensicanalysis skills Equal Opportunity Employer: S&P Global is an equal opportunity employer and all qualified candidates will receive consideration for employment without regard to race/ethnicity More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensicanalysis to determine the root cause and recommend remediation actions. Outside of this, you will be an enthusiastic individual with a passion for all things security and will More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensicanalysis to determine the root cause and recommend remediation actions. Outside of this, you will be an enthusiastic individual with a passion for all things security and will More ❯
industry trends and emerging technologies in network security. Provide support and guidance to IT teams on security best practices and compliance requirements. Participate in incident response activities and perform forensic analyses when necessary. Prepare and maintain documentation related to network security architecture and operations. Critical Skills for Success Proven experience with security technologies such as firewalls, VPNs, IDS/ More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
industry trends and emerging technologies in network security. * Provide support and guidance to IT teams on security best practices and compliance requirements. * Participate in incident response activities and perform forensic analyses when necessary. * Prepare and maintain documentation related to network security architecture and operations. Critical Skills for Success * Proven experience with security technologies such as firewalls, VPNs, IDS/ More ❯
industry trends and emerging technologies in network security. Provide support and guidance to IT teams on security best practices and compliance requirements. Participate in incident response activities and perform forensic analyses when necessary. Prepare and maintain documentation related to network security architecture and operations. Critical Skills for Success: Proven experience with security technologies such as firewalls, VPNs, IDS/ More ❯
large data sets for reporting, hunting, and anomaly detection Incident Management - Detect, document, investigate, and resolve security incidents in an efficient manner Endpoint Forensics - Construct meaningful incident timelines from forensic artifact analysis Counter Measures - Ability to design and implement preventative and corrective controls to counteract emerging threats Proactive Threat Hunting - Develop and execute focused plans to discover advanced … threats that evade traditional security controls Behavioral Analysis -Develop and implement criteria to identify anomalous user behavior leading indicating insider threat activity Intrusion Detection - Develop and tune network anomaly control capability to produce reliable actionable data Threat Hunting - Proactively search for unknown threats within the environment. Knowledge and Experience University degree in related discipline 1+ years of relevant experience More ❯
London, England, United Kingdom Hybrid / WFH Options
Free-Work UK
Maintain system security through configuring firewalls, VPNs, and intrusion detection systems, and ensure timely patching. Manage vulnerability remediation based on penetration tests and risk assessments. Conduct penetration testing and forensicanalysis of security incidents. Stay updated on security technologies and trends to enhance system protection. Design disaster recovery plans and coordinate incident responses with the IT team. Ensure More ❯
Digital Forensic Cyber Crime Investigator - South West Regional Organised Crime Unit (SWROCU) 2 days ago Be among the first 25 applicants Get AI-powered advice on this job and more exclusive features. Job Description The South West Regional Organised Crime Unit (SWROCU) is looking for experienced Digital Forensic Cyber Crime Investigator keen to progress their careers as part … data theft/breaches. The role requires a dynamic and innovative investigator using cutting edge techniques and technology. There will be a need for you to display a sound forensic approach to investigations and you’ll undertake live and dead box data recovery and network forensics to provide evidentially sound technical support to operations and investigations into the most … able to communicate your findings in both written and verbal form to the understanding of cyber-crime investigators and victims. Some Of The Activities Of The Role Include Forensics analysis of: Computers and large-scale computer networks Mobile devices UAVs (drones) Vehicle telemetry systems Malware Scene attendance at warrants and victim premises Advanced project development Providing technical advice to More ❯
Social network you want to login/join with: Graduate Data Analyst – London – Full-Time, Office-Based Excel | Data Cleaning | Reporting | Quantitative Analysis | Litigation Support We're working with a boutique data analytics consultancy that partners with top law firms on high-profile commercial and regulatory disputes. They’re now looking for a Graduate Data Analyst to join their … growing team in Central London. This is a fantastic opportunity for a numerically minded graduate to launch a career in data analytics, combining forensicanalysis with client-facing work. You’ll be working on complex data sets, helping to quantify financial claims and support legal investigations. The role is office-based and sits within a small, high-performing … team backed by the stability of a well-established financial services group. What you’ll be doing: Reviewing and cleaning datasets from clients and third parties Performing financial analysis to assess overcharging and commercial losses Producing clear, structured outputs in Excel and Word for legal and client use Supporting assumptions and models with logical frameworks when data is incomplete More ❯