governance and identity lifecycle processes in a highly View job & apply CTI Analyst Location: London Job type: Permanent Financial Services firm seeks an Operational CTI Analyst to join its Threat Intelligence team. Th View job & apply Senior Manager - BCM Second Line Location: Frankfurt Salary: 125,000 + Benefits Job type: Permanent Sector: Banking We are seeking a Senior Manager … type: Permanent Leading banking group seeks a Cryptography Analyst to join their security team. As an Analyst in We are seeking a highly motivated and skilled InsiderThreat Investigations Lead to join a newly formed InsiderThreat Team. This role focuses on identifying, preventing, and responding to risks posed by individuals with authorized access … suits someone with strong investigative skills, an analytical mindset, the ability to interpret and act on data, and the capability to execute initiatives that strengthen the insiderthreat programme. Key Responsibilities Support the delivery of the insiderthreat programme, including developing tools, standards, and procedures to detect, prevent, and respond to insiderMore ❯
Initial We are looking for a highly capable and technically skilled Security Analyst (Network & Endpoint) to join our cybersecurity team. This role focuses on network and endpoint security operations, threat intelligence, and incident response within a Security Operations Centre (SOC) environment. The successful candidate will have hands-on experience with leading security platforms and demonstrate the ability to operate … Network & Endpoint) Location: England/Remote Contract Type: Contract Duration: Contract till 31st Mar 26 Sector: Healthcare . Key Responsibilities: Network Detection & Response: Administer and optimise Darktrace for network threat detection, model tuning, and behavioural analysis. Investigate anomalies and escalate incidents based on network telemetry. Endpoint Protection: Deploy and manage CrowdStrike Falcon agents across enterprise endpoints. Maintain and update … detection rules, ensuring alignment with threat intelligence. Security Operations Centre (SOC): Act as a Level 2 SOC Analyst and Incident Handler. Triage, investigate, and respond to security alerts and incidents. Collaborate with other SOC team members to ensure timely resolution and documentation. Threat Intelligence & InsiderThreat Monitoring: Monitor threat feeds and manage Indicators of More ❯
to join their dynamic team and make a real impact. With a focus on innovation and a commitment to excellence, this organisation is at the forefront of tackling insiderthreats and safeguarding critical data. This role provides the perfect environment for professional growth, collaboration, and working on cutting-edge projects that truly matter. What You Will Do: - Monitor … insiderthreats such as data exfiltration, fraud, or misuse of privileges. - Conduct thorough behavioural risk assessments by combining technical data with contextual information. - Lead insiderthreat investigations from triage through closure, ensuring proper documentation and reporting. - Collaborate with HR, Legal, Compliance, and Business Units to handle sensitive cases while aligning with policies and regulations. - Contribute … Will Bring: - A bachelor's degree in Cybersecurity, Computer Science, Criminology, Behavioural Science, or equivalent practical experience. - At least three years of experience in cybersecurity operations, insiderthreat programmes, SOC, or similar investigative roles. - Familiarity with insider risk tools and technologies such as SIEM, DLP, UEBA, and EDR. - Strong analytical and investigative skills, with the More ❯
to join their dynamic team and make a real impact. With a focus on innovation and a commitment to excellence, this organisation is at the forefront of tackling insiderthreats and safeguarding critical data. This role provides the perfect environment for professional growth, collaboration, and working on cutting-edge projects that truly matter. What You Will Do: - Monitor … insiderthreats such as data exfiltration, fraud, or misuse of privileges. - Conduct thorough behavioural risk assessments by combining technical data with contextual information. - Lead insiderthreat investigations from triage through closure, ensuring proper documentation and reporting. - Collaborate with HR, Legal, Compliance, and Business Units to handle sensitive cases while aligning with policies and regulations. - Contribute … Will Bring: - A bachelor's degree in Cybersecurity, Computer Science, Criminology, Behavioural Science, or equivalent practical experience. - At least three years of experience in cybersecurity operations, insiderthreat programmes, SOC, or similar investigative roles. - Familiarity with insider risk tools and technologies such as SIEM, DLP, UEBA, and EDR. - Strong analytical and investigative skills, with the More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
UKRI
professionals to deliver impact across the organisation and the wider UK research and innovation system. Join us for this rare opportunity to apply your experience in offensive security and threat intelligence in a dynamic, fast-paced security operational and strategic role in an organisation at the heart of research and innovation in the UK. Leading the Red Team of … proactive advice to teams on the most effective remediation strategies. The role encompasses the full scope and delivery of penetration testing, including black box network assessments, insiderthreat evaluations, credentialed application exploitation, and rigorous testing of human and physical security controls across the UKRI estate. In addition to these offensive security responsibilities, the specialist manages the external … check Key Responsibilities: Execute targeted penetration tests and red team exercises to identify exploitable vulnerabilities. Develop and maintain offensive tooling to simulate adversary tactics and techniques. Monitor and analyse threat intelligence feeds to identify emerging threats and relevant TTPs. Produce technical threat reports and briefings to inform security posture and decision-making. Conduct proactive threat hunting based More ❯
Keyworth, Nottinghamshire, United Kingdom Hybrid / WFH Options
UK Research and Innovation (UKRI)
professionals to deliver impact across the organisation and the wider UK research and innovation system. Join us for this rare opportunity to apply your experience in offensive security and threat intelligence in a dynamic, fast-paced security operational and strategic role in an organisation at the heart of research and innovation in the UK. Leading the Red Team of … proactive advice to teams on the most effective remediation strategies. The role encompasses the full scope and delivery of penetration testing, including Black Box network assessments, insiderthreat evaluations, credentialed application exploitation, and rigorous testing of human and physical security controls across the UKRI estate. In addition to these offensive security responsibilities, the specialist manages the external … check Key Responsibilities: Execute targeted penetration tests and red team exercises to identify exploitable vulnerabilities. Develop and maintain offensive tooling to simulate adversary tactics and techniques. Monitor and analyse threat intelligence feeds to identify emerging threats and relevant TTPs. Produce technical threat reports and briefings to inform security posture and decision-making. Conduct proactive threat hunting based More ❯
configuration, and administration of privileged access management (PAM) solution such as Delinea , CyberArk. Knowledge on cybersecurity principles and best practices, with focus on securing privileged access and preventing insider threats. Strong knowledge of privileged access management concepts and best practices. Hands on experience on integration of privileged management solutions with tools such as Active Directory, Azure/OKTA More ❯
configuration, and administration of privileged access management (PAM) solution such as Delinea , CyberArk. Knowledge on cybersecurity principles and best practices, with focus on securing privileged access and preventing insider threats. Strong knowledge of privileged access management concepts and best practices. Hands on experience on integration of privileged management solutions with tools such as Active Directory, Azure/OKTA More ❯
configuration, and administration of privileged access management (PAM) solution such as Delinea , CyberArk. Knowledge on cybersecurity principles and best practices, with focus on securing privileged access and preventing insider threats. Strong knowledge of privileged access management concepts and best practices. Hands on experience on integration of privileged management solutions with tools such as Active Directory, Azure/OKTA More ❯
configuration, and administration of privileged access management (PAM) solution such as Delinea , CyberArk. Knowledge on cybersecurity principles and best practices, with focus on securing privileged access and preventing insider threats. Strong knowledge of privileged access management concepts and best practices. Hands on experience on integration of privileged management solutions with tools such as Active Directory, Azure/OKTA More ❯
london (city of london), south east england, united kingdom
Persistent Systems
configuration, and administration of privileged access management (PAM) solution such as Delinea , CyberArk. Knowledge on cybersecurity principles and best practices, with focus on securing privileged access and preventing insider threats. Strong knowledge of privileged access management concepts and best practices. Hands on experience on integration of privileged management solutions with tools such as Active Directory, Azure/OKTA More ❯
digital forensics team. This is a client-facing role where you'll lead DFIR (Digital Forensics & Incident Response) investigations, guide executives through cyber incidents, and help organisations strengthen their threat detection, response, and resilience. If you're an expert in incident response, threat hunting, and forensic analysis and thrive under pressure, this is your opportunity to work on … from breach triage and containment to full recovery. Client Engagement: Act as a trusted advisor to CISOs, boards, and regulators, providing executive-level briefings during and after incidents. Forensics & Threat Hunting: Conduct advanced forensic investigations across endpoints, servers, networks, cloud platforms, and SaaS. Adversary Analysis: Use threat intelligence and MITRE ATT&CK to attribute attacks and inform proactive … digital forensics. Industry Contribution: Publish thought leadership, speak at conferences, and represent the business at NCSC CIR and key cybersecurity forums. Required Skills & Experience Proven experience in incident response, threat hunting, or digital forensics (DFIR), ideally in consulting or client-facing roles. Hands-on leadership of large-scale incidents such as ransomware, insiderthreats, or advanced persistent More ❯
/DFIR Consultant) to join their team. As an Incident Responder, you'll take the lead on active engagements involving real-world attacks such as ransomware, data breaches, insiderthreats, and more. You'll conduct forensic investigations, advise clients on containment and recovery strategies, work on delivery and implementation, and produce detailed post-incident reports. This is a … incident response for a diverse client base, ensuring effective containment, investigation, and recovery. Conduct in-depth digital forensic analysis of relevant incident data Monitor and interpret the evolving cyber threat landscape, providing clients with timely, relevant insights into emerging threats, tactics, and vulnerabilities that may impact their organisation. Act as a key point of contact for clients, ensuring clear More ❯
/DFIR Consultant) to join their team. As an Incident Responder, you'll take the lead on active engagements involving real-world attacks such as ransomware, data breaches, insiderthreats, and more. You'll conduct forensic investigations, advise clients on containment and recovery strategies, work on delivery and implementation, and produce detailed post-incident reports. This is a … incident response for a diverse client base, ensuring effective containment, investigation, and recovery. Conduct in-depth digital forensic analysis of relevant incident data Monitor and interpret the evolving cyber threat landscape, providing clients with timely, relevant insights into emerging threats, tactics, and vulnerabilities that may impact their organisation. Act as a key point of contact for clients, ensuring clear More ❯