Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malware analysis and reverseengineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Static malware analysis and reverse engineering. DV Clearance. Programming and scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications. Experience with More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
and Linux operating systems, and encryption technologies Experience analyzing and inspecting log files, network packets, and any other security tool information output from multiple system types Familiar with basic reverseengineering principles and understand of malware, rootkits, TCP/UDP packets, network protocols Knowledge and experience with scripting and programming (Python, PERL, etc.) Experience with technical analysis of More ❯
enterprise-grade security tools such as firewalls, VPNs, AV, IDS/IPS, and log management. Experience analysing log data and network security events. Understanding of static malware analysis and reverse engineering. Familiarity with additional SIEM tools such as QRadar. 25 days annual leave, with the option to purchase more Health cash plan Life assurance Generous flexible benefits fund Seniority More ❯
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: ? Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure More ❯
familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MITRE ATT&CK Framework for detection and threat analysis Experience of static malware analysis and reverseengineering (desirable) Scripting or programming with Python, Perl, Bash, PowerShell or C++ (desirable but not essential) SIEM technologies knowledge such as QRadar (desirable but not essential) In-depth More ❯
security tools such as firewalls, VPNs, AV, IDS/IPS, and log management. Experience analysing log data and network security events. Desirable Skills: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst certification. Familiarity with additional SIEM tools such as QRadar. Benefits: 25 days annual leave, with the option to purchase more Health cash plan Life More ❯
security tools such as firewalls, VPNs, AV, IDS/IPS, and log management. Experience analysing log data and network security events. Desirable Skills: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst certification. Familiarity with additional SIEM tools such as QRadar. Benefits: 25 days annual leave, with the option to purchase more Health cash plan Life More ❯
watford, hertfordshire, east anglia, united kingdom
Hamilton Barnes 🌳
security tools such as firewalls, VPNs, AV, IDS/IPS, and log management. Experience analysing log data and network security events. Desirable Skills: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst certification. Familiarity with additional SIEM tools such as QRadar. Benefits: 25 days annual leave, with the option to purchase more Health cash plan Life More ❯
then you're the sort of person we'd love to see at CoreTech. The Opportunity We're seeking talented graduates with an active interest in multi-platform software engineering to join our world-class research and development team in September 2026. CoreTech Academy As a CoreTech graduate you will be enrolled on the CoreTech Academy where you’ll … be provided with the opportunity to rapidly upskill in native development, debugging and reverseengineering through a mix of training, mentoring and shadowing with our experienced team. The Academy also provides the opportunity to attend seminars/presentations on a whole range of subjects, presented by colleagues from across the business. What we're looking for: Strong programming More ❯
detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls , VPNs , enterprise AntiVirus solutions Experience in static malware analysis and reverseengineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity More ❯
understanding of network protocols (TCP/IP, HTTP, SMTP, etc.), firewalls, VPNs, AV products, and enterprise infrastructure. It would be great if you had: Skills in malware analysis or reverse engineering. Experience with scripting or programming (Python, PowerShell, Bash, etc.). Exposure to additional SIEM tools such as QRadar. 25 days annual leave (plus option to purchase more). More ❯
understanding of network protocols (TCP/IP, HTTP, SMTP, etc.), firewalls, VPNs, AV products, and enterprise infrastructure. It would be great if you had: Skills in malware analysis or reverse engineering. Experience with scripting or programming (Python, PowerShell, Bash, etc.). Exposure to additional SIEM tools such as QRadar. 25 days annual leave (plus option to purchase more). More ❯
understanding of network protocols (TCP/IP, HTTP, SMTP, etc.), firewalls, VPNs, AV products, and enterprise infrastructure. It would be great if you had: Skills in malware analysis or reverse engineering. Experience with scripting or programming (Python, PowerShell, Bash, etc.). Relevant SOC certifications (e.g., CREST, Blue Team Level 1). Exposure to additional SIEM tools such as QRadar. More ❯
watford, hertfordshire, east anglia, united kingdom
Hamilton Barnes 🌳
understanding of network protocols (TCP/IP, HTTP, SMTP, etc.), firewalls, VPNs, AV products, and enterprise infrastructure. It would be great if you had: Skills in malware analysis or reverse engineering. Experience with scripting or programming (Python, PowerShell, Bash, etc.). Relevant SOC certifications (e.g., CREST, Blue Team Level 1). Exposure to additional SIEM tools such as QRadar. More ❯
systems, E-Mail, Proxies, Endpoint Protection). Working knowledge of SIEM architecture, XDR and Vulnerability Management, Incident Response tooling such as Hive. Sandboxing technologies such as Cuckoo and Malware reverseengineering IE IDA Pro, ole debugger (both static and dynamic analysis required ), and a good understanding of REMnux . Understanding DFIR toolsets ( e.g. Volatility, SIFT Workstation) memory and … business. Technical & Management reporting to demonstrate effectiveness and value of the teams work . †̄Global Information Assurance Certifications (GIAC) e.g. Certified Incident Handler (GCIH), Certified Intrusion Analyst (GCIA), ReverseEngineering Malware (GREM) would be an advantage. What’s in it for you? Competitive salary + Bonus 25 days annual leave with the option to purchase 5 more More ❯
London, England, United Kingdom Hybrid / WFH Options
AVEVA Denmark
processes to include identification, collection, preservation, and processing of relevant incident data. Manage and supervise Digital Forensic Responder on immediate host-based and network-based forensic examinations and Malware reverseengineering on security incidents to determine the root cause and to reconstruct a timeline of events to facilitate incident response and recovery. Manage and supervise Digital Forensic Responder … on performing malware analysis and reverseengineering as directed in a safe and secure environment. Supervise Digital Forensic Responder to conduct forensic collection and analysis of all supported devices, including but not limited to Linux, Windows, and Apple workstations, servers, as well as IOS and Android mobile devices, both online and offline, in support of the AVEVA Incident More ❯
Qualifications : Technical Expertise : Expert in C++ , C# , PowerShell , and other scripting/programming languages. Strong knowledge of penetration testing tools (e.g., Metasploit, Burp Suite, Nmap, Wireshark). Experience with reverseengineering, exploit development, and vulnerability research. Familiarity with operating systems (Windows, Linux, macOS) and their security mechanisms. Understanding of network protocols, firewalls, and intrusion detection/prevention systems. More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Forward Role
mitigation strategies. What You'll Be Doing Researching, designing, and building resilient systems to support National Security objectives. Conducting vulnerability assessments and threat modelling on software and hardware components. Reverseengineering a wide range of technologies to uncover vulnerabilities and improve security. Writing secure, high-performance code that integrates deeply with operating systems and platforms. Developing tools and More ❯
attempts. Develop and enhance incident response playbooks, ensuring alignment with evolving threats. Analyze threat intelligence sources to identify new attack vectors and adversary tactics. Provide forensic analysis and malware reverseengineering to assess security incidents. Collaborate with IT, Risk, and Compliance teams to ensure regulatory compliance and security best practices. Produce timely reports on incident trends, threat intelligence More ❯
such as SIEM, EDR, and SOAR platforms to stay ahead of emerging threats. Develop and refine detection use cases, playbooks, and operational procedures to enhance efficiency and resilience. Detection Engineering and Threat Hunting Design and implement advanced detection strategies to identify and mitigate emerging threats. Conduct proactive threat hunting activities using tools and frameworks such as MITRE ATT&CK. … CREST (CRIA/CCIM), GIAC (GCIH/GCIA/GCFA), CISSP, CISM are highly desirable. Hands-on experience designing and delivering cyber incident simulations. Experience with Malware analysis and reverse engineering. Benefits/Perks Time off - 25 days leave + public holidays. x1 day Birthday leave per year. Company Pension Scheme (employer contribution 5%) + flexible salary sacrifice. Employee More ❯
attempts. Develop and enhance incident response playbooks, ensuring alignment with evolving threats. Analyze threat intelligence sources to identify new attack vectors and adversary tactics. Provide forensic analysis and malware reverseengineering to assess security incidents. Collaborate with IT, Risk, and Compliance teams to ensure regulatory compliance and security best practices. Produce timely reports on incident trends, threat intelligence More ❯
attempts. Develop and enhance incident response playbooks, ensuring alignment with evolving threats. Analyze threat intelligence sources to identify new attack vectors and adversary tactics. Provide forensic analysis and malware reverseengineering to assess security incidents. Collaborate with IT, Risk, and Compliance teams to ensure regulatory compliance and security best practices. Produce timely reports on incident trends, threat intelligence More ❯