london, south east england, United Kingdom Hybrid / WFH Options
Global TechForce
vulnerability testing and penetration testing: Using various tools and techniques (like Nessus, Burp Suite, Metasploit), you'll simulate attacks to uncover exploitable flaws. Developing threatanalysis schedules and staying updated on emerging threats: Keeping abreast of the latest attack vectors, malware, and security trends is crucial. Developing and More ❯
you will be responsible for designing and implementing robust risk and vulnerability management processes, ensuring alignment with key stakeholders, and conducting thorough risk and threat analyses to maintain the security of our OT assets. In this role you will Lead the OT risk management lifecycle, including risk identification, assessment More ❯
you will be responsible for designing and implementing robust risk and vulnerability management processes, ensuring alignment with key stakeholders, and conducting thorough risk and threat analyses to maintain the security of our OT assets. In this role you will Lead the OT risk management lifecycle, including risk identification, assessment More ❯
to help secure our foundational platforms such as OS kernels, virtualization, device emulation, firmware, and hardware. You will be responsible for conducting security reviews, threat modeling, developing tooling that will help detect security issues at scale, and hands-on security evaluations (pen-testing). The successful candidate must be … comfortable diving into complex engineering discussions and leveraging deep security expertise to ensure proper risk assessment and threatanalysis is performed. You will provide crystal-clear technical direction and risk mitigation guidance for diverse engineering and business leaders at all levels. By applying your hard-earned years of … new security skills in the course of your duties. Key job responsibilities Security reviews for hardware including servers and devices. Penetration testing & vulnerability research. Threat modeling. Security training and outreach to internal development teams. Security guidance documentation. Assistance with recruiting activities. BASIC QUALIFICATIONS BS in Computer Science or related More ❯
the team through sophisticated cyber defence challenges. Your responsibilities will include: Monitoring, triaging, and investigating alerts across host and network security systems Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities Providing line management to SOC Analysts (team of 4) -developing capability and supporting … career progression Enhancing team knowledge across SOC tooling, detection methodologies, and threat triage Analysing and optimising detection rules and use cases based on Mitre Att&ck Maintaining detailed and up-to-date incident documentation, findings, and mitigation strategies Acting as a representative of the SOC in key meetings and … management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threatanalysis In-depth understanding of: Client Server applications and multi-tier web environments Relational databases, Firewalls, VPNs, enterprise AntiVirus solutions Networking principles (eg More ❯
the team through sophisticated cyber defence challenges. Your responsibilities will include: Monitoring, triaging, and investigating alerts across host and network security systems Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities Providing line management to SOC Analysts (team of 4) -developing capability and supporting … career progression Enhancing team knowledge across SOC tooling, detection methodologies, and threat triage Analysing and optimising detection rules and use cases based on Mitre Att&ck Maintaining detailed and up-to-date incident documentation, findings, and mitigation strategies Acting as a representative of the SOC in key meetings and … management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threatanalysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases, firewalls, VPNs, enterprise AntiVirus solutions Networking principles (eg More ❯
Stevenage, Hertfordshire, South East, United Kingdom
Henderson Scott
systems meet operational requirements while collaborating with suppliers, customers, and cross-functional teams. Key Responsibilities: ? EW System Design & Verification: Develop and validate RF systems, threat analyses, and modelling/simulation tools. ? Requirements Management: Serve as the EW requirements authority, using tools like DOORS . ? Systems Integration: Oversee end-to More ❯
scale. And if something doesn't go to plan, this role will be accountable alongside the executive team to contain, control and disrupt any threat-and restore normal operations. Responsibilities will include: Championing our security culture-training our team to be the best form of defence. Conducting threat … and frameworks in practise (e.g. ISO 27001, NIST CSF, SP 800-53, NCSC CAF, Cyber Essentials). Has a thorough understanding of cyber security threat and risk with the ability to think like an attacker and design controls that make a real difference. Has proven ability to enable a … us to achieve objectives, whilst also keeping us safe. Has good research and analytical skills utilising a variety of sources: online research, industry forums, threat intel feeds etc. using these to maintain oversight of current and future threats and opportunities to mitigate them. Has an enthusiastic 'roll up your More ❯
The Jr. Cybersecurity Threat Researcher works in the KnowBe4 Threat Research Lab, and is responsible for deploying and configuring various security products and solutions such as endpoint, email, web and network protection. Responsibilities: Assisting in deploying and maintaining cybersecurity products in lab settings. Supporting inventory management of licenses … in Computer Science, Cybersecurity, or related field. Internship experience or up to 1 year of experience in cybersecurity preferred. Basic understanding of IOCs and threat analysis. Familiarity with scripting for task automation. Detail oriented individual that enjoys the challenge of a fast-paced environment. Well versed with IOCs, reverse … engineering and threat campaign tracking. Experience in malicious URL and phishing email analysis. Python enabled for scripting automations for handling huge volumes of threat artifacts like files, emails, URLs. More ❯