Location(s): UK, Europe & Africa : UK : Leeds BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. CyberThreatIntelligence and Vulnerability Lead Job Title: CyberThreatIntelligence and Vulnerability Lead Requisition ID: 121483 Location: Leeds (this is a 100% office based role due to the nature of the project) Grade: GG10 - GG11 Referral Bonus: £5,000 Role Description BAE Systems have been contracted to undertake the day to day operation of (and incremental … environments that must be protected. The customer is committed to development of this improved SOC to be a benchmark of best practice and excellence in reflection of the significant threat that the protected systems are subject to. This role requires a minimum of DV clearance. This role reports to the Service Delivery Manager. The Role You will be: Accountable More ❯
Location(s): UK, Europe & Africa: UK: Gloucester BAE Systems Digital Intelligence is home to 4,500 digital, cyber, and intelligence experts. We work across 10 countries to collect, connect, and analyze complex data, enabling governments, armed forces, and businesses to achieve digital advantages in demanding environments. Job Title: Threat Hunter Requisition ID: 121789 Location: Leeds - hybrid … members and share knowledge proactively. Contribute to the SOC Knowledge Repository by creating and updating documentation independently. Build relationships externally with other SOCs and cybersecurity researchers to identify analytics, threatintelligence, and tradecraft that benefit the Blue Team. Communicate funding and prioritization suggestions and lead implementation when needed. Develop complex, anomaly-based KQL analytics and playbooks for detection … vulnerabilities, produce proof-of-concept exploits, and emulate adversary TTPs for training and detection evaluation. Review red team and pentest findings to improve detection rules. Provide forensic support and threat emulation to improve alert triage and accuracy. Identify gaps in SOC processes, data collection, and analysis, demonstrating the need for improvements through scenarios and red teaming. Perform complex threatMore ❯
across a multi-region infrastructure consisting of 6,100+ staff and 90+ sites. As a member of the Information Security team, you will review aspects of the Information and Cyber Security and its components. You will be required to proactively improve and provide advice and guidance on information security matters. This position also entails support and development of the … company's IT policies and security solutions. Principal Duties, Responsibilities & Accountabilities: Responsibilities will include: Maintaining and improving the Cyber Essentials Plus Security Standard. Assist and report on the technical aspects of security management. Fully participate in internal governance activities relating to Information Security. Propose changes to existing policies and procedures to ensure operating efficiency and regulatory compliance. Co-ordinate … information security hardware or software and analyze its impact on the existing environment. Manage security projects and provide expert guidance on security matters for other IT projects. Perform daily threatintelligence checks. Duties will vary and be revised due to the nature of the IT Support environment (the above is a guide and not a comprehensive list of More ❯
of the following security awareness then this would be a major advantage: Develop and enhance security policies, processes, procedures and technical controls to strengthen security capabilities and resilience to cyber threats Take a proactive role in identifying security risks, mitigations and opportunities to strengthen resilience to cyber-attacks and security incidents Participate in the design and implementation of … and issues of non-compliance Employ previous experience and industry best practices to monitor, enhance and report on security posture, including dashboard reports and management information Gather and use cyberthreatintelligence to provide greater insight into cyber threats, to enable a faster, more targeted response and to identify new risks, along with proactive, best practice More ❯