Direct message the job poster from Lorien Sourcing Consultant at Lorien: Empowering Businesses with Strategic Procurement Solutions Job Posting: L3 InsiderThreat Engineering Lead - DLP Location: Remote UK Job Type: Contract About the Role We are seeking a highly skilled L3 InsiderThreat Engineering … Lead - DLP to manage and enhance our InsiderThreat Data Loss Prevention (DLP) capabilities. This role is pivotal in ensuring the effectiveness of our DLP platform and leading a globally distributed team of engineers. Reporting to the Global Head of InsiderThreat, you will … risks. Key Responsibilities Oversee the technical management, troubleshooting, and administration of the DLP platform. Lead and mentor a diverse team of InsiderThreat Engineers specializing in DLP, providing guidance, coaching, and technical expertise. Collaborate with the L1 InsiderThreat Manager, the L3 InsiderMore ❯
people, assets, operations, and reputation, both in the UK and overseas. The ideal candidate will bring a strong understanding of counterintelligence, insiderthreat, personnel and physical security, and be capable of shaping and delivering a mature, scalable protective security and resilience strategy across the business. This includes … company-wide InsiderThreat Working Group, collaborating with HR, Cyber, and operational leads. Develop strategies to detect and mitigate espionage threats, insider risks, and hostile intelligence activity. Coordinate the delivery of risk assessments, briefings, and targeted interventions. Security Risk Management & Assurance Design and maintain risk … field operations. Requirements Required Experience Background in UK intelligence, law enforcement, defence, or government protective security roles. Proven experience in counterintelligence, insiderthreat, and facility or personnel security. Strong working knowledge of HMG Security Policy Framework and associated government or client security requirements. Commercial sector security experience More ❯
We are seeking a Senior Threat Analyst to join our rapidly growing Information Security team. This role offers a unique opportunity for a seasoned cybersecurity professional to lead our cyber defense strategy, protect our brand from threats, and build our threat intelligence and hunting capabilities from scratch. You … and a passion for solving complex problems. You'll report to the Head of Cyber Defence and lead the development of advanced CTI and threat hunting strategies, integrating seamlessly into our security processes and driving ongoing improvements. Our Future Health is the UK's largest health research program, supported … million volunteers to advance health discoveries. Key Responsibilities Collaborate with the security team and MSP SOC to enhance organizational security. Develop and utilize cyber threat intelligence approaches, including tooling and feeds. Stay updated on the cyber threat landscape, especially in health research sector. Triaging, analyzing, and responding to More ❯
and malware triage in support of incident response investigations. Identify, analyze, and assess potential insiderthreats through behavioral analytics, log review, and threat intelligence. Maintain and improve SOC processes and procedures, staying current with the latest security trends and technologies. Assist in developing strategies to handle security … incidents and coordinate responses to insider threats. Support the development and implementation of use cases, detection rules, and playbooks. Perform threat hunting activities to proactively identify threats within the environment. Continuously review and refine insider risk policies to ensure they are effective and up to … Cyber Incident Response Plan. Develop comprehensive and accurate reports and presentations for both technical and executive audiences. Stay up to date with relevant vulnerabilities, threat actors, indicators of compromise (IOCs) tactics, techniques, and procedures (TTPs), and trends, identifying actionable areas of interest and threats. Requirements and Qualifications At least More ❯
and malware triage in support of incident response investigations. Identify, analyze, and assess potential insiderthreats through behavioral analytics, log review, and threat intelligence. Maintain and improve SOC processes and procedures, staying current with the latest security trends and technologies. Assist in developing strategies to handle security … incidents and coordinate responses to insider threats. Support the development and implementation of use cases, detection rules, and playbooks. Perform threat hunting activities to proactively identify threats within the environment. Continuously review and refine insider risk policies to ensure they are effective and up to … Cyber Incident Response Plan. Develop comprehensive and accurate reports and presentations for both technical and executive audiences. Stay up to date with relevant vulnerabilities, threat actors, indicators of compromise (IOCs) tactics, techniques, and procedures (TTPs), and trends, identifying actionable areas of interest and threats. Requirements and Qualifications At least More ❯
and malware triage in support of incident response investigations. Identify, analyze, and assess potential insiderthreats through behavioral analytics, log review, and threat intelligence. Maintain and improve SOC processes and procedures, staying current with the latest security trends and technologies. Assist in developing strategies to handle security … incidents and coordinate responses to insider threats. Support the development and implementation of use cases, detection rules, and playbooks. Perform threat hunting activities to proactively identify threats within the environment. Continuously review and refine insider risk policies to ensure they are effective and up to … Cyber Incident Response Plan. Develop comprehensive and accurate reports and presentations for both technical and executive audiences. Stay up to date with relevant vulnerabilities, threat actors, indicators of compromise (IOCs) tactics, techniques, and procedures (TTPs), and trends, identifying actionable areas of interest and threats. Requirements and Qualifications At least More ❯
and malware triage in support of incident response investigations. Identify, analyze, and assess potential insiderthreats through behavioral analytics, log review, and threat intelligence. Maintain and improve SOC processes and procedures, staying current with the latest security trends and technologies. Assist in developing strategies to handle security … incidents and coordinate responses to insider threats. Support the development and implementation of use cases, detection rules, and playbooks. Perform threat hunting activities to proactively identify threats within the environment. Continuously review and refine insider risk policies to ensure they are effective and up to … Cyber Incident Response Plan. Develop comprehensive and accurate reports and presentations for both technical and executive audiences. Stay up to date with relevant vulnerabilities, threat actors, indicators of compromise (IOCs) tactics, techniques, and procedures (TTPs), and trends, identifying actionable areas of interest and threats. Requirements and Qualifications At least More ❯
and malware triage in support of incident response investigations. Identify, analyze, and assess potential insiderthreats through behavioral analytics, log review, and threat intelligence. Maintain and improve SOC processes and procedures, staying current with the latest security trends and technologies. Assist in developing strategies to handle security … incidents and coordinate responses to insider threats. Support the development and implementation of use cases, detection rules, and playbooks. Perform threat hunting activities to proactively identify threats within the environment. Continuously review and refine insider risk policies to ensure they are effective and up to … Cyber Incident Response Plan. Develop comprehensive and accurate reports and presentations for both technical and executive audiences. Stay up to date with relevant vulnerabilities, threat actors, indicators of compromise (IOCs) tactics, techniques, and procedures (TTPs), and trends, identifying actionable areas of interest and threats. Requirements and Qualifications At least More ❯
london (city of london), south east england, united kingdom
NorthMark Strategies
and malware triage in support of incident response investigations. Identify, analyze, and assess potential insiderthreats through behavioral analytics, log review, and threat intelligence. Maintain and improve SOC processes and procedures, staying current with the latest security trends and technologies. Assist in developing strategies to handle security … incidents and coordinate responses to insider threats. Support the development and implementation of use cases, detection rules, and playbooks. Perform threat hunting activities to proactively identify threats within the environment. Continuously review and refine insider risk policies to ensure they are effective and up to … Cyber Incident Response Plan. Develop comprehensive and accurate reports and presentations for both technical and executive audiences. Stay up to date with relevant vulnerabilities, threat actors, indicators of compromise (IOCs) tactics, techniques, and procedures (TTPs), and trends, identifying actionable areas of interest and threats. Requirements and Qualifications At least More ❯
and malware triage in support of incident response investigations. Identify, analyze, and assess potential insiderthreats through behavioral analytics, log review, and threat intelligence. Maintain and improve SOC processes and procedures, staying current with the latest security trends and technologies. Assist in developing strategies to handle security … incidents and coordinate responses to insider threats. Support the development and implementation of use cases, detection rules, and playbooks. Perform threat hunting activities to proactively identify threats within the environment. Continuously review and refine insider risk policies to ensure they are effective and up to … Cyber Incident Response Plan. Develop comprehensive and accurate reports and presentations for both technical and executive audiences. Stay up to date with relevant vulnerabilities, threat actors, indicators of compromise (IOCs) tactics, techniques, and procedures (TTPs), and trends, identifying actionable areas of interest and threats. Requirements and Qualifications At least More ❯
London, England, United Kingdom Hybrid / WFH Options
Canonical
Join to apply for the Threat Intelligence Lead role at Canonical Join to apply for the Threat Intelligence Lead role at Canonical The Threat Intelligence Lead will own Canonical’s threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical … with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence. This role will report to the CISO. You will lead intelligence gathering and development activities on threat actors targeting software supply chains. … of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure. More ❯
malware, network traffic, and system logs to uncover threats. Incident Response: Lead security response efforts, including containment, eradication, and recovery of cyber incidents. Forensics & Threat Hunting: Conduct forensic investigations and proactive threat hunts to detect and mitigate potential risks before they escalate. Threat Intelligence: Utilise intelligence feeds … Looking For 5+ years experience in Security Operations Centre (SOC) and Incident Response (IR). Proficiency in digital forensics, malware analysis, SIEM tools, and threat intelligence. A solid understanding of cyber threats, particularly in regulated industries. Experience conducting security exercises and breach simulations. Excellent communication skills, with the ability … England, United Kingdom 3 days ago Greater London, England, United Kingdom 1 month ago London, England, United Kingdom 3 weeks ago InsiderThreat & Cyber Investigations Specialist London, England, United Kingdom 2 days ago Information Security GRC and Operational Resilience Analyst London, England, United Kingdom 6 hours ago More ❯
processes and controls. Your responsibilities will include but are not limited to being an escalation point and expert on cyber incidents of various types, threat hunting for TTPs prioritized by internal and external threat intelligence, owning team process improvements as well as mentorship, and staying on top of … industry technology and cyber threat advancements. We are a passionate global team dedicated to helping keep our clients and our firm safe. RESPONSIBILITIES Maintain a core competency in event analysis and serve as an escalation point for noteworthy investigations, deeper investigations, and those that require critical attention. Continue to … alerting, reports, and other objects as needed in Splunk. Continue to maintain a depth of knowledge within the cyber security field. This entails following threat actor activity targeting the industry and speaking knowledgeably at regular internal threat intelligence briefings. Leveraging threat intelligence, experience, and other inputs to More ❯
Construct meaningful incident timelines from forensic artifact analysis Counter Measures - Ability to design and implement preventative and corrective controls to counteract emerging threats Proactive Threat Hunting - Develop and execute focused plans to discover advanced threats that evade traditional security controls Behavioral Analysis - Develop and implement criteria to identify anomalous … user behavior leading indicating insiderthreat activity Intrusion Detection - Develop and tune network anomaly control capability to produce reliable actionable data Threat Hunting - Proactively search for unknown threats within the environment. Preferred Knowledge And Experience 3+ years of relevant experience Deep understanding of networking and its More ❯
variety of tools and technologies to identify, investigate, and respond to security incidents, including Cortex, Falcon, Microsoft Sentinel, Defender for Endpoint, Tenable IO, Defender Threat Hunting, and OpenCTI. Key Responsibilities: Perform advanced analysis of security events and alerts, using a combination of manual techniques and automated tools to identify … and Level 2 analysts in the investigation and remediation of security incidents. Use Cortex, Falcon, Microsoft Sentinel, Defender for Endpoint, Tenable IO, Defender Threat Hunting, and OpenCTI to perform threat hunting and identify potential security risks. Work closely with other members of the SOC team to develop and … month ago Birmingham, England, United Kingdom 1 day ago London, England, United Kingdom £40,000.00-£50,000.00 1 month ago InsiderThreat & Cyber Investigations Specialist London, England, United Kingdom 1 week ago North Yorkshire, England, United Kingdom 1 month ago Application Security Engineer (Visa Sponsorship and relocation More ❯
required: Yes Job Views: 2 Posted: 31.05.2025 Expiry Date: 15.07.2025 Job Description: We are seeking a Data Loss Prevention (DLP)/InsiderThreat Analyst for Harrington Starr’s global client to join their Cyber Security Engineering team. The role involves protecting the organization from data loss and … policies, incident management, data protection, and reporting Experience with Microsoft Purview, M365, and Proofpoint technologies Experience with End-User Behaviour Analytics (EUBA) and Insider Risk Management Strong understanding of cybersecurity and information security principles Certifications such as Microsoft SC-400, AZ-500, MS-900, or CISSP are preferred More ❯
col-narrow-right Job Views: 2 Posted: 31.05.2025 Expiry Date: 15.07.2025 col-wide Job Description: Data Loss Prevention/DLP/InsiderThreat Analyst required by Harrington Starr’s global client to play a key role in their Cyber Security Engineering team. The role will play a … policy, incident management, data protection and reporting Experience of Microsoft Purview, M365, and Proofpoint technologies Practical experience End-User Behaviour Analytics (EUBA) and Insider Risk Management A good overall understanding of cyber and information security Certifications such as Microsoft SC-400, AZ-500, MS- 900, or CISSP preferred More ❯
Symantec, Forcepoint, or similar). Familiarity with data classification, data handling standards, and regulatory requirements (e.g., NYDFS, GDPR). Knowledge of insiderthreat detection and user behavior analytics (UBA). Exposure to security incident and event management (SIEM) tools. Core Values Love what you do: We show More ❯
Symantec, Forcepoint, or similar). Familiarity with data classification, data handling standards, and regulatory requirements (e.g., NYDFS, GDPR). Knowledge of insiderthreat detection and user behavior analytics (UBA). Exposure to security incident and event management (SIEM) tools. Core Values Love what you do: We show More ❯
Colchester, England, United Kingdom 2 weeks ago Hatfield, England, United Kingdom 3 weeks ago London, England, United Kingdom 2 months ago InsiderThreat & Cyber Investigations Specialist London, England, United Kingdom 1 week ago London, England, United Kingdom 2 weeks ago London, England, United Kingdom 3 weeks ago More ❯
Construct meaningful incident timelines from forensic artifact analysis Counter Measures - Ability to design and implement preventative and corrective controls to counteract emerging threats Proactive Threat Hunting - Develop and execute focused plans to discover advanced threats that evade traditional security controls Behavioral Analysis -Develop and implement criteria to identify anomalous … user behavior leading indicating insiderthreat activity Intrusion Detection - Develop and tune network anomaly control capability to produce reliable actionable data Threat Hunting - Proactively search for unknown threats within the environment. Knowledge and Experience University degree in related discipline 1+ years of relevant experience Deep understanding More ❯
Construct meaningful incident timelines from forensic artifact analysis Counter Measures - Ability to design and implement preventative and corrective controls to counteract emerging threats Proactive Threat Hunting - Develop and execute focused plans to discover advanced threats that evade traditional security controls Behavioral Analysis - Develop and implement criteria to identify anomalous … user behavior leading indicating insiderthreat activity Intrusion Detection - Develop and tune network anomaly control capability to produce reliable actionable data Threat Hunting - Proactively search for unknown threats within the environment. Preferred Knowledge and Experience 3+ years of relevant experience Deep understanding of networking and its More ❯
London, England, United Kingdom Hybrid / WFH Options
AVEVA Denmark
Response Analyst team to proactively identifying, Investigating, and hunting potential attacks and security risks on AVEVA networks and systems using various platform dashboards and threat feeds. Manage and supervise Cyber Security Response Analyst team on analysis of security events as detected by various security controls, monitoring, and recording security … years of experience leading or managing technical teams in following subject areas: vulnerabilities, exploitation, and remediation, network traffic and node analysis, InsiderThreat, ransomware, supply-chain attacks, data exfiltration, web-focused security topics, persistent Threat (APT), Spear Phishing, and credential compromise techniques. Minimum of five years … information and cyber security experience as Security Analyst and Incident Response, Security Threat Hunting, or Security Operations Centre analyst role. Bachelor's degree in information systems or equivalent work experience in relevant information and cyber security domain. Security certification from a recognised organisation such as ISC2, CompTIA, ECCouncil, SANS More ❯
pay range Direct message the job poster from ApTask Trusted Partner in Talent Acquisition for High-Growth Companies Job Description As a Senior Engineer - Threat Modelling you will be a part of a smart cross-functional team delivering digital business transformation solutions to our clients. This position entails an … individual contributor role focused on Security Architecture and Threat Modelling, encompassing governance, evaluation of public cloud services, and conducting security reviews for Public Cloud Providers. Collaboration and partnership with Engineering, Information Security, Program Management, and Development teams are essential. The candidate will conduct technical architecture reviews to pinpoint security … opportunities, identify exploitable threats, and propose mitigation strategies. Your Impact •Conduct thorough threat modeling exercises utilizing established methodologies and frameworks •Maintain a rigorous standard of excellence in identifying potential threats and specifying effective mitigation controls. •Manage the lifecycle of identified threats and associated controls, ensuring timely updates and adjustments More ❯
teams. Maintain cyber security solutions with existing systems, applications, and infrastructure. Evaluate and recommend technologies, tools, and vendors to meet business needs. Perform proactive threat hunting for new and emerging cyber threats. Specialist in OT systems, defining monitoring alerts and ensuring the operation of effective security controls. Support compliance … Operations Centre [SOC] Assistant Manager IGH Greater London, England, United Kingdom 1 week ago London, England, United Kingdom 1 month ago InsiderThreat & Cyber Investigations Specialist London, England, United Kingdom 2 weeks ago London, England, United Kingdom 1 week ago London, England, United Kingdom 2 weeks ago More ❯