Threat Analysis Jobs in London

1 to 6 of 6 Threat Analysis Jobs in London

SOC Tier 2 Cybersecurity Analyst - SC Cleared

London, United Kingdom
Hybrid / WFH Options
People Source Consulting
triage security alerts escalated from Tier 1 SOC analysts, determine severity and potential impact of the incident, and follow the triage process until closure. *Threat Analysis: Conduct in-depth analysis of security events to identify malicious activities, tactics, techniques, and procedures used by threat actors. *Security … Security Tool Management: Managing and configuring security tools, specifically Microsoft Sentinel and the Microsoft Defender suite including Defender for Cloud and Microsoft 365 Defender. *Threat Intelligence: Utilizing threat intelligence feeds and sources to stay up-to-date with the latest threats and vulnerabilities. *Collaboration: Collaborating with other members … in Kusto Query Language (KQL). Experience with the creation, configuration and use of Playbooks, Notebooks and Workbooks. Strong understanding of advanced cybersecurity concepts, threat landscape, and attack methodologies. Demonstrated experience in conducting in-depth incident analysis, threat hunting, and forensic investigations. People Source Consulting Ltd is more »
Employment Type: Contract
Rate: £65 - £80/hour PAYE CONTRACT
Posted:

SOC Tier 2 Cybersecurity Analyst (SC Cleared)

London Area, United Kingdom
People Source Consulting
triage security alerts escalated from Tier 1 SOC analysts, determine severity and potential impact of the incident, and follow the triage process until closure. •Threat Analysis: Conduct in-depth analysis of security events to identify malicious activities, tactics, techniques, and procedures used by threat actors. •Security … Security Tool Management: Managing and configuring security tools, specifically Microsoft Sentinel and the Microsoft Defender suite including Defender for Cloud and Microsoft 365 Defender. •Threat Intelligence: Utilizing threat intelligence feeds and sources to stay up-to-date with the latest threats and vulnerabilities. •Collaboration: Collaborating with other members … in Kusto Query Language (KQL). Experience with the creation, configuration and use of Playbooks, Notebooks and Workbooks. Strong understanding of advanced cybersecurity concepts, threat landscape, and attack methodologies. Demonstrated experience in conducting in-depth incident analysis, threat hunting, and forensic investigations. more »
Posted:

Regional Intelligence Manager, Compliance, Safety and Risk Management

London, United Kingdom
Confidential
technology sector, and/or demonstrated understanding of technical infrastructure. Experience with Google Cloud Platform (GCP) or other cloud computing environments as well security analysis tools and techniques. Experience with incident response procedures and methodologies, and knowledge of emerging security threats and trends. About the job Security is at … providing effective security doesn't come at the expense of customer service - you will be our bodyguard (and our long lost pal). The Threat Analysis and Crisis Services (TACS) team within Google Data Center's Compliance, Safety, and Risk Management (CSRM) organization, provides 24x7 threat monitoring … intelligence analysis and crisis reporting of potential threats to Technical Infrastructure s personnel, operations, assets, and supply chain to support decision making and business continuity. TACS surfaces emerging threats leveraging data collected in open sources, through public/private sector partnerships, and third-party providers. TACS is enabling ongoing more »
Posted:

Lead Security Analyst

South West London, London, United Kingdom
Hybrid / WFH Options
Espire Infolabs Limited
mitigate risks. Incident Lifecycle Management: Overseeing incidents from the moment of detection, through the containment and eradication stages, to the final resolution. Post-Incident Analysis: Conducting detailed investigations post-incident to understand the root cause and to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on … the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating potential threats and vulnerabilities to ensure that the organization is prepared to defend against them. Strategic Defense Implementation: Putting in place robust security measures to protect the organization's information assets. Cross-Team Coordination … unified security strategy. This role demands a proactive mindset, deep technical expertise, and strong leadership skills to navigate the complex and ever-evolving cyber threat landscape. It's about being always prepared, constantly learning, and effectively communicating to maintain and enhance the organization's security posture. Tasks & Responsibilities Evaluate more »
Employment Type: Permanent, Work From Home
Posted:

Senior Incident Response Engineer, SIRT

London, United Kingdom
Confidential
world better than we found it. Description Apple is seeking a security professional to join its Information Security Response Organization, as part of the Threat Analysis and Incident Response function. A successful candidate will possess a proven technical background, relevant Information Security experience with a strong focus in … Response, Security Engineering, and/or Intrusion Detection Proficient understanding of incident response automation strategies, with demonstrated ability to implement them Proficient understanding of threat modeling, operational threat intelligence, and common attack vectors Knowledge of web application vulnerabilities with ability to triage/verify OWASP Top 10 issues more »
Posted:

Information Security Manager

London, United Kingdom
Confidential
may be required from time to time which provides opportunity for international travel. Your team also carries out incident triage and investigation including malware analysis and some digital forensic work. If these are not areas that you are already experienced in, then this is a great opportunity to learn. … Key Responsibilities Shape our Information Security strategy to stay abreast of the evolving threat landscape as relevant to Ascential Supporting a wider Cloud Governance project through the setting of Cloud security policy, standards, and auditing and remediation activities. Setting the Information Security strategy for the organisation Reporting to the … pulse of current threats from a variety of sources to highlight those that pose a risk to Ascential Understanding the nature of our Cyber threat as it evolves and implementing appropriate defence Ensuring the secure procurement and on-boarding of new suppliers and implementation of third party solutions Ensuring more »
Posted:
Threat Analysis
London
10th Percentile
£52,500
25th Percentile
£62,500
Median
£65,000
75th Percentile
£67,500
90th Percentile
£80,400