london (city of london), south east england, united kingdom
Anson McCade
scalability, automation, and resilience. Collaborating with security analysts, engineers, and stakeholders to ensure seamless integration of tools and workflows. Leading technical discussions and providing guidance on best practices for threat detection, incident response, and log management. Supporting pre-sales engagements with technical expertise and solution design input. Staying ahead of emerging threats and technologies to continuously improve SOC capabilities … . What You’ll Bring: Strong experience in designing and implementing SOC platforms (e.g., SIEM, SOAR, EDR). Deep understanding of security operations workflows, threatintelligence, and incident response. Hands-on experience with tools like Splunk, Sentinel, QRadar, or similar. Ability to engage with both technical and non-technical stakeholders. Familiarity with cloud environments (Azure, AWS, GCP) and More ❯
using Splunk, including data onboarding, creating correlation rules, and developing dashboards and reports to improve security visibility. Develop and maintain detection use cases, alerts, and response playbooks based on threatintelligence and compliance requirements. Monitor, tune, and optimise Splunk performance to ensure availability, scalability, and accuracy of security event logging and analysis. Work closely with SOC analysts, incident … response, and threat hunting teams to enhance threat detection, investigation capabilities, and response effectiveness. More ❯
adoption and effective use. Contribute to internal process documentation and improvement initiatives, ensuring procedures support a consistent and high-quality customer experience. Deliver proactive communications to customers on relevant threatintelligence, product enhancements, best practices, and industry developments. Advocate for customers internally, ensuring their needs and feedback influence product development and service improvements. Support the introduction and adoption … audiences. Ability to manage multiple customer accounts, prioritising effectively in a fast-paced environment. Experience driving customer satisfaction and retention through proactive engagement. Understanding of key concepts in cybersecurity, threat detection, and managed security services. Familiarity with ITIL service management principles. Experience presenting to senior stakeholders and technical teams. Exposure to security technologies such as EDR, SIEM and network More ❯
Overview TRM Labs is a blockchain intelligence company committed to fighting crime and creating a safer world. By leveraging blockchain data, threatintelligence, and advanced analytics, our products empower governments, financial institutions, and crypto businesses to combat illicit activity and global security threats. At TRM, you ll join a mission-driven, fast-paced team made up of … experts in law enforcement, data science, engineering, and financial intelligence, tackling complex global challenges daily. Whether analyzing blockchain data, developing cutting-edge tools, or collaborating with global organizations, you ll have the opportunity to make a meaningful and lasting impact. As a member of the Global Investigations Team, you will conduct ad hoc investigations, time sensitive blockchain analysis for … our partners, and develop solutions that allow TRM to scale rapidly and effectively. You will collaborate with an experienced team of blockchain intelligence experts, engineers, and data scientists to deliver cutting-edge support to TRM s clients. Responsibilities Investigate complex cases involving phishing, blockchain exploits, hacks, terrorism finance, account take overs (ATOs), money laundering, sim swaps, ransomware and other More ❯
objectives. Perform deep analysis and develop metrics that measure current risk Identify appropriate technology/data sources and drive the collection of data necessary to effectively evaluate threats. Communicate threatintelligence and vulnerability management options Analysing threats and current security controls to identify gaps in current defensive posture Meet with clients and leading workshops Candidates ideally need to More ❯
About Recorded Future With 1,000 intelligence professionals, over $300M in sales, and serving over 1,900 clients worldwide, Recorded Future is the world's most advanced, and largest, intelligence company! At Recorded Future, we're on a mission to empower organisations to disrupt adversaries with intelligence. We deliver accurate and actionable insights at the speed and scale … to interpret performance metrics and optimise accordingly. A passion for coaching, developing talent, and creating a high-performance sales culture. Experience or strong interest in the information security and threatintelligence landscape. Why Join Us? A mission-driven company making a real impact in cybersecurity and global safety. A diverse and inclusive team of professionals who bring innovation More ❯
With 1,000 intelligence professionals, over $300M in sales, and serving over 1,900 clients worldwide, Recorded Future is the world's most advanced, and largest, intelligence company! Recorded Future is looking to hire an In-House Counsel to support the EMEA region focussing on the DACH region and ad hoc general legal matters globally. Reporting to the … Recorded Future employees (or "Futurists"), represent over 40 nationalities and embody our core values of having high standards, practicing inclusion, and acting ethically. Our dedication to empowering clients with intelligence to disrupt adversaries has earned us a 4.8-star user rating from Gartner and more than 45 of the Fortune 100 companies as clients. Want more info? Blog & Podcast … Learn everything you want to know (and maybe some things you'd rather not know) about the world of cyber threatintelligence Linkedin , Instagram &Twitter : What's happening at Recorded Future The Record : The Record is a cybersecurity news publication that explores the untold stories in this rapidly changing field Timeline : History of Recorded Future Recognition : Check out More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Lorien
This role would be based on a hybrid working basis in Central London Experience Experience of working in Cyber Security, ideally within SOC Excellent stakeholder management skills Experience with threatintelligence platforms Active SC clearance would be required If you are an SC cleared Cyber Security Analyst looking for a new role, please apply now! Carbon60, Lorien & SRG More ❯
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threatintelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threatintelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threatintelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
london (city of london), south east england, united kingdom
Iceberg
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threatintelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
City of London, London, United Kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
highly skilled SOC Solutions Engineer to enhance security operations and strengthen detection & response strategies. This is a hands-on engineering role focused on IBM QRadar, playbook automation, and advanced threat modelling to deliver cutting-edge security solutions. What you'll do: SIEM Engineering & Management: Deploy, configure, and optimise QRadar. Onboard log sources from cloud/on-prem environments. Build … detection and anomaly rules. Playbook Development & Automation: Design and implement automated response playbooks (phishing, lateral movement, exfiltration) with SOAR tools (e.g., Logic Apps, XSOAR). Threat Detection & Response: Investigate alerts, enrich detection logic with threat intel, coordinate incident response. Threat Modelling & Use Case Development: Apply MITRE ATT&CK, STRIDE, and Kill Chain frameworks to build detection use … security (SOC/NOC environment preferred). Strong knowledge of log parsing, SIEM query languages (KQL, SPL, AQL), and automation with Python/PowerShell. Deep understanding of incident response, threat detection, and frameworks (MITRE, NIST, CIS). Knowledge of vulnerability scanning, penetration testing, and network traffic analysis. Familiarity with ITIL processes (Incident, Problem, Change). Excellent stakeholder communication, with More ❯