a leading provider of advanced cybersecurity services, safeguarding organizations against evolving digital threats. We are seeking an Associate Director who will spearhead the Forensics, ThreatIntelligence and Incident Response practice area for EMEA. This pivotal role involves leading a team of elite cybersecurity consultants, overseeing a substantial revenue … is imperative for you to remain abreast of advancements in technology and evolving market trends, particularly those pertaining to Data security and privacy, Artificial Intelligence, Zero Trust, and Secure Access Service Edge (SASE), Cyber resilience and risk quantification as well as market regulatory needs and compliance. Additionally, the capacity … teams to develop programs that enhance knowledge of cyber operations, threats, regulations, and case studies Managing the business and P&L of the Verizon threat and advisory practice for EMEA You'll Need to have: Experience as a Cyber Security executive at a leading cybersecurity company or consulting firm More ❯
london, south east england, united kingdom Hybrid / WFH Options
Entasis Partners
collaborating with global teams to maintain and improve cyber resilience. Key Responsibilities: Manage and optimize key security tools, including Defender, CrowdStrike, and Zscaler Lead threatintelligence activities, IT controls, and performance dashboards Develop and run phishing simulations & cyber security awareness programs Collaborate with global teams to ensure consistent More ❯
working in a dynamic, fast paced environment Security tooling experience across protection, detection and response platforms Experience with EDR, SIEM, vulnerability management solutions and threatintelligence platforms Hands-on experience in implementing and testing new security features, planning security tooling upgrades, troubleshooting, and responding to security incidents. Strong More ❯
for engineering solutions to complex security challenges, and recognize and fill gaps in capabilities. Above all, you should be passionate about information security, the threat landscape and security automation and tooling. BASIC QUALIFICATIONS - BS degree in Computer Science, Computer Engineering, Electrical Engineering or equivalent related field - 3 years or … security incidents. - Proficiency with one high-level programming or scripting language PREFERRED QUALIFICATIONS - 3+ years experience working in security response, security automation tooling, or threatintelligence - Familiarity with malware analysis, forensics, SOAR, SIEM platforms, and a variety of Operating Systems (MS Windows, Linux, MacOS) - Experience with Amazon Web More ❯
for engineering solutions to complex security challenges, and recognize and fill gaps in capabilities. Above all, you should be passionate about information security, the threat landscape and security automation and tooling. BASIC QUALIFICATIONS BS degree in Computer Science, Computer Engineering, Electrical Engineering or equivalent related field 3 years or … security incidents. Proficiency with one high-level programming or scripting language PREFERRED QUALIFICATIONS 3+ years experience working in security response, security automation tooling, or threatintelligence Familiarity with malware analysis, forensics, SOAR, SIEM platforms, and a variety of Operating Systems (MS Windows, Linux, MacOS) Experience with Amazon Web More ❯
7+ years in SOC leadership roles. Proven experience designing and operating Security Operations Centers. Hands-on experience with SIEM platforms Expertise implementing SOAR and ThreatIntelligence solutions. More ❯
7+ years in SOC leadership roles. Proven experience designing and operating Security Operations Centers. Hands-on experience with SIEM platforms Expertise implementing SOAR and ThreatIntelligence solutions. More ❯
7+ years in SOC leadership roles. Proven experience designing and operating Security Operations Centers. Hands-on experience with SIEM platforms Expertise implementing SOAR and ThreatIntelligence solutions. More ❯
strong understanding of managed security services. Technical Expertise: Hands-on experience with security technologies such as SIEM, EDR, SOAR, vulnerability and exposure management tooling, threatintelligence, and data security solutions. Pre-Sales & Consulting Experience: Proven experience in a pre-sales, solution consulting, or technical advisory role within cyber More ❯
strong understanding of managed security services. Technical Expertise: Hands-on experience with security technologies such as SIEM, EDR, SOAR, vulnerability and exposure management tooling, threatintelligence, and data security solutions. Pre-Sales & Consulting Experience: Proven experience in a pre-sales, solution consulting, or technical advisory role within cyber More ❯
strong understanding of managed security services. Technical Expertise: Hands-on experience with security technologies such as SIEM, EDR, SOAR, vulnerability and exposure management tooling, threatintelligence, and data security solutions. Pre-Sales & Consulting Experience: Proven experience in a pre-sales, solution consulting, or technical advisory role within cyber More ❯
of Okta implementation—streamlining access, enforcing MFA, and reducing risk Design and establishment of a new Unified Security Operations Centre (SOC), integrating detection, response, threatintelligence, and automation Qualifications & Experience Proven experience (7+ years) in technical programme management, with a strong focus on IT/security transformation initiatives More ❯
metrics and monitoring/audits Network, VM & container image and system hardening, Cloud issues and misconfigurations Endpoint Security, Infrastructure Identity and Access Management, SIEM, Threatintelligence, common misconfigs (DNS, email, networking, etc.) Organising and performing penetration testing of our infrastructure, and collaborating with external parties on those tests. More ❯
incidents. - Proficiency with a programming or scripting language. PREFERRED QUALIFICATIONS - 5+ years experience working in incident response, security operations, security automation tooling, hunting, or threat intelligence. - Familiarity with malware analysis, forensics, SOAR, SIEM platforms, or detection engineering and hunting. Demonstrable subject matter expertise in any of these domains a More ❯
Management: Monitor, analyze, and respond to IT security incidents and threats. Maintain an incident management tracker and generate reports for review. Stay updated on threatintelligence and conduct periodic security audits. Documentation and Compliance: Prepare and update network diagrams and security documentation. Maintain a record of firewall policies … firewall configuration and management (e.g., Sophos). Hands-on experience with antivirus servers and endpoint security tools. Familiarity with IT security incident response and threat management processes. Solid understanding of network protocols, VLANs, and IP addressing. Excellent problem-solving skills and ability to work under pressure. More ❯
with background research and context. Collaborate with marketing to provide feedback on campaign performance and market signals. Stay up to date on cybersecurity trends, threatintelligence, and The clients products and value proposition. You’ll need: 1–2 years’ experience in a sales or business development role, ideally More ❯
with background research and context. Collaborate with marketing to provide feedback on campaign performance and market signals. Stay up to date on cybersecurity trends, threatintelligence, and The clients products and value proposition. You’ll need: 1–2 years’ experience in a sales or business development role, ideally More ❯
with background research and context. Collaborate with marketing to provide feedback on campaign performance and market signals. Stay up to date on cybersecurity trends, threatintelligence, and The clients products and value proposition. You’ll need: 1–2 years’ experience in a sales or business development role, ideally More ❯
Bumble is looking for a Threat Detection and Analysis Engineer to join our team and play a key role in fulfilling our mission to create a world where all relationships are healthy and equitable. Concretely this means you will be analysing data to prevent unintended uses for products that … sharing, and open-sourcing. What you will be doing: Analyse data across Bumble Inc products and implement logic for proactive discovery and prevention of threat actors and unwanted activity Develop new analytics and dashboards to visualise and surface data for analysis, reporting, and planning Develop and execute code to … Bachelor's degree in Computer Science, Engineering, Mathematics or a related field, equivalent training, fellowship, or work experience is required Experience understanding bad actors, threatintelligence, and abuse; involvement in remediating abuse or security-related incidents is a plus Experience with Linux, Kibana, and engineering fundamentals at scale More ❯
and configuration skills in ServiceNow (JavaScript, Business Rules, Workflows). Knowledge of security operations processes, vulnerability management, and incident handling. Experience integrating ServiceNow with threatintelligence feeds, scanners, and SIEMs. Cer... More ❯
with an emphasis on cloud security solutions. Experience recommending and implementing security technologies and solutions tailored to UK public sector organizations, including SIEM and threatintelligence platforms. Experience negotiating and securing large, multi-year Cyber security transformation projects within UK public sector entities. Understanding of cyber security principles More ❯
to provide the best-in-class security to protect the bank. We live and breathe the Allica values and deliver services intelligently using automation, intelligence, and innovation. Role Description An experienced Head of IT Security is required to join a fast-paced IT division, to facilitate and enhance all … strategy of enhancing the bank's IT security further. Using a combination of third-party tooling and custom solutions to assist you with security threat analysis and detection, you will help drive the security strategy for current and future product implementations. With good mentoring and coaching capabilities, you will … to monitor, detect, and respond to potential threats in real-time. Lead the establishment of a Security Operations Center (SOC) for continuous monitoring and threat intelligence. Continuously evaluate and enhance security tools, technologies, and processes to stay ahead of evolving threats. Application and Cloud Security Implement best practices for More ❯
. PREFERRED QUALIFICATIONS - Strong collaboration skills. Proven ability to work across functions and across marketplaces to influence senior leaders. - Intermediate SQL skills. - Experience in threatintelligence research, such as investigating, researching, or analyzing current trends, news, and historical events. - Experience in technical or policy writing. - Experience in policy More ❯