Doing: Security-Driven Development - Enhance and extend mobile app security solutions using system-level insights. Mobile OS Research - Dive into Android, iOS, and HarmonyOS Next to analyse system behaviours. ReverseEngineering & Security Testing - Utilise white hat techniques, including penetration testing and reverseengineering, to identify and address threats. Collaboration & Innovation - Work closely with the team in More ❯
Doing: Security-Driven Development - Enhance and extend mobile app security solutions using system-level insights. Mobile OS Research - Dive into Android, iOS, and HarmonyOS Next to analyse system behaviours. ReverseEngineering & Security Testing - Utilise white hat techniques, including penetration testing and reverseengineering, to identify and address threats. Collaboration & Innovation - Work closely with the team in More ❯
in Chinese and English and love tackling complex security challenges, this role is for you! Mobile OS Research Dive into Android, iOS, and HarmonyOS Next to analyse system behaviours. ReverseEngineering & Security Testing Utilise white hat techniques, including penetration testing and reverseengineering, to identify and address threats. Collaboration & Innovation Work closely with the team in More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Edinburgh/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter you will be … creative and analytical problem-solver who can work independently and as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, Threat Intelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding … think like an adversary and anticipate their next moves. Strong understanding of forensic analysis principles. Desired Certifications (one or more is a plus) GIAC Certified Threat Hunter (GCTH) GIAC ReverseEngineering Malware (GREM) Offensive Security Certified Professional (OSCP) Certified Ethical Hacker (CEH) For any further queries regarding the role, please contact Danny Palmer at Reasonable Adjustments: Respect and More ❯