Gloucester, Gloucestershire, UK Hybrid / WFH Options
EDF
Online ThreatIntelligence Senior Analyst - Gloucester, UK About the Role 2 Year Fixed Term Contract Are you naturally inquisitive and eager to discover opportunities to support customers and improve cyber resilience? If so, come and join EDF as an Online ThreatIntelligence Senior Analyst! The … Opportunity As an Online ThreatIntelligence Senior Analyst, you will support our IT Security and counter fraud and risk management teams in identifying online threats to both our valued customers and our operational businesses to ensure we are well informed of advancing threats and actively implementing proactive countermeasures … to mitigate risk. The Online ThreatIntelligence Senior Analyst will join the Customers Security and Resilience Team, to support our Business Information Security Officer and Counter Fraud Team to gather, analyse and communicate threats and security risks to our customers and Business Unit. You’ll work with our More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
EDF Energy
About the Role 2 Year Fixed Term Contract Are you naturally inquisitive and eager to discover opportunities to support customers and improve cyber resilience? If so, come and join EDF as an Online ThreatIntelligence Senior Analyst! The Opportunity As an Online ThreatIntelligence Senior … customers and our operational businesses to ensure we are well informed of advancing threats and actively implementing proactive countermeasures to mitigate risk. The Online ThreatIntelligence Senior Analyst will join the Customers Security and Resilience Team, to support our Business Information Security Officer and Counter Fraud Team to … our technical and customer support specialisms to continually improve our security posture and provide support in incidents and investigations as well as delivering strategic threatintelligence and trend analysis reporting to our senior stakeholders and Executives. Pay, benefits and culture Alongside a salary of circa £50,000 (depending More ❯
Plymouth, Devon, South West, United Kingdom Hybrid / WFH Options
Inspire People
leadership for the Security Operations Centre team providing technical oversight and direction. You will engage with various teams across DDaT to maintain security monitoring, threatintelligence and vulnerability management controls to detect and alert across all HM Land Registry technical assets. Salary of £46,058 - £57,400 dependent … with the Technology and Business Strategies. Working closely with the Lead Infrastructure Engineers and subject matter experts, you will develop and maintain security monitoring, threatintelligence and vulnerability management controls, to detect and alert across all HMLR technical assets. You will work with technical teams to develop SOC … you have led technical investigations and developed response frameworks. You are proficient with Security Information and Event Management (SIEM) systems and adept at utilising CyberThreatIntelligence within this context. You have a strong capability to manage technical risks and lead the implementation of mitigations. Additionally, you More ❯
A leading Financial Services firm seeks a ThreatIntelligence Lead to spearhead their Global threatintelligence initiatives and enhance their Cyber Defence strategy. This is a hands-on, technical role focused on Threat hunting, Malware analysis, and tracking changes made by Threat Actors. … This position plays a key role in shaping the Cyber Defence strategy, driving deliverables, and focusing on Threat-led and Threat detection activities. The organisation is investing in new tooling, including the procurement of a new TIP solution. The individual in this role will be responsible for More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. ThreatIntelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. Security Automation & Scripting More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. ThreatIntelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. Security Automation & Scripting More ❯
Alexander Mann Solutions - Public Sector Resourcing
month contract based in Exeter office once per month. As the Security Architect within the Security Operations team of the Met Office's Cyber Security Department, you will design and implement security solutions that protect Met Office digital services. You'll advise on enterprise security initiatives to further enhance … our cyber security posture, safeguarding systems that are essential to public safety and national security. This role requires close collaboration with our Security Operations Center and Vulnerability Management teams to continuously improve our security services. This role will specifically support the deployment of our Network Detection and Response solution. … responsibilities will be: . Design and implement enterprise security solutions for on-premises and cloud-based systems by applying technical architecture, risk management, and threat analysis to create solutions that are resilient from attack . Assess and improve security postures to address evolving cyber threats, keeping our operational More ❯
responding to security threats and incidents. Your role will involve working with cutting-edge security tools and technologies to protect the IT infrastructure from cyber threats. You will collaborate with various teams to ensure a robust security posture and contribute to the continuous improvement of our security operations. Essential … Skills Experience with security monitoring tools (e.g., SIEM). Strong analytical skills to assess complex security issues. Cyber incident response and handling experience. Ability to identify and mitigate security threats. Happy working in a fast-paced environment. Strong communication skills. Problem-solving and analytical skills. Key Responsibilities Monitor security … eradication, and recovery. Perform forensic analysis. Develop trusting relationships with critical third-party security providers. Prepare reports on security incidents and recommend improvements. Develop threatintelligence relevant to the business. Conduct threat hunting, vulnerability analysis, and penetration testing to identify risks. Continually assess security systems, suggesting appropriate More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Gold Group Limited
responding to security threats and incidents. Your role will involve working with cutting-edge security tools and technologies to protect the IT infrastructure from cyber threats. You will collaborate with various teams to ensure a robust security posture and contribute to the continuous improvement of our security operations. Essential … Skills Experience with security monitoring tools (e.g., SIEM). Strong analytical skills to assess complex security issues. Cyber incident response and handling experience. Ability to identify and mitigate security threats. Happy working in a fast-paced environment. Problem-solving and analytical skills. Key Responsibilities Monitor security alerts and logs … eradication, and recovery. Perform forensic analysis. Develop trusting relationships with critical third-party security providers. Prepare reports on security incidents and recommend improvements. Develop threatintelligence relevant to the business. Conduct threat hunting, vulnerability analysis, and penetration testing to identify risks. Continually assess security systems, suggesting appropriate More ❯
for security monitoring and analysis. Familiarity with security technologies and an understanding of network protocols, firewalls, and intrusion detection/prevention systems. Knowledge of ThreatIntelligence , Digital Forensics , and Data Loss Prevention . Relevant certifications such as CISSP , CEH , or Splunk certifications are highly desirable. Ability to thrive More ❯
IT systems. The Security Architect will draw upon Enterprise Security Architecture or Security Solutions Architecture to: Identify business objectives, user needs, risk appetite and cyber security obligations Identify vulnerabilities, perform threat modelling, undertake risk assessment, evaluate the effectiveness of security controls Verify and evidence alignment to 'Secure by … of established patterns, principles and guidelines Research emerging technologies, new products and be able to position these in a coherent manner against the developing threat landscape and client risk appetite Ability to distil complex information and concepts into key discussion points that identifies a path to resolution rather than … which incorporate Regulatory, Legal and Compliance in relation to applicable security policies. Standards and guidelines Assisting with the identification of identified risks and emerging cyber security vulnerabilities and threats. The subsequent analysis to quantify and lead risk mitigation plans Work with Service Management to ensure that partners and suppliers More ❯