Malware Analysis Jobs in the UK

176 to 200 of 222 Malware Analysis Jobs in the UK

Senior Digital Security Incident Responder

England, United Kingdom
Energy Consulting group
Job Description Summary Responsible for hunting, detecting and responding to digital security threats. Demonstrates technical leadership abilities and strong comprehension of malware, emerging threats and calculating risk. Job Description Essential Responsibilities In this role, you will: Specialize in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and log-centric analysis … Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerability management, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Digital Security Incident Responder

cheltenham, south west england, united kingdom
GE Renewable Energy Power and Aviation
Job Description Summary Responsible for hunting, detecting and responding to digital security threats. Demonstrates technical leadership abilities and strong comprehension of malware, emerging threats and calculating risk. Job Description Essential Responsibilities In this role, you will: Specialize in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and log-centric analysis … Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerability management, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure More ❯
Posted:

Senior Digital Security Incident Responder

Cheltenham, England, United Kingdom
Energy Job Search
Security Incident Responder role at Energy Job Search Job Description Summary Responsible for hunting, detecting and responding to digital security threats. Demonstrates technical leadership abilities and strong comprehension of malware, emerging threats and calculating risk. Job Description Summary Responsible for hunting, detecting and responding to digital security threats. Demonstrates technical leadership abilities and strong comprehension of malware, emerging … threats and calculating risk. Job Description Essential Responsibilities In This Role, You Will Specialize in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and log-centric analysis (SIEM) Perform daily response operations on a schedule that may involve non-traditional working hours Curate signatures, tune systems/tools, and develop … Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) Understanding of APT, Cyber Crime and other associated tactics Understanding of host forensics and network analysis techniques and tools Understanding of malware and reverse engineering Understanding of vulnerabilities. Vulnerability management, remediation and implementation techniques. Understanding of responding to threats in cloud platforms (AWS, Azure More ❯
Posted:

Information Security Specialist

London, England, United Kingdom
Crédit Agricole CIB
alerts to relevant stakeholders, helping assess potential impacts on organizational assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malware analysis and threat hunting. Collaborate with the CERT team in maintaining an up-to-date threat landscape and contributing to incident response playbooks. Security Risk Management and Compliance … alerts to relevant stakeholders, helping assess potential impacts on organizational assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malware analysis and threat hunting. Collaborate with the CERT team in maintaining an up-to-date threat landscape and contributing to incident response playbooks. Security Risk Management and Compliance More ❯
Posted:

Cyber Security Incident Responder

Lincoln, England, United Kingdom
JR United Kingdom
determine root cause, and recommend remediation Collaborate with IT, Privacy, Legal teams, and senior stakeholders; prepare incident reports Conduct post-incident reviews for continuous improvement Perform digital forensics and malware analysis on artefacts to assess risks Work with the Senior Manager Incident Response to develop cyber defence metrics and KPIs Stay updated on cyber threats and technologies Develop … Needed: Managing serious cyber incidents as a digital forensic incident responder Working in large, complex enterprise environments Understanding of security monitoring and intrusion prevention systems Technical expertise in networks, malware analysis, digital forensics Effective communication with senior stakeholders Company Overview: Element is a rapidly growing testing, inspection, and certification company with a global presence. We aim to make More ❯
Posted:

Analyst I, Falcon Complete (Remote, GBR)

Reading, England, United Kingdom
Hybrid / WFH Options
CrowdStrike
minded people in a world class team who you can both learn from and mentor on a daily basis? What You'll Do Conduct monitoring and perform in-depth analysis of security alerts using the CrowdStrike platform. Exercise incident handling processes across Windows, Mac, and Linux platforms. Perform malware analysis. Perform remote remediation of malware or malicious … of the following areas: Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists. Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise. Systems Administration: an understanding of system internals … is required to understand how to implement and execute countermeasures and remediation. Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware. Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations. Programming/Scripting: experience coding in Powershell, C More ❯
Posted:

Senior Incident Responder (DFIR)

Welwyn Garden City, England, United Kingdom
Hybrid / WFH Options
Tesco UK
a senior incident responder also involves serving as a role model for engineers and analysts across Security Operations. Responsibilities include: Investigation and Response: Conduct host, network, and cloud forensic analysis to understand security incidents and take appropriate actions to contain, remediate, and recover. Incident Handling: Support incident managers and decision makers with root cause analysis and recommendations for … engineering programs. Minimum Requirements: 4+ years of relevant experience. Experience responding to security incidents in large-scale on-premises and cloud environments (preferably Microsoft Azure). Experience with forensic analysis on Windows, MacOS, and Unix systems. Knowledge of security technologies such as EDR, SOAR, and SIEM. Proficiency in at least one scripting language like Python or PowerShell. Strong critical … thinking and leadership in investigations. Ability to handle high-pressure situations professionally. Experience with static and dynamic malware analysis is desirable. Our vision at Tesco is to become every customer's favourite way to shop, whether at home or on the move. Our core purpose is to serve our customers, communities, and planet better every day, acting responsibly More ❯
Posted:

Security Engineer, Incident Response

London, England, United Kingdom
Meta
functional environment and drive incident resolution. Lead and develop Incident Response initiatives that improve Meta’s capabilities to effectively respond and remediate security incidents. Perform digital forensic acquisition and analysis of a wide variety of assets including endpoints, mobile, servers and networking equipment. Perform log analysis from a variety of sources (e.g., individual host logs, network traffic logs … and procedures. Bachelor's degree or equivalent experience in Security. Preferred Qualifications Experience as a Lead Security Incident Responder and Investigator in a large and regulated organization. Background in malware analysis, digital forensics, intrusion detection, and/or threat intelligence. Experience in threat hunting including the ability to leverage intelligence data to proactively identify and iteratively investigates suspicious More ❯
Posted:

Cyber Security Content Engineer, Blue Team

London, United Kingdom
Hybrid / WFH Options
TryHackMe Ltd
Analyst, Security Engineer, Incident Responder, Threat Hunter or Digital Forensics Investigator. You should also demonstrate: Strong expertise in core blue team areas: incident detection and response, threat intelligence, log analysis, security monitoring, and digital forensics. A deep understanding of networking, computing, and operating systems as they relate to security practices. Familiarity with blue team tooling (e.g., SIEM, EDR, IDS …/IPS, forensic tools) and methodologies (e.g., MITRE ATT&CK framework, log analysis, malware analysis). Proven ability to research and adapt to emerging threats and technologies and translate that knowledge into engaging training content. Strong verbal and written English communication skills, essential for conveying complex technical concepts. Job Responsibilities Research, design, and develop defensive cyber security … training material with supporting hands-on lab exercises (such as virtual machines and datasets for analysis). Collaborate with the Content Engineering Team to support security training coverage and identify content development opportunities. Experience developing and configuring virtual machines and sample datasets for realistic cybersecurity labs. Provide guidance and support to other Content Engineering Team members in areas of More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Security Specialist

London, England, United Kingdom
Credit Agricole CIB
alerts to relevant stakeholders, helping assess potential impacts on organizational assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malware analysis and threat hunting. Collaborate with the CERT team in maintaining an up-to-date threat landscape and contributing to the incident response playbooks. Security Risk Management and More ❯
Posted:

Information Security Specialist

South East London, England, United Kingdom
Credit Agricole CIB
alerts to relevant stakeholders, helping assess potential impacts on organizational assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malware analysis and threat hunting. Collaborate with the CERT team in maintaining an up-to-date threat landscape and contributing to the incident response playbooks. Security Risk Management and More ❯
Posted:

Information Security Specialist

london, south east england, united kingdom
Credit Agricole CIB
alerts to relevant stakeholders, helping assess potential impacts on organizational assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malware analysis and threat hunting. Collaborate with the CERT team in maintaining an up-to-date threat landscape and contributing to the incident response playbooks. Security Risk Management and More ❯
Posted:

Information Security Specialist

slough, south east england, united kingdom
Credit Agricole CIB
alerts to relevant stakeholders, helping assess potential impacts on organizational assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malware analysis and threat hunting. Collaborate with the CERT team in maintaining an up-to-date threat landscape and contributing to the incident response playbooks. Security Risk Management and More ❯
Posted:

Security Specialist - Security Operations

London, England, United Kingdom
Votresommelier
Microsoft Security Technologies and Tooling. The Role Will Involve The Following: Endpoint monitoring and detailed alert triaging/response, following an incident through to resolution and root cause analysis. Malware Analysis and investigation. Alert fatigue initiatives and tuning. Act as a security SME for essential skills in one or more of the following areas: Network monitoring, Bot Protection More ❯
Posted:

Security Operations Engineer, AWS Security Cloud Response

London, United Kingdom
Amazon
mix of deep technical knowledge and a demonstrated background in information security. We value broad and deep technical knowledge, specifically in the fields of cryptography, network security, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. Key Responsibilities Confidently and intelligently respond to security incidents, and proactively consider how to prevent the same type More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Security Specialist | London, UK

London, England, United Kingdom
Crédit Agricole CIB
alerts to relevant stakeholders, helping assess potential impacts on organizational assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malware analysis and threat hunting. Collaborate with the CERT team in maintaining an up-to-date threat landscape and contributing to the incident response playbooks. Security Risk Management and More ❯
Posted:

Incident Response Manager Devi Technologies

London, England, United Kingdom
Devitechs
response plans, ensuring they align with organizational goals and regulatory requirements ️ Collaborating with other teams (IT, legal, and compliance) to ensure coordinated and effective incident response ️ Conducting post-incident analysis and providing reports with recommendations to improve incident response strategies ️ Continuously improving incident response processes, tools, and workflows to stay ahead of evolving cyber threats What We’re Looking … or in a senior incident response role ️ Strong knowledge of incident response frameworks (e.g., NIST, SANS, CERT) and best practices ️ Hands-on experience with forensic tools, SIEM systems, and malware analysis techniques ️ Excellent leadership and communication skills, with the ability to manage high-pressure situations effectively ️ Certifications such as CISSP, CISM, GIAC, or SANS GIAC Incident Handler are More ❯
Posted:

Security Operations Engineer - Corporate Security

London, United Kingdom
Amazon
monitoring and response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of the domains mentioned above, but we … to security incidents. Proficiency with one high-level programming or scripting language PREFERRED QUALIFICATIONS 3+ years experience working in security response, security automation tooling, or threat intelligence Familiarity with malware analysis, forensics, SOAR, SIEM platforms, and a variety of Operating Systems (MS Windows, Linux, MacOS) Experience with Amazon Web Services Meets/exceeds Amazon's leadership principles requirements More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

DevOps Engineer (Visa Sponsorship Available)

London, England, United Kingdom
Techwaka
Accepting Feedback, Active Listening, Analytical Thinking, Cloud Security, Communication, Conducting Research, Creativity, Cyber Defense, Cyber Threat Intelligence, Embracing Change, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Learning Agility, Malware Analysis, Malware Detection Tools {+ 16 more} Desired Languages (If blank, desired languages More ❯
Posted:

Cyber Security Researcher - eDV Cleared

Greater Manchester, North West, United Kingdom
Hybrid / WFH Options
Forward Role
bring a structured approach to dissecting complex systems and conducting cutting-edge research. Required skills and experience: Experience in areas such as Reverse engineering in IDA Pro or Ghidra, Malware analysis, Vulnerability analysis and/or exploitation development. Processor architectures (x86-64 and ARM). Debugging with gdb, binary exploitation and code injection. Python, C or bash More ❯
Employment Type: Permanent, Work From Home
Posted:

Senior Cyber Security Analyst

London, United Kingdom
Barclay Simpson
of the firm's information assets. In this role you will also act as the first point of contact for security-related incidents, and do other investigative work including malware analysis, email forensics, and other incident response activities. The successful candidate will be a hands-on, technically skilled security professional with experience across a broad range of cybersecurity More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Security Analyst

City of London, England, United Kingdom
JR United Kingdom
the security of the firm’s information assets. In this role, you will act as the first point of contact for security-related incidents, and conduct investigative work including malware analysis, email forensics, and other incident response activities. The successful candidate will be a hands-on, technically skilled security professional with experience across a broad range of cybersecurity More ❯
Posted:

Principal Offensive Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
you will be responsible for planning and delivering in depth security assessments across a variety of products and services. Your next project could be anything from static and dynamic analysis of a multi-node infrastructure, to writing a fuzzer for an undocumented network protocol or the grammar of a new programming language. Other responsibilities includes as below Scope and … depth security assessments and vulnerability research across a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help teams identify security-related weaknesses Collaborate with teams to help them triage and fix security issues What You’ll Bring Bachelor’s or Master … or C/C++ 5+ years industry experience in software development Ability to perform manual source code reviews in one of the aforementioned languages, or assisted review with code analysis tools Hands-on experience in one or more of the following with an interest in doing full time research: cybersecurity consulting, security engineering, vulnerability management, risk assessments, bug bounty More ❯
Posted:

Cyber Security Engineer

Birmingham, England, United Kingdom
JR United Kingdom
AI/ML models, and advanced analytics technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and analytics in Databricks More ❯
Posted:

AI Engineer

City Of Westminster, London, United Kingdom
Resource Area for Teaching
e s . On top of the latest developments in the industry, and able to advise on new and alt ernative approaches to solving problems. Lead Day 2 monitoring & analysis of models. What you'll need to be successful: Advanced knowledge of machine learning, deep learning, and statistical analysis. Massive bonus points if you have experience applying these skills … to threat detection, malware analysis, phishing, and/or abuse detection. Experience designing and implementing anomaly detection, classification, clustering, and retrieval across vision and language models, ideally for identifying cyber threats (URLs, domains, phishing, botnets, etc.) Hands-on experience building production -grade AI pipelines, including data ingestion, feature engineering, validation, model deployment, and monitoring . Proficient in a More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Malware Analysis
10th Percentile
£46,250
25th Percentile
£46,985
Median
£62,000
75th Percentile
£70,938
90th Percentile
£87,750