Malware Analysis Jobs in the UK

51 to 75 of 122 Malware Analysis Jobs in the UK

Cyber Defence Analyst L3

Newport, Wales, United Kingdom
Airbus Protect Limited
processes. Ensure relations with CERT (Computer Emergency Response Team), particularly in a crisis situation to coordinate the various operational security teams. Response: Perform Incident Response of major cyber incidents: Malware reverse engineering, Hosts forensics, log analysis, etc. Perform Threat Intelligence on attacker groups related to aeronautics and defence. Perform Threat Hunting : Conduct Malware Analysis in the More ❯
Posted:

L3 SOC Analyst - Systems Integrator

England, United Kingdom
Hamilton Barnes Associates Limited
learn more about this opportunity, feel free to reach out and apply today! Responsibilities: Monitor and analyse security events within the SOC, ensuring timely detection and response. Perform threat analysis, vulnerability assessments, and implement mitigation strategies. Develop and refine incident response playbooks and procedures. Conduct root cause analysis (RCA) for high-priority incidents to prevent recurrence. Collaborate with … Have: Minimum of two years' experience in a SOC or managed security environment. Strong knowledge of network security (firewalls, IDS/IPS, VPNs). Proficiency in incident response, threat analysis, and vulnerability management. Experience working with SIEM tools for monitoring and event analysis. Understanding of malware analysis, forensic investigations, and endpoint security. Strong analytical and problem-solving More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

L2 SOC Analyst - Telecommunications

London, England, United Kingdom
Hamilton Barnes Associates Limited
learn more about this opportunity, feel free to reach out and apply today! Responsibilities: Monitor and analyse security events within the SOC, ensuring timely detection and response. Perform threat analysis, vulnerability assessments, and implement mitigation strategies. Develop and refine incident response playbooks and procedures. Conduct root cause analysis (RCA) for high-priority incidents to prevent recurrence. Collaborate with … Requirements: Minimum of two years' experience in a SOC or managed security environment. Strong knowledge of network security (firewalls, IDS/IPS, VPNs). Proficiency in incident response, threat analysis, and vulnerability management. Experience working with SIEM tools for monitoring and event analysis. Understanding of malware analysis, forensic investigations, and endpoint security. Strong analytical and problem-solving More ❯
Posted:

Cyber Security Incident Responder

United Kingdom
Element Materials Technology
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malware analysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware analysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
Posted:

Cyber Security Incident Responder

Reading, England, United Kingdom
JR United Kingdom
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malware analysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware analysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
Posted:

Cyber Security Incident Responder

Hounslow, England, United Kingdom
JR United Kingdom
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malware analysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware analysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
Posted:

Threat Intelligence Analyst Devi Technologies

United Kingdom
Devitechs
re Looking For: ️ Proven experience as a Threat Intelligence Analyst or in a similar role within cybersecurity ️ Strong knowledge of threat intelligence platforms (TIPs), open-source intelligence (OSINT), and malware analysis ️ Familiarity with cybersecurity frameworks (e.g., MITRE ATT&CK, STIX, TAXII) ️ Experience in analyzing cyber threats, including advanced persistent threats (APTs), ransomware, and phishing attacks ️ Certifications such as More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SOC Analyst | Remote Contract | Outside IR35

United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

Central London, UK
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

West London, UK
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

London, England, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

Leigh, England, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

City of London, London, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

How, Cumbria, UK
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
cybersecurity with hands-on SOC experience. Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel, or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified) are a plus. More ❯
Employment Type: Full-time
Posted:

SOC Analyst | Remote Contract | Outside IR35

East London, London, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

Bolton, Greater Manchester, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

Bury, Greater Manchester, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

Altrincham, Greater Manchester, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

Leeds, West Yorkshire, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

Leigh, Greater Manchester, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

South East London, England, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

Central London / West End, London, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

SOC Analyst | Remote Contract | Outside IR35

Ashton-Under-Lyne, Greater Manchester, United Kingdom
Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Posted:

Cyber Security Incident Responder

London, England, United Kingdom
JR United Kingdom
investigations, determine root causes, and recommend remediation. Collaborate with IT, Privacy, Legal teams, and stakeholders; prepare incident reports. Conduct post-incident reviews for continuous improvement. Perform digital forensics and malware analysis. Develop cyber defence metrics and KPIs with the Incident Response team. Stay updated on cyber threats and technologies. Build relationships with external stakeholders for information sharing and response … serious cyber incidents as a Digital Forensic Incident Responder. Working within large, complex enterprise environments. Understanding of security monitoring, intrusion detection, prevention, and control systems. Technical expertise in networks, malware analysis, and digital forensics. Strong analytical and communication skills. Company Overview: Element is a leading testing, inspection, and certification company with over 9,000 employees across 30 countries. More ❯
Posted:

Incident Response Analyst

London, England, United Kingdom
Pentest People
comprehensive reports for clients. Technical skills: Demonstrated experience in responding to and investigating incidents whilst utilizing various monitoring, detection and investigation tooling – SIEM, SOAR, EDR etc. Proficiency in log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incident response following NIST 800-61 guidelines incorporating containment, eradication … tabletop exercises, and IR planning. Should have an understanding of Technical Frameworks such as MITRE Attack, Lockheed Martin kill chain or Diamond model. Should be able to perform dynamic malware analysis. Qualifications: Certifications such as ECIH, Security +, BTL1, Cysa+, SC-200 are good to have Knowledge of open-source IR tools, such as Velociraptor, Eric Zimmerman Tools, Chainsaw … skills, with the ability to manage and coordinate various incidents whilst remaining calm under pressure. Ability to align client deliverables with industry best practices. Experience in threat intelligence and analysis to support proactive IR. Capable of taking ownership of tasks, ensuring quality delivery and supporting the IR's team growth. While this role is advertised as remote, it will More ❯
Posted:
Malware Analysis
10th Percentile
£46,250
25th Percentile
£46,985
Median
£62,000
75th Percentile
£70,938
90th Percentile
£87,750