Inside IR35 Security Clearance: DV Minimum Requirement: Have experience with dealing with real world threats in the serious and organised crime or cyber threat incidents. Have experience in analysing malware behaviour and an ability to identify associated infrastructure. Have an excellent understanding of how cyber threat attackers build and use infrastructure to undertake malicious activity Essential Qualifications: CompTIA Cybersecurity … Analyst (CySA+) or a similar certification GIAC Cyber Threat Intelligence (GCTI) or a similar certification GIAC ReverseEngineeringMalware (GREM) or a similar certification Certified Ethical Hacker (CEH) Offensive Security Certified Professional (OSCP) or a similar certification Any mix of 2 of the above qualifications* The Role: The purpose of this project is to understand how 'real More ❯
Inside IR35 Security Clearance: DV Minimum Requirement: Have experience with dealing with real world threats in the serious and organised crime or cyber threat incidents. Have experience in analysing malware behaviour and an ability to identify associated infrastructure. Have an excellent understanding of how cyber threat attackers build and use infrastructure to undertake malicious activity Essential Qualifications: CompTIA Cybersecurity … Analyst (CySA+) or a similar certification GIAC Cyber Threat Intelligence (GCTI) or a similar certification GIAC ReverseEngineeringMalware (GREM) or a similar certification Certified Ethical Hacker (CEH) Offensive Security Certified Professional (OSCP) or a similar certification Any mix of 2 of the above qualifications* The Role: The purpose of this project is to understand how 'real More ❯
and procedures (TTPs) Professional-level Russian with strong reading and writing skills in the Russian-language Proficiency in conducting technical and tactical investigations into atomic IOCs, threat actor methodologies, malware, and vulnerabilities Familiarity with the intelligence cycle , structured analytical techniques, and appropriate analytical frameworks (including Cyber Kill Chain, Diamond Model, MITRE ATT&CK) Ability to deliver at pace , find … IDS/IPS, firewall solutions, offensive security tools ) Basic knowledge of Linux/Unix operating systems Certifications such as Network+, Security+, CySA + Experience with scripting or programming, including malwarereverseengineering Professional-level foreign language skills, preferably Russian, Farsi , or Chinese Data or statistical analysis skills Familiarity with open, deep, and dark web cybercriminal marketplaces and … forums Experience of online HUMINT operations and/or social engineering techniques Capacity to read security logs and code to understand the content and context About Us Why ReliaQuest? Making security possible for our customers starts with our commitment to our people. We inspire every individual to be the best that they can be and provide the tools necessary More ❯
technical escalation point for complex security incidents within the SOC team. Oversee incident response activities and ensure timely communication with stakeholders. Facilitate tabletop exercises and training for analysts, including malwarereverseengineering, threat intelligence, and log analysis. Lead and mentor SOC analysts, fostering a high-performing team. Improve SOC services, including security monitoring, incident detection, analysis, and More ❯
dive deep into adversary infrastructure, behavioral patterns, and attack chains. This isn't about writing reports from vendor feeds - it's about getting your hands dirty with PCAP analysis, malware reversing, and building detection logic that actually catches bad actors. What You'll Actually Do Hunt Adversaries: Track APTs across infrastructure, analyze C2 patterns, and map adversary playbooks Build … Automate: Develop custom tooling for threat hunting, automate IOC enrichment, and create detection pipelines Deep Technical Analysis: Reverse engineer malware samples, analyze memory dumps, and dissect attack chains at the assembly level Lead Regulated Engagements: Execute TIBER/CBEST/STAR-FS assessments with technical depth that goes beyond compliance checkboxes Operationalize Intelligence: Transform raw threat data into More ❯