Initial We are looking for a highly capable and technically skilled Security Analyst (Network & Endpoint) to join our cybersecurity team. This role focuses on network and endpoint security operations, threat intelligence, and incident response within a Security Operations Centre (SOC) environment. The successful candidate will have hands-on experience with leading security platforms and demonstrate the ability to operate … Network & Endpoint) Location: England/Remote Contract Type: Contract Duration: Contract till 31st Mar 26 Sector: Healthcare . Key Responsibilities: Network Detection & Response: Administer and optimise Darktrace for network threat detection, model tuning, and behavioural analysis. Investigate anomalies and escalate incidents based on network telemetry. Endpoint Protection: Deploy and manage CrowdStrike Falcon agents across enterprise endpoints. Maintain and update … detection rules, ensuring alignment with threat intelligence. Security Operations Centre (SOC): Act as a Level 2 SOC Analyst and Incident Handler. Triage, investigate, and respond to security alerts and incidents. Collaborate with other SOC team members to ensure timely resolution and documentation. Threat Intelligence & InsiderThreat Monitoring: Monitor threat feeds and manage Indicators of More ❯
to join their dynamic team and make a real impact. With a focus on innovation and a commitment to excellence, this organisation is at the forefront of tackling insiderthreats and safeguarding critical data. This role provides the perfect environment for professional growth, collaboration, and working on cutting-edge projects that truly matter. What You Will Do: - Monitor … insiderthreats such as data exfiltration, fraud, or misuse of privileges. - Conduct thorough behavioural risk assessments by combining technical data with contextual information. - Lead insiderthreat investigations from triage through closure, ensuring proper documentation and reporting. - Collaborate with HR, Legal, Compliance, and Business Units to handle sensitive cases while aligning with policies and regulations. - Contribute … Will Bring: - A bachelor's degree in Cybersecurity, Computer Science, Criminology, Behavioural Science, or equivalent practical experience. - At least three years of experience in cybersecurity operations, insiderthreat programmes, SOC, or similar investigative roles. - Familiarity with insider risk tools and technologies such as SIEM, DLP, UEBA, and EDR. - Strong analytical and investigative skills, with the More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
UKRI
professionals to deliver impact across the organisation and the wider UK research and innovation system. Join us for this rare opportunity to apply your experience in offensive security and threat intelligence in a dynamic, fast-paced security operational and strategic role in an organisation at the heart of research and innovation in the UK. Leading the Red Team of … proactive advice to teams on the most effective remediation strategies. The role encompasses the full scope and delivery of penetration testing, including black box network assessments, insiderthreat evaluations, credentialed application exploitation, and rigorous testing of human and physical security controls across the UKRI estate. In addition to these offensive security responsibilities, the specialist manages the external … check Key Responsibilities: Execute targeted penetration tests and red team exercises to identify exploitable vulnerabilities. Develop and maintain offensive tooling to simulate adversary tactics and techniques. Monitor and analyse threat intelligence feeds to identify emerging threats and relevant TTPs. Produce technical threat reports and briefings to inform security posture and decision-making. Conduct proactive threat hunting based More ❯
Keyworth, Nottinghamshire, United Kingdom Hybrid / WFH Options
UK Research and Innovation (UKRI)
professionals to deliver impact across the organisation and the wider UK research and innovation system. Join us for this rare opportunity to apply your experience in offensive security and threat intelligence in a dynamic, fast-paced security operational and strategic role in an organisation at the heart of research and innovation in the UK. Leading the Red Team of … proactive advice to teams on the most effective remediation strategies. The role encompasses the full scope and delivery of penetration testing, including Black Box network assessments, insiderthreat evaluations, credentialed application exploitation, and rigorous testing of human and physical security controls across the UKRI estate. In addition to these offensive security responsibilities, the specialist manages the external … check Key Responsibilities: Execute targeted penetration tests and red team exercises to identify exploitable vulnerabilities. Develop and maintain offensive tooling to simulate adversary tactics and techniques. Monitor and analyse threat intelligence feeds to identify emerging threats and relevant TTPs. Produce technical threat reports and briefings to inform security posture and decision-making. Conduct proactive threat hunting based More ❯
Their decisions directly impact who is granted access to sensitive environments. Errors in judgement or process can result in reputational damage, legal non-compliance, and increased risk of insider threats. This role is a specialist function requiring a high level of trust, responsibility, and alignment with government security standards. More ❯
configuration, and administration of privileged access management (PAM) solution such as Delinea , CyberArk. Knowledge on cybersecurity principles and best practices, with focus on securing privileged access and preventing insider threats. Strong knowledge of privileged access management concepts and best practices. Hands on experience on integration of privileged management solutions with tools such as Active Directory, Azure/OKTA More ❯
configuration, and administration of privileged access management (PAM) solution such as Delinea , CyberArk. Knowledge on cybersecurity principles and best practices, with focus on securing privileged access and preventing insider threats. Strong knowledge of privileged access management concepts and best practices. Hands on experience on integration of privileged management solutions with tools such as Active Directory, Azure/OKTA More ❯
london (city of london), south east england, united kingdom
Persistent Systems
configuration, and administration of privileged access management (PAM) solution such as Delinea , CyberArk. Knowledge on cybersecurity principles and best practices, with focus on securing privileged access and preventing insider threats. Strong knowledge of privileged access management concepts and best practices. Hands on experience on integration of privileged management solutions with tools such as Active Directory, Azure/OKTA More ❯
/DFIR Consultant) to join their team. As an Incident Responder, you'll take the lead on active engagements involving real-world attacks such as ransomware, data breaches, insiderthreats, and more. You'll conduct forensic investigations, advise clients on containment and recovery strategies, work on delivery and implementation, and produce detailed post-incident reports. This is a … incident response for a diverse client base, ensuring effective containment, investigation, and recovery. Conduct in-depth digital forensic analysis of relevant incident data Monitor and interpret the evolving cyber threat landscape, providing clients with timely, relevant insights into emerging threats, tactics, and vulnerabilities that may impact their organisation. Act as a key point of contact for clients, ensuring clear More ❯