Sandwich, Kent, South East, United Kingdom Hybrid / WFH Options
CYBERFORT LIMITED
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds More ❯
to provide the best-in-class security to protect the bank. We live and breathe the Allica values and deliver services intelligently using automation, intelligence, and innovation. Role Description An experienced Head of IT Security is required to join a fast-paced IT division, to facilitate and enhance all … strategy of enhancing the bank's IT security further. Using a combination of third-party tooling and custom solutions to assist you with security threat analysis and detection, you will help drive the security strategy for current and future product implementations. With good mentoring and coaching capabilities, you will … to monitor, detect, and respond to potential threats in real-time. Lead the establishment of a Security Operations Center (SOC) for continuous monitoring and threat intelligence. Continuously evaluate and enhance security tools, technologies, and processes to stay ahead of evolving threats. Application and Cloud Security Implement best practices for More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Aerospace Corporation
/IV), you will help to ensure cybersecurity compliance and implement proactive solutions and policies based on organizational, and regulatory requirements, risk posture and threat intelligence. You will join a team of dedicated cybersecurity professionals who are chartered with securing Aerospace's classified and unclassified enterprise IT environments and … teams and projects in the areas of: cybersecurity audits and audit oversight, compliance review, vulnerability identification and remediation, cybersecurity administration Contributing to and compiling threat briefings and risk assessments based on current events Providing expertise for cyber policy development and enhancement Remaining informed on trends and issues in the … governance, and compliance Ability to document security best practices and IT security requirements Cyber policy knowledge and creation experience Thorough understanding of the cyber threat landscape and experience in identifying credible threats relative to current and emerging vulnerabilities Experience reviewing cloud environments Excellent knowledge of technology environments, including cybersecurity More ❯
scale. And if something doesn't go to plan, this role will be accountable alongside the executive team to contain, control and disrupt any threat-and restore normal operations. Responsibilities will include: Championing our security culture-training our team to be the best form of defence. Conducting threat … and frameworks in practise (e.g. ISO 27001, NIST CSF, SP 800-53, NCSC CAF, Cyber Essentials). Has a thorough understanding of cyber security threat and risk with the ability to think like an attacker and design controls that make a real difference. Has proven ability to enable a … us to achieve objectives, whilst also keeping us safe. Has good research and analytical skills utilising a variety of sources: online research, industry forums, threat intel feeds etc. using these to maintain oversight of current and future threats and opportunities to mitigate them. Has an enthusiastic 'roll up your More ❯
If you enjoy diving deep into attacker behaviors, writing detection rules that actually catch things (not just flag every login attempt), and helping drive threat visibility across modern tech stacks — this might be for you! You'll be part of a global cyber defence team building and refining detections … across SIEM, EDR, and ELK stacks , and collaborating with security analysts, threat hunters, and incident responders to stop threats faster and smarter. 🔧 What You'll Be Doing Writing & tuning detection rules across SIEM/EDR/ELK to surface real attacker behaviors (not noise) Analyzing TTPs, threat intel … attacker methodology Solid experience with ELK, Splunk, or similar SIEM platforms Comfort pivoting through logs under pressure and building fast, accurate queries Experience with threat modeling and mapping detections to MITRE ATT&CK Bonus: You've worked with version control for detection rules, or done some detection-as-code More ❯
Fairfax, Virginia, United States Hybrid / WFH Options
CGI
the core security team for CARE (Cyber Analysis, Research, and Engineering) Watch and provide Endpoint detection and response, Identity and access management, and Mobile threat detection subject matter expertise and experience. At a high level, they are responsible for interpreting an alert generated from any of the cyber tools … Must also be able to be on call as needed. Your future duties and responsibilities: Interpret and investigate incidents to understand the impact and threat mechanisms Map and decipher the tactics, techniques and procedures (TTPs) Own the response and remediation of every alert Ensure that each alert description and … Develop possible remediation plan(s) for a specific security incident. Document as part of the playbook Develop response and remediation templates Work with a Threat Intel Analyst to develop Tech Notes and Agency Advisories as needed Provide the required subject matter expertise for effective EDR implementations Assist with Response More ❯
Alexandria, Virginia, United States Hybrid / WFH Options
Accrete.AI
Office Location: Alexandria, VA (Hybrid) TOP SECRET SCI Required Accrete AI partners with government agencies to deliver advanced artificial intelligence solutions that enhance national security and defense operations. Our AI technology is designed to meet the unique challenges of government clients, from improving threat detection and intelligence … Position Description: Accrete's Frontend Developers are responsible for delivering the functionality behind our compelling and engaging user interfaces in our suite of artificial intelligence products. In this role, you will be working hand-in-hand with the client, QA/QC testers, and UI/UX professionals to … fixes in a timely manner Skills: 5+ years of experience developing software as part of an engineering team 3+ years experience working with artificial intelligence/machine learning software packages Expert proficiency in HTML/CSS/JavaScript with jQuery Requirements: Bachelor's degree in Computer Science or related More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
TieTalent
This makes this a unique role where you will be able to utilize a broad skill set. Role Requirements Experience in cybersecurity matters (e.g., threat detection, malware intelligence, cloud security posture management, or identity and access management systems). Understanding of the following functions: TCP/IP stack More ❯
BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title … ensure patch deployment and validation. Generate comprehensive vulnerability assessment reports and communicate findings to relevant stakeholders, including IT management, System owners and CSO. Monitor Threat Intel feeds and vulnerabilities databases to proactively identify and respond to new vulnerabilities and attack vectors. Support integration of personnel and physical security with … the best and brightest minds - can work together to achieve excellence and realise individual and organisational potential. Division overview: Government At BAE Systems Digital Intelligence, we pride ourselves in being a leader in the cyber defence industry, and Government contracts are an area we have many decades of experience More ❯