Bristol, England, United Kingdom Hybrid / WFH Options
Computershare
Senior CyberThreatIntelligence AnalystThis is a hybrid position primarily based in Edinburgh or Bristol UK. We’re committed to your flexibility and wellbeing and our hybrid strategy currently requires two days a week in the office, giving you the option to work remotely for some of … give you a world of potentialThe Global Information Security (GIS) team is responsible for driving the development, deployment, monitoring and management of information and cyber security across the Computershare businesses, globally. Through partnerships with the business units, Technology Services and other support functions, the Global Information Security team actively … across all of the global Computershare environments.The Senior CTI Analyst is responsible collecting and assessing indicators and adversary TTP’s to identify and mitigate cyber threats. Senior CTI Analysts will collaborate with Global Information security and other enterprise teams to evaluate Computershare’s cyber defense posture, processes, and more »
Bristol, England, United Kingdom Hybrid / WFH Options
Computershare
Senior CyberThreatIntelligence Analyst This is a hybrid position primarily based in Edinburgh or Bristol UK. We’re committed to your flexibility and wellbeing and our hybrid strategy currently requires two days a week in the office, giving you the option to work remotely for some … you a world of potential The Global Information Security (GIS) team is responsible for driving the development, deployment, monitoring and management of information and cyber security across the Computershare businesses, globally. Through partnerships with the business units, Technology Services and other support functions, the Global Information Security team actively … all of the global Computershare environments. The Senior CTI Analyst is responsible collecting and assessing indicators and adversary TTP’s to identify and mitigate cyber threats. Senior CTI Analysts will collaborate with Global Information security and other enterprise teams to evaluate Computershare’s cyber defense posture, processes, and more »
Bristol, England, United Kingdom Hybrid / WFH Options
Computershare
Cyber Security EngineerThis is a hybrid position primarily based in Bristol or Edinburgh. We’re committed to your flexibility and wellbeing and our hybrid strategy currently requires two days a week in the office, giving you the option to work remotely for some of your working week. Find out … give you a world of potentialThe Global Information Security (GIS) team is responsible for driving the development, deployment, monitoring and management of information and cyber security across the Computershare businesses, globally. Through partnerships with the business units, Technology Services and other support functions, the Global Information Security team actively … Security Operations team is responsible for delivering a comprehensive portfolio of technical security control and monitoring services across all of the global Computershare environments.The Cyber Security Engineer role has hands-on responsibilities for the implementation and maintenance of our o prem and cloud-related infrastructure and technologies. This role more »
services to our customers and streamline and automate our business processes. To help us manage our cybersecurity incidents, whilst performing forensic investigations and providing cyberthreatintelligence services, we're looking for two talented individuals with strong analytical skills to join this growing team. At AXA we … the security analysts to provide recommendations on security mechanisms Support the maintenance, testing and execution of the AXA UK Security Incident Management framework Provide cyberthreatintelligence to in scope UK entities Due to the number of applications we expect to receive for this role, we reserve … networking and common protocol behaviours Proven experience using a major scripting/programming language or search query language to support in security operations and threat detection GIAC certified qualification would be ideal but not essential Comfortable with packet analysis and ideally experienced with network detection and response tooling Experience more »
services to our customers and streamline and automate our business processes. To help us manage our cybersecurity incidents, whilst performing forensic investigations and providing cyberthreatintelligence services, we're looking for two talented individuals with strong analytical skills to join this growing team. At AXA we … the security analysts to provide recommendations on security mechanisms Support the maintenance, testing and execution of the AXA UK Security Incident Management framework Provide cyberthreatintelligence to in scope UK entities Due to the number of applications we expect to receive for this role, we reserve … networking and common protocol behaviours Proven experience using a major scripting/programming language or search query language to support in security operations and threat detection GIAC certified qualification would be ideal but not essential Comfortable with packet analysis and ideally experienced with network detection and response tooling Experience more »
Lead ThreatIntelligence Analyst – SC Cleared Location: Leeds, UK - Onsite Working Salary: Up to £72,000 per annum plus a 10% bonus. Are you passionate about defending against cyber threats and safeguarding critical assets? Join one of the UK's largest defence companies, dedicated to protecting the … nation against cyber threats worldwide. We are currently seeking a Lead ThreatIntelligence Analyst to join our team based in Leeds. In this role, you will play a pivotal role in identifying, analyzing, and mitigating cyber threats to ensure the security and resilience of our systems … and infrastructure. Responsibilities: Lead a team of threatintelligence analysts in gathering, analyzing, and disseminating intelligence on cyber threats and adversaries. Monitor and analyze various sources of threatintelligence to identify emerging threats, vulnerabilities, and attack trends. Develop and maintain comprehensive threatintelligencemore »
awareness of security risks. Develop and enhance security policies, processes, procedures, and technical controls to strengthen the company's security capabilities and resilience to cyber threats. Take a proactive role in identifying security risks, mitigations, and opportunities to strengthen the company's resilience to cyber-attacks and security … Requirements: Two years of hands-on experience in security and/or infrastructure within an enterprise environment. Exposure to enterprise information security standards including Cyber Essentials, ISO 27001, 27002, etc., Data Protection Act, and the General Data Protection Regulation. Microsoft O365 Security solutions; Networking; Security operations; Vulnerability Management; Security … identifying, resolving, and reporting risks. Experience of formal document creation, such as the creation of reports or procedures. Detailed knowledge of: Microsoft O365 environment. ThreatIntelligence analysis and best practice. Security Incident Response processes, procedures, and best practices. Disaster Recovery and Business Continuity principles. Event and log analysis. more »
Job Title: Technical Cyber Security Consultant Reporting to: Lead consultant Location: Remote with travel as required Reward Package: £65,000 - £70,000 DOE 25 days annual leave plus 8 statutory holidays + Birthday off in addition Buy or sell up to 5 additional days per year Pension Private medical … Life Assurance ComprehensiveEmployee rewards package THE ROLE This is an exciting opportunity to join our world class Consultancy arm, as a Technical Cyber Security Consultant, supporting the next phase of Cyberforts growth. Youll be joining a culture of knowledge sharing and continuous learning with expert peers in Secure Architecture … that match their requirements. Youll work in close partnership with clients to ensure the delivery of expert services by complementing their inhouse Information and Cyber Security resources combining expertise in information security, solution architecture and business advice. Working across the business and multiple technology platforms, you will play a more »
Job Title: Technical Cyber Security Consultant Reporting to: Lead consultant Location: Remote with travel as required Reward Package: £65,000 - £70,000 DOE 25 days annual leave plus 8 statutory holidays + Birthday off in addition Buy or sell up to 5 additional days per year Pension Private medical … Life Assurance ComprehensiveEmployee rewards package THE ROLE This is an exciting opportunity to join our world class Consultancy arm, as a Technical Cyber Security Consultant, supporting the next phase of Cyberforts growth. Youll be joining a culture of knowledge sharing and continuous learning with expert peers in Secure Architecture … that match their requirements. Youll work in close partnership with clients to ensure the delivery of expert services by complementing their inhouse Information and Cyber Security resources combining expertise in information security, solution architecture and business advice. Working across the business and multiple technology platforms, you will play a more »
services to our customers and streamline and automate our business processes. To help us manage our cybersecurity incidents, whilst performing forensic investigations and providing cyberthreatintelligence services, we're looking for two talented individuals with strong analytical skills to join this growing team. At AXA we … the security analysts to provide recommendations on security mechanisms Support the maintenance, testing and execution of the AXA UK Security Incident Management framework Provide cyberthreatintelligence to in scope UK entities Due to the number of applications we expect to receive for this role, we reserve … networking and common protocol behaviours Proven experience using a major scripting/programming language or search query language to support in security operations and threat detection GIAC certified qualification would be ideal but not essential Comfortable with packet analysis and ideally experienced with network detection and response tooling Experience more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Logiq Consulting
incidents and vulnerabilities. Collaborate with other team members to further investigate incidents and propose responses and solutions. Report any new knowledge gained about existing cyber threats or vulnerabilities within their network so that future incidents can be prevented. Promote and evolve the company Security Operations Centre (SOC). Mature … play books, processes and procedures, and further integrate monitoring capabilities to enhance our SOC function. Utilise threatintelligence feeds to identify and respond to emerging threats and vulnerabilities in company IT systems. Collaborate with other team members to ensure that the company has the correct procedures in place … with recent NCSC guidance would be helpful. Experience in the Microsoft Sentinel and 365 Defender, being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Qualifications: Computer Security Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Role Rewards more »
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Workday
a global cybersecurity leader that secures human progress with Secureworks® Taegis™, a SaaS-based, open XDR platform built on 20+ years of real-world threatintelligence and research, improving customers’ ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions. We enjoy competitive … GCP and orchestrations systems like Kubernetes Experience working with blended teams of backend and frontend engineers, product managers, and user experience researchers Knowledge of cyber security domain Work Environment We are a remote first team and are geographically distributed across the US, Canada, and UK - we utilize tools to more »
Leeds, England, United Kingdom Hybrid / WFH Options
Anson McCade
ThreatIntelligence Lead Location: London - Hybrid Travel: Max 2 days consulting travel Employment : Full-Time Role Overview : We are seeking a skilled ThreatIntelligence Lead to join our team, focusing on supporting the defence of a major UK Critical National Infrastructure (CNI) organization. In this role … you will oversee the collation and analysis of ThreatIntelligence (TI), ensuring the SOC (Security Operations Centre) is equipped with the necessary insights to proactively defend against cyber threats. The ideal candidate will have a strong technical background, exceptional analytical skills, and the ability to effectively communicate … complex concepts to technical and non-technical audiences. Responsibilities: • Produce and maintain threat assessments to provide a comprehensive understanding of the customer threat landscape. • Maintain and update the Indicator of Compromise (IoC) database tailored to the monitored environment and threats. • Oversee threat profiles and threat modelling more »
ThreatIntelligence Analyst Our client stands as a cornerstone in the realm of digital security solutions, offering state-of-the-art services to safeguard clients against ever-morphing cyber threats. With a dedication to pioneering innovations and unwavering excellence, the company empowers governments and organizations to fortify … their digital assets and infrastructure. They are in search of a proficient ThreatIntelligence Analyst to complement its esteemed team of cybersecurity specialists. As a ThreatIntelligence Analyst you will wield significant influence in identifying, dissecting, and neutralizing cyber threats, thereby ensuring the unshakeable security … and resilience of our clients' operations. Key Responsibilities: Employ advanced intelligence tools and methodologies to monitor and analyze cyber threats across various channels, including open-source intelligence and dark web monitoring. Conduct exhaustive research and analysis to discern emerging threats, dissect attack patterns, and decipher threatmore »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Orbis Group
ThreatIntelligence Lead (Salary flexible for the right candidate) Do you want to join a fast-paced company with a cloud security product with industry recognition and awards? Would you like to do research that has a positive impact on the security community? Are you unhappy with your … you answered yes to all of these questions then this is the role for you! The role: A cloud security scale-up, founded by cyber security SME's, are searching for a ThreatIntelligence Lead to conduct malware analysis, lead threatintelligence research, and build … the research team that specifically focuses on Malware. This role will include line management responsibilities (no prior management experience is needed) of one other threatintelligence engineer and expectations to grow the team if/when needed. Desirable experience: 6+ months of experience working in a public cloud more »
a global cybersecurity leader that secures human progress with Secureworks® Taegis™, a SaaS-based, open XDR platform built on 20+ years of real-world threatintelligence and research, improving customers’ ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions. We enjoy competitive … team. Responsibilities Leverage internal, commercial, and open-source tools and data sources to analyze, enrich and synthesize indicators of compromise and/or other intelligence artifacts to provide meaningful and actionable intelligence Analyze raw data sets and extract relevant insight to form high quality TI responses Perform proactive … products, where appropriate Maintain a broad understanding and knowledge of the latest offensive and defensive Tactics, Techniques and Procedures (TTPs) as well as overall Threat Landscape trends Collaborate internally and externally, and develop, enhance and produce Secureworks TI products Own and execute ongoing projects such as customer threatmore »
services to our customers and streamline and automate our business processes. To help us manage our cybersecurity incidents, whilst performing forensic investigations and providing cyberthreatintelligence services, we're looking for two talented individuals with strong analytical skills to join this growing team. At AXA we … the security analysts to provide recommendations on security mechanisms Support the maintenance, testing and execution of the AXA UK Security Incident Management framework Provide cyberthreatintelligence to in scope UK entities Due to the number of applications we expect to receive for this role, we reserve … networking and common protocol behaviours Proven experience using a major scripting/programming language or search query language to support in security operations and threat detection GIAC certified qualification would be ideal but not essential Comfortable with packet analysis and ideally experienced with network detection and response tooling Experience more »
roadmap to ensure that the SOC sets the standard for SOCs in the UK and remains performant in line with customer’s requirements and threat profiles. The SDM drives continuous improvement of the SOC services to increase performance and reduce costs. This includes supporting the project teams with delivering … is building collaborative, trusted relationship with the authority teams and tenant owners. The SDM is a leader with a deep knowledge of technical and cyber security technologies and cyberthreat tools, tactics, techniques and procedures who is experienced in planning and managing development activities in accordance with … security controls as well as detection tools to protect large cloud estates; Utilise SIEM tools to detect security breaches and recognise the importance of threat led Use Cases. Knowledge of SIEM/SOAR tools (Splunk and Sentinel at a minimum) and other appropriate tooling e.g. SOAR, ThreatIntelligencemore »
X3 Cyber Security Operations Managers - SOC - URGENT - Security - Offices Based In Reading/Oxford and Woking/Thames Valley🌳🌳🌳 Areti Group has exclusively partnered with a rapidly growing tech company who are actively seeking x3 Senior Cyber Security Operations Managers These roles are very urgent. Incredibly exciting opportunity … company • Leading our Security Operations Centre (SOC), and effective management to operationalise the service effectively Must have at least 5 years’ experience working in cyber security operations. • Must have practical experience of working in a security incident response team and leading the technical response to cyber security incidents … and be able to act as the incident manager. • Must have experience working with cyber security tools and technologies including endpoint security, email security, network security tools, SIEM and SOAR etc, and be able to optimise such tools. • Must have a have experience in Vulnerability/Threat management more »
Cyber Security Analyst Bolton £60,000 ShortList Recruitment have a requirement for a Cyber Security Analyst to join a new IT Department based in Bolton. The Cyber Security Analyst will oversee risk assessment and communication related to infrastructure vulnerabilities. They will collaborate with teams to identify vulnerabilities … prioritise risks, and improve the vulnerability management process. The right candidate for the Cyber Security Analyst position will have the following: Enjoy working in a fast-paced, customer-centric environment without bureaucratic constraints Strong communication skills, ability to explain technical topics to non-tech colleagues, and a genuine interest … in Cyber Security are key Have experience in similar roles, Cyber Security qualifications, and a track record of enhancing Vulnerability Management processes through communication and relationship-building The required skills for the Cyber Security Analyst include but are not limited to: A comprehensive grasp of security vulnerabilities more »
WILL PROVIDE FULL TRAINING AT NO COST. Overview We have a pool of companies who are looking to employ someone for the role of Cyber Security Trainee. The candidate does NOT need to have any prior experience since all the necessary training will be provided for FREE . The … Training All training is included and is funded by the UK Government and will be delivered online over 16 weeks. Level 2 "Principles of Cyber Security" course 16 weeks ONLINE self-paced course Our tutor will support you along the way The Role As a Cyber Security Trainee … experienced professionals in the field to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you more »
WILL PROVIDE FULL TRAINING AT NO COST. Overview We have a pool of companies who are looking to employ someone for the role of Cyber Security Trainee. The candidate does NOT need to have any prior experience since all the necessary training will be provided for FREE . The … Training All training is included and is funded by the UK Government and will be delivered online over 16 weeks. Level 2 "Principles of Cyber Security" course 16 weeks ONLINE self-paced course Our tutor will support you along the way The Role As a Cyber Security Trainee … experienced professionals in the field to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you more »
WILL PROVIDE FULL TRAINING AT NO COST. Overview We have a pool of companies who are looking to employ someone for the role of Cyber Security Trainee. The candidate does NOT need to have any prior experience since all the necessary training will be provided for FREE . The … Training All training is included and is funded by the UK Government and will be delivered online over 16 weeks. Level 2 "Principles of Cyber Security" course 16 weeks ONLINE self-paced course Our tutor will support you along the way The Role As a Cyber Security Trainee … experienced professionals in the field to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you more »
WILL PROVIDE FULL TRAINING AT NO COST. Overview We have a pool of companies who are looking to employ someone for the role of Cyber Security Trainee. The candidate does NOT need to have any prior experience since all the necessary training will be provided for FREE . The … Training All training is included and is funded by the UK Government and will be delivered online over 16 weeks. Level 2 "Principles of Cyber Security" course 16 weeks ONLINE self-paced course Our tutor will support you along the way The Role As a Cyber Security Trainee … experienced professionals in the field to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you more »
WILL PROVIDE FULL TRAINING AT NO COST. Overview We have a pool of companies who are looking to employ someone for the role of Cyber Security Trainee. The candidate does NOT need to have any prior experience since all the necessary training will be provided for FREE . The … Training All training is included and is funded by the UK Government and will be delivered online over 16 weeks. Level 2 "Principles of Cyber Security" course 16 weeks ONLINE self-paced course Our tutor will support you along the way The Role As a Cyber Security Trainee … experienced professionals in the field to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you more »