Security Operations Engineer (34584) Shape the Future of Cyber Security at Holland & Barrett At Holland & Barrett, we're not just a leading health and wellness retailer-we're a digital-first business that places customer trust at the heart of everything we do. We're looking for a Senior Security Operations Engineer to join our growing Cyber Security team … and help us protect millions of customers across our digital and in-store platforms. If you're passionate about automation, cloud technology, and fast-paced problem-solving-and want your work to have a real impact-this could be the perfect role for you. Key Responsibilities Lead security incident response and threat detection efforts, prioritising the protection of customer … and cloud-native security tooling Cloud Security: Strong knowledge of AWS and Azure, especially services like WAF, Shield, IAM, and API Gateway Forensic Skills: Experience handling security incidents and digitalforensics in hybrid/cloud environments Analytical Thinker: Risk-aware with the ability to assess threats and act quickly to protect customer trust Strong Communicator: Confident working with More ❯
Government decision or implementation - Review Information Needs (IN's) to understand operational, tactical or strategic mission requirements - Conduct computer/network security to provide advice to the Government - Use digitalforensics and conduct vulnerability discoveries Degree and minimum years of relevant work experience as follows: - BS + 2-11 years' experience or; - MS + 3-9 years' experience … + 2-7 years' experience Required: - Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). - Information Assurance Certification may be required. - All candidates must have a current TS/SCI clearance and must be More ❯
any of the multiple offices my client has across the UK. The client is looking for a Principal Associate to support and shape the delivery of expert incident response, digital risk, and cyber advisory services for a broad portfolio of global clients, from tech innovators and major insurers to public sector bodies and emergency services. This award-winning cyber … group is uniquely positioned at the intersection of law, digitalforensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threat intelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a critical role across matters More ❯
any of the multiple offices my client has across the UK. The client is looking for a Principal Associate to support and shape the delivery of expert incident response, digital risk, and cyber advisory services for a broad portfolio of global clients, from tech innovators and major insurers to public sector bodies and emergency services. This award-winning cyber … group is uniquely positioned at the intersection of law, digitalforensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threat intelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a critical role across matters More ❯
skills, and a deep understanding of current and emerging threat actors. Role Tasks and Responsibilities Technical Response Lead and assist with host and network-based investigations, collaborating with the DigitalForensics Incident Response (DFIR) team. Perform threat hunting using EDR tooling to evaluate attacker movement and prevent further activity. Conduct live compromise assessments for organizations suspecting a breach. … being on call. Identify new growth opportunities. Essential Requirements Experience leading cyber incident investigations. Technical degree or equivalent knowledge of networks, software, and hardware. Experience in log analysis and digital forensics. Proven response experience to cyber-attacks. Experience within a Security Operations Centre. Fluent in English, both written and spoken. Excellent presentation and analytical skills. Preferred Skills and Qualifications More ❯
Mc Lean, Virginia, United States Hybrid / WFH Options
ANISTAR Technologies
security measures are effectively integrated into the architecture and operation of IT systems. Collaborate with incident response teams to investigate security breaches, malware infections, and other cyber incidents. Conduct digitalforensics analysis to determine the root cause of incidents and recommend remediation measures to prevent recurrence. Develop and maintain cybersecurity policies, standards, and procedures based on industry best More ❯
need to be successful You should have practical experience in information technology and information security. Suitable roles include IT Systems Architect, Cloud Systems Engineer, Network Engineer, Cyber Intelligence Specialist, DigitalForensics Analyst , or similar. We value relevant experience, even if outside these roles. Your expertise is crucial. As this role involves regional and national travel, a full driving More ❯
critical areas of public service. You ll be responsible for producing in-depth market intelligence reports, providing insightful client briefings, and identifying opportunities where technology meets operational need from digitalforensics and secure communications to AI-enabled policing and cyber defence. What you ll be doing Produce timely and insightful reports on policy developments, procurement trends, and technology More ❯
critical areas of public service. You’ll be responsible for producing in-depth market intelligence reports, providing insightful client briefings, and identifying opportunities where technology meets operational need – from digitalforensics and secure communications to AI-enabled policing and cyber defence. What you’ll be doing… Produce timely and insightful reports on policy developments, procurement trends, and technology More ❯
GCP) - cloud security knowledge preferred. Familiarity with virtualization technologies and associated security controls. Demonstrated experience in at least one of the following: Penetration Testing : Offensive security and exploitation techniques. DigitalForensics : Host, network, or memory-based investigation. Threat Hunting : Detection engineering and hypothesis-driven threat investigation. Knowledge of modern security tooling (SIEM, EDR, vulnerability management, SOAR). Strong More ❯
Strong mindset for UTS threats and mitigation strategies Familiarity with technical operations, computer network operations (CNO), mobile device security, technology deployments into high threat environments, secure communication practices, and digitalforensics Frequent domestic travel with limited international travel - up to 25% Ability and strong motivation to learn new tools, techniques, and methodologies Willingness to support end-users to More ❯
environments. Knowledge of adversary tactics and frameworks relevant to OT (e.g., MITRE ATT&CK for ICS). Hands-on lab or internship experience in cybersecurity operations, threat hunting, or digital forensics. Exposure to packet capture (PCAP) analysis or basic scripting (e.g., Python, Bash). Compensation : Salary: £35,000 Competitive Equity Package Comprehensive Benefits Plan Dragos is an Equal Opportunity More ❯
PhD. Four (4) years of additional relevant experience will be considered in lieu of a Bachelor's degree. TS/SCI with CI Poly required to start Experience in digital image optimization, image/video authentication, metadata analysis, and identifying geolocations. Experience in conducting audio enhancement of video and audio recordings to improve speech quality and other establishing the … signal optimization, audio enhancement and authentication, photogrammetry techniques. Ability to build and apply solutions to signals-based intel questions using languages to include Python and MATLAB. Familiarity with current digitalforensics processes and techniques. Strong analytical and problem-solving skills to provide quick solutions to issues. Law Enforcement and Emergency Services Video Association (LEVA), Certified Video Technician OR … International Association for Identification (IAI), Forensic Video Examiner DoD 8570 Compliant, IAT Level II Certification (Sec+ or equivalent) Software Skills such as Adobe Suite AMPED FIVE AMPED Authenticate MEDEX Forensics VideoFocus Pro Axon Salary Range: $130,000 - $160,000 Our Approach At SecureStrux, we are committed to core values that guide the way we work with one another and More ❯
updates to leadership through executive summaries and in-depth technical reports • Planning, coordinating and directing the inventory, examination and comprehensive technical analysis of computer related evidence • Serving as technical forensics liaison to stakeholders and explaining investigation details • Required Skills: • U.S. Citizenship • Must have an active Secret clearance (TS/SCI eligible) and be able to obtain DHS Suitability • 8+ … anomalous activity/potential threats, analyze anomalies in network traffic using metadata • Ability to create forensically sound duplicates of evidence (forensic images) • Able to write cyber investigative reports documenting forensics findings • In depth knowledge and experience of: • identifying different classes and characterization of attacks and attack stages • CND policies, procedures and regulations • proactive analysis of systems and networks, to … Conducting all-source research Required Education: 8+ years of experience and BS Computer Science, Cybersecurity, Computer Engineering or related degree; or HS Diploma and 10+ years of host or digitalforensics or network forensic experience Desired Certifications: - GCFA, GCFE, EnCE, CCE, CFCE, CEH, CCNA, CCSP, CCIE, OSCP, GNFA More ❯
experiences. We are seeking an enthusiastic Cybersecurity Instructor to lead the delivery of our new Cybersecurity Bootcamp, tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethical hacking, incident response, and security operations, enabling them to secure new or …/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and DigitalForensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security More ❯
experiences. We are seeking an enthusiastic Cybersecurity Instructor to lead the delivery of our new Cybersecurity Bootcamp, tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethical hacking, incident response, and security operations, enabling them to secure new or …/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and DigitalForensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security More ❯
experiences. We are seeking an enthusiastic Cybersecurity Instructor to lead the delivery of our new Cybersecurity Bootcamp, tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethical hacking, incident response, and security operations, enabling them to secure new or …/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and DigitalForensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security More ❯
response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of the domains mentioned above, but we do expect you … threat intelligence, or forensics. - Experience with Amazon Web Services. - Experience in Security Incident Response and proficiency in at least one of the following domains: Malware Analysis/Reverse Engineering; DigitalForensics; Security Tool Development & Automation; Programming/Scripting; Network & OS Security; Identity Management Amazon is an equal opportunities employer. We believe passionately that employing a diverse workforce is More ❯
challenges at scale, working to protect the applications powering the most sophisticated e-commerce platform ever built. We value broad and deep technical knowledge, specifically in the fields of forensics, malware analysis, network security, application security, threat hunting, and threat intelligence. Key job responsibilities - Responding to security incidents, and coordinating a cohesive response involving multiple teams across Amazon. - Providing … or application security - Proficiency in at least one programming language (e.g., Python, Go, PowerShell, Shell scripting, Perl, Ruby, Java, C++, C) - Technical depth in two or more specialties including: digitalforensics, malware analysis, network security, application security, security intelligence, and security operations - Understanding of security vulnerabilities, attacker exploit techniques, and their remediation methodologies. PREFERRED QUALIFICATIONS - Experience triaging and More ❯
challenges at scale, working to protect the applications powering the most sophisticated e-commerce platform ever built. We value broad and deep technical knowledge, specifically in the fields of forensics, malware analysis, network security, application security, threat hunting, and threat intelligence. Key job responsibilities - Responding to security incidents, and coordinating a cohesive response involving multiple teams across Amazon. - Providing … identification, containment, eradication, recovery, etc) while coordinating with various teams and providing reporting to leadership. PREFERRED QUALIFICATIONS - Technical depth in one or more specialties including: application security, infrastructure security, digitalforensics, malware analysis, threat hunting or some combination thereof. - Relevant industry certifications from SANS, ISC2, etc. - Experience working as part of a Computer Security Incident Response Team (CSIRT More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Precise Placements
alongside a 24/7 Security Operations Centre . Strong technical exposure to SIEM (ideally Splunk), EDR (CrowdStrike preferred), and SOAR tools. Expertise in incident handling , threat analysis , and digitalforensics . Scripting or automation experience (Python, PowerShell, etc.) is highly beneficial. Knowledge of MITRE ATT&CK , NIST CSF , and related security frameworks. Legal, financial, or similarly high More ❯
will directly support national security and intelligence missions at the forefront of media exploitation. What You'll Do As a Forensic Audio-Video Examiner, you'll: • Analyze and authenticate digital video and audio evidence. • Enhance recordings to improve speech intelligibility and clarity. • Extract and interpret metadata to detect tampering or synthetic media. • Apply advanced techniques like photogrammetry, geometric analysis …/reflection studies. • Use cutting-edge tools to identify geolocations and verify media integrity. • Deliver expert-level reports and articulate findings with precision. What You Bring • Proven experience in digital image optimization, video/audio authentication, and metadata analysis. • Proficiency with Adobe Suite, AMPED FIVE, AMPED Authenticate, and other forensic tools. • Deep understanding of audio/video formats (AVI … skills in Python or MATLAB for signal analysis. • Certifications such as: • LEVA Certified Video Technician or Analyst • IAI Forensic Video Examiner • DoD 8570 Compliant (IAT Level II) • Experience with digitalforensics workflows and tools. Tools of the Trade • Adobe Creative Suite • AMPED FIVE & Authenticate • MEDEX Forensics • VideoFocus Pro • Axon Evidence Tools More ❯
written communication skills Ability to explain complex product features to both technical and non-technical users Experience with Salesforce CRM and Gainsight is a strong plus Familiarity with the DigitalForensics and Incident Response (DFIR) field is preferred Relevant certifications (CFCE, GCIHA, MCFE, etc.) are an advantage Strong organizational skills with the ability to manage multiple priorities Understanding More ❯
critical areas of public service. You ll be responsible for producing in-depth market intelligence reports, providing insightful client briefings, and identifying opportunities where technology meets operational need from digitalforensics and secure communications to AI-enabled policing and cyber defence. What you ll be doing Produce timely and insightful reports on policy developments, procurement trends, and technology More ❯
critical areas of public service. You’ll be responsible for producing in-depth market intelligence reports, providing insightful client briefings, and identifying opportunities where technology meets operational need – from digitalforensics and secure communications to AI-enabled policing and cyber defence. What you’ll be doing… Produce timely and insightful reports on policy developments, procurement trends, and technology More ❯