abnormal activities in client environments Coordinate and execute incident response procedures, including containment, eradication, and recovery - document all incident-related activities and findings Conduct threatintelligence research to stay updated on emerging threats and vulnerabilities Analyze data to identify potential security risks and recommend countermeasures Perform vulnerability assessments more »
a global cybersecurity leader that secures human progress with Secureworks® Taegis™, a SaaS-based, open XDR platform built on 20+ years of real-world threatintelligence and research, improving customers’ ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions. We enjoy competitive more »
a global cybersecurity leader that secures human progress with Secureworks® Taegis™, a SaaS-based, open XDR platform built on 20+ years of real-world threatintelligence and research, improving customers’ ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions. We enjoy competitive more »
NCSC CTAS and CPA Assurance Schemes. Knowledge of working in secure environments (List X facilities) and accredited labs (ISO17025). Research and Development experience. ThreatIntelligence experience. To discuss this or wider Consulting roles with our recruitment team, all you need to do is apply, create a profile more »
the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber ThreatIntelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the use of industry leading SIEM … IDS and threatIntelligence Technologies. Provide advice and guidance to client targets of cyber attacks and malicious activity to a high standard. Provide incident reporting capabilities ensuring that all information is provided in a timely, accurate and effective manner. Provide analytical support to other SOC team members during … security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and Vulnerability Management tools Serve as a technical point of escalation and provide mentoring for L1 Security Operations Centre (SOC) analysts. Responsible for investigating incidents, analysing attack methods, researching new defence techniques and tools, developing more »
Greater London, England, United Kingdom Hybrid / WFH Options
Noir
Threat and Vulnerability Manager - Break into FinTech – London/Hybrid (Tech stack: Threat and Vulnerability Manager, Security Engineer, Security Tester, Penetration Testing, Cybersecurity, Systems, Infrastructure, Network, Cloud, Architecture, Security Solutions, Python, Shell, Ansible, Jenkins, CISSP/CISM/CISSO-ISSMP, CRISC, GIAC, COBIT/ITL Processes, Financial Services … Threat and Vulnerability Manager, URGENT) We have a fantastic opportunity for a Threat and Vulnerability Manager to join an ambitious Fintech start-up. This is your chance to work with the sharpest minds in private wealth management and financial software development. Our client’s latest product release has … provide their clients with an individualised, scalable asset management framework that is unrivalled in today’s marketplace. Our client is looking for a passionate Threat and Vulnerability Manager with experience in applications deployment, DNS, PKI, OS (Windows, MAC, *NIX), SDN, encryption, security solutions, ‘Attack and Defensive’ methods, Threatmore »
Up to £48,000 Remote (UK) *Sponsorship not provided Are you a SOC Analyst with more than two years of experience delivering front-line threat hunting support? Do you want to work for an organisation that are leaders in the delivery of Microsoft Sentinel SOC services in a fast … and respond to security incidents Remediate serious attacks escalated from Tier 1 SOC Analysts Assess the scope of attacks and the affected systems Use threatintelligence to pinpoint scale of the attack, the type of attack and systems affected Conduct incident response activities Use IOC’s to research more »
Respond to cyber related events and incidents and manage and coordinate cyber operations personnel during the remediation phase and post incident review phase. · Enable threat hunting through the fusion of threatintelligence and business risk and produce forecasting products around future threats. · Own, build and maintain cyber … Qualys, IBM. Scripting and programming Endpoint Detect and Response tools/Anti Virus tools/Network traffic packet analysis/Sandboxing and malware analysis Threat hunting methodologies Understanding of network protocols, architectures, and components Familiarity with firewalls, intrusion detection/prevention systems (IDS/IPS), and network monitoring tools … incidents and seeking resolution within diverse but standardised precedents and procedures by applying operational knowledge and learnings from similar past incidents. Coordinate and control threat hunting exercises based on threatintelligence, OSINT and general network observations. Ability to proactively lead the development/improvement of agreed procedures more »
Doncaster, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
provide protective monitoring, incident response, and advisory services to our diverse clientele. Responsibilities: Provide round-the-clock protective monitoring using leading SIEM, IDS, and threatintelligence tools. Offer advice and guidance to clients targeted by cyber attacks, ensuring high-quality assistance. Produce timely and accurate incident reports to … facilitate effective response strategies. Collaborate with SOC team members during security incidents and Threat Mining exercises, including assistance with tool deployment and administration tasks. Skills/Must Have: Cyber Security Analyst/SOC Analyst experience SIEM tool experience Excellent communication skills, comfortable in client-facing scenarios.. Demonstrated ability to more »
Reading, England, United Kingdom Hybrid / WFH Options
Thames Water
you’ll help the business become an intelligent, connected organisation in order to deliver our digital transformation and turnaround. We are seeking a Cyber Threat & Vulnerability Analys t to be responsible for supporting the design, implementation, and maintenance of TVM (Cyber Threat & Vulnerability Management) solutions, controls, and processes … technologies, and best practices, as well as the ability to collaborate effectively with cross-functional teams. What you will be doing as a Cyber Threat & Vulnerability Analyst Support vulnerability management across the enterprise, ensuring that a framework for identification, categorisation and mitigation exists and is implemented and maintained. Collaborate … with stakeholders to understand business requirements and assist with the development of threat assessment and vulnerability management (TVM) strategies and controls that align with organisational goals. Assist with the development and maintenance of TVM documentation, policies, and procedures. Integrate cyber security solutions (e.g. vulnerability scanning tools) with existing systems more »
Greater London, England, United Kingdom Hybrid / WFH Options
Franklin Fitch
audit findings. o Management and configuration of vulnerability management tools (Microsoft Azure and Qualys) o Support the InfoSec function in proactively identifying and leveraging threatintelligence sources to inform strategic vulnerability mitigation measures. Threat Management o Take lead on the daily threat management activities o Maintain more »
to understand client requirements and translate them into actionable service delivery plans. Oversee the day-to-day operations of the SOC, including incident response, threat detection, and vulnerability management. Monitor service performance metrics and KPIs, implementing continuous improvement initiatives to enhance service delivery efficiency and effectiveness. Act as the … within a Security Operation Centre (SOC) environment, with a focus on service delivery management. Strong understanding of cybersecurity principles and technologies, including incident response, threatintelligence, and security monitoring. Proven track record of successfully managing client relationships and delivering high-quality services in accordance with SLAs and contractual more »
Lead ThreatIntelligence Analyst – SC Cleared Location: Leeds, UK Schedule: 4 days on, 4 days off, based in our secure SOC Centre. Salary: Up to £75,000 per annum plus a 10% bonus. Are you passionate about defending against cyber threats and safeguarding critical assets? Join one of … the UK's largest defence companies, dedicated to protecting the nation against cyber threats worldwide. We are currently seeking a Lead ThreatIntelligence Analyst to join our team based in Leeds. In this role, you will play a pivotal role in identifying, analyzing, and mitigating cyber threats to … ensure the security and resilience of our systems and infrastructure. Responsibilities: Lead a team of threatintelligence analysts in gathering, analyzing, and disseminating intelligence on cyber threats and adversaries. Monitor and analyze various sources of threatintelligence to identify emerging threats, vulnerabilities, and attack trends. more »
a pivotal role in coordinating security operations within their IT environment. Your responsibilities will include managing cyber defence technologies, coordinating incident response, and leading threat hunting efforts. You will collaborate closely with internal teams and external partners to ensure the highest level of security across the organisation. Key Responsibilities … Standard Operating Procedures (SOPs) and other documentation to support cyber operations. Respond to cyber-related incidents, coordinating remediation efforts and post-incident reviews. Enable threat hunting through the fusion of threatintelligence and business risk analysis. Requirements: Strong understanding of network protocols, firewalls, and intrusion detection/… scale security technology deployments (SIEM/SOAR/EDR/NDR). Ability to lead technical teams and manage service providers effectively. Familiarity with threatintelligence sources and incident prioritization. Understanding of cybersecurity regulations and standards (e.g., GDPR, NIST). Working knowledge of the MITRE ATT&CK framework. more »
Security Engineer! As a Cyber Security Engineer, you'll be to work across various divisions within our clients cyber security team including incident response, threatintelligence, security operations, and more, to maintain, and improve our clients security measures. Main responsibilities: Build and maintain security controls to keep our more »
D Intel Portfolio Cyber Specialist you will be required to utilize your cyber experience to evolve advanced technical BIDS, captures and campaigns within the Intelligence Team and wider business. Assisting to develop customer centric solution for the UK Intelligence customer group, comprising of both offensive and defensive cyber … activities, including: anomaly detection and insider threat detection, malware analysis, reverse engineering, threatintelligence, decoys and deception, application of AI/ML techniques, orchestration and automation, and penetration testing across a variety of environments. The successful candidate will be expected to have a customer centric mind-set … self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings. - Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework. - An active Certified Information Systems Security Professional (CISSP) Certification and/ more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Experian Ltd
Adversary Simulation (Red Team) testing, leads and contributes to Purple Team Exercises and performs Ad-Hoc and Tactical Assessments based on changes to the threat landscape and organisational needs. As a Senior Engineer within the Offensive Security team, you will participate in the design and execution of both campaign … the efficacy of remediation/mitigative actions. Actively participate in performing physical exploitation, network exploitation and social engineering assessments against authorized targets. Leverage CyberThreat Intelligence, Offensive Security Research, previous Adversary Simulation (Red Team) findings and internal risk intelligence to develop test cases demonstrating TTP effectiveness against Experians control … in offensive security and adversarial simulation focused positions. Proficient in attacker tooling, including post-exploitation frameworks and tooling. Detailed knowledge of global cyber threats, threat actors, and the tactics, techniques and procedures used by cyber adversaries, specifically those targeting the financial services and healthcare sectors. Demonstrable experience in two more »
Working with other members of the Security Operation Centre, you will be supporting the ongoing development of the function through the use of automation, threatintelligence, and attack driven defence techniques. You will also be responsible for timely resolution of security incidents, requests and changes, following existing ITIL more »
Salford, Greater Manchester, North West, United Kingdom
Reed Technology
support within the Defence and Availability Centre team. You will also be responsible for leading major incidents, detecting, triaging, and resolving events, managing the threatintelligence activities. As a SOC Engineer, you will be required to assess, implement and configure the technical security controls, tools and data. Furthermore … act as the point of contact for any 3rd party incident support Assist in the analysis of potential attack vectors and methods employed by threat actors by conduct depth analysis on network traffic and hosts artifacts The following skills and experience will be beneficial for the role: Ability to more »
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
Reed Technology
have the opportunity to expand and take on new projects. The role: As a Cyber Security Engineer, you will play a vital role in threat hunting & and intelligence to ensure the security of digital infrastructure and data. Day to day you will work on a mixture of BAU … the business. There are significant training budgets and the opportunity to work alongside some of the best in the business. The day-to-day: Threat Hunting - use of advanced threat-hunting techniques to uncover potential risks whilst developing playbooks to standardise procedures. Threatintelligence - Understanding of … the threat landscape, emerging attacks and vulnerabilities. Enhance detection and response strategies. Security Tool Management- Upgrade and optimise tools whilst working with penetration testers to prioritise assessments. Documentation and reporting - create detailed reports on threat-hunting activities, incidents, and vulnerabilities Data-led decision-making - use of data to more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
Cheltenham, Gloucestershire, South West, United Kingdom Hybrid / WFH Options
Egress Software technologies
Analytics Egress Software Technologies are a leading cyber security company providing global solutions to protect against human-activated risk. By aggregating data to derive intelligence, Egress is the only company able to predict future threats and prevent attacks or breaches before they happen. Egress is proud to support thousands … moving landscape and protecting users. Day-to-day activities include: Developing detection algorithms (python, c#) and extracting identifying features of phishing emails. Empowering the threatintelligence and cyber analytics teams through the development of internal tools Optimizing and implementing new functionality to existing code bases and data models more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »