Threat Intelligence Job Vacancies

151 to 175 of 362 Threat Intelligence Jobs

Senior SOC Engineer

Bedford, Bedfordshire, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

Aberdeen, Aberdeenshire, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

Doncaster, Yorkshire, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

York, Yorkshire, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

Cheltenham, Gloucestershire, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

Woking, Surrey, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

Shrewsbury, Shropshire, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

Bradford, Yorkshire, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

Chelmsford, Essex, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

High Wycombe, Buckinghamshire, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

Hemel Hempstead, Hertfordshire, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

Milton Keynes, Buckinghamshire, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

Cardiff, South Glamorgan, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

Stoke-on-trent, Staffordshire, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Global Security Operations Center Analyst

Windsor, Berkshire, South East, United Kingdom
Centrica - CHP
defined incident response processes and escalate to the Cyber Security Incident Response team when necessary. Develop and fine-tune detection rules, create and maintain detection playbooks, and collaborate with threat intelligence to identify new detection opportunities. Use automation tools and scripting languages (e.g., Python, PowerShell) to streamline repetitive tasks and boost efficiency. Proactively hunt for potential threats within … the environment, leveraging threat intelligence and advanced analytics to identify and mitigate risks. Work closely with other cyber defence teams, including Intelligence, Vulnerability Management, Threat Hunting, and Purple Teams. Effectively communicate findings and recommendations to various stakeholders. Utilise your technical expertise to analyse telemetry related to incidents and identify appropriate investigation pathways. Identify techniques used by … experience in scripting or programming languages. Preferred experience dealing with incidents in various environments, including OT and ICS technologies. Preferred experience working with wider Cyber Defence teams, such as Intelligence, Vulnerability Management, Threat Hunting, and Purple Teams. Understanding of cyber security legislation and experience with information risk and security-related best practices, policies, standards, and regulations. What's More ❯
Employment Type: Permanent
Posted:

Chief Information Security Officer

London, United Kingdom
Fuse Energy, LLC
strategy across infrastructure, applications, and data. Lead hands-on development of security roadmaps, maturity models, and control frameworks tailored to Fuse's risk profile. Directly contribute to architecture reviews, threat modelling sessions, and key design decisions across product and platform teams. Build and mentor a high-performing security team, including hiring, coaching, and managing performance. Develop KPIs and reporting … data protection, access control, and insider risk. Ensure compliance with SOC 2, ISO 27001, GDPR, and other relevant frameworks. Oversee security audits and third-party risk programs. Risk Management & Threat Intelligence Lead threat modelling, risk assessments, and security reviews of critical systems; design and deliver security awareness training programs for all employees to promote a culture of … proactive risk management. Build threat intelligence capabilities to stay ahead of emerging risks. Balance risk management with product and engineering velocity. Incident Response & Resilience Own response plans for high-severity threats and incidents. Build robust detection, containment, and remediation processes. Drive business continuity and disaster recovery strategy. Technology & Infrastructure Security Partner with engineering to embed security in the More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Engineer

Cambridge, Cambridgeshire, England, United Kingdom
Hybrid / WFH Options
REDTECH RECRUIT
and the wider Defender XDR suite Knowledge of cloud and on-premise environments, ideally Azure, including networking and firewalls Familiarity with incident response processes, playbooks, and tools Understanding of threat intelligence and vulnerability management Experience with ISO27001 and compliance frameworks Scripting and coding skills (e.g., Python, PowerShell, Bash) Exposure to CI/CD, Infrastructure as Code (IaC), and … Security Engineer/Security Analyst/Cloud Security Engineer/Security Operations Engineer/SOC Engineer/InfoSec Engineer/Infrastructure Security/DevSecOps Engineer/Security Automation/Threat Detection/Threat Intelligence/SIEM/Azure Sentinel/Microsoft Defender/Endpoint Security/PowerShell/Python/Bash/Azure DevOps/Infrastructure as More ❯
Employment Type: Full-Time
Salary: £45,000 - £50,000 per annum
Posted:

Threat Hunt Analyst with Security Clearance

Ashburn, Virginia, United States
Gray Tier LLC
Primary Responsibilities: • Create Threat Models to better understand the DHS IT Enterprise, identify defensive gaps, and prioritize mitigations • Author, update, and maintain SOPs, playbooks, work instructions • Utilize Threat Intelligence and Threat Models to create threat hypotheses • Plan and scope Threat Hunt Missions to verify threat hypotheses • Proactively and iteratively search through systems and … networks to detect advanced threats • Analyze host, network, and application logs in addition to malware and code • Prepare and report risk analysis and threat findings to appropriate stakeholders • Create, recommend, and assist with development of new security content as the result of hunt missions to include signatures, alerts, workflows, and automation. • Coordinate with different teams to improve threat More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Digital Forensics and Incident Response Analyst

England, United Kingdom
Pen Test Partners
investigation strategies. Develop and refine forensic methodologies and procedures to ensure consistent, high-quality investigations. Provide guidance and best practices on forensic readiness and security incident management. Collaborate with threat intelligence teams to correlate forensic findings with threat actor tactics, techniques, and procedures (TTPs). Conduct compromise assessments and proactive threat hunting using forensic tools and … collection, handling, and analysis of digital evidence in AWS and Azure environments. Key Skills & Experience: Proven experience in DFIR, with hands-on expertise in forensic analysis, incident response, and threat investigations ideally in a consultancy capacity. Technical background (e.g., previous experience as a systems or network administrator) with a solid understanding of operating systems, networking, and security architectures. Strong … translate complex forensic concepts into client-friendly language, supporting engagement with both technical and executive stakeholders. Experience with forensic data preservation, chain of custody, and evidential procedures. Familiarity with threat intelligence frameworks (MITRE ATT&CK, TTP mapping, IOC development). Certifications such as GCFA, GCIH, CISSP, AWS Security Specialty, Azure Security Engineer, or equivalent are desirable. Offensive certifications More ❯
Posted:

Threat Detection Engineer (Cyber)

Windsor, Berkshire, South East, United Kingdom
Centrica - CHP
do energy differently - we do it all. We make it, store it, move it, sell it, and mend it. An opportunity to play your part - Join Centrica as a Threat Detection Engineer, where you'll be at the forefront of our mission to safeguard our digital landscape. In this dynamic role, you'll be responsible for developing, automating, and … enhancing our detection capabilities to swiftly identify and respond to security threats. You'll have the exciting opportunity to create innovative detection use cases, leveraging security telemetry, threat intelligence, and insights from past incidents. Your expertise will be crucial in addressing detection gaps across our infrastructure, working closely with various business units to boost visibility, and crafting automated … address any gaps in security coverage. Apply GitOps and CI/CD principles to automate detection engineering workflows, boosting operational efficiency. Build and optimize security playbooks to streamline detection, threat hunting, and incident response activities. Develop, automate, and enhance our threat detection and response capabilities. Work closely with security analysts and other stakeholders to identify and address gaps More ❯
Employment Type: Permanent
Posted:

Senior Incident Responder SOC Analyst (L3)

South East, United Kingdom
Hybrid / WFH Options
Anson Mccade
are followed, and directly engage with clients and delivery managers to provide expert guidance on incident handling. This is a hands-on technical leadership role that combines investigation, response, threat intelligence, and collaboration with stakeholders. You'll also support service improvement, tool optimisation, and the development of new SOC capabilities. Key Responsibilities Lead investigations into escalated incidents, providing … detailed analysis and containment strategies. Perform malware analysis, reverse engineering, and develop detection signatures. Integrate threat intelligence into SOC operations, staying ahead of emerging attack techniques. Manage and optimise SIEM tools (Splunk, QRadar, Microsoft Sentinel). Develop SOC use cases, runbooks, and playbooks to improve response capability. Collaborate with IT, legal, and management teams during incident response. Support More ❯
Employment Type: Permanent, Work From Home
Posted:

Cybersecurity Specialist 3

Atlanta, Georgia, United States
Hybrid / WFH Options
Burgeon IT Services
Revenue is seeking an experienced Cybersecurity Specialist 3 to lead the development, delivery, and optimization of IT security standards, best practices, and system architecture. This role focuses on advanced threat hunting, complex incident response, vulnerability management, and security design to protect critical state systems and sensitive data. Key Responsibilities: Proactively hunt for advanced threats that bypass automated detection tools. … and implement security architecture and recommend improvements. Monitor networks and systems for unauthorized activities and respond to incidents. Optimize cybersecurity tools (SIEM, EDR, IDS) and integrate new technologies. Incorporate threat intelligence feeds into platforms to enhance detection. Required Skills & Competencies: Bachelors degree in Computer Science, IT, Information Security, or equivalent experience. 4+ years of proven success in technology … focus on information security and data governance. Hands-on expertise with SIEM, EDR, IDS, and network monitoring tools. Strong knowledge of vulnerability management tools and practices. Advanced understanding of threat intelligence, incident response, and proactive defense. Excellent analytical, problem-solving, and documentation skills. Working Conditions: Hybrid work model (onsite in Metro Atlanta as required). On-call rotation More ❯
Employment Type: Any
Salary: USD Annual
Posted:

Cyber Protection Specialist with Security Clearance

Boston, Massachusetts, United States
Hybrid / WFH Options
Digital Prospectors
In this role, you will be at the forefront of protecting critical systems, networks, and applications from evolving cyber threats. You will leverage your deep knowledge of security tools, threat intelligence, intrusion analysis, and incident response to safeguard sensitive data and ensure organizational resilience. This is an exciting opportunity for an individual who thrives in fast-paced environments … intrusion analysis, vulnerability assessments, and forensic investigations to support enterprise security posture. • Research, track, and analyze emerging threats, attack methods, and malicious campaigns. • Collect, validate, and apply open-source intelligence (OSINT) to strengthen defense strategies. • Provide subject matter expertise in malware, botnets, distributed denial-of-service (DDoS) attacks, social engineering, insider threats, and hacktivism. • Administer and optimize IDS/… controls. • Experience with Nessus Security Center (or ACAS, Tenable Security Center). • Familiarity with malware analysis, packet analysis, Splunk, and OSINT reconnaissance. • Experience with STIX, TAXII, OpenIOC, or other threat intelligence schemas. • Programming/scripting skills in at least one language (Python, Ruby, PowerShell, C#, Bash, Perl, C++). • Database administration experience with Oracle, MSSQL, MySQL, or similar More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SOC Technical Lead with Security Clearance

Smyrna, Georgia, United States
Crest Security Assurance
SOC operations, including hands-on involvement in incident detection, analysis, containment, and remediation. The Technical Lead ensures that security technologies such as SIEM, SOAR, IDS/IPS, EDR, and threat intelligence platforms are effectively configured, maintained, and optimized to support real-time monitoring and response. Additional responsibilities include mentoring junior analysts, conducting technical training, developing playbooks and detection … analysis of security incident responses. Perform forensic analysis of devices involved in incidents. Investigate potential intrusions and security events to contain and mitigate incidents. Research cyber-attacks, malware, and threat actors to determine potential impact and develop remediation guidance. Analyze network traffic and identifies attack activity. Document incident response activities and lessons learned. Effectively communicate incident response activities. Provide … management. Collaborate with vendors to ensure proper best practices are enforced and recommendations are delivered. Validate suspicious events by performing investigations using SIEM, leverage tools available to the SOC, threat intelligence and OSINT, TTPs and IOCs. Leverage knowledge of Alert Triage, SOC Operations, and Defense in Depth (DiD) to contribute to projects for overall success. Produce high-quality More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Incident Response Specialist

Nationwide, United Kingdom
Morson Talent
in place to avoid reoccurrence of incidents. Incident detection: Demonstrate an ability to understand in detail how an incident has occurred without relying on alerts (e.g., reviewing logs and threat intelligence data). Support the Analyst in prioritizing incidents for further analysis, response, or closure. Incident management: Provide specialist knowledge on specific types of attacks. Support Senior Analyst … in cyber security and forensic investigations when they arise. Demonstrate an ability to understand in detail how an incident has occurred without relying on alerts (e.g., reviewing logs and threat intelligence data). Support the Analyst in prioritizing incidents for further analysis, response, or closure. Provide specialist knowledge on specific types of attacks. Support Senior Analyst and Analyst … to them appropriately Experience working through cyber investigations independently Proven experience of Splunk or Sentinel Worked with EDR systems such as Defender or Symantec Knowledge of KQL and SPL Threat Hunting experience Experience working with third-party suppliers and vendors?? Familiarity with enterprise security controls and security best practices for Windows, Linux, and Mac systems or similar Experience of More ❯
Employment Type: Contract
Rate: £700 - £750/day None
Posted:
Threat Intelligence
10th Percentile
£43,200
25th Percentile
£54,625
Median
£73,250
75th Percentile
£90,000
90th Percentile
£110,000