scalability, automation, and resilience. Collaborating with security analysts, engineers, and stakeholders to ensure seamless integration of tools and workflows. Leading technical discussions and providing guidance on best practices for threat detection, incident response, and log management. Supporting pre-sales engagements with technical expertise and solution design input. Staying ahead of emerging threats and technologies to continuously improve SOC capabilities … . What You’ll Bring: Strong experience in designing and implementing SOC platforms (e.g., SIEM, SOAR, EDR). Deep understanding of security operations workflows, threatintelligence, and incident response. Hands-on experience with tools like Splunk, Sentinel, QRadar, or similar. Ability to engage with both technical and non-technical stakeholders. Familiarity with cloud environments (Azure, AWS, GCP) and More ❯
scalability, automation, and resilience. Collaborating with security analysts, engineers, and stakeholders to ensure seamless integration of tools and workflows. Leading technical discussions and providing guidance on best practices for threat detection, incident response, and log management. Supporting pre-sales engagements with technical expertise and solution design input. Staying ahead of emerging threats and technologies to continuously improve SOC capabilities … . What You’ll Bring: Strong experience in designing and implementing SOC platforms (e.g., SIEM, SOAR, EDR). Deep understanding of security operations workflows, threatintelligence, and incident response. Hands-on experience with tools like Splunk, Sentinel, QRadar, or similar. Ability to engage with both technical and non-technical stakeholders. Familiarity with cloud environments (Azure, AWS, GCP) and More ❯
london (city of london), south east england, united kingdom
Anson McCade
scalability, automation, and resilience. Collaborating with security analysts, engineers, and stakeholders to ensure seamless integration of tools and workflows. Leading technical discussions and providing guidance on best practices for threat detection, incident response, and log management. Supporting pre-sales engagements with technical expertise and solution design input. Staying ahead of emerging threats and technologies to continuously improve SOC capabilities … . What You’ll Bring: Strong experience in designing and implementing SOC platforms (e.g., SIEM, SOAR, EDR). Deep understanding of security operations workflows, threatintelligence, and incident response. Hands-on experience with tools like Splunk, Sentinel, QRadar, or similar. Ability to engage with both technical and non-technical stakeholders. Familiarity with cloud environments (Azure, AWS, GCP) and More ❯
join one of our biggest customers who are in the financial services sector. As an IT Security Specialist, you will support the day-to-day operations of the Counter Threat Unit, applying your strong background in infrastructure engineering, cloud-based architectures, and solution delivery. You will contribute to maintaining secure systems across hybrid environments, leveraging your expertise in both … on-premises and cloud platforms such as Azure, AWS, and GCP. Main Responsibilities as IT Infrastructure Engineer - Security : Assist in gathering and analysing threatintelligence; monitor systems and networks to identify anomalies and support situational awareness. Follow established processes to help ensure compliance with legal, regulatory, and internal security requirements. Contribute to the investigation and resolution of security More ❯
using Splunk, including data onboarding, creating correlation rules, and developing dashboards and reports to improve security visibility. Develop and maintain detection use cases, alerts, and response playbooks based on threatintelligence and compliance requirements. Monitor, tune, and optimise Splunk performance to ensure availability, scalability, and accuracy of security event logging and analysis. Work closely with SOC analysts, incident … response, and threat hunting teams to enhance threat detection, investigation capabilities, and response effectiveness. More ❯
adoption and effective use. Contribute to internal process documentation and improvement initiatives, ensuring procedures support a consistent and high-quality customer experience. Deliver proactive communications to customers on relevant threatintelligence, product enhancements, best practices, and industry developments. Advocate for customers internally, ensuring their needs and feedback influence product development and service improvements. Support the introduction and adoption … audiences. Ability to manage multiple customer accounts, prioritising effectively in a fast-paced environment. Experience driving customer satisfaction and retention through proactive engagement. Understanding of key concepts in cybersecurity, threat detection, and managed security services. Familiarity with ITIL service management principles. Experience presenting to senior stakeholders and technical teams. Exposure to security technologies such as EDR, SIEM and network More ❯
Network Security Operations Center (SOC) experience Experience and talent in date correlation Experience creating workflows for Incident Response within a SIEM Tool GIAC Certified Incident Handler Certification GIAC Cyber ThreatIntelligence Certification Cybersecurity certifications Formal SIEM training More ❯
SOC) experience. Experience and talent in data visualization. Extensive experience creating workflows for Incident Response within a SIEM Tool. Security+ Certification. GIAC Certified Incident Handler Certification/GIAC Cyber ThreatIntelligence Certification. Cybersecurity certifications. Formal SIEM training. Experience working on an Agile team/program. More ❯
Azure administration and governance * Deep knowledge of Microsoft Defender for Cloud and Cloud Security remediation * Experience of designing and implementing network segmentation and segregation * Knowledge of vulnerability management and threatintelligence tooling * Practical experience and understanding of cyber security frameworks (NCSC CAF, Cyber Essentials, ISO27001) * Excellent cloud and on-premise troubleshooting environments * Relevant Azure security certifications (e.g. AZ More ❯
to managing infrastructure, you will spearhead strategic initiatives to enhance network and telecommunications security. You will develop and implement robust security policies, protocols, and procedures, leveraging advanced technologies and threatintelligence to protect against cyber threats and ensure compliance with regulatory requirements, such as GDPR and NHS Digital Data Security and Protection Toolkit. You will deputise for the More ❯
clients (weekly/monthly). Oversee vulnerability management efforts including scanning, prioritisation, risk communication, and remediation coordination. Ensure IDS/IPS systems are maintained and aligned with the latest threat intelligence. Work closely with the Senior Service Delivery Manager to identify process improvements and implement best practices. What You'll Bring 10+ years of experience in technical support for More ❯
each fiscal year. The operation of existing applications and new application initiatives are critical to the success of the FBI mission. Additionally, thousands of personnel in the law enforcement, intelligence, legal, and administrative communities use these services daily to perform mission-critical work. These applications require responsive, effective, and specialized technical expertise to limit disruption to FBI operations. THIS … for tactical teams performing incident response and computer network operations and exploitation (CNO/CNE). Build and test operational prototypes for tactical teams Conduct analysis of case and intelligence related cyber data to develop advanced analytical tools Perform research of novel capabilities derived from technical analysis Research emerging technologies, exploitation techniques, and custom tools Perform reverse engineering of … processing Linux and Windows operating systems Basic reverse engineering concepts Vulnerability assessment techniques Version control systems (Git) Containerization (Docker) Experience with tool development for cyber operations Understanding of cyber threat actor tactics, techniques, and procedures Senior-Level Advanced proficiency with: Advanced programming in multiple languages Complex malware analysis and reverse engineering Exploit development and vulnerability research Advanced network analysis More ❯
security best practices Ability to understand code written in other scripting languages Knowledge of incident response (SecOps) Eagerness to look for and evaluate available open-source incident response/threatintelligence tools Strong focus on writing high quality technical documentation Good knowledge of Linux, git, nginx More ❯
II/PCI-DSS. Champion a company-wide culture of security awareness and operational resilience by playing a key role in defining, maintaining, and managing security incident response and threatintelligence procedures. Lead, curate, and report on Navro's on-going and persistent security awareness programme including frequent phishing testing campaigns, secure development, etc. Work with IT, SRE More ❯
Someone to assure security controls, manage vulnerabilities, and maintain policies A mentor to support junior analysts while contributing to governance and compliance work Strong technical background – SOC, incident response, threatintelligence or security engineering Experience with Microsoft Security tools (Sentinel, Defender, etc.) Knowledge of governance, risk and compliance frameworks (PCI, FCA, GDPR) Please apply if this would be More ❯
Someone to assure security controls, manage vulnerabilities, and maintain policies A mentor to support junior analysts while contributing to governance and compliance work Strong technical background – SOC, incident response, threatintelligence or security engineering Experience with Microsoft Security tools (Sentinel, Defender, etc.) Knowledge of governance, risk and compliance frameworks (PCI, FCA, GDPR) Please apply if this would be More ❯
Leadership and engineers to improve the cybersecurity tools and processes Collaborating with local Information System Security Officers (ISSOs) to ensure compliance with relevant cybersecurity standards and regulations Support cyber threatintelligence activities Support the development and maintenance of cyber scanning, patching, remediation, tools and applications Support, as required, TEMPEST, DFARS, COMSEC, CNSSI, and other compliance drivers as needed More ❯
and remediation options, including vendor-supplied fixes and workarounds. Actively collaborate with ISSO to develop, maintain, and enhance cyber security controls. Collaborate with security groups such as Red Teams, threatintelligence and risk management to form a holistic team dedicated to thwarting attackers and reducing attack surface. Assist multiple teams on the implementation of configuration management for security More ❯
West Midlands Ambulance Service University NHS Foundation Trust
other relevant bodies as required ensuring IT Security advisories, directives and notifications are actioned and logged. This includes but is not limited to CareCERT, CiSP, vendor and other specialist threatintelligence feeds. Ensure all systems and applications where applicable are kept up to date and are encompassed in the patch management routine as detailed in the patch management More ❯
issues early and helping us respond quickly. Working side by side with Analysts, Architects, PMs and Engineers to make sure the SIEM content hits the mark. Bringing the latest threat intel, vulnerabilities and attack methods into our set-up. Helping to shape and maintain security standards and procedures. What you’ll bring Solid hands-on experience with SIEM tools More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Fynity
issues early and helping us respond quickly. Working side by side with Analysts, Architects, PMs and Engineers to make sure the SIEM content hits the mark. Bringing the latest threat intel, vulnerabilities and attack methods into our set-up. Helping to shape and maintain security standards and procedures. What you’ll bring Solid hands-on experience with SIEM tools More ❯
/researching on previously reported IOCs. Participate in collaborative sessions with other CNDSPs and IC agencies on malicious intrusions, attacks or suspicious activities, as well as share emerging Cyber Threat Intel data. Assist in the development of IOCs for active defensive countermeasures and passive detection signatures. Day or Swing shift position available. REQUIRED SKILLS AND ABILITIES: Expertise in reverse More ❯
Security Clearance Overall Assignment Description: Conduct defensive CI activities in support of the NGA mission. Duties may include: Conduct daily research to gather, assimilate, evaluate and interpret information concerning intelligence, terrorism and espionage threats against NGA personnel, programs, technology and information systems and/or facilities and the National System for GEOINT (NSG). Provide daily CI analyses for … distribution to selected parties within NGA, the DoD, and the Intelligence Community. Assimilate, evaluate and interpret all-source information related to NGA from an operational security perspective. Publish intelligence with recommendations for mitigation and countermeasures, as appropriate. Detect and assess anomalous activities for links to possible foreign intelligence collection within NGA with recommended countermeasures. Immediately alert the … government to imminent foreign intelligence, terrorism and espionage threats with recommended countermeasures. Provide analytical forecasts of foreign intelligence, terrorism and espionage threats against NGA as requested with recommended countermeasures. Provide CI assessments of proposed international agreements involving GEOINT sharing as requested. Provide annual CI threat analyses of foreign intelligence and terrorism threats to NGA employees assigned More ❯
Counterintelligence (CI) Officer will conduct defensive CI activities in support of the NGA mission. Duties may include: Conduct daily research to gather, assimilate, evaluate and interpret information concerning intelligence, terrorism and espionage threats against NGA personnel, programs, technology and information systems and/or facilities and the National System for GEOINT (NSG). Provide daily CI analyses for distribution … to selected parties within NGA, the DoD, and the Intelligence Community. Assimilate, evaluate and interpret all-source information related to NGA from an operational security perspective. Publish intelligence with recommendations for mitigation and countermeasures, as appropriate. Detect and assess anomalous activities for links to possible foreign intelligence collection within NGA with recommended countermeasures. Immediately alert the government … to imminent foreign intelligence, terrorism and espionage threats with recommended countermeasures. Provide analytical forecasts of foreign intelligence, terrorism and espionage threats against NGA as requested with recommended countermeasures. Provide CI assessments of proposed international agreements involving GEOINT sharing as requested. Provide annual CI threat analyses of foreign intelligence and terrorism threats to NGA employees assigned to More ❯