Birmingham, West Midlands, England, United Kingdom
Crimson
Head of IT Security Incident and Threat Management - Solihull Crimson and IMI have joined forces to build IMI's new security team, and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security and want to be part of a dynamic team that is shaping the future of security … within a successful global company, we want to hear from you! We are seeking a highly skilled and experienced Head of IT Security Incident and Threat Management to join our team. In this role, you will be responsible for leading the strategic efforts to safeguard the company's digital assets against potential threats and incidents. This role requires a … seasoned professional with a deep understanding of cybersecurity, incident response an threat management within a FTSE 100 environment. The salary on offer for this position is between £90,000 and £110,000 per annum plus benefits. Key Responsibilities Develop and implement comprehensive incident response strategies to address security threats swiftly and effectively Lead the threat and intelligenceMore ❯
Manager, Financial Crime Intelligence Unit page is loaded Manager, Financial Crime Intelligence Unit Apply locations London time type Full time posted on Posted 5 Days Ago job requisition id R7652 Company Description We're - you might not know our name, but companies like eBay, ASOS, Klarna, Uber Eats, and Sony do. That moment when you check out online … isn't just another job; it's a career-defining opportunity to build the future of fintech. Job Description We're looking for a Manager for our Financial Crime Intelligence Unit (FCIU), based in our London office. You will join a growing Compliance team, reporting to the Head of Financial Crime Controls. This role is central to 's ability … to proactively identify, investigate, and mitigate complex financial crime threats. You will be responsible for leading the FCIU and shaping the firm's financial crime intelligence strategy. In this role, you will lead a specialised team of analysts dedicated to conducting deep-dive investigations into complex financial crime escalations and proactive risk assessments. You will act as a crucial More ❯
Job Number: R Counterintelligence Officer The Opportunity: As a Counterintelligence ( CI ) Officer, you will c ond uct defensive CI activities in support of an intelligence agency. What You'll Work On: C ond uct daily research to gather, assimilate, evaluate, and interpret information concerning intelligence, terror ism, and espionage threats against agency personnel, programs, technology, and information systems … or facilities and the National System for GEOINT ( NSG ) . Provide daily CI analyses for distribution to selected parties within the agency, the DoD, and the Intelligence Community. Assimilate, evaluate, and interpret all-source information related to the agency from an operational security perspective. Publish intelligence with recommendations for mitigation and countermeasures, as appropriate. Detect and assess anomalous … activities for links to possible foreign intelligence collection within the agency with recommended countermeasures. Immediately alert the government to imminent foreign intelligence, terror ism, and espionage threats with recommended countermeasures. Provide analytical forecasts of foreign intelligence, terror ism, and espionage threats against the agency as requested with recommended countermeasures. Provide CI assessments of proposed international agreements involving More ❯
workflows, playbooks, and logging integrations to enhance the SOC's scalability, efficiency, and incident response readiness. Designed and fine-tune proactive and reactive detections in Sentinel - working closely with ThreatIntelligence, IR, and Attack Surface Management teams. Partnered with SOC analysts to identify repetitive tasks and implement automation to boost day-to-day operational efficiency in areas like … threat hunting and vulnerability management. Continuously assessed and improved automation systems for reliability, performance, and scalability to meet evolving security and operational needs. Hands-on experience with security automation and cloud tools such as Sentinel, Splunk SOAR, Palo Alto XSOAR, and platforms like Azure, AWS, and GCP to support SOC and detection engineering efforts. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Lorien
This role would be based on a hybrid working basis in Central London Experience Experience of working in Cyber Security, ideally within SOC Excellent stakeholder management skills Experience with threatintelligence platforms Active SC clearance would be required If you are an SC cleared Cyber Security Analyst looking for a new role, please apply now! Carbon60, Lorien & SRG More ❯
ZeroFox is at the forefront of digital security, offering cutting-edge Digital Risk Protection, ThreatIntelligence, and External Attack Surface Management solutions. We are on the lookout for a dynamic and skilled Senior Product Manager who will play a pivotal role in shaping and driving the vision for our products. This position demands a strategic thinker with a … the Senior Product Manager, you will effectively lead the product lifecycle, from conceptualizing innovative ideas to launching high-impact solutions that empower our clients to navigate the evolving digital threat landscape. Key Responsibilities: Product Strategy: Develop and implement a robust product strategy that aligns with ZeroFox's mission and addresses key market challenges. Collaboration: Work alongside engineering, sales, and … disrupt external cyber threats on the surface, deep, and dark web. ZeroFox offers the only unified cybersecurity platform combining advanced AI analytics, digital risk and privacy protection, full-spectrum threatintelligence, and a robust portfolio of breach, incident and takedown response capabilities to protect customers from growing threats across the external attack surface. It's a great time More ❯
and analyze security alerts from various sources to detect and respond to potential threats in real-time. - Develop, implement, and fine-tune detection rules and correlation logic to improve threat detection capabilities. - Conduct in-depth investigations of security incidents, perform forensic analysis, and coordinate incident response activities. - Maintain and optimize security information and event management systems and other security … tools used in the SOC. - Collaborate with other teams to enhance threatintelligence, improve incident response procedures, and provide regular reports on security posture. A day in the life A day in the life As a Security Engineer in Detections, your day revolves around safeguarding our digital assets. This position supports other AWS Security Engineers with security engineering … security operations and incident response activities. You will be responsible for coordinating and facilitating security response activities, fine-tuning detection rules. You'll investigate potential incidents, collaborate with threatintelligence teams, and develop new detection algorithms. About the team About the team Diverse Experiences Amazon Security values diverse experiences. Even if you do not meet all of the More ❯
and analyze security alerts from various sources to detect and respond to potential threats in real-time. - Develop, implement, and fine-tune detection rules and correlation logic to improve threat detection capabilities. - Conduct in-depth investigations of security incidents, perform forensic analysis, and coordinate incident response activities. - Maintain and optimize security information and event management systems and other security … tools used in the SOC. - Collaborate with other teams to enhance threatintelligence, improve incident response procedures, and provide regular reports on security posture. A day in the life As a Security Engineer in Detections, your day revolves around safeguarding our digital assets. This position supports other AWS Security Engineers with security engineering, security operations and incident response … activities. You will be responsible for coordinating and facilitating security response activities, fine-tuning detection rules. You'll investigate potential incidents, collaborate with threatintelligence teams, and develop new detection algorithms. About the team Diverse Experiences Amazon Security values diverse experiences. Even if you do not meet all of the qualifications and skills listed in the job description More ❯
WHO ARE WE? Searchlight Cyber was founded in 2017 with a mission to stop threat actors from acting with impunity. Its External Cyber Risk Management Platform helps organizations to identify and protect themselves from threats emerging from the cybercriminal underground, with Attack Surface Management and ThreatIntelligence tools designed to separate the signal from the noise. It … to business goals. Oversee the development of all content formats-blogs, reports, whitepapers, case studies, videos, podcasts, and more. Lead cross-functional content planning and collaboration with teams including threatintelligence, research, product, and leadership. Maintain a high editorial standard across all outputs, ensuring consistency of voice, quality, and brand alignment. Campaigns & Promotion Develop and manage content-led More ❯
Ability to work independently under supervision and follow established procedures for incident documentation and escalation. Preferred Qualifications 1-2 years of experience supporting enterprise-level security, emergency preparedness, or threatintelligence programs. Experience conducting or supporting workplace investigations, including insider threats, counterintelligence, or executive protection activities. Working knowledge of incident and crisis response tools or platforms (e.g., Everbridge … NC4, OnSolve, etc.). Familiarity with federal, state, or industry regulations relevant to workplace security and emergency response (e.g., FEMA, DHS, OSHA). Demonstrated experience writing and presenting threat awareness communications or briefings to employees and/or leadership. Exposure to global security monitoring and international threat assessment. Certifications such as: FEMA ICS/NIMS training Certified Emergency More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Lockheed Martin
your referral is hired, you'll receive a payment! code-extrefer Senior Systems Network Administrator - Clearance Required WHAT WE'RE DOING • Join Lockheed Martin Rotary and Mission Systems, Cyber & Intelligence, where we foster innovation and integrity. • As a Senior Systems Network Administrator, you'll be empowered to create "new realities" and pioneer solutions that break boundaries. • Benefit from the … provides systems engineering, software development, data science and cloud development and engineering services to the Cyber Infrastructure Solutions customer. The services enable the Data Transformation, Malware Analysis, and Cyber ThreatIntelligence processing and sharing capabilities for the customer, fulfilling mission objectives and offering actionable information to detect and mitigate cyber threats. The contract has several locations in Maryland … excellence and integrity. WHO YOU ARE • You are a Senior Systems Network Administrator who will support Malware & Cybersecurity Solutions which provides normalization of cyber security data and automation of threat intelligence. • You have extensive experience with Linux and Windows, are AWS System Administrator Certified, and have deep customer mission knowledge (specifically, CSD). WHY JOIN US • Join a global More ❯
You must have a passion for engineering solutions to complex security challenges, and recognize and fill gaps in capabilities. Above all, you should be passionate about information security, the threat landscape and security automation and tooling. Inclusive Team Culture In Amazon Security, it's in our nature to learn and be curious. Ongoing DEI events and learning experiences inspire … security incidents. - Proficiency with one high-level programming or scripting language. PREFERRED QUALIFICATIONS - 3+ years experience performing detection engineering in a dedicated or hybrid capacity supporting incident response and threat intel operations. - 5+ years experience working in incident response response, security automation tooling, threatintelligence, or forensics. - Experience with Amazon Web Services. - Experience in Security Incident Response More ❯
Full Scope Polygraph Clearance. 2HB Incorporated is seeking a Senior Systems Engineer to support its government customer in Annapolis Junction, MD. DESCRIPTION: Seeking a candidate to support the Cyber ThreatIntelligence initiative which defends of our nation's most critical unclassified and classified networks. This is for a position on the Collection team. The candidate will work with More ❯
environmental conditions or hazards. Office environment. Little physical effort required. Requirements Associate degree or higher in any field and must hold one of the following certifications: a. Open Source Intelligence (OSINT) certification b. GIAC Open Source Intelligence (GOSI) c. Certified ThreatIntelligence Analyst (CTIA) d. Certified Ethical Hacker (CEH) e. EC Council Certified Network Defender (CND More ❯
Red Team Operations, Defensive Cyber Operations, Software Engineering, and Technical Engineering. With the largest contingent of contracted Red Team operators in the DoD, we provide an unmatched level of threatintelligence and battle-tested experience for customers in both the DoD and federal civilian markets. What We Believe Millennium is an equal opportunity employer and does not discriminate … Engineer will conduct multiple penetration tests of global customer networks, rapid development of domain or problem-specific tools that leverage identified vulnerabilities, research on the latest exploitation techniques and threat vectors, and design and configuration of representative test environments. Candidate must support various training events, conferences, exercises, and demonstrations to ensure continued compliance with team member certification requirements to More ❯
Red Team Operations, Defensive Cyber Operations, Software Engineering, and Technical Engineering. With the largest contingent of contracted Red Team operators in the DoD, we provide an unmatched level of threatintelligence and battle-tested experience for customers in both the DoD and federal civilian markets. What We Believe Millennium is an equal opportunity employer and does not discriminate … Engineer will conduct multiple penetration tests of global customer networks, rapid development of domain or problem-specific tools that leverage identified vulnerabilities, research on the latest exploitation techniques and threat vectors, and design and configuration of representative test environments. Candidate must support various training events, conferences, exercises, and demonstrations to ensure continued compliance with team member certification requirements to More ❯
Red Team Operations, Defensive Cyber Operations, Software Engineering, and Technical Engineering. With the largest contingent of contracted Red Team operators in the DoD, we provide an unmatched level of threatintelligence and battle-tested experience for customers in both the DoD and federal civilian markets. What We Believe Millennium is an equal opportunity employer and does not discriminate … Engineer will conduct multiple penetration tests of global customer networks, rapid development of domain or problem-specific tools that leverage identified vulnerabilities, research on the latest exploitation techniques and threat vectors, and design and configuration of representative test environments. Candidate must support various training events, conferences, exercises, and demonstrations to ensure continued compliance with team member certification requirements to More ❯
Red Team Operations, Defensive Cyber Operations, Software Engineering, and Technical Engineering. With the largest contingent of contracted Red Team operators in the DoD, we provide an unmatched level of threatintelligence and battle-tested experience for customers in both the DoD and federal civilian markets. What We Believe Millennium is an equal opportunity employer and does not discriminate … Engineer will conduct multiple penetration tests of global customer networks, rapid development of domain or problem-specific tools that leverage identified vulnerabilities, research on the latest exploitation techniques and threat vectors, and design and configuration of representative test environments. Candidate must support various training events, conferences, exercises, and demonstrations to ensure continued compliance with team member certification requirements to More ❯
Business Development Representative II, Nordics & Benelux London With 1,000 intelligence professionals, over $300M in sales, and serving over 1,900 clients worldwide, Recorded Future is the world's most advanced, and largest, intelligence company! The Role: In this position you'll act as part of the sales team interfacing closely with marketing to develop new sales opportunities. … Recorded Future employees (or "Futurists"), represent over 40 nationalities and embody our core values of having high standards, practicing inclusion, and acting ethically. Our dedication to empowering clients with intelligence to disrupt adversaries has earned us a 4.8-star user rating from Gartner and more than 45 of the Fortune 100 companies as clients. Want more info? Blog & Podcast … Learn everything you want to know (and maybe some things you'd rather not know) about the world of cyber threatintelligence Linkedin , Instagram &Twitter : What's happening at Recorded Future The Record : The Record is a cybersecurity news publication that explores the untold stories in this rapidly changing field Timeline : History of Recorded Future Recognition : Check out More ❯
threats through a revolutionary and integrated ecosystem, a common operating picture, analytics and a communications hub, and persistent joint operations; protect systems/networks through forward-looking technologies and threatintelligence; and pioneer integrated coalitions to strategically posture with the speed and agility necessary to protect the U.S. and its allies. Deliverables will enable DODIN Areas of Operation More ❯
substituted for some experience. Ten (10) years' experience in two or more of the following: designing/implementing machine learning, data mining, advanced analytical algorithms, advanced statistical analysis, artificial intelligence, or software engineering with data analysis software (R, Python, SAS, MATLAB). Experience with Windows server management and Power BI Report Service. Proficiency with Python/Jupyter Notebooks, SQL … data pipelines, and IP-based network data is a plus, but not required. 5+ years of experience working within a cybersecurity mission environment using tools and capabilities to generate threat intelligence. This includes working with cybersecurity analyst teams to perform data analysis and a deep understanding of adversary tradecraft. 5+ years of experience implementing best practices for knowledge management … ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth More ❯
Account Executives and support them with background research and context. Collaborate with marketing to provide feedback on campaign performance and market signals. Stay up to date on cybersecurity trends, threatintelligence, and The clients products and value proposition. You’ll need: 1-2 years’ experience in a sales or business development role, ideally in B2B SaaS or cybersecurity. More ❯
Red Team Operations, Defensive Cyber Operations, Software Engineering, and Technical Engineering. With the largest contingent of contracted Red Team operators in the DoD, we provide an unmatched level of threatintelligence and battle-tested experience for customers in both the DoD and federal civilian markets. What We Believe Millennium is an equal opportunity employer and does not discriminate More ❯
life-both in and outside of work. BASIC QUALIFICATIONS - Bachelor's degree in engineering, computer science or equivalent - 5+ years of experience managing multiple projects in IT security (operations, threatintelligence, application security, etc) to meet business and/or organization goals - Current, active US Government Security Clearance of TS/SCI with Polygraph PREFERRED QUALIFICATIONS - Familiarity with More ❯
tuning our security tool configuration and assessing our deployed controls Effectively liaise and communicate with other Operating Companies (OpCos) within IAG to respond to wider-impacting incidents; share IoCs, threatintelligence and lessons learnt Responsible for relationship development and continuous improvement of our suppliers who support elements of the cyber incident response lifecycle What you'll bring to More ❯