Huntsville, Alabama, United States Hybrid / WFH Options
OSAAVA Services
Position Overview: We are seeking a skilled Cyber ThreatIntelligence (CTI) Analyst with a focus on adversary Tactics, Techniques, and Procedures (TTPs) to support cyber defense operations in a mission-critical DoD environment. This position requires strong analytical abilities to assess and track cyber adversaries, identify trends and attack patterns, and provide actionable intelligence for both defensive … and proactive cyber operations. As a member of a multidisciplinary threatintelligence team, you will work closely with cyber defenders, incident responders, and stakeholders to enrich detection capabilities and enhance the organization's overall cybersecurity posture. Key Responsibilities: Analyze, document, and track adversary TTPs using frameworks like MITRE ATT&CK, and integrate findings into threat detection strategies. … Produce detailed cyber threatintelligence reports, briefings, and technical advisories for internal and external stakeholders. Fuse data from multiple sources (e.g., open-source intel, classified feeds, threat hunting) to provide a holistic threat picture. Collaborate with SOC and Incident Response teams to inform detections and investigations based on threatintelligence findings. Monitor and report More ❯
The team you'll be working with: Consultant - Offensive Security Testing Role Overview: We are seeking a highly skilled and experienced Offensive Security Consultant with a strong focus on threatintelligence and attack methods. The ideal candidate will manage and conduct advanced penetration testing engagements, leveraging threatintelligence to simulate real-world attacks across various environments … provide strategic, actionable recommendations to enhance our clients' security posture. What you'll be doing: Responsibilities: Lead and manage the full lifecycle of complex penetration testing engagements, applying a threatintelligence-led approach. Execute advanced penetration tests across environments such as applications, infrastructure, web, APIs, O365, Azure, AWS, and OT, using current threat landscape knowledge and attacker … TTPs. Develop and maintain detailed test plans and use cases informed by threatintelligence analysis. Identify and prioritize critical OT and IT assets based on potential threats and exposure. Plan and schedule testing engagements based on threat assessments and client needs. Produce clear, detailed reports with technical findings, business impact, and strategic remediation recommendations for diverse audiences. More ❯
a diverse SOC team of Tier 1, 2, and 3 analysts Coordinate incident response efforts, working closely with internal departments (e.g., IT, Risk, Legal) and external partners (e.g., MSSPs, threatintelligence providers) Lead post-incident analysis to determine root causes and implement corrective actions Regularly review and enhance SOC processes, including playbooks, response protocols, and threat hunting … field. 6+ years of cybersecurity experience, with at least 2 years in a SOC leadership role Expertise in cybersecurity frameworks (e.g., MITRE ATT&CK, NIST, CIS), incident response, and threatintelligence In-depth knowledge of security operations, including SIEM, EDR, IDS/IPS, malware analysis, and vulnerability management Strong background in cloud security operations and monitoring across AWS … Azure, and GCP Preferred Proven success in incident resolution within SLAs and based on severity. Experience in threat hunting, digital forensics, or malware analysis. Knowledge of advanced persistent threats (APTs) and contemporary attack techniques. Proficiency in security automation (SOAR), orchestration, and scripting (e.g., Python, PowerShell). Preferred certifications: CISSP, CISM, CEH, or similar. Familiarity with DevSecOps, CI/CD More ❯
a seasoned and visionary cybersecurity leader to head global security operations at an innovative, fast-paced technology organisation. This role will drive the strategic and operational excellence of our threat detection, incident response, and vulnerability management functions across a globally distributed digital estate. Reporting directly to the Chief Information Security Officer (CISO), this high-impact position is responsible for … growth, and cybersecurity thought leadership across the business. What You’ll Be Doing: Shape and deliver the long-term roadmap for detection and response aligned with business strategy and threat landscape. Lead a highly skilled global team in building scalable, responsive, and intelligence-driven capabilities. Evolve functions such as ThreatIntelligence, Security Testing, and Analytics to … enterprise. Strong executive communication skills, with the ability to translate complex risk issues into business-relevant insight and strategy. A strategic thinker with deep domain knowledge across enterprise security, threatintelligence, and incident response, and who can effectively influence C-Suite stakeholders. Demonstrated experience leading and mentoring cross-functional, high-performing teams with a focus on development and More ❯
Cyber Operations and GRC, ensuring UK-specific compliance and security resilience. Role: Security Incidents: Oversee incident management and response, including root cause analysis, impact assessment, and post-incident reviews. Threat Management: Develop and refine threatintelligence, threat hunting capabilities, and prevention/detection measures. Security Technologies: Configure, maintain, and optimise security platforms (SIEM/XDR, EDR … to UK cyber security regulations, including UK GDPR, Cyber Essentials, and any industry-specific security requirements. Skills and Experience: 5–7 years' experience in security operations, engineering, or cyber threat management. Strong knowledge of SIEM, XDR, EDR, vulnerability management, firewalls, and network security. Hands-on experience in security control implementation and maintenance (e.g. ISO27001, Cyber Essentials). Familiarity with More ❯
monitoring, logging, and compliance frameworks* Excellent analytical skills and a keen eye for detail* Strong written and verbal communication skills Desirable: * An interest in or basic understanding of cyber threatintelligence, including how attackers operate and how to spot signs of compromise (e.g., suspicious files, unusual behaviour, or known attack patterns)* Relevant cyber security or networking certifications (e.g. … Excellent benefits package* Opportunities for professional development and certification* A collaborative and secure working environment* Fully on-site role with no shift work Keywords: SOC Analyst, SIEM, Incident Response, ThreatIntelligence, Cyber Security, Network Security, Compliance, Logging, Monitoring, Security Operations, SC Clearance, DV Clearance, Wiltshire Jobs, British Nationals Only, Security Assessments, Cyber Qualifications, Networking Certifications, Cyber Threats, IOCs More ❯
Our innovative approach to security testing merges the benefits of consultant-led penetration testing with ongoing vulnerability assurance through our advanced SecurePortal. This provides clients with a continuous, living threat management system throughout the duration of the contract, rather than a single point-in-time assessment. We are expanding our Incident Response team and are looking for a DFIR … future incidents. Key Responsibilities: Conduct initial incident assessments and support ongoing Incident Response (IR) management. Participate in live IR operations, including digital forensics and data acquisition. Perform security assessments, threatintelligence gathering, and OSINT analysis. Collaborate with internal teams to deliver a holistic cybersecurity service. Engage with clients regularly to collect relevant logs and gain infrastructure access for … incidents to minimise disruption. Strong communication skills with the ability to stay calm and effective under pressure. Able to align client deliverables with industry best practices. Skilled in proactive threatintelligence and analysis to support IR operations. Proactive, responsible, and eager to contribute to the growth of the Incident Response team. While this role is advertised as remote More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Fynity
environments Investigating events using system logs, network traffic, and endpoint telemetry Supporting containment and recovery efforts during active security incidents Continuously enhancing SOC capabilities, tooling, and detection rules using threat-informed approaches like MITRE ATT&CK Producing detailed incident reports and documentation for both technical and non-technical stakeholders Assisting with threatintelligence activities as needed Staying … Hands-on experience working in a Security Operations Centre (SOC) Solid knowledge of SIEM tools such as Microsoft Sentinel or Splunk Familiarity with the MITRE ATT&CK framework and threat detection methodologies Strong analytical skills with a keen eye for detail in log analysis and network monitoring Basic understanding of enterprise security architecture including firewalls, VPNs, AV, and web More ❯
Florissant, Missouri, United States Hybrid / WFH Options
Centene
highly skilled Senior UEBA (User and Entity Behavior Analytics) Engineer to lead the implementation, and optimization of advanced security analytics solutions. The ideal candidate will possess deep expertise in threat detection, data analysis, and behavioral analytics, driving initiatives to enhance the organization's security posture through proactive monitoring and anomaly detection. This role requires a deep understanding of security … analytics, behavioral baselining, data integration, and threat detection methodologies. This role will serve as a key technical leader, mentor, and strategic advisor within the cybersecurity team to enhance threat detection and overall security posture. Solution Design & Leadership: Architect and maintain scalable UEBA solutions, integrating with SIEMs, data lakes, and other security technologies. Design & Implementation: Deploy and configure UEBA … in-depth analysis and investigation of alerts triggered by anomalous behavior. Incident Response Support: Provide expert guidance and technical analysis for security incidents involving anomalous user and entity behavior. Threat Hunting: Assist in proactive threat hunting efforts using behavioral insights from the UEBA platform. Optimization: Continuously fine-tune analytics models to reduce false positives and improve detection capabilities. More ❯
Columbia, Missouri, United States Hybrid / WFH Options
Centene
highly skilled Senior UEBA (User and Entity Behavior Analytics) Engineer to lead the implementation, and optimization of advanced security analytics solutions. The ideal candidate will possess deep expertise in threat detection, data analysis, and behavioral analytics, driving initiatives to enhance the organization's security posture through proactive monitoring and anomaly detection. This role requires a deep understanding of security … analytics, behavioral baselining, data integration, and threat detection methodologies. This role will serve as a key technical leader, mentor, and strategic advisor within the cybersecurity team to enhance threat detection and overall security posture. Solution Design & Leadership: Architect and maintain scalable UEBA solutions, integrating with SIEMs, data lakes, and other security technologies. Design & Implementation: Deploy and configure UEBA … in-depth analysis and investigation of alerts triggered by anomalous behavior. Incident Response Support: Provide expert guidance and technical analysis for security incidents involving anomalous user and entity behavior. Threat Hunting: Assist in proactive threat hunting efforts using behavioral insights from the UEBA platform. Optimization: Continuously fine-tune analytics models to reduce false positives and improve detection capabilities. More ❯
St. Louis, Missouri, United States Hybrid / WFH Options
Centene
highly skilled Senior UEBA (User and Entity Behavior Analytics) Engineer to lead the implementation, and optimization of advanced security analytics solutions. The ideal candidate will possess deep expertise in threat detection, data analysis, and behavioral analytics, driving initiatives to enhance the organization's security posture through proactive monitoring and anomaly detection. This role requires a deep understanding of security … analytics, behavioral baselining, data integration, and threat detection methodologies. This role will serve as a key technical leader, mentor, and strategic advisor within the cybersecurity team to enhance threat detection and overall security posture. Solution Design & Leadership: Architect and maintain scalable UEBA solutions, integrating with SIEMs, data lakes, and other security technologies. Design & Implementation: Deploy and configure UEBA … in-depth analysis and investigation of alerts triggered by anomalous behavior. Incident Response Support: Provide expert guidance and technical analysis for security incidents involving anomalous user and entity behavior. Threat Hunting: Assist in proactive threat hunting efforts using behavioral insights from the UEBA platform. Optimization: Continuously fine-tune analytics models to reduce false positives and improve detection capabilities. More ❯
Jefferson City, Missouri, United States Hybrid / WFH Options
Centene
highly skilled Senior UEBA (User and Entity Behavior Analytics) Engineer to lead the implementation, and optimization of advanced security analytics solutions. The ideal candidate will possess deep expertise in threat detection, data analysis, and behavioral analytics, driving initiatives to enhance the organization's security posture through proactive monitoring and anomaly detection. This role requires a deep understanding of security … analytics, behavioral baselining, data integration, and threat detection methodologies. This role will serve as a key technical leader, mentor, and strategic advisor within the cybersecurity team to enhance threat detection and overall security posture. Solution Design & Leadership: Architect and maintain scalable UEBA solutions, integrating with SIEMs, data lakes, and other security technologies. Design & Implementation: Deploy and configure UEBA … in-depth analysis and investigation of alerts triggered by anomalous behavior. Incident Response Support: Provide expert guidance and technical analysis for security incidents involving anomalous user and entity behavior. Threat Hunting: Assist in proactive threat hunting efforts using behavioral insights from the UEBA platform. Optimization: Continuously fine-tune analytics models to reduce false positives and improve detection capabilities. More ❯
Kansas City, Missouri, United States Hybrid / WFH Options
Centene
highly skilled Senior UEBA (User and Entity Behavior Analytics) Engineer to lead the implementation, and optimization of advanced security analytics solutions. The ideal candidate will possess deep expertise in threat detection, data analysis, and behavioral analytics, driving initiatives to enhance the organization's security posture through proactive monitoring and anomaly detection. This role requires a deep understanding of security … analytics, behavioral baselining, data integration, and threat detection methodologies. This role will serve as a key technical leader, mentor, and strategic advisor within the cybersecurity team to enhance threat detection and overall security posture. Solution Design & Leadership: Architect and maintain scalable UEBA solutions, integrating with SIEMs, data lakes, and other security technologies. Design & Implementation: Deploy and configure UEBA … in-depth analysis and investigation of alerts triggered by anomalous behavior. Incident Response Support: Provide expert guidance and technical analysis for security incidents involving anomalous user and entity behavior. Threat Hunting: Assist in proactive threat hunting efforts using behavioral insights from the UEBA platform. Optimization: Continuously fine-tune analytics models to reduce false positives and improve detection capabilities. More ❯
resources to better use. CLS products are designed to enable clients to manage risk most effectively across the full FX lifecycle - whether through more efficient processing tools or market intelligence derived from the largest single source of FX executed data available to the market. Our ambition to make a positive difference starts with our people. Our values - Protect, Improve … improvements. Key member of the function who regularly reviews Security Policies, Standards and Controls and optimize position on areas associated to regulations and company strategy. Integrate processes with Cyber ThreatIntelligence to ensure appropriate monitoring of the threat landscape for emerging security risks and ensure swift response to zero-day threats. Collaborating on Security Risk Management strategies … degree in computer science, Cybersecurity, Information Technology, or related field. Master's degree preferred. CRISC, CISM, CISA, CDPSE, or similar advanced security certifications. Advantageous to have experience in Artificial Intelligence, post quantum computing and cyber risk quantification. Considerable experience in cybersecurity, with notable experience in a senior or managerial role focused on security policy, standards, controls testing, governance, and More ❯
Implementation, Cyber Strategy, Cyber Risk Management, Data Privacy, Offensive Security, Security Architecture, and Cloud Security & Engineering. Lead the onboarding process for Managed Security Services including Managed Detection & Response, Cyber ThreatIntelligence, and Vulnerability Management Services. Collaborate with technical teams to ensure seamless integration of managed services within clients' environments. Build and maintain strong relationships with internal teams and … Implementation, Cyber Strategy, Cyber Risk Management, Data Privacy, Offensive Security, Security Architecture, and Cloud Security & Engineering. Lead the onboarding process for Managed Security Services including Managed Detection & Response, Cyber ThreatIntelligence, and Vulnerability Management Services. Collaborate with technical teams to ensure seamless integration of managed services within clients' environments. Build and maintain strong relationships with internal teams and More ❯
also serves as a technical authority within the team and department. What you'll need to succeed Security Operations & Incident Response Lead security operations services, including monitoring, incident response, threat management, and intrusion detection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery … efforts with internal teams and vendors. Establish and manage threatintelligence processes to ensure timely remediation of vulnerabilities. Monitor and analyse performance metrics to support security troubleshooting and continuous improvement. Identity & Access Management Provide expert technical leadership for identity and access management, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of … Qualifications Degree or equivalent industry certification. Professional certification in security/identity (e.g. CREST, GIAC). ITIL Foundation certification. Incident response certification preferred. Technical Knowledge Proficient in SIEM, EDR, threat detection, and vulnerability management. Solid understanding of network security (firewalls, segmentation, IDS/IPS). Experience with Windows, Mac, Linux environments and security tooling. Familiarity with public cloud platforms More ❯
also serves as a technical authority within the team and department. What you'll need to succeed Security Operations & Incident Response Lead security operations services, including monitoring, incident response, threat management, and intrusion detection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery … efforts with internal teams and vendors. Establish and manage threatintelligence processes to ensure timely remediation of vulnerabilities. Monitor and analyse performance metrics to support security troubleshooting and continuous improvement. Identity & Access Management Provide expert technical leadership for identity and access management, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of … Qualifications Degree or equivalent industry certification. Professional certification in security/identity (e.g. CREST, GIAC). ITIL Foundation certification. Incident response certification preferred. Technical Knowledge Proficient in SIEM, EDR, threat detection, and vulnerability management. Solid understanding of network security (firewalls, segmentation, IDS/IPS). Experience with Windows, Mac, Linux environments and security tooling. Familiarity with public cloud platforms More ❯
Management (SIEM) platforms and the configuration of our wider security tools are key. We are also seeking candidates with experience leveraging AI to enhance productivity and effectiveness. Key Deliverables: Threat Detection & Incident Response Leading investigation and analysis of security alerts to identify and promptly respond to security events. Leading the response to major cyber security incidents, collaborating with key … improving our security operations processes, escalation paths and playbooks. Leveraging AI capabilities to enhance the effectiveness of our security capabilities and your own productivity in the role. Consuming relevant threatintelligence to drive proactive action within the Cyber Security and wider IT environment. Indicative Performance Measures Mean time for business recovery to C1 (Highest criticality) level security incidents … and following common response frameworks. Experience within the gaming industry providing security operations support to game releases, game infrastructure monitoring and live game operations. Strong appreciation of the cyber threat landscape and attacker tactics, techniques and procedures. Experience developing operational processes and playbooks. Desirable Interpersonal Skills: Ability to remain composed and effective during high-pressure situations. Clear focus on More ❯
monitoring, logging, and compliance frameworks Excellent analytical skills and a keen eye for detail Strong written and verbal communication skills Desirable: An interest in or basic understanding of cyber threatintelligence, including how attackers operate and how to spot signs of compromise (e.g., suspicious files, unusual behaviour, or known attack patterns) Relevant cyber security or networking certifications (e.g. More ❯
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threatintelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM More ❯
Stone, Staffordshire, England, United Kingdom Hybrid / WFH Options
Oscar Technology
and triage security alerts from SIEM and EDR platforms. Investigate potential security incidents and escalate as needed. Analyse logs from various systems including firewalls, endpoints, and cloud environments. Support threatintelligence efforts by identifying indicators of compromise (IOCs). Document triage actions, observations, and escalations clearly and accurately. Assist in fine-tuning detection rules to reduce false positives More ❯
and allow for effective and efficient execution of business functions. 3. Provide effective leadership to identify, assess, and mitigate cybersecurity risks; exercise direct ownership of system monitoring and auditing, threatintelligence, vulnerability management, incident response, cybersecurity awareness, and other critical continuous monitoring processes. 4. Lead investigations of computer security violations and incidents, reporting as necessary to both the More ❯
United Kingdom, with a primary focus on cyber assurance, third-party risk management, and large-scale regulatory compliance audits. In this role, you will collaborate closely with our cyber threatintelligence, advisory, and response teams to expand our digital risk business. Your responsibility will include representing our global penetration testing team, overseeing the assessment of cybersecurity programs, ensuring More ❯
South Kensington, England, United Kingdom Hybrid / WFH Options
Control Risks
United Kingdom, with a primary focus on cyber assurance, third-party risk management, and large-scale regulatory compliance audits. In this role, you will collaborate closely with our cyber threatintelligence, advisory, and response teams to expand our digital risk business. Your responsibility will include representing our global penetration testing team, overseeing the assessment of cybersecurity programs, ensuring More ❯
Bath, Somerset, United Kingdom Hybrid / WFH Options
Bmt Defence Services LTD
Federation of Security Operations Centre (SOC)operations across two or more organisational environments such as enterprise, edge/deployed environments or cloud . Demonstrable knowledge of cyber detection (e.g., threat identification/intelligence, real-time monitoring, anomaly detection) and cyber response (e.g. incident response, eradication and remediation, recovery, post-incident analysis). DevSecOps. Zero Trust Architecture (ZTA) expertise More ❯