NCSC CTAS and CPA Assurance Schemes. Knowledge of working in secure environments (List X facilities) and accredited labs (ISO17025). Research and Development experience. ThreatIntelligence experience. To discuss this or wider Consulting roles with our recruitment team, all you need to do is apply, create a profile more »
a global cybersecurity leader that secures human progress with Secureworks® Taegis™, a SaaS-based, open XDR platform built on 20+ years of real-world threatintelligence and research, improving customers’ ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions. We enjoy competitive more »
within Cyber Security Operations Centre (CSOC) functions – essential. Experience of SIEM delivery, new platform or convergence – essential. Other security tool delivery e.g. CyberArk, EDR, ThreatIntelligence – desirable. Experience delivering global projects with 3rd parties Experience within the Pharma sector would be beneficial This contract sits Outside of IR35 more »
Employment Type: Contract
Rate: £700 - £800/day Up to £800 per day - Outside of IR35
Manchester Area, United Kingdom Hybrid / WFH Options
Searchability®
/Prevention/Documentation Responsibilities: Monitor SIEM Systems Identify and investigate security threats Responding to alerts Documentation Collaborating within an information security environment Proactive threatintelligence What We Offer: An opportunity to work within an innovative, and forward thinking information security team, addressing enterprise level security risks. Flexible more »
youll: Demonstrate your experience of managing a vulnerability assessment programme. Undertake internal testing to understand strengths and risks of NCCs IT security. Work with threatintelligence to identify risks and potential issues. Provide your insight and experience of working with SIEM tools. Have a good understanding of working more »
Kanban. * Coordinate operational activities' forecasting engaging with Office of CSO finance lead. REFINE * Own/Update S&I landing page (intranet); work with CEA, intelligence & resilience to optimise comms outreach and engagement with the supply chain. * Develop and maintain supply chain security comms list/process for CTI for … security incident response. * Develop and maintain the monthly reporting schedule: KPIs; KRIs; Resilience; Threatintelligence; security integration. * Draft technical SoWs, JDs or commercial proposals (incl Business Cases). EXECUTE * Oversee onboarding and offboarding knowledge transfer * Run/oversee engagement with the DS/other governance and business process more »
exposure to diverse industries and advanced security architectures, as you lead sophisticated simulated cyber-attacks against our globally renowned clients, employing the very latest threat actor tools and techniques. Work closely with top-tier security experts in our threatintelligence and incident response teams, strengthening your already more »
alerts to detect any abnormal or suspicious activities, conducting regular security assessments and risk evaluations. Remain updated on emerging cybersecurity threats and vulnerabilities, utilizing threatintelligence to enhance security measures. Prepare and deliver routine security reports to management and stakeholders, summarizing the organization's security posture, incidents encountered more »
range of information IT security technologies and embedded security; at the minimum knowledge must cover key cybersecurity domains such as Identity and Access Management, ThreatIntelligence, Risk Evaluation, Security Assessment/Testing, Incidence Management and Vendor/Cloud products assessment Experience carrying out IT Security Assessments I will more »
a global cybersecurity leader that secures human progress with Secureworks® Taegis™, a SaaS-based, open XDR platform built on 20+ years of real-world threatintelligence and research, improving customers’ ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions. We enjoy competitive more »
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Workday
a global cybersecurity leader that secures human progress with Secureworks® Taegis™, a SaaS-based, open XDR platform built on 20+ years of real-world threatintelligence and research, improving customers’ ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions. We enjoy competitive more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
Create and enhance a regular penetration testing programme for the red and purple teams that are in line with industry cyber threats and primary threat intelligence. • Create a Vulnerability Management procedure to guarantee that all security flaws and vulnerabilities that are known to exist are located, evaluated in context more »
teamIdentifying vulnerabilities, building exploits, developing reusable attack componentsWriting reports after each engagementTake ownership for mentoring, coaching and leading this new teamOperations will emulate real threat actors and target cutting-edge technology in Starling Bank’s platform as well as ranging across the endpoint estate. You will use emerging threatintelligence to inform and develop effective attacks.You will be an early member of the team and will take a lead role in shaping the growth and evolution of the team.RequirementsYou will have:Relevant certification (e.g. CSSAS, CSSAM, OSCP, OSCE, CRT, CCT, or similar)Significant Red Team experience and more »
UKI and EMEA Strategic/Enterprise Account Executive - Hunting/Net New Logo Regional Sales A Global Leader in ThreatIntelligence are looking for 2 London-based Strategic/Enterprise Account Executives. They work with half of the Fortune 100, most of the top 10 banks in the more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
have a broad remit ensuring high availability and performance, and currently have a particular focus on security system efficiency, monitoring and sustainability, looking at threatintelligence, IAM, data and application security across the Kubernetes and Linux based environments. They are very open to background, but tend to look more »
of enterprise security systems including shift rotations and hand-offs.Work closely with Managed Security Providers (MSP) to maintain runbooks, escalation procedures, and consume available threat intelligence.Utilize detective controls to develop rules and alerts to drive security monitoring.Perform hunt activities across our log aggregation and SIEM platforms.Recommend, test, tune and … Security Incident Response activities for the Firm’s environment.Enforce security policies and procedures by administering and monitoring appropriate systems, events and answering client queries.Perform threat and vulnerability management functions including vulnerability scans and/or analyze results of scans and assist with remediation as required.Collaborate with the Information Security more »
s largest networks with data centers in 102 cities worldwide.What you'll doTackling real world security problems that affect our customers, building & leveraging massive threatintelligence data, with the help of data science and machine learning, and finally building scalable & performant distributed software that runs on thousands of more »
program for the team to ensure the team is capable to respond to the latest cyber threats and attack methods.Collaborate with the SIEM and Threat Intel teams to effectively contribute to increasing security posture at the organisation.Provide mentorship, guidance and positive recognition to security analysts and team leads.Improve and … requirementsDemonstrable track record of leading cyber incident response efforts in multinational organisationExperience of leading and mentoring a security operations teamIn-depth knowledge of cyber threat landscape and the technics, tactics & procedures of advanced adversariesIn-depth knowledge of security technologies, tools, methodologies including SIEM, IDP/IPS, EDRExcellent communication and more »
program for the team to ensure the team is capable to respond to the latest cyber threats and attack methods.Collaborate with the SIEM and Threat Intel teams to effectively contribute to increasing security posture at the organisation.Provide mentorship, guidance and positive recognition to security analysts and team leads.Improve and … requirementsDemonstrable track record of leading cyber incident response efforts in multinational organisationExperience of leading and mentoring a security operations teamIn-depth knowledge of cyber threat landscape and the technics, tactics & procedures of advanced adversariesIn-depth knowledge of security technologies, tools, methodologies including SIEM, IDP/IPS, EDRExcellent communication and more »
Desired Key Skills: Experience responding to security tests and audits (Penetration Tests, Red/Purple Team) Designing and operating Incident Management Processes Experience with Threat Hunting & Threat Intelligence. The above is a wish list and not a list of imperatives; if you are missing one or more of more »
Desired Key Skills Experience responding to security tests and audits (Penetration Tests, Red/Purple Team) Designing and operating Incident Management Processes Experience with Threat Hunting & Threat Intelligence. The above is a wish list and not a list of imperatives; if you are missing one or more of more »