ThreatIntelligence Specialist 6 months £540 per day (Inside IR35) 5 Days per week in Reading My client in the telecommunications industry are looking for a ThreatIntelligence Specialist to join their fast-paced team on an initial 6 month contract. The role will be fully … on site in Reading so a local candidate will be most ideal. Responsibilities in the role; Identify information security and ThreatIntelligence requirements and oversight of delivery by: Identifying business unit Priority Intelligence Requirements that enable the business unit to conduct its business continuously in a secure … manner. Analysis of information across Strategic, Operational and Tactical arenas into actionable intelligence that allows stakeholders to make informed decisions. Ensuring delivery of the ThreatIntelligence programme within the business unit, delivery of services and products provided by Group Security. Where services are delivered by external providers more »
Portsmouth, Hampshire, United Kingdom Hybrid / WFH Options
J & C Associates Ltd
investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system security according to latest threatintelligence and evolving trends. Participate in root cause analysis of incidents in conjunction with engineers across the enterprise. Provide Subject Matter Expertise (SME more »
high-performing team as a Senior Analyst in Vulnerability Management & Security Testing. This role offers the unique opportunity to enhance a best-in-class Threat Defence capability and make significant contributions to our security operations. Ideal candidates will bring a strong background in threat management, vulnerability assessment, and … knowledge of Exabeam, Tenable.io and Tenable.sc would be considered a positive Proficient in incident management and response, with a deep understanding of cyber-attacks, threat vectors, and risk management. Knowledge of various operating systems (Windows, Linux, Unix), cloud security concepts, applications, and databases. Excellent skills in report preparation, dashboards … and documentation. Strong communication, leadership, and stakeholder management abilities. Preferred Qualifications: Experience developing and delivering strategies in cyber threat defence and vulnerability management. Awareness of regulatory compliance requirements such as GDPR. Familiarity with threatintelligence sources and their application in practical contexts. more »
Benefits + Bonuses Lead cross-functional post-incident process reviews to identify and implement continuous improvement initiatives. Partner with Legal, 2LoD, Major Incident Management, Threat Management, Vulnerability Management, Attack Surface Reduction, Software Engineering, Security Architecture, Platform Support both locally and globally. You will have experience in: Leading the response … management or risk management within an enterprise environment. Self-motivated interest in the latest cyber security threats and vulnerabilities and is able to integrate threatintelligence into incident response strategies to proactively defend against emerging risks. Nice to have would be: Deep technical knowledge of network fundamentals, common more »
SC clearance with UK-eyes only caveat. Enterprise Security Architectures (SABSA, MODAF). Desirable: DV Clearance. Knowledge of Quantum Cryptography & Quantum Key management. Current threatintelligence awareness. Knowledge of NATO security policy, risk management and Accreditation. Understanding of the role of advisory boards within the UK Government or more »
The main responsibilities are set around, monitoring, compliance, security engagement, and detection/response.Role:· Assist in the design, implementation, and maintenance of security measures.Develop threatintelligence capabilitiesProvide a strong level consultancy when it comes to engineering security solutions.· Provide input for architecture plans with consideration of current standards. more »
Leatherhead, England, United Kingdom Hybrid / WFH Options
Zest
are essential in demonstrating our commitment to information security to our clients. Security Training: Deliver information security awareness training for all employees. Security Operations ThreatIntelligence: Stay abreast of the latest cybersecurity threats and trends to inform strategic security planning. Security Infrastructure: Oversee the installation and maintenance of more »
role as this vendor looks to expand their offerings across the UK and Central Europe. We are looking for someone with experience in cyber threatintelligence sales who has taken ownership of the entire sales process, from cradle to grave.We are looking to speak with problem solvers and … to business growthYour sales experience is from dealing with leading enterprise companies or organisations, communicating and closing deals with CISOs, CSOs, CIOs, Heads of Intelligence or equivalent level of seniorityPositive, energetic and driven by achieving personal and company/team successYou enjoy working in a fast-paced, entrepreneurial environment more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
issuesSecurity & Best PracticeWorking with various other Security personnelMitigating Information and Cyber based risks Identifying potential threats and risksAssisting with resolution of incidentsIncident response and threat huntingWorking with threat management frameworksThreat intelligence and continuous improvementSecurity monitoring and traffic analysisVulnerability management You will advise on Security best practices, and … cover 7am-7pm on a shift basis to ensure that full coverage is achieved.The ideal candidate will have:Incident response and security monitoringUnderstanding of threat modellingInvestigation experience into Information and Cyber security incidentsBroad technical understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware more »