developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
Leatherhead, England, United Kingdom Hybrid / WFH Options
Zest
are essential in demonstrating our commitment to information security to our clients. Security Training: Deliver information security awareness training for all employees. Security Operations ThreatIntelligence: Stay abreast of the latest cybersecurity threats and trends to inform strategic security planning. Security Infrastructure: Oversee the installation and maintenance of more »
designing, developing, and maintaining our security information and event management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threat detection, incident response, and overall security posture. What you’ll be doing • Data Ingestion and Enrichment: o Configure Elasticsearch pipelines for data ingestion from … various sources, primarily from Kafka o Enhance data enrichment by integrating threatintelligence feeds and contextual information. • SIEM Solution Development: o Collaborate with security analysts and architects to design and implement SIEM solutions using Elasticsearch. o Optimize SIEM rules, alerts, and dashboards for efficient threat detection. • Query more »
audits, certifications, and provide consultancy support. Utilise automation to enhance security posture and response capabilities. Liaise with stakeholders to enforce network security policies. Utilise threatintelligence to proactively defend against threats. Mentor junior security professionals and support incident response. Qualifications/Skills Required: Bachelor’s degree in Computer more »
role as this vendor looks to expand their offerings across the UK and Central Europe. We are looking for someone with experience in cyber threatintelligence sales who has taken ownership of the entire sales process, from cradle to grave. We are looking to speak with problem solvers … business growth Your sales experience is from dealing with leading enterprise companies or organisations, communicating and closing deals with CISOs, CSOs, CIOs, Heads of Intelligence or equivalent level of seniority Positive, energetic and driven by achieving personal and company/team success You enjoy working in a fast-paced more »
of security tools such as SIEM, Firewalls and Cloud Security to monitor systems Providing Windows Server and Network Support Assess and respond to external threatintelligence reports Support ISO27001, Cyber Essentials Plus and other internal and external audit programme Implement and improve technical processes to create efficient and more »
City of London, London, United Kingdom Hybrid / WFH Options
Robert Half
tools for affirmative and non-affirmative coverages. The role includes responsibility for: Lead the gathering of information and analysis of material for insurance market intelligence, collaborating closely with the Senior Cyber Specialist Help deliver cyber training to our cyber insurance and cyber risk community. Monitor and maintain an understanding … governance forums for our community. Stakeholder management including regular communication measures appropriate for the target groups. Desired Skills: Ability to collect, analyse, and disseminate threatintelligence, both actionable and strategic Fundamental knowledge of cyber insurance At least three years' relevant professional experience Excellent Microsoft Office Skills, being able more »
point for Cyber Security across BAE Systems PLC’s global business, with members of the team working across GRC, Training and Awareness, Security Architecture, ThreatIntelligence and Incident Response.Why BAE Systems?This is a place where you’ll be able to make a real difference. You’ll be more »
teamIdentifying vulnerabilities, building exploits, developing reusable attack componentsWriting reports after each engagementTake ownership for mentoring, coaching and leading this new teamOperations will emulate real threat actors and target cutting-edge technology in Starling Bank’s platform as well as ranging across the endpoint estate. You will use emerging threatintelligence to inform and develop effective attacks.You will be an early member of the team and will take a lead role in shaping the growth and evolution of the team.RequirementsYou will have:Relevant certification (e.g. CSSAS, CSSAM, OSCP, OSCE, CRT, CCT, or similar)Significant Red Team experience and more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
have a broad remit ensuring high availability and performance, and currently have a particular focus on security system efficiency, monitoring and sustainability, looking at threatintelligence, IAM, data and application security across the Kubernetes and Linux based environments. They are very open to background, but tend to look more »
s largest networks with data centers in 102 cities worldwide.What you'll doTackling real world security problems that affect our customers, building & leveraging massive threatintelligence data, with the help of data science and machine learning, and finally building scalable & performant distributed software that runs on thousands of more »
forensic data and physical equipment Act as incident responder for potential incident identified Ability to work under pressure In-depth understanding of the cyber threat landscape and advances adversary tactics Conduct security assessments regularly to identify vulnerabilities and performing risk analysis. Analyse the breach to reach the root cause. … Monitoring/SOC documentation, processes and procedures and ensure currency. Skills and Experiences Ability to work under pressure In-depth understanding of the cyber threat landscape and advances adversary tactics The role requires an intermediate knowledge and experience of Linux; Windows; Azure; AWS; Elastic Stack; Tennable; Threat Intel more »
program for the team to ensure the team is capable to respond to the latest cyber threats and attack methods.Collaborate with the SIEM and Threat Intel teams to effectively contribute to increasing security posture at the organisation.Provide mentorship, guidance and positive recognition to security analysts and team leads.Improve and … requirementsDemonstrable track record of leading cyber incident response efforts in multinational organisationExperience of leading and mentoring a security operations teamIn-depth knowledge of cyber threat landscape and the technics, tactics & procedures of advanced adversariesIn-depth knowledge of security technologies, tools, methodologies including SIEM, IDP/IPS, EDRExcellent communication and more »
program for the team to ensure the team is capable to respond to the latest cyber threats and attack methods.Collaborate with the SIEM and Threat Intel teams to effectively contribute to increasing security posture at the organisation.Provide mentorship, guidance and positive recognition to security analysts and team leads.Improve and … requirementsDemonstrable track record of leading cyber incident response efforts in multinational organisationExperience of leading and mentoring a security operations teamIn-depth knowledge of cyber threat landscape and the technics, tactics & procedures of advanced adversariesIn-depth knowledge of security technologies, tools, methodologies including SIEM, IDP/IPS, EDRExcellent communication and more »
of enterprise security systems including shift rotations and hand-offs.Work closely with Managed Security Providers (MSP) to maintain runbooks, escalation procedures, and consume available threat intelligence.Utilize detective controls to develop rules and alerts to drive security monitoring.Perform hunt activities across our log aggregation and SIEM platforms.Recommend, test, tune and … Security Incident Response activities for the Firm’s environment.Enforce security policies and procedures by administering and monitoring appropriate systems, events and answering client queries.Perform threat and vulnerability management functions including vulnerability scans and/or analyze results of scans and assist with remediation as required.Collaborate with the Information Security more »
Harlow, London, United Kingdom Hybrid / WFH Options
Raytheon
Operations Centre. Main Duties Responding to requests from SOC to tune SIEM, IDS and associated tooling in an effective and timely manner. Working with threat management teams and liaising directly with Network and Data Centre teams to ensure Network architecture, Security Zone configuration and deployment of sensors and remediation … or Python. Experience of working in MOD and/or other regulated industries i.e. banking, telecommunications. Experience of use case development and implementation, leveraging threat intelligence. An understanding of designing and implementing secure systems to HMG security requirements. You will be a self-starter with the ability to prioritise more »
forensic data and physical equipment Act as incident responder for potential incident identified Ability to work under pressure In-depth understanding of the cyber threat landscape and advances adversary tactics Conduct security assessments regularly to identify vulnerabilities and performing risk analysis. Analyse the breach to reach the root cause. … Monitoring/SOC documentation, processes and procedures and ensure currency. Skills and Experiences Ability to work under pressure In-depth understanding of the cyber threat landscape and advances adversary tactics The role requires an intermediate knowledge and experience of Linux; Windows; Azure; AWS; Elastic Stack; Tennable; Threat Intel more »
Wrexham, Wales, United Kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
a key part in the Cyber/Information Security function. You will drive and enhance their current operational processes and contribute across Security Assurance, Threat Detection, Risk Management, CPSM & Threat Intelligence. Skills required: Control Frameworks & Industry Standards (ISO27001, 27002, GDPR, NIST) Security Operations Performance Tracking Data Security, Malware … Detection, Threat & Incident response For the right person this is a huge opportunity - considering the sustained growth that they're going through, this role has a dotted line to management or C suite positions. This is a 2 stage process - initial 30 minute chat and 60 minute formal interview. more »