AdwordJob Title: SOC Threat hunting AnalystLocation: RemoteDuration: 04 months contractActive SC Clearance required Experience and knowledgeKey Responsibilities: Threat Detection Use Case Development: Design and implement detection logic aligned to specific threat scenarios, using industry frameworks such as MITRE ATT&CK. Maintain detection content throughout its lifecycle - from development and testing to deployment and tuning. Work with client Lead Ana
AdwordJob Title: SOC Threat hunting AnalystLocation: RemoteDuration: 04 months contractActive SC Clearance required Experience and knowledgeKey Responsibilities: Threat Detection Use Case Development: Design and implement detection logic aligned to specific threat scenarios, using industry frameworks such as MITRE ATT&CK. Maintain detection content throughout its lifecycle - from development and testing to deployment and tuning. Work with client Lead Ana
Role: SIEM Application EngineerType: Contract (3 Months)Location: Birmingham/Manchester, UK (Hybrid 3 days a week)Payrate: £450 - £550 per day INSIDE IR35 UmbrellaElastic Stack Mastery: 5+ years of cybersecurity engineering experience, specializing in the end-to-end delivery, optimization, and operation of the Elastic Stack (ELK), with a focus on Elastic Security.Detection & Compliance Expert: Proven ability to engineer high-fidelity detection rules based
Role: SIEM Application EngineerType: Contract (3 Months)Location: Birmingham/Manchester, UK (Hybrid 3 days a week)Payrate: £450 - £550 per day INSIDE IR35 UmbrellaElastic Stack Mastery: 5+ years of cybersecurity engineering experience, specializing in the end-to-end delivery, optimization, and operation of the Elastic Stack (ELK), with a focus on Elastic Security.Detection & Compliance Expert: Proven ability to engineer high-fidelity detection rules based
Job Description: Experienced developer with at least 3-5 years of experience. I will be looking for someone with good knowledge of scripting/programming with Python. This person will join our "AI and Automation team" within the Security Research departmentHere are the requirements and description for this position:Description:We are looking for a Mid-level Software Security Engineer to join our AI & Automation team within the Security Research department.
Job Description: Experienced developer with at least 3-5 years of experience. I will be looking for someone with good knowledge of scripting/programming with Python. This person will join our "AI and Automation team" within the Security Research departmentHere are the requirements and description for this position:Description:We are looking for a Mid-level Software Security Engineer to join our AI & Automation team within the Security Research department.
Required Skills (Must Have and should meet all the below standards for qualifying to this role)Prior experience on creating Design documents, Implementation/ Change Management Plans or optimisation reports (beyond day to day routine operations) is a must. Expertise in Implement &/or design (design is must for CE3 & CE4) of one of the following - Firewall, Identity solutions, Email Security, Web Security/Proxy, Cloud Security.Competent hands-on experience (
Required Skills (Must Have and should meet all the below standards for qualifying to this role)Prior experience on creating Design documents, Implementation/ Change Management Plans or optimisation reports (beyond day to day routine operations) is a must. Expertise in Implement &/or design (design is must for CE3 & CE4) of one of the following - Firewall, Identity solutions, Email Security, Web Security/Proxy, Cloud Security.Competent hands-on experience (
Job Title: Cyber Security Specialist (Threat Modelling Contract) Location: Birmingham (Hybrid, 3 days on-site) Contract: 3 - 6 MonthsWe are seeking an experienced Cyber Security Specialist for a 3 - 6 month hybrid contract in Birmingham. This role is focused on conducting comprehensive threat modelling and risk assessments on complex IT and telecommunications infrastructure. You will work with architecture teams to identify vulnerabilities, recommend mitig
Job Title: Cyber Security Specialist (Threat Modelling Contract) Location: Birmingham (Hybrid, 3 days on-site) Contract: 3 - 6 MonthsWe are seeking an experienced Cyber Security Specialist for a 3 - 6 month hybrid contract in Birmingham. This role is focused on conducting comprehensive threat modelling and risk assessments on complex IT and telecommunications infrastructure. You will work with architecture teams to identify vulnerabilities, recommend mitig
Job Title: Security Consulting LeadLocation: RemoteType of employment: 06 months contractActive ready to transfer SC Clearance Required Responsibilities: As a Security Lead, you will be responsible for:Leading the effort and teams to enable development and implementation of proprietary and innovative security solutions. Assess, manage, and ensure compliance to risk-reducing behaviours and processes. Expected to be an SME, collaborate and manage the team
Job Title: Security Consulting LeadLocation: RemoteType of employment: 06 months contractActive ready to transfer SC Clearance Required Responsibilities: As a Security Lead, you will be responsible for:Leading the effort and teams to enable development and implementation of proprietary and innovative security solutions. Assess, manage, and ensure compliance to risk-reducing behaviours and processes. Expected to be an SME, collaborate and manage the team
Job Description: Experienced developer with at least 3-5 years of experience. I will be looking for someone with good knowledge of scripting/programming with Python. This person will join our "AI and Automation team" within the Security Research departmentHere are the requirements and description for this position:Description:We are looking for a Mid-level Software Security Engineer to join our AI & Automation team within the Security Research department.
Job Description: Experienced developer with at least 3-5 years of experience. I will be looking for someone with good knowledge of scripting/programming with Python. This person will join our "AI and Automation team" within the Security Research departmentHere are the requirements and description for this position:Description:We are looking for a Mid-level Software Security Engineer to join our AI & Automation team within the Security Research department.
Required Skills (Must Have and should meet all the below standards for qualifying to this role)Prior experience on creating Design documents, Implementation/ Change Management Plans or optimisation reports (beyond day to day routine operations) is a must. Expertise in Implement &/or design (design is must for CE3 & CE4) of one of the following - Firewall, Identity solutions, Email Security, Web Security/Proxy, Cloud Security.Competent hands-on experience (
Required Skills (Must Have and should meet all the below standards for qualifying to this role)Prior experience on creating Design documents, Implementation/ Change Management Plans or optimisation reports (beyond day to day routine operations) is a must. Expertise in Implement &/or design (design is must for CE3 & CE4) of one of the following - Firewall, Identity solutions, Email Security, Web Security/Proxy, Cloud Security.Competent hands-on experience (
Job Description:Engage in evaluations, proof-of-concept activities, design, build and implementation of cybersecurity solutions, specializing in network security (such as Network Access Control, Zero Trust Network Access (ZTNA), SecureAccess Service Edge (SASE), IPS etc.), other perimeter protection tools with minimal supervision and guidance.Perform core operational cyber-security functions such as co-managing security controls ranging from endpoint secur
Job Description:Engage in evaluations, proof-of-concept activities, design, build and implementation of cybersecurity solutions, specializing in network security (such as Network Access Control, Zero Trust Network Access (ZTNA), SecureAccess Service Edge (SASE), IPS etc.), other perimeter protection tools with minimal supervision and guidance.Perform core operational cyber-security functions such as co-managing security controls ranging from endpoint secur