Threat Analysis Jobs with Work from Home (WFH) Options

1 to 5 of 5 Threat Analysis Jobs with Hybrid or WFH Options

SOC Tier 2 Cybersecurity Analyst - SC Cleared

London, United Kingdom
Hybrid / WFH Options
People Source Consulting
triage security alerts escalated from Tier 1 SOC analysts, determine severity and potential impact of the incident, and follow the triage process until closure. *Threat Analysis: Conduct in-depth analysis of security events to identify malicious activities, tactics, techniques, and procedures used by threat actors. *Security … Security Tool Management: Managing and configuring security tools, specifically Microsoft Sentinel and the Microsoft Defender suite including Defender for Cloud and Microsoft 365 Defender. *Threat Intelligence: Utilizing threat intelligence feeds and sources to stay up-to-date with the latest threats and vulnerabilities. *Collaboration: Collaborating with other members … in Kusto Query Language (KQL). Experience with the creation, configuration and use of Playbooks, Notebooks and Workbooks. Strong understanding of advanced cybersecurity concepts, threat landscape, and attack methodologies. Demonstrated experience in conducting in-depth incident analysis, threat hunting, and forensic investigations. People Source Consulting Ltd is more »
Employment Type: Contract
Rate: £65 - £80/hour PAYE CONTRACT
Posted:

IT Security Engineer

Republic of Ireland
Hybrid / WFH Options
Reperio Human Capital
and dynamic analysis. - Conduct penetration tests to identify vulnerabilities in applications and infrastructure. - Develop and execute offensive security strategies to simulate real-world attacks. Threat Analysis & Incident Response: - Monitor and analyze security threats using advanced threat intelligence tools. - Lead incident response efforts to mitigate and resolve security … breaches. - Conduct root cause analysis and implement measures to prevent future incidents. Cloud Security (AWS): - Design and implement secure cloud infrastructure on AWS. - Ensure cloud services comply with security policies and standards. - Manage identity and access management (IAM) policies and practices in the cloud environment. Vulnerability Management: - Perform regular … of security frameworks such as NIST, ISO 27001, CIS, PCI-DSS. - Expertise in application security, penetration testing, and offensive security tactics. - Strong understanding of threat analysis, incident response, and root cause analysis. - Extensive experience with AWS cloud security, including IAM, VPC, and security groups. - Proficient in vulnerability scanning more »
Employment Type: Contract
Rate: £323 - £431/day
Posted:

Cyber Security Engineer

Cardiff, South Glamorgan, United Kingdom
Hybrid / WFH Options
yolk recruitment
security issues could arise, and provide guidance and support to customers. This is what you'll be doing: Identify patterns and tactics used by threat actors through threat analysis. Review and rectify misconfigurations and outdated rules in security tools. Conduct detailed threat analysis within the M365 … M365, EDR, firewalls, web security gateways, and email security gateways. Skilled in documentation and procedural writing. Experience using ticketing systems for task resolution. Certified Threat Intelligence Analyst (CTIA) certification or equivalent. Any experience with Threat Intelligence Platforms, SIEM systems, DMARC Compliance, MySQL and Clickhouse databases would be a more »
Employment Type: Permanent
Salary: £50000 - £60000/annum
Posted:

Lead Security Analyst

South West London, London, United Kingdom
Hybrid / WFH Options
Espire Infolabs Limited
mitigate risks. Incident Lifecycle Management: Overseeing incidents from the moment of detection, through the containment and eradication stages, to the final resolution. Post-Incident Analysis: Conducting detailed investigations post-incident to understand the root cause and to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on … the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating potential threats and vulnerabilities to ensure that the organization is prepared to defend against them. Strategic Defense Implementation: Putting in place robust security measures to protect the organization's information assets. Cross-Team Coordination … unified security strategy. This role demands a proactive mindset, deep technical expertise, and strong leadership skills to navigate the complex and ever-evolving cyber threat landscape. It's about being always prepared, constantly learning, and effectively communicating to maintain and enhance the organization's security posture. Tasks & Responsibilities Evaluate more »
Employment Type: Permanent, Work From Home
Posted:

Senior Security Engineer-Hybrid

Southampton, England, United Kingdom
Hybrid / WFH Options
LexisNexis Risk Solutions
analyze security events for anomalous activity Be able to identify emerging security threats and develop/implement security programs Able to conduct vulnerability assessments, threat analysis, and reporting. Experience/understanding of Cloud PlatformsAWS/GCP and Firewalls Possess a related credential for ethical hacking and security risk more »
Posted:
Threat Analysis
Work from Home
10th Percentile
£41,250
25th Percentile
£50,000
Median
£55,000
75th Percentile
£67,500