Protective Intelligence Analyst - Locations: London, United Kingdom; Mountain View, California; New York City, New York; San Francisco, California; Washington, D.C. While candidates in the listed location(s) are encouraged for this role, candidates in other locations will be considered. Mission At Databricks, we build tools that help organizations unlock the power of AI and big data-securely, responsibly, and at scale. Our Corporate Security & Investigations team is at the heart of this mission, proactively protecting our people, assets, and operations so our teams can focus on innovation with confidence. We're looking for a Protective Intelligence Analyst to join our growing Corporate Security team. In this role, you'll track and analyze potential physical security threats from open source intelligence (OSINT), social media, and the dark web, while staying ahead of emerging geopolitical developments that may impact our work. Your insights will drive security measures, protect our people and executives, and strengthen our global risk posture. Key Responsibilities Monitor and analyze OSINT streams, social media, and dark web sources to identify potential credible threats and inform decision making across Databricks. Conduct persons of interest (POI) investigations to assess severity, recommend countermeasures, and safeguard executives and at risk personnel. Perform end to end risk based intelligence assessments for people, operations, and assets. Build and maintain protocols for monitoring travel risks, advising business travelers and executives, and responding to critical incidents affecting personnel on the move. Collaborate with Corporate Security, Legal, People teams, and other cross functional partners to respond to emerging threats. Prepare concise, high impact intelligence briefings and reports for leadership and stakeholders. Analyze geopolitical trends and world events to proactively identify risks to our business, offices, and personnel. Use advanced analytical tools and technologies to enhance the speed and accuracy of your assessments. Maintain and evolve protective intelligence protocols, methodologies, and best practices. Build trusted intelligence sharing networks across the company and with external partners. Required Qualifications Bachelor's degree in Criminal Justice, Cybersecurity, or a related field (or equivalent experience), along with 5+ years of experience in investigations, protective intelligence, geopolitical analysis or executive protection. Deep knowledge of OSINT research techniques, corporate security protocols, risk assessment, and the intelligence cycle. Proficiency with analytical tools, including OSINT monitoring tools, threat detection, and case management software. Familiarity with the ASIS PCI investigative and/or ATAP threat assessment frameworks. Demonstrated ability performing geopolitical analysis, and converting that into actionable intelligence for decisionmakers. Proven ability to distill complex information into clear and actionable insights for diverse audiences-technical teams, senior leaders, and external partners. Exceptional problem solving skills and adaptability in fast changing environments. Comfort working independently or within a small, distributed team. Proven record of managing or mentoring contingent workers, third party security resources, or cross functional teams involved in intelligence gathering and risk mitigation. Availability to work flexible hours, including nights and weekends, to respond to urgent security events. High integrity, professionalism, and the ability to handle sensitive or confidential matters with discretion. Active U.S. or U.K. security clearance or the ability to obtain one preferred. Pay Range Transparency Databricks is committed to fair and equitable compensation practices. The pay range for this role is listed below and represents the expected salary range for non commissionable roles or on target earnings for commissionable roles. Zone 1 Pay Range $167,700 - $234,750 USD Zone 2 Pay Range $150,900 - $211,275 USD About Databricks Databricks is the data and AI company. More than 10,000 organizations worldwide - including Comcast, Condé Nast, Grammarly, and over 50% of the Fortune 500 - rely on the Databricks Data Intelligence Platform to unify and democratize data, analytics and AI. Databricks is headquartered in San Francisco, with offices around the globe and was founded by the original creators of Lakehouse, Apache Spark , Delta Lake and MLflow. Benefits At Databricks, we strive to provide comprehensive benefits and perks that meet the needs of all of our employees. For specific details on the benefits offered in your region, please visit Our Commitment to Diversity and Inclusion At Databricks, we are committed to fostering a diverse and inclusive culture where everyone can excel. We take great care to ensure that our hiring practices are inclusive and meet equal employment opportunity standards. Individuals looking for employment at Databricks are considered without regard to age, color, disability, ethnicity, family or marital status, gender identity or expression, language, national origin, physical and mental ability, political affiliation, race, religion, sexual orientation, socio economic status, veteran status, and other protected characteristics. Compliance If access to export controlled technology or source code is required for performance of job duties, it is within Employer's discretion whether to apply for a U.S. government license for such positions, and Employer may decline to proceed with an applicant on this basis alone.
Dec 07, 2025
Full time
Protective Intelligence Analyst - Locations: London, United Kingdom; Mountain View, California; New York City, New York; San Francisco, California; Washington, D.C. While candidates in the listed location(s) are encouraged for this role, candidates in other locations will be considered. Mission At Databricks, we build tools that help organizations unlock the power of AI and big data-securely, responsibly, and at scale. Our Corporate Security & Investigations team is at the heart of this mission, proactively protecting our people, assets, and operations so our teams can focus on innovation with confidence. We're looking for a Protective Intelligence Analyst to join our growing Corporate Security team. In this role, you'll track and analyze potential physical security threats from open source intelligence (OSINT), social media, and the dark web, while staying ahead of emerging geopolitical developments that may impact our work. Your insights will drive security measures, protect our people and executives, and strengthen our global risk posture. Key Responsibilities Monitor and analyze OSINT streams, social media, and dark web sources to identify potential credible threats and inform decision making across Databricks. Conduct persons of interest (POI) investigations to assess severity, recommend countermeasures, and safeguard executives and at risk personnel. Perform end to end risk based intelligence assessments for people, operations, and assets. Build and maintain protocols for monitoring travel risks, advising business travelers and executives, and responding to critical incidents affecting personnel on the move. Collaborate with Corporate Security, Legal, People teams, and other cross functional partners to respond to emerging threats. Prepare concise, high impact intelligence briefings and reports for leadership and stakeholders. Analyze geopolitical trends and world events to proactively identify risks to our business, offices, and personnel. Use advanced analytical tools and technologies to enhance the speed and accuracy of your assessments. Maintain and evolve protective intelligence protocols, methodologies, and best practices. Build trusted intelligence sharing networks across the company and with external partners. Required Qualifications Bachelor's degree in Criminal Justice, Cybersecurity, or a related field (or equivalent experience), along with 5+ years of experience in investigations, protective intelligence, geopolitical analysis or executive protection. Deep knowledge of OSINT research techniques, corporate security protocols, risk assessment, and the intelligence cycle. Proficiency with analytical tools, including OSINT monitoring tools, threat detection, and case management software. Familiarity with the ASIS PCI investigative and/or ATAP threat assessment frameworks. Demonstrated ability performing geopolitical analysis, and converting that into actionable intelligence for decisionmakers. Proven ability to distill complex information into clear and actionable insights for diverse audiences-technical teams, senior leaders, and external partners. Exceptional problem solving skills and adaptability in fast changing environments. Comfort working independently or within a small, distributed team. Proven record of managing or mentoring contingent workers, third party security resources, or cross functional teams involved in intelligence gathering and risk mitigation. Availability to work flexible hours, including nights and weekends, to respond to urgent security events. High integrity, professionalism, and the ability to handle sensitive or confidential matters with discretion. Active U.S. or U.K. security clearance or the ability to obtain one preferred. Pay Range Transparency Databricks is committed to fair and equitable compensation practices. The pay range for this role is listed below and represents the expected salary range for non commissionable roles or on target earnings for commissionable roles. Zone 1 Pay Range $167,700 - $234,750 USD Zone 2 Pay Range $150,900 - $211,275 USD About Databricks Databricks is the data and AI company. More than 10,000 organizations worldwide - including Comcast, Condé Nast, Grammarly, and over 50% of the Fortune 500 - rely on the Databricks Data Intelligence Platform to unify and democratize data, analytics and AI. Databricks is headquartered in San Francisco, with offices around the globe and was founded by the original creators of Lakehouse, Apache Spark , Delta Lake and MLflow. Benefits At Databricks, we strive to provide comprehensive benefits and perks that meet the needs of all of our employees. For specific details on the benefits offered in your region, please visit Our Commitment to Diversity and Inclusion At Databricks, we are committed to fostering a diverse and inclusive culture where everyone can excel. We take great care to ensure that our hiring practices are inclusive and meet equal employment opportunity standards. Individuals looking for employment at Databricks are considered without regard to age, color, disability, ethnicity, family or marital status, gender identity or expression, language, national origin, physical and mental ability, political affiliation, race, religion, sexual orientation, socio economic status, veteran status, and other protected characteristics. Compliance If access to export controlled technology or source code is required for performance of job duties, it is within Employer's discretion whether to apply for a U.S. government license for such positions, and Employer may decline to proceed with an applicant on this basis alone.
Senior Strategic Cyber Threat Intelligence Analyst About us We are SecAlliance, part of CSIS Security Group and the Allurity family of cybersecurity companies Together, we form one of Europe's most trusted networks of cybersecurity experts. At SecAlliance, we deliver world-class cyber and conventional intelligence solutions across the UK and Europe. Our clients include financial institutions, governments, and critical national infrastructure organisations. We're a small but fast-growing team with a strong sense of purpose - to provide the highest quality intelligence while keeping the human touch at the heart of what we do. We make Intelligence Human! Why SecAlliance We offer more than just a job - we offer the chance to shape the future of cyber intelligence. You'll join a diverse, inclusive, and collaborative team where every voice is valued. Our culture encourages innovation, agility, and continuous learning. And as part of the Allurity Group, you'll benefit from the strength of a wider European cybersecurity network while working in a close-knit, supportive environment. If you are someone who enjoys building relationships, thrives on collaboration, and brings a positive, proactive approach to your work, you will feel right at home here. About the role UK applicants only, no sponsorships Location: London, UK Duration: Permanent, full-time role Job Brief We are looking for an individual with at least three years of operational experience as a CTI analyst who is familiar with the process of researching, writing and editing CTI reporting for a broad range of audiences. Experience mapping and tracking threat actor campaigns, and / or deploying structured analytical techniques would be highly advantageous. Your responsibilities Collecting and processing cyber threat intelligence relevant to our client base. Producing high-quality intelligence reporting (both written and spoken), tailored to our clients' requirements. Liaising with clients to ensure that their intelligence requirements are fully met. Undertaking quality assurance and peer review of other analysts' work, providing feedback and guidance as appropriate. Providing mentoring, training and guidance to other analysts within the organisation. Deputising for the Strategic Intelligence Lead when required. Identifying and implementing mechanisms to improve the quality and timeliness of our intelligence outputs, and the smooth running of the organisation. Our Requirements The ability to write accessible, accurate and informative cyber threat intelligence reports. The ability to confidently present spoken intelligence briefings. Excellent critical thinking skills. The ability to write accurate, insightful and 'actionable' assessments. Excellent knowledge of intelligence processes and analytical techniques. A good understanding of the: Potential range of sources for cyber threat intelligence reporting, and how such information can be obtained. Current geopolitical themes, and how they relate to the cyber threat landscape. Full spectrum of cyber threat actors, with some knowledge of capability and intent of individual APT groups. Cybercrime groups, their operations, modus operandi and infrastructure. Strong interpersonal and stakeholder skills. A strong work ethic, with a pro active, results oriented approach to problem solving. Holding the CREST Registered Threat Intelligence Analyst (CRTIA) or a similar qualification would be advantageous but is not essential. Language skills, whilst not essential, would be advantageous. What we offer Career growth opportunities within the Allurity Group, a leading European cybersecurity platform A dynamic, international, and growth focused environment ibility around hybrid (majority remote) working 25 days annual leave, in addition to bank holidays Enrolment in NEST Pension Scheme If you're interested in joining our team, send a covering letter describing your suitability, CV, salary expectations, availability and let us know why you think you're a good fit. No agencies please. Security Alliance Limited, One Canada Square, Canary Wharf, London, E14 5AA United Kingdom Security Alliance B.V. Zuid-Hollandlaan 7, 2596AL, The Hague, The Netherlands Security Alliance is a member of the Allurity family.
Dec 07, 2025
Full time
Senior Strategic Cyber Threat Intelligence Analyst About us We are SecAlliance, part of CSIS Security Group and the Allurity family of cybersecurity companies Together, we form one of Europe's most trusted networks of cybersecurity experts. At SecAlliance, we deliver world-class cyber and conventional intelligence solutions across the UK and Europe. Our clients include financial institutions, governments, and critical national infrastructure organisations. We're a small but fast-growing team with a strong sense of purpose - to provide the highest quality intelligence while keeping the human touch at the heart of what we do. We make Intelligence Human! Why SecAlliance We offer more than just a job - we offer the chance to shape the future of cyber intelligence. You'll join a diverse, inclusive, and collaborative team where every voice is valued. Our culture encourages innovation, agility, and continuous learning. And as part of the Allurity Group, you'll benefit from the strength of a wider European cybersecurity network while working in a close-knit, supportive environment. If you are someone who enjoys building relationships, thrives on collaboration, and brings a positive, proactive approach to your work, you will feel right at home here. About the role UK applicants only, no sponsorships Location: London, UK Duration: Permanent, full-time role Job Brief We are looking for an individual with at least three years of operational experience as a CTI analyst who is familiar with the process of researching, writing and editing CTI reporting for a broad range of audiences. Experience mapping and tracking threat actor campaigns, and / or deploying structured analytical techniques would be highly advantageous. Your responsibilities Collecting and processing cyber threat intelligence relevant to our client base. Producing high-quality intelligence reporting (both written and spoken), tailored to our clients' requirements. Liaising with clients to ensure that their intelligence requirements are fully met. Undertaking quality assurance and peer review of other analysts' work, providing feedback and guidance as appropriate. Providing mentoring, training and guidance to other analysts within the organisation. Deputising for the Strategic Intelligence Lead when required. Identifying and implementing mechanisms to improve the quality and timeliness of our intelligence outputs, and the smooth running of the organisation. Our Requirements The ability to write accessible, accurate and informative cyber threat intelligence reports. The ability to confidently present spoken intelligence briefings. Excellent critical thinking skills. The ability to write accurate, insightful and 'actionable' assessments. Excellent knowledge of intelligence processes and analytical techniques. A good understanding of the: Potential range of sources for cyber threat intelligence reporting, and how such information can be obtained. Current geopolitical themes, and how they relate to the cyber threat landscape. Full spectrum of cyber threat actors, with some knowledge of capability and intent of individual APT groups. Cybercrime groups, their operations, modus operandi and infrastructure. Strong interpersonal and stakeholder skills. A strong work ethic, with a pro active, results oriented approach to problem solving. Holding the CREST Registered Threat Intelligence Analyst (CRTIA) or a similar qualification would be advantageous but is not essential. Language skills, whilst not essential, would be advantageous. What we offer Career growth opportunities within the Allurity Group, a leading European cybersecurity platform A dynamic, international, and growth focused environment ibility around hybrid (majority remote) working 25 days annual leave, in addition to bank holidays Enrolment in NEST Pension Scheme If you're interested in joining our team, send a covering letter describing your suitability, CV, salary expectations, availability and let us know why you think you're a good fit. No agencies please. Security Alliance Limited, One Canada Square, Canary Wharf, London, E14 5AA United Kingdom Security Alliance B.V. Zuid-Hollandlaan 7, 2596AL, The Hague, The Netherlands Security Alliance is a member of the Allurity family.
Do you want join the UK's largest and fastest growing Technology Solutions Provider? Do you love FinOps and want to join a hugely successful, incredible team? Join our Asset Intelligence team The Asset Intelligence team provides a range of proactive services to assist clients with managing their estate and software procurement. Success. The Softcat Way. Softcat is a £1billion+ technology solutions business and trusted partner to names like Apple, Microsoft and Adobe. Offering a growing portfolio of services including software licensing, cyber security and IT infrastructure, we give our technical teams the tools and support to make exciting things happen. This is where to achieve more for your career. Do you want to make change happen by joining a team that never stands still? As a Cloud Intelligence Analyst, you will be expected to proactively support clients within the Cloud Intelligence Service (CIS) to analyse, optimise and manage their Cloud estate. As Cloud Intelligence Analyst, you'll be responsible for: Forming trusted advisor relationships with key CIS clients Utilising industry leading cloud optimisation solution (CloudHealth) to proactively manage clients Cloud estate Performing end to end technical onboarding of clients Cloud estate into the CloudHealth platform Providing detailed reporting as part of a scheduled service Identifying cost savings and infrastructure optimisation opportunities in clients public cloud environments Providing ad hoc support to all clients. Resolve all service requests that are logged by CIS clients What we need from you Ideally, you will have knowledge of Cloud Infrastructure and terminology Knowledge of AWS and Azure technology You will also be expected to have, or work towards the CloudHealth vendor certification Previous experience either in presenting or hold excellent communication skills Confident using Microsoft applications such as Excel, Word, PowerPoint etc Industry certifications in AWS and/or Azure We also acknowledge that the confidence gap and imposter syndrome are a real thing and can get in the way of us meeting fantastic talent, so please don't hesitate to apply - we would love to hear from you! Work in a way that works for you We recognise that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Hybrid working Working flexible hours - flexing the times you start and finish during the day Flexibility around school pick up and drop offs Working with us Wherever you work, we want you to experience the freedom and autonomy to realise your potential. You will feel supported by a team that celebrates individuality, encourages different perspectives, and embraces every background. Join us To become part of the success story, please apply now. If you have a disability or neurodiversity, we can provide support or adjustments that you may need throughout our recruitment process or any mitigating circumstance you wish for us to consider. Any information you share on your application will be treated in confidence. You can find out more about life at Softcat and our commitments to diversity and inclusion at Here at Softcat, we don't prohibit the use of AI (artificial intelligence) in our application process, as we understand how far it can go to creating a truly equitable candidate experience. That being said, as a culture-driven organisation, we believe that the genuine essence of each person is what truly matters, so we highly encourage you to be as authentically you as possible when submitting your application to showcase your true and whole self.
Dec 07, 2025
Full time
Do you want join the UK's largest and fastest growing Technology Solutions Provider? Do you love FinOps and want to join a hugely successful, incredible team? Join our Asset Intelligence team The Asset Intelligence team provides a range of proactive services to assist clients with managing their estate and software procurement. Success. The Softcat Way. Softcat is a £1billion+ technology solutions business and trusted partner to names like Apple, Microsoft and Adobe. Offering a growing portfolio of services including software licensing, cyber security and IT infrastructure, we give our technical teams the tools and support to make exciting things happen. This is where to achieve more for your career. Do you want to make change happen by joining a team that never stands still? As a Cloud Intelligence Analyst, you will be expected to proactively support clients within the Cloud Intelligence Service (CIS) to analyse, optimise and manage their Cloud estate. As Cloud Intelligence Analyst, you'll be responsible for: Forming trusted advisor relationships with key CIS clients Utilising industry leading cloud optimisation solution (CloudHealth) to proactively manage clients Cloud estate Performing end to end technical onboarding of clients Cloud estate into the CloudHealth platform Providing detailed reporting as part of a scheduled service Identifying cost savings and infrastructure optimisation opportunities in clients public cloud environments Providing ad hoc support to all clients. Resolve all service requests that are logged by CIS clients What we need from you Ideally, you will have knowledge of Cloud Infrastructure and terminology Knowledge of AWS and Azure technology You will also be expected to have, or work towards the CloudHealth vendor certification Previous experience either in presenting or hold excellent communication skills Confident using Microsoft applications such as Excel, Word, PowerPoint etc Industry certifications in AWS and/or Azure We also acknowledge that the confidence gap and imposter syndrome are a real thing and can get in the way of us meeting fantastic talent, so please don't hesitate to apply - we would love to hear from you! Work in a way that works for you We recognise that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Hybrid working Working flexible hours - flexing the times you start and finish during the day Flexibility around school pick up and drop offs Working with us Wherever you work, we want you to experience the freedom and autonomy to realise your potential. You will feel supported by a team that celebrates individuality, encourages different perspectives, and embraces every background. Join us To become part of the success story, please apply now. If you have a disability or neurodiversity, we can provide support or adjustments that you may need throughout our recruitment process or any mitigating circumstance you wish for us to consider. Any information you share on your application will be treated in confidence. You can find out more about life at Softcat and our commitments to diversity and inclusion at Here at Softcat, we don't prohibit the use of AI (artificial intelligence) in our application process, as we understand how far it can go to creating a truly equitable candidate experience. That being said, as a culture-driven organisation, we believe that the genuine essence of each person is what truly matters, so we highly encourage you to be as authentically you as possible when submitting your application to showcase your true and whole self.
Do you want join the UK's largest and fastest growing Technology Solutions Provider? Do you love FinOps and want to join a hugely successful, incredible team? Join our Asset Intelligence team The Asset Intelligence team provides a range of proactive services to assist clients with managing their estate and software procurement. Success. The Softcat Way. Softcat is a £1billion+ technology solutions business and trusted partner to names like Apple, Microsoft and Adobe. Offering a growing portfolio of services including software licensing, cyber security and IT infrastructure, we give our technical teams the tools and support to make exciting things happen. This is where to achieve more for your career. Do you want to make change happen by joining a team that never stands still? As a Cloud Intelligence Analyst, you will be expected to proactively support clients within the Cloud Intelligence Service (CIS) to analyse, optimise and manage their Cloud estate. As Cloud Intelligence Analyst, you'll be responsible for: Forming trusted advisor relationships with key CIS clients Utilising industry leading cloud optimisation solution (CloudHealth) to proactively manage clients Cloud estate Performing end to end technical onboarding of clients Cloud estate into the CloudHealth platform Providing detailed reporting as part of a scheduled service Identifying cost savings and infrastructure optimisation opportunities in clients public cloud environments Providing ad hoc support to all clients. Resolve all service requests that are logged by CIS clients What we need from you Ideally, you will have knowledge of Cloud Infrastructure and terminology Knowledge of AWS and Azure technology You will also be expected to have, or work towards the CloudHealth vendor certification Previous experience either in presenting or hold excellent communication skills Confident using Microsoft applications such as Excel, Word, PowerPoint etc Industry certifications in AWS and/or Azure We also acknowledge that the confidence gap and imposter syndrome are a real thing and can get in the way of us meeting fantastic talent, so please don't hesitate to apply - we would love to hear from you! Work in a way that works for you We recognise that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Hybrid working Working flexible hours - flexing the times you start and finish during the day Flexibility around school pick up and drop offs Working with us Wherever you work, we want you to experience the freedom and autonomy to realise your potential. You will feel supported by a team that celebrates individuality, encourages different perspectives, and embraces every background. Join us To become part of the success story, please apply now. If you have a disability or neurodiversity, we can provide support or adjustments that you may need throughout our recruitment process or any mitigating circumstance you wish for us to consider. Any information you share on your application will be treated in confidence. You can find out more about life at Softcat and our commitments to diversity and inclusion at Here at Softcat, we don't prohibit the use of AI (artificial intelligence) in our application process, as we understand how far it can go to creating a truly equitable candidate experience. That being said, as a culture-driven organisation, we believe that the genuine essence of each person is what truly matters, so we highly encourage you to be as authentically you as possible when submitting your application to showcase your true and whole self.
Dec 07, 2025
Full time
Do you want join the UK's largest and fastest growing Technology Solutions Provider? Do you love FinOps and want to join a hugely successful, incredible team? Join our Asset Intelligence team The Asset Intelligence team provides a range of proactive services to assist clients with managing their estate and software procurement. Success. The Softcat Way. Softcat is a £1billion+ technology solutions business and trusted partner to names like Apple, Microsoft and Adobe. Offering a growing portfolio of services including software licensing, cyber security and IT infrastructure, we give our technical teams the tools and support to make exciting things happen. This is where to achieve more for your career. Do you want to make change happen by joining a team that never stands still? As a Cloud Intelligence Analyst, you will be expected to proactively support clients within the Cloud Intelligence Service (CIS) to analyse, optimise and manage their Cloud estate. As Cloud Intelligence Analyst, you'll be responsible for: Forming trusted advisor relationships with key CIS clients Utilising industry leading cloud optimisation solution (CloudHealth) to proactively manage clients Cloud estate Performing end to end technical onboarding of clients Cloud estate into the CloudHealth platform Providing detailed reporting as part of a scheduled service Identifying cost savings and infrastructure optimisation opportunities in clients public cloud environments Providing ad hoc support to all clients. Resolve all service requests that are logged by CIS clients What we need from you Ideally, you will have knowledge of Cloud Infrastructure and terminology Knowledge of AWS and Azure technology You will also be expected to have, or work towards the CloudHealth vendor certification Previous experience either in presenting or hold excellent communication skills Confident using Microsoft applications such as Excel, Word, PowerPoint etc Industry certifications in AWS and/or Azure We also acknowledge that the confidence gap and imposter syndrome are a real thing and can get in the way of us meeting fantastic talent, so please don't hesitate to apply - we would love to hear from you! Work in a way that works for you We recognise that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Hybrid working Working flexible hours - flexing the times you start and finish during the day Flexibility around school pick up and drop offs Working with us Wherever you work, we want you to experience the freedom and autonomy to realise your potential. You will feel supported by a team that celebrates individuality, encourages different perspectives, and embraces every background. Join us To become part of the success story, please apply now. If you have a disability or neurodiversity, we can provide support or adjustments that you may need throughout our recruitment process or any mitigating circumstance you wish for us to consider. Any information you share on your application will be treated in confidence. You can find out more about life at Softcat and our commitments to diversity and inclusion at Here at Softcat, we don't prohibit the use of AI (artificial intelligence) in our application process, as we understand how far it can go to creating a truly equitable candidate experience. That being said, as a culture-driven organisation, we believe that the genuine essence of each person is what truly matters, so we highly encourage you to be as authentically you as possible when submitting your application to showcase your true and whole self.
What You'll Be Working On: ️ Gathering, analyzing, and disseminating threat intelligence from multiple sources to identify emerging cyber threats ️ Identifying attack patterns, trends, and vulnerabilities to inform defensive strategies ️ Collaborating with internal teams to enhance incident response and improve threat detection capabilities ️ Producing detailed threat reports, including indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs) ️ Supporting vulnerability management and assisting with the development of security posture recommendations What We're Looking For: ️ Proven experience as a Threat Intelligence Analyst or in a similar role within cybersecurity ️ Strong knowledge of threat intelligence platforms (TIPs), open-source intelligence (OSINT), and malware analysis ️ Familiarity with cybersecurity frameworks (e.g., MITRE ATT&CK, STIX, TAXII) ️ Experience in analyzing cyber threats, including advanced persistent threats (APTs), ransomware, and phishing attacks ️ Certifications such as GCIH, CTIA, or equivalent are highly desirable Ready to make a real impact on cyber defense?
Dec 07, 2025
Full time
What You'll Be Working On: ️ Gathering, analyzing, and disseminating threat intelligence from multiple sources to identify emerging cyber threats ️ Identifying attack patterns, trends, and vulnerabilities to inform defensive strategies ️ Collaborating with internal teams to enhance incident response and improve threat detection capabilities ️ Producing detailed threat reports, including indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs) ️ Supporting vulnerability management and assisting with the development of security posture recommendations What We're Looking For: ️ Proven experience as a Threat Intelligence Analyst or in a similar role within cybersecurity ️ Strong knowledge of threat intelligence platforms (TIPs), open-source intelligence (OSINT), and malware analysis ️ Familiarity with cybersecurity frameworks (e.g., MITRE ATT&CK, STIX, TAXII) ️ Experience in analyzing cyber threats, including advanced persistent threats (APTs), ransomware, and phishing attacks ️ Certifications such as GCIH, CTIA, or equivalent are highly desirable Ready to make a real impact on cyber defense?
Do you want join the UK's largest and fastest growing Technology Solutions Provider? Do you love FinOps and want to join a hugely successful, incredible team? Join our Asset Intelligence team The Asset Intelligence team provides a range of proactive services to assist clients with managing their estate and software procurement. Success. The Softcat Way. Softcat is a £1billion+ technology solutions business and trusted partner to names like Apple, Microsoft and Adobe. Offering a growing portfolio of services including software licensing, cyber security and IT infrastructure, we give our technical teams the tools and support to make exciting things happen. This is where to achieve more for your career. Do you want to make change happen by joining a team that never stands still? As a Cloud Intelligence Analyst, you will be expected to proactively support clients within the Cloud Intelligence Service (CIS) to analyse, optimise and manage their Cloud estate. As Cloud Intelligence Analyst, you'll be responsible for: Forming trusted advisor relationships with key CIS clients Utilising industry leading cloud optimisation solution (CloudHealth) to proactively manage clients Cloud estate Performing end to end technical onboarding of clients Cloud estate into the CloudHealth platform Providing detailed reporting as part of a scheduled service Identifying cost savings and infrastructure optimisation opportunities in clients public cloud environments Providing ad hoc support to all clients. Resolve all service requests that are logged by CIS clients What we need from you Ideally, you will have knowledge of Cloud Infrastructure and terminology Knowledge of AWS and Azure technology You will also be expected to have, or work towards the CloudHealth vendor certification Previous experience either in presenting or hold excellent communication skills Confident using Microsoft applications such as Excel, Word, PowerPoint etc Industry certifications in AWS and/or Azure We also acknowledge that the confidence gap and imposter syndrome are a real thing and can get in the way of us meeting fantastic talent, so please don't hesitate to apply - we would love to hear from you! Work in a way that works for you We recognise that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Hybrid working Working flexible hours - flexing the times you start and finish during the day Flexibility around school pick up and drop offs Working with us Wherever you work, we want you to experience the freedom and autonomy to realise your potential. You will feel supported by a team that celebrates individuality, encourages different perspectives, and embraces every background. Join us To become part of the success story, please apply now. If you have a disability or neurodiversity, we can provide support or adjustments that you may need throughout our recruitment process or any mitigating circumstance you wish for us to consider. Any information you share on your application will be treated in confidence. You can find out more about life at Softcat and our commitments to diversity and inclusion at Here at Softcat, we don't prohibit the use of AI (artificial intelligence) in our application process, as we understand how far it can go to creating a truly equitable candidate experience. That being said, as a culture-driven organisation, we believe that the genuine essence of each person is what truly matters, so we highly encourage you to be as authentically you as possible when submitting your application to showcase your true and whole self.
Dec 07, 2025
Full time
Do you want join the UK's largest and fastest growing Technology Solutions Provider? Do you love FinOps and want to join a hugely successful, incredible team? Join our Asset Intelligence team The Asset Intelligence team provides a range of proactive services to assist clients with managing their estate and software procurement. Success. The Softcat Way. Softcat is a £1billion+ technology solutions business and trusted partner to names like Apple, Microsoft and Adobe. Offering a growing portfolio of services including software licensing, cyber security and IT infrastructure, we give our technical teams the tools and support to make exciting things happen. This is where to achieve more for your career. Do you want to make change happen by joining a team that never stands still? As a Cloud Intelligence Analyst, you will be expected to proactively support clients within the Cloud Intelligence Service (CIS) to analyse, optimise and manage their Cloud estate. As Cloud Intelligence Analyst, you'll be responsible for: Forming trusted advisor relationships with key CIS clients Utilising industry leading cloud optimisation solution (CloudHealth) to proactively manage clients Cloud estate Performing end to end technical onboarding of clients Cloud estate into the CloudHealth platform Providing detailed reporting as part of a scheduled service Identifying cost savings and infrastructure optimisation opportunities in clients public cloud environments Providing ad hoc support to all clients. Resolve all service requests that are logged by CIS clients What we need from you Ideally, you will have knowledge of Cloud Infrastructure and terminology Knowledge of AWS and Azure technology You will also be expected to have, or work towards the CloudHealth vendor certification Previous experience either in presenting or hold excellent communication skills Confident using Microsoft applications such as Excel, Word, PowerPoint etc Industry certifications in AWS and/or Azure We also acknowledge that the confidence gap and imposter syndrome are a real thing and can get in the way of us meeting fantastic talent, so please don't hesitate to apply - we would love to hear from you! Work in a way that works for you We recognise that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Hybrid working Working flexible hours - flexing the times you start and finish during the day Flexibility around school pick up and drop offs Working with us Wherever you work, we want you to experience the freedom and autonomy to realise your potential. You will feel supported by a team that celebrates individuality, encourages different perspectives, and embraces every background. Join us To become part of the success story, please apply now. If you have a disability or neurodiversity, we can provide support or adjustments that you may need throughout our recruitment process or any mitigating circumstance you wish for us to consider. Any information you share on your application will be treated in confidence. You can find out more about life at Softcat and our commitments to diversity and inclusion at Here at Softcat, we don't prohibit the use of AI (artificial intelligence) in our application process, as we understand how far it can go to creating a truly equitable candidate experience. That being said, as a culture-driven organisation, we believe that the genuine essence of each person is what truly matters, so we highly encourage you to be as authentically you as possible when submitting your application to showcase your true and whole self.
Do you want join the UK's largest and fastest growing Technology Solutions Provider? Do you love FinOps and want to join a hugely successful, incredible team? Join our Asset Intelligence team The Asset Intelligence team provides a range of proactive services to assist clients with managing their estate and software procurement. Success. The Softcat Way. Softcat is a £1billion+ technology solutions business and trusted partner to names like Apple, Microsoft and Adobe. Offering a growing portfolio of services including software licensing, cyber security and IT infrastructure, we give our technical teams the tools and support to make exciting things happen. This is where to achieve more for your career. Do you want to make change happen by joining a team that never stands still? As a Cloud Intelligence Analyst, you will be expected to proactively support clients within the Cloud Intelligence Service (CIS) to analyse, optimise and manage their Cloud estate. As Cloud Intelligence Analyst, you'll be responsible for: Forming trusted advisor relationships with key CIS clients Utilising industry leading cloud optimisation solution (CloudHealth) to proactively manage clients Cloud estate Performing end to end technical onboarding of clients Cloud estate into the CloudHealth platform Providing detailed reporting as part of a scheduled service Identifying cost savings and infrastructure optimisation opportunities in clients public cloud environments Providing ad hoc support to all clients. Resolve all service requests that are logged by CIS clients What we need from you Ideally, you will have knowledge of Cloud Infrastructure and terminology Knowledge of AWS and Azure technology You will also be expected to have, or work towards the CloudHealth vendor certification Previous experience either in presenting or hold excellent communication skills Confident using Microsoft applications such as Excel, Word, PowerPoint etc Industry certifications in AWS and/or Azure We also acknowledge that the confidence gap and imposter syndrome are a real thing and can get in the way of us meeting fantastic talent, so please don't hesitate to apply - we would love to hear from you! Work in a way that works for you We recognise that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Hybrid working Working flexible hours - flexing the times you start and finish during the day Flexibility around school pick up and drop offs Working with us Wherever you work, we want you to experience the freedom and autonomy to realise your potential. You will feel supported by a team that celebrates individuality, encourages different perspectives, and embraces every background. Join us To become part of the success story, please apply now. If you have a disability or neurodiversity, we can provide support or adjustments that you may need throughout our recruitment process or any mitigating circumstance you wish for us to consider. Any information you share on your application will be treated in confidence. You can find out more about life at Softcat and our commitments to diversity and inclusion at Here at Softcat, we don't prohibit the use of AI (artificial intelligence) in our application process, as we understand how far it can go to creating a truly equitable candidate experience. That being said, as a culture-driven organisation, we believe that the genuine essence of each person is what truly matters, so we highly encourage you to be as authentically you as possible when submitting your application to showcase your true and whole self.
Dec 07, 2025
Full time
Do you want join the UK's largest and fastest growing Technology Solutions Provider? Do you love FinOps and want to join a hugely successful, incredible team? Join our Asset Intelligence team The Asset Intelligence team provides a range of proactive services to assist clients with managing their estate and software procurement. Success. The Softcat Way. Softcat is a £1billion+ technology solutions business and trusted partner to names like Apple, Microsoft and Adobe. Offering a growing portfolio of services including software licensing, cyber security and IT infrastructure, we give our technical teams the tools and support to make exciting things happen. This is where to achieve more for your career. Do you want to make change happen by joining a team that never stands still? As a Cloud Intelligence Analyst, you will be expected to proactively support clients within the Cloud Intelligence Service (CIS) to analyse, optimise and manage their Cloud estate. As Cloud Intelligence Analyst, you'll be responsible for: Forming trusted advisor relationships with key CIS clients Utilising industry leading cloud optimisation solution (CloudHealth) to proactively manage clients Cloud estate Performing end to end technical onboarding of clients Cloud estate into the CloudHealth platform Providing detailed reporting as part of a scheduled service Identifying cost savings and infrastructure optimisation opportunities in clients public cloud environments Providing ad hoc support to all clients. Resolve all service requests that are logged by CIS clients What we need from you Ideally, you will have knowledge of Cloud Infrastructure and terminology Knowledge of AWS and Azure technology You will also be expected to have, or work towards the CloudHealth vendor certification Previous experience either in presenting or hold excellent communication skills Confident using Microsoft applications such as Excel, Word, PowerPoint etc Industry certifications in AWS and/or Azure We also acknowledge that the confidence gap and imposter syndrome are a real thing and can get in the way of us meeting fantastic talent, so please don't hesitate to apply - we would love to hear from you! Work in a way that works for you We recognise that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Hybrid working Working flexible hours - flexing the times you start and finish during the day Flexibility around school pick up and drop offs Working with us Wherever you work, we want you to experience the freedom and autonomy to realise your potential. You will feel supported by a team that celebrates individuality, encourages different perspectives, and embraces every background. Join us To become part of the success story, please apply now. If you have a disability or neurodiversity, we can provide support or adjustments that you may need throughout our recruitment process or any mitigating circumstance you wish for us to consider. Any information you share on your application will be treated in confidence. You can find out more about life at Softcat and our commitments to diversity and inclusion at Here at Softcat, we don't prohibit the use of AI (artificial intelligence) in our application process, as we understand how far it can go to creating a truly equitable candidate experience. That being said, as a culture-driven organisation, we believe that the genuine essence of each person is what truly matters, so we highly encourage you to be as authentically you as possible when submitting your application to showcase your true and whole self.
IP House is a platform company backed by a prominent growth-oriented private equity firm, to create a global, technology-enabled services firm providing meaningful IP enforcement outcomes to multinational brands, in partnership with government and law enforcement agencies around the world. We are a fast-growing and entrepreneurial environment, which requires innovative, creative and novel solutions. Ready to shape the future of intelligence? Join IPH UK Holdings Ltd as a Senior Intelligence Analyst and use your expertise to disrupt illicit trade and protect global brands. What You'll Do You will play a vital role in supporting our Intelligence & Investigations team by producing actionable, high-quality intelligence that drives strategic and operational decisions. From assessing risks and threats to influencing investigative direction, your insights will make a tangible difference. Key Responsibilities Create advanced intelligence products that guide investigations and strategy. Analyse complex data sets to identify patterns, threats, and opportunities. Deliver professional, timely reports that exceed client expectations. Re-evaluate intelligence to ensure ongoing relevance and accuracy. Collaborate across the team and support business development efforts. What You'll Bring 3-5 years' experience as an Intelligence Analyst. Proven skills in OSINT, SOCMINT, and digital investigations. Familiarity with tools like i2 Analyst's Notebook, Maltego, etc. Excellent communication, critical thinking, and data interpretation skills. Understanding of relevant legal frameworks (IP, data protection). Knowledge of cybercrime, social media security risks, and emerging technologies, with experience exploiting digital intelligence sources. Familiarity with darknet environments and the role they play in illicit trade is advantageous. 2 days WFH On-site parking Opportunity to work in a dynamic, purpose-driven team Why IP House Our vision is to solidify IP House as the global end-to-end solution, empowering multinational corporations to effectively prevent and combat illicit trade and IP theft. Only through the collaboration of our uniquely skilled employees and under the strategic leadership of our Executive Team will such a lofty goal be realized. We recognize our people drive everything we accomplish, and as such, we are dedicated to investing in our employees fostering a culture of continuous learning, growth, and excellence. Our team works hard, and we recognize the importance of taking care of our own. We offer a comprehensive suite of benefit offerings to support the health, well-being, and financial health of our employees and their families. Our robust benefits package underscores our commitment to our people, our most important asset. IP house seeks excellence through diversity in its staff. We prohibit discrimination based on race, color, religion, sex, age, national origin, sexual orientation, gender identity or expression, disability, veteran status, or marital status.
Dec 06, 2025
Full time
IP House is a platform company backed by a prominent growth-oriented private equity firm, to create a global, technology-enabled services firm providing meaningful IP enforcement outcomes to multinational brands, in partnership with government and law enforcement agencies around the world. We are a fast-growing and entrepreneurial environment, which requires innovative, creative and novel solutions. Ready to shape the future of intelligence? Join IPH UK Holdings Ltd as a Senior Intelligence Analyst and use your expertise to disrupt illicit trade and protect global brands. What You'll Do You will play a vital role in supporting our Intelligence & Investigations team by producing actionable, high-quality intelligence that drives strategic and operational decisions. From assessing risks and threats to influencing investigative direction, your insights will make a tangible difference. Key Responsibilities Create advanced intelligence products that guide investigations and strategy. Analyse complex data sets to identify patterns, threats, and opportunities. Deliver professional, timely reports that exceed client expectations. Re-evaluate intelligence to ensure ongoing relevance and accuracy. Collaborate across the team and support business development efforts. What You'll Bring 3-5 years' experience as an Intelligence Analyst. Proven skills in OSINT, SOCMINT, and digital investigations. Familiarity with tools like i2 Analyst's Notebook, Maltego, etc. Excellent communication, critical thinking, and data interpretation skills. Understanding of relevant legal frameworks (IP, data protection). Knowledge of cybercrime, social media security risks, and emerging technologies, with experience exploiting digital intelligence sources. Familiarity with darknet environments and the role they play in illicit trade is advantageous. 2 days WFH On-site parking Opportunity to work in a dynamic, purpose-driven team Why IP House Our vision is to solidify IP House as the global end-to-end solution, empowering multinational corporations to effectively prevent and combat illicit trade and IP theft. Only through the collaboration of our uniquely skilled employees and under the strategic leadership of our Executive Team will such a lofty goal be realized. We recognize our people drive everything we accomplish, and as such, we are dedicated to investing in our employees fostering a culture of continuous learning, growth, and excellence. Our team works hard, and we recognize the importance of taking care of our own. We offer a comprehensive suite of benefit offerings to support the health, well-being, and financial health of our employees and their families. Our robust benefits package underscores our commitment to our people, our most important asset. IP house seeks excellence through diversity in its staff. We prohibit discrimination based on race, color, religion, sex, age, national origin, sexual orientation, gender identity or expression, disability, veteran status, or marital status.
Insight Investment are looking for a Cyber Defence Specialist to join our Cyber Security team. This role will maintain the Sentinel Threat Detection capability for Insight's bespoke application. The successful candidate will maintain and optimise the Microsoft Sentinel platform, ensuring its stability, performance, and integration with other security tools, as well as developing use cases for the SOC team. Alongside this, the candidate will support the 24/7 SOC team, providing incident response, and continuously improving detection and automation capabilities. Role Responsibilities Maintain and optimise the Microsoft Sentinel environment, including configuration, performance tuning, and health monitoring. Onboard new data sources, connectors, and log streams to support evolving security requirements. Develop and enhance analytics rules, workbooks, and playbooks to improve detection and response. Monitor security alerts alongside the 24/7 SOC team, providing advanced analysis and escalation support. Troubleshoot and resolve issues related to Sentinel ingestion, queries, and automation workflows. Collaborate with SOC analysts, application and development teams, security engineers and security architects to ensure effective threat detection and incident response. Document configurations, processes, and improvements for operational continuity. Experience Required Experience developing, testing and implementing use cases/detection rules for the Sentinel SIEM environment. Strong hands on experience with Microsoft Sentinel and related Azure security services. Proficiency in Kusto Query Language (KQL) for creating and tuning detection rules and dashboards. Solid understanding of SIEM concepts, log ingestion, and security monitoring practices. Experience with incident response workflows and SOC operations. Ability to work collaboratively with development, engineering and monitoring teams. Excellent problem solving and communication skills. Advantageous Experience with SOAR automation and playbook development. Familiarity with cloud security monitoring across Azure, AWS, or GCP. Knowledge of MITRE ATT&CK framework and threat detection methodologies. Exposure to compliance driven environments and security best practices. Relevant certifications (e.g., SC-200, AZ-500, Security+). About Insight Investment Insight Investment is a leading asset manager focused on designing investment solutions to meet its clients' needs. Founded in 2002, Insight's collaborative approach has delivered both investment performance and growth in assets under management. Insight manages assets across its core liability driven investment, risk management, full spectre fixed income, currency and absolute return capabilities. Insight has a global network of operations in the UK, Ireland, Germany, US, Japan and Australia. More information about Insight Investment can be found at:
Dec 05, 2025
Full time
Insight Investment are looking for a Cyber Defence Specialist to join our Cyber Security team. This role will maintain the Sentinel Threat Detection capability for Insight's bespoke application. The successful candidate will maintain and optimise the Microsoft Sentinel platform, ensuring its stability, performance, and integration with other security tools, as well as developing use cases for the SOC team. Alongside this, the candidate will support the 24/7 SOC team, providing incident response, and continuously improving detection and automation capabilities. Role Responsibilities Maintain and optimise the Microsoft Sentinel environment, including configuration, performance tuning, and health monitoring. Onboard new data sources, connectors, and log streams to support evolving security requirements. Develop and enhance analytics rules, workbooks, and playbooks to improve detection and response. Monitor security alerts alongside the 24/7 SOC team, providing advanced analysis and escalation support. Troubleshoot and resolve issues related to Sentinel ingestion, queries, and automation workflows. Collaborate with SOC analysts, application and development teams, security engineers and security architects to ensure effective threat detection and incident response. Document configurations, processes, and improvements for operational continuity. Experience Required Experience developing, testing and implementing use cases/detection rules for the Sentinel SIEM environment. Strong hands on experience with Microsoft Sentinel and related Azure security services. Proficiency in Kusto Query Language (KQL) for creating and tuning detection rules and dashboards. Solid understanding of SIEM concepts, log ingestion, and security monitoring practices. Experience with incident response workflows and SOC operations. Ability to work collaboratively with development, engineering and monitoring teams. Excellent problem solving and communication skills. Advantageous Experience with SOAR automation and playbook development. Familiarity with cloud security monitoring across Azure, AWS, or GCP. Knowledge of MITRE ATT&CK framework and threat detection methodologies. Exposure to compliance driven environments and security best practices. Relevant certifications (e.g., SC-200, AZ-500, Security+). About Insight Investment Insight Investment is a leading asset manager focused on designing investment solutions to meet its clients' needs. Founded in 2002, Insight's collaborative approach has delivered both investment performance and growth in assets under management. Insight manages assets across its core liability driven investment, risk management, full spectre fixed income, currency and absolute return capabilities. Insight has a global network of operations in the UK, Ireland, Germany, US, Japan and Australia. More information about Insight Investment can be found at:
Overview Description Cyber Defence Analyst Location: Farnborough on a 12-hour, 4 days on, 4 days off day and night shift pattern The Role: Leidos, a Global IT Solutions Provider specialising in large scale implementations involving science, engineering, and technology, requires a Cyber Defence Analyst to work in its CSOC (Cyber Security Operations Centre) Team. The Cyber Defence Analyst will contribute to the growth and development of the CSOC. You will work with a wide variety of stakeholders to ensure the Leidos CSOC, a Defensive Cyber Security capability, can support a customer's Cyber Resilience, protecting them with a 24 x 7 Threat Detection and Response service, mitigating risk of Cyber Attack. The successful candidate will have CSOC experience or demonstrate sufficient transferable Cyber Security knowledge, qualifications, aptitude, and passion to quickly learn the Cyber Defence Analyst role. To succeed, the candidate must be capable of working under pressure, delivering on multiple customer accounts, and have an appetite to progress and develop their Cyber Security career. The role operates within a matrix managed environment, reporting operationally to the CSOC Lead and accountable to the CSOC Manager. What will I be doing? Maintain the integrity and security of Cyber Security systems and networks. Support Cyber Security initiatives through predictive and reactive analysis, articulating emerging trends to leadership and staff. Use data from Cyber Defence tools (firewalls, IDS, network traffic, UEBA, SOAR, etc.) to analyse events within the environment. Respond to and correlate alerts from detective and preventative tools such as SIEM, EPP, EDR, XDR, WAF, and Firewalls. Proactively detect suspicious activity, vulnerabilities, and misconfigurations before they can be exploited, protecting Confidentiality, Integrity and Availability. Inspect and correlate logs from multiple sources to identify repeating patterns and Indicators of Compromise (IOC). Continuously scan the Threat Horizon to classify Threats by impact on a client's network or solution. Engage with security communities to review and share knowledge on IOC's and Threats. Follow and develop the Cyber Security Incident Response Process and Playbooks. Apply Cyber Security Incident Prioritisation Criteria to classify and rate Incidents. Define and coordinate countermeasures to mitigate Threats and support action plans in response to Incidents. Ensure confidentiality and discretion when dealing with multiple clients. Run Vulnerability Assessment tools to measure compliance with security updates and patches. Contribute as a team member performing multiple daily CSOC checks to detect and respond to suspicious activity or alerts. Record events and actions during a Cyber Security Incident accurately to enable effective handovers during shift changes. Continuously improve CSOC processes and collaborate with stakeholders from other technology stacks to contribute to Incident Response. Perform tabletop scenarios and derive lessons learned. What does Leidos need from me? Experience of Sentinel, Microsoft XDR and Microsoft Defender variants, and Elastic Security, or aptitude to learn SIEM technologies. Experience and knowledge of SIEM tools, Cyber Security Incident Response, Vulnerability Management and Cyber Threat Intelligence. Experience investigating Cyber Security incidents and supporting root cause analysis or transferable skills to learn and excel. Understanding of the Confidentiality, Integrity, and Availability (CIA) triad. Understanding of trends for malware, ransomware and Advanced Persistent Threats affecting Cloud and On-Premises solutions. Experience working within Change Controlled environments. Understanding of the OSI 7 network layers and TCP/IP networking. Understanding of network and boundary protection controls for Cloud and On-Premises solutions, including Firewalls, ACLs, NSGs, DDoS Protection, VPNs, Mail Gateways, Web Proxies, Load Balancers, WAFs, IPS, and IDS. Communication and Soft Skills Good verbal and written communication for handovers, reports, and documenting events during Incidents. Positive, collaborative, and self-motivated with the ability to work with minimal supervision. Ability to build strong relationships with customers and internal stakeholders. Analytical thinking with the ability to plan and remediate problems. Ability to track market trends and stay at the forefront of Cyber Security Technology. Ability to manage multiple work streams, prioritise, and escalate as necessary. Initiative-taker with the drive to see solutions through to completion. Agility and flexibility to cover shifts at short notice to ensure CSOC protection for customers. Desirable Exposure to working on or within HM Government classified systems or programs. Clearance Requirements Due to the nature of the work, candidates must be British and non-dual nationals. Candidates must be eligible to hold DV clearance. Clearance to start role: SC. What we do for you At Leidos we are passionate about customer success, united as a team and inspired to make a difference. We offer meaningful and engaging careers, a collaborative culture, and support for your career goals, while nurturing a healthy work-life balance. We provide an employment package that attracts, develops and retains top talent. Our reward scheme includes: contributory pension, private medical insurance, 33 days annual leave (including holidays), and access to Flexible benefits (life assurance, health schemes, gym memberships, annual buy/sell holidays, cycle to work). Flexi-Time Working Commitment to Diversity We welcome applications from all parts of the community and are committed to a diverse and inclusive culture. If you have a disability or need reasonable adjustments during the application and selection stages, please let us know and we will respond appropriately. Who We Are Leidos UK & Europe - we work to make the world safer, healthier, and more efficient through technology, engineering and science. Leidos is a growing company delivering innovative technology and solutions focused on safeguarding critical capabilities and transformation in defence, healthcare, government, safety and security, and transportation. What Makes Us Different: Purpose, Collaboration, and People. We offer flexible work arrangements to enable you to perform your role effectively, whether from home, office, or customer sites. Come break things (in a good way). Then build them smarter. We solve high-stakes problems with code and a healthy disregard for "how it's always been done." Pay Range £36,700.00 - £45,900.00
Dec 05, 2025
Full time
Overview Description Cyber Defence Analyst Location: Farnborough on a 12-hour, 4 days on, 4 days off day and night shift pattern The Role: Leidos, a Global IT Solutions Provider specialising in large scale implementations involving science, engineering, and technology, requires a Cyber Defence Analyst to work in its CSOC (Cyber Security Operations Centre) Team. The Cyber Defence Analyst will contribute to the growth and development of the CSOC. You will work with a wide variety of stakeholders to ensure the Leidos CSOC, a Defensive Cyber Security capability, can support a customer's Cyber Resilience, protecting them with a 24 x 7 Threat Detection and Response service, mitigating risk of Cyber Attack. The successful candidate will have CSOC experience or demonstrate sufficient transferable Cyber Security knowledge, qualifications, aptitude, and passion to quickly learn the Cyber Defence Analyst role. To succeed, the candidate must be capable of working under pressure, delivering on multiple customer accounts, and have an appetite to progress and develop their Cyber Security career. The role operates within a matrix managed environment, reporting operationally to the CSOC Lead and accountable to the CSOC Manager. What will I be doing? Maintain the integrity and security of Cyber Security systems and networks. Support Cyber Security initiatives through predictive and reactive analysis, articulating emerging trends to leadership and staff. Use data from Cyber Defence tools (firewalls, IDS, network traffic, UEBA, SOAR, etc.) to analyse events within the environment. Respond to and correlate alerts from detective and preventative tools such as SIEM, EPP, EDR, XDR, WAF, and Firewalls. Proactively detect suspicious activity, vulnerabilities, and misconfigurations before they can be exploited, protecting Confidentiality, Integrity and Availability. Inspect and correlate logs from multiple sources to identify repeating patterns and Indicators of Compromise (IOC). Continuously scan the Threat Horizon to classify Threats by impact on a client's network or solution. Engage with security communities to review and share knowledge on IOC's and Threats. Follow and develop the Cyber Security Incident Response Process and Playbooks. Apply Cyber Security Incident Prioritisation Criteria to classify and rate Incidents. Define and coordinate countermeasures to mitigate Threats and support action plans in response to Incidents. Ensure confidentiality and discretion when dealing with multiple clients. Run Vulnerability Assessment tools to measure compliance with security updates and patches. Contribute as a team member performing multiple daily CSOC checks to detect and respond to suspicious activity or alerts. Record events and actions during a Cyber Security Incident accurately to enable effective handovers during shift changes. Continuously improve CSOC processes and collaborate with stakeholders from other technology stacks to contribute to Incident Response. Perform tabletop scenarios and derive lessons learned. What does Leidos need from me? Experience of Sentinel, Microsoft XDR and Microsoft Defender variants, and Elastic Security, or aptitude to learn SIEM technologies. Experience and knowledge of SIEM tools, Cyber Security Incident Response, Vulnerability Management and Cyber Threat Intelligence. Experience investigating Cyber Security incidents and supporting root cause analysis or transferable skills to learn and excel. Understanding of the Confidentiality, Integrity, and Availability (CIA) triad. Understanding of trends for malware, ransomware and Advanced Persistent Threats affecting Cloud and On-Premises solutions. Experience working within Change Controlled environments. Understanding of the OSI 7 network layers and TCP/IP networking. Understanding of network and boundary protection controls for Cloud and On-Premises solutions, including Firewalls, ACLs, NSGs, DDoS Protection, VPNs, Mail Gateways, Web Proxies, Load Balancers, WAFs, IPS, and IDS. Communication and Soft Skills Good verbal and written communication for handovers, reports, and documenting events during Incidents. Positive, collaborative, and self-motivated with the ability to work with minimal supervision. Ability to build strong relationships with customers and internal stakeholders. Analytical thinking with the ability to plan and remediate problems. Ability to track market trends and stay at the forefront of Cyber Security Technology. Ability to manage multiple work streams, prioritise, and escalate as necessary. Initiative-taker with the drive to see solutions through to completion. Agility and flexibility to cover shifts at short notice to ensure CSOC protection for customers. Desirable Exposure to working on or within HM Government classified systems or programs. Clearance Requirements Due to the nature of the work, candidates must be British and non-dual nationals. Candidates must be eligible to hold DV clearance. Clearance to start role: SC. What we do for you At Leidos we are passionate about customer success, united as a team and inspired to make a difference. We offer meaningful and engaging careers, a collaborative culture, and support for your career goals, while nurturing a healthy work-life balance. We provide an employment package that attracts, develops and retains top talent. Our reward scheme includes: contributory pension, private medical insurance, 33 days annual leave (including holidays), and access to Flexible benefits (life assurance, health schemes, gym memberships, annual buy/sell holidays, cycle to work). Flexi-Time Working Commitment to Diversity We welcome applications from all parts of the community and are committed to a diverse and inclusive culture. If you have a disability or need reasonable adjustments during the application and selection stages, please let us know and we will respond appropriately. Who We Are Leidos UK & Europe - we work to make the world safer, healthier, and more efficient through technology, engineering and science. Leidos is a growing company delivering innovative technology and solutions focused on safeguarding critical capabilities and transformation in defence, healthcare, government, safety and security, and transportation. What Makes Us Different: Purpose, Collaboration, and People. We offer flexible work arrangements to enable you to perform your role effectively, whether from home, office, or customer sites. Come break things (in a good way). Then build them smarter. We solve high-stakes problems with code and a healthy disregard for "how it's always been done." Pay Range £36,700.00 - £45,900.00
A leading asset management firm in Greater London is seeking a Senior Cyber Defence Operations Analyst to lead incident response and vulnerability management efforts. The role includes maintaining alerts in the monitoring solution, coordinating with stakeholders for compliance, and enhancing operational security processes. Candidates should have a strong background in incident response, knowledge of SIEM tools, and effective collaboration skills. Relevant cyber security certifications are advantageous. This position offers opportunities for innovation in security practices.
Dec 05, 2025
Full time
A leading asset management firm in Greater London is seeking a Senior Cyber Defence Operations Analyst to lead incident response and vulnerability management efforts. The role includes maintaining alerts in the monitoring solution, coordinating with stakeholders for compliance, and enhancing operational security processes. Candidates should have a strong background in incident response, knowledge of SIEM tools, and effective collaboration skills. Relevant cyber security certifications are advantageous. This position offers opportunities for innovation in security practices.
London, United Kingdom; Mountain View, California; New York City, New York; San Francisco, California; Washington, D.C. While candidates in the listed location(s) are encouraged for this role, candidates in other locations will be considered. Mission At Databricks, we build tools that help organizations unlock the power of AI and big data-securely, responsibly, and at scale. Our Corporate Security & Investigations team is at the heart of this mission, proactively protecting our people, assets, and operations so our teams can focus on innovation with confidence. We're looking for a Protective Intelligence Analyst to join our growing Corporate Security team. In this role, you'll track and analyze potential physical security threats from open source intelligence (OSINT), social media, and the dark web, while staying ahead of emerging geopolitical developments that may impact our work. Your insights will drive security measures, protect our people and executives, and strengthen our global risk posture. You'll leverage cutting edge intelligence methodologies to identify and analyze physical security threats and emerging geopolitical risks, while forging key partnerships across the company. Your insights and actions will help ensure that our teams and leaders can drive technological advancement in a secure environment. If you're passionate about using intelligence to solve complex problems, thrive in high stakes environments, and want to support a mission at the forefront of technology innovation-this role is for you. Key Responsibilities Monitor and analyze OSINT streams, social media, and dark web sources to identify potential credible threats and inform decision making across Databricks. Conduct persons of interest (POI) investigations to assess severity, recommend countermeasures, and safeguard executives and at risk personnel. Perform end to end risk based intelligence assessments for people, operations, and assets. Build and maintain protocols for monitoring travel risks, advising business travelers and executives, and responding to critical incidents affecting personnel on the move. Collaborate with Corporate Security, Legal, People teams, and other cross functional partners to respond to emerging threats. Prepare concise, high impact intelligence briefings and reports for leadership and stakeholders. Analyze geopolitical trends and world events to proactively identify risks to our business, offices, and personnel. Use advanced analytical tools and technologies to enhance the speed and accuracy of your assessments. Maintain and evolve protective intelligence protocols, methodologies, and best practices. Build trusted intelligence sharing networks across the company and with external partners. Required Qualifications Bachelor's degree in Criminal Justice, Cybersecurity, or a related field (or equivalent experience), along with 5+ years of experience in investigations, protective intelligence, geopolitical analysis or executive protection. Deep knowledge of OSINT research techniques, corporate security protocols, risk assessment, and the intelligence cycle. Proficiency with analytical tools, including OSINT monitoring tools, threat detection, and case management software. Familiarity with the ASIS PCI investigative and/or ATAP threat assessment frameworks. Demonstrated ability performing geopolitical analysis, and converting that into actionable intelligence for decisionmakers. Proven ability to distill complex information into clear and actionable insights for diverse audiences-technical teams, senior leaders, and external partners. Exceptional problem solving skills and adaptability in fast changing environments. Comfort working independently or within a small, distributed team. Proven record of managing or mentoring contingent workers, third party security resources, or cross functional teams involved in intelligence gathering and risk mitigation. Availability to work flexible hours, including nights and weekends, to respond to urgent security events. High integrity, professionalism, and the ability to handle sensitive or confidential matters with discretion. Active U.S. or U.K. security clearance or the ability to obtain one preferred. Pay Range Transparency Zone 1 Pay Range: $167,700 - $234,750 USD Zone 2 Pay Range: $150,900 - $211,275 USD About Databricks Databricks is the data and AI company. More than 10,000 organizations worldwide-including Comcast, Condé Nast, Grammarly, and over 50% of the Fortune 500-rely on the Databricks Data Intelligence Platform to unify and democratize data, analytics and AI. Databricks is headquartered in San Francisco, with offices around the globe and was founded by the original creators of Lakehouse, Apache Spark , Delta Lake and MLflow. Benefits Databricks offers a comprehensive benefits and perks package that meets the needs of all employees. For specific details on the benefits offered in your region, please visit Our Commitment to Diversity and Inclusion At Databricks, we are committed to fostering a diverse and inclusive culture where everyone can excel. We take great care to ensure that our hiring practices are inclusive and meet equal employment opportunity standards. Individuals looking for employment at Databricks are considered without regard to age, color, disability, ethnicity, family or marital status, gender identity or expression, language, national origin, physical and mental ability, political affiliation, race, religion, sexual orientation, socio economic status, veteran status, and other protected characteristics. Compliance If access to export controlled technology or source code is required for performance of job duties, it is within Employer's discretion whether to apply for a U.S. government license for such positions, and Employer may decline to proceed with an applicant on this basis alone.
Dec 05, 2025
Full time
London, United Kingdom; Mountain View, California; New York City, New York; San Francisco, California; Washington, D.C. While candidates in the listed location(s) are encouraged for this role, candidates in other locations will be considered. Mission At Databricks, we build tools that help organizations unlock the power of AI and big data-securely, responsibly, and at scale. Our Corporate Security & Investigations team is at the heart of this mission, proactively protecting our people, assets, and operations so our teams can focus on innovation with confidence. We're looking for a Protective Intelligence Analyst to join our growing Corporate Security team. In this role, you'll track and analyze potential physical security threats from open source intelligence (OSINT), social media, and the dark web, while staying ahead of emerging geopolitical developments that may impact our work. Your insights will drive security measures, protect our people and executives, and strengthen our global risk posture. You'll leverage cutting edge intelligence methodologies to identify and analyze physical security threats and emerging geopolitical risks, while forging key partnerships across the company. Your insights and actions will help ensure that our teams and leaders can drive technological advancement in a secure environment. If you're passionate about using intelligence to solve complex problems, thrive in high stakes environments, and want to support a mission at the forefront of technology innovation-this role is for you. Key Responsibilities Monitor and analyze OSINT streams, social media, and dark web sources to identify potential credible threats and inform decision making across Databricks. Conduct persons of interest (POI) investigations to assess severity, recommend countermeasures, and safeguard executives and at risk personnel. Perform end to end risk based intelligence assessments for people, operations, and assets. Build and maintain protocols for monitoring travel risks, advising business travelers and executives, and responding to critical incidents affecting personnel on the move. Collaborate with Corporate Security, Legal, People teams, and other cross functional partners to respond to emerging threats. Prepare concise, high impact intelligence briefings and reports for leadership and stakeholders. Analyze geopolitical trends and world events to proactively identify risks to our business, offices, and personnel. Use advanced analytical tools and technologies to enhance the speed and accuracy of your assessments. Maintain and evolve protective intelligence protocols, methodologies, and best practices. Build trusted intelligence sharing networks across the company and with external partners. Required Qualifications Bachelor's degree in Criminal Justice, Cybersecurity, or a related field (or equivalent experience), along with 5+ years of experience in investigations, protective intelligence, geopolitical analysis or executive protection. Deep knowledge of OSINT research techniques, corporate security protocols, risk assessment, and the intelligence cycle. Proficiency with analytical tools, including OSINT monitoring tools, threat detection, and case management software. Familiarity with the ASIS PCI investigative and/or ATAP threat assessment frameworks. Demonstrated ability performing geopolitical analysis, and converting that into actionable intelligence for decisionmakers. Proven ability to distill complex information into clear and actionable insights for diverse audiences-technical teams, senior leaders, and external partners. Exceptional problem solving skills and adaptability in fast changing environments. Comfort working independently or within a small, distributed team. Proven record of managing or mentoring contingent workers, third party security resources, or cross functional teams involved in intelligence gathering and risk mitigation. Availability to work flexible hours, including nights and weekends, to respond to urgent security events. High integrity, professionalism, and the ability to handle sensitive or confidential matters with discretion. Active U.S. or U.K. security clearance or the ability to obtain one preferred. Pay Range Transparency Zone 1 Pay Range: $167,700 - $234,750 USD Zone 2 Pay Range: $150,900 - $211,275 USD About Databricks Databricks is the data and AI company. More than 10,000 organizations worldwide-including Comcast, Condé Nast, Grammarly, and over 50% of the Fortune 500-rely on the Databricks Data Intelligence Platform to unify and democratize data, analytics and AI. Databricks is headquartered in San Francisco, with offices around the globe and was founded by the original creators of Lakehouse, Apache Spark , Delta Lake and MLflow. Benefits Databricks offers a comprehensive benefits and perks package that meets the needs of all employees. For specific details on the benefits offered in your region, please visit Our Commitment to Diversity and Inclusion At Databricks, we are committed to fostering a diverse and inclusive culture where everyone can excel. We take great care to ensure that our hiring practices are inclusive and meet equal employment opportunity standards. Individuals looking for employment at Databricks are considered without regard to age, color, disability, ethnicity, family or marital status, gender identity or expression, language, national origin, physical and mental ability, political affiliation, race, religion, sexual orientation, socio economic status, veteran status, and other protected characteristics. Compliance If access to export controlled technology or source code is required for performance of job duties, it is within Employer's discretion whether to apply for a U.S. government license for such positions, and Employer may decline to proceed with an applicant on this basis alone.
CBSbutler Holdings Limited trading as CBSbutler
City, London
Information Assurance Project Analyst months + +Hybrid 2/3 days on site in London +SC cleared role +Outside IR35 + 400 - 475 a day Skills: +Information Assurance +SC clearance / DV clearance +Certifications, from a recognised body, in digital security e.g. GIAC, ISC2, BCS, ISACA. We're seeking a skilled Information Assurance Consultant to join a key government agency, supporting the Information, Policy and Security (IPS) Cyber and Information Assurance (C&IA) function. You'll provide expert direction and assurance across multiple programmes and projects, ensuring that the technical, procedural, and physical controls in place to protect sensitive data are robust, proportionate, and aligned with government standards. This is a hands-on, advisory role-ideal for someone who thrives on influencing at programme level while also getting into the detail of how assurance frameworks are applied across IT, data analytics, and wider business functions. Key Responsibilities Provide cyber and information assurance advice to new and ongoing projects, shaping security requirements and framework controls. Conduct security audits, risk assessments, and assurance reviews to ensure compliance with HMG Security Classifications and relevant regulations and standards. Advise on IT security solutions and emerging technologies, maintaining up-to-date knowledge of best practice. Collaborate with other security disciplines - including Cyber Operations, Physical Security, and Personnel Security - to manage and reduce data loss risks. Deliver formal technical assurance on system and architectural designs, ensuring appropriate security of information and processing facilities. Support incident management activities, offering expert input and response guidance. Required You'll bring both technical depth and strategic assurance expertise , ideally gained within a secure or government environment. You're confident engaging with multiple stakeholders, managing risk in complex programmes, and balancing security controls with operational need. Essential: Degree or equivalent in an IT-related discipline or recognised security certifications (e.g. GIAC, ISC2, BCS, ISACA). Demonstrable experience in information assurance, IT risk management, or cyber security within government or critical national infrastructure. Strong understanding of government security frameworks and assurance processes . Active SC clearance (enhanced SC preferred). If you'd like to discuss this Information Assurance role in more detail, please send your updated CV and I will get in touch.
Dec 05, 2025
Contractor
Information Assurance Project Analyst months + +Hybrid 2/3 days on site in London +SC cleared role +Outside IR35 + 400 - 475 a day Skills: +Information Assurance +SC clearance / DV clearance +Certifications, from a recognised body, in digital security e.g. GIAC, ISC2, BCS, ISACA. We're seeking a skilled Information Assurance Consultant to join a key government agency, supporting the Information, Policy and Security (IPS) Cyber and Information Assurance (C&IA) function. You'll provide expert direction and assurance across multiple programmes and projects, ensuring that the technical, procedural, and physical controls in place to protect sensitive data are robust, proportionate, and aligned with government standards. This is a hands-on, advisory role-ideal for someone who thrives on influencing at programme level while also getting into the detail of how assurance frameworks are applied across IT, data analytics, and wider business functions. Key Responsibilities Provide cyber and information assurance advice to new and ongoing projects, shaping security requirements and framework controls. Conduct security audits, risk assessments, and assurance reviews to ensure compliance with HMG Security Classifications and relevant regulations and standards. Advise on IT security solutions and emerging technologies, maintaining up-to-date knowledge of best practice. Collaborate with other security disciplines - including Cyber Operations, Physical Security, and Personnel Security - to manage and reduce data loss risks. Deliver formal technical assurance on system and architectural designs, ensuring appropriate security of information and processing facilities. Support incident management activities, offering expert input and response guidance. Required You'll bring both technical depth and strategic assurance expertise , ideally gained within a secure or government environment. You're confident engaging with multiple stakeholders, managing risk in complex programmes, and balancing security controls with operational need. Essential: Degree or equivalent in an IT-related discipline or recognised security certifications (e.g. GIAC, ISC2, BCS, ISACA). Demonstrable experience in information assurance, IT risk management, or cyber security within government or critical national infrastructure. Strong understanding of government security frameworks and assurance processes . Active SC clearance (enhanced SC preferred). If you'd like to discuss this Information Assurance role in more detail, please send your updated CV and I will get in touch.
The Role Working as part of a team safeguarding BAE Systems against cyber threats by developing and enhancing the Technical Operations capability across People, Process, and Technology, ensuring an efficient approach to all Cyber Operations. Proactively protecting BAE Systems through continual automation and testing of security controls. Continuously working toward organisational, departmental, and individual objectives and upholding security standards and principles. Providing assurance to the Head of Cyber Operations and Technical Operations Manager that the SOC is operating efficiently through the use of orchestration and automation. Role Responsibilities: Not limited to Identification of process that can be automated to make the SOC more effective. Responsible for the overall delivery of the Technical Operations function by providing support to other members of the team to protect BAE Systems against cyber threats. Lead in the identification and the creation, maintenance and troubleshooting of SOAR playbooks, automations and enrichments. Apply critical thinking to solve unique problems in the information security space. Enhancing the processes around interacting with large datasets to construct actionable information to enhance the detection of suspicious activity within the business. On boarding new data sources to increase the visibility of security event information across multiple technologies. Creating security use cases to enable the wider SOC to respond to a wider array of threats. Identify where automation can assist the Incident Response team when investigating suspicious activity. Creation of analytic content to enable quantifiable metrics on SOC performance. What are BAE Systems looking for from you? A strong technical background with a detailed knowledge of cyber security, computer networks and operating systems. Knowledge of Python 3 programming language SPLUNK knowledge or Seim tools Security Requirements: SC This role will require you to hold or be eligible to obtain Security Clearance (SC). You will need to obtain a BPSS check as part of this process. You must be eligible to work in the UK without sponsorship and have lived and worked in the UK for a minimum 5 year period. If you are unsure as to whether you are eligible, please contact me to discuss. This role also requires you to be a sole British national and therefore hold no other nationalities. The Umbrella rate quoted above is the Gross Umbrella rate (i.e. the rate we pay to the Umbrella Company inclusive of ALL employment costs). Please note, the rate paid by the Umbrella will be less, as will a Limited Deemed rate or Agency PAYE rate. Please get in touch to discuss the rates via these different payment vehicles.
Dec 05, 2025
Contractor
The Role Working as part of a team safeguarding BAE Systems against cyber threats by developing and enhancing the Technical Operations capability across People, Process, and Technology, ensuring an efficient approach to all Cyber Operations. Proactively protecting BAE Systems through continual automation and testing of security controls. Continuously working toward organisational, departmental, and individual objectives and upholding security standards and principles. Providing assurance to the Head of Cyber Operations and Technical Operations Manager that the SOC is operating efficiently through the use of orchestration and automation. Role Responsibilities: Not limited to Identification of process that can be automated to make the SOC more effective. Responsible for the overall delivery of the Technical Operations function by providing support to other members of the team to protect BAE Systems against cyber threats. Lead in the identification and the creation, maintenance and troubleshooting of SOAR playbooks, automations and enrichments. Apply critical thinking to solve unique problems in the information security space. Enhancing the processes around interacting with large datasets to construct actionable information to enhance the detection of suspicious activity within the business. On boarding new data sources to increase the visibility of security event information across multiple technologies. Creating security use cases to enable the wider SOC to respond to a wider array of threats. Identify where automation can assist the Incident Response team when investigating suspicious activity. Creation of analytic content to enable quantifiable metrics on SOC performance. What are BAE Systems looking for from you? A strong technical background with a detailed knowledge of cyber security, computer networks and operating systems. Knowledge of Python 3 programming language SPLUNK knowledge or Seim tools Security Requirements: SC This role will require you to hold or be eligible to obtain Security Clearance (SC). You will need to obtain a BPSS check as part of this process. You must be eligible to work in the UK without sponsorship and have lived and worked in the UK for a minimum 5 year period. If you are unsure as to whether you are eligible, please contact me to discuss. This role also requires you to be a sole British national and therefore hold no other nationalities. The Umbrella rate quoted above is the Gross Umbrella rate (i.e. the rate we pay to the Umbrella Company inclusive of ALL employment costs). Please note, the rate paid by the Umbrella will be less, as will a Limited Deemed rate or Agency PAYE rate. Please get in touch to discuss the rates via these different payment vehicles.
SOC Practitioner Analyst £364.65p daily rate - PAYE £467.08p daily rate Umbrella Inside IR35 Full time 6 Month Contract Initially Milton Keynes / Hybrid 60% onsite working DV Clearance required Restrictions Apply Our government client is seeking an experienced level 1 SOC Practitioner Analyst to work in an existing team consisting of Cyber SOC Engineers and Cyber SOC Analysts on a temporary basis until a permanent position can be filled. Scope and Objectives To Work alongside an existing team of Cyber Engineer and Cyber Analysts within an established Security Operations Centre to provide level 1 triage analysis duties which include: Monitor, triage and investigate Security Alerts on the various monitoring tools to identify potential Security Incidents. Escalate suspected Security Incidents to the Lead Analysts. Assist Lead Analysts and Incident Response team with investigation and containment. Maintain knowledge of technology and cyber threats by reading Threat Intel, reports, attending Threat Intel briefings and self-study. Perform analysis of Security Event Data / Security Alerts to support Customers in responding to Security Incidents. Ensure Protective monitoring tools are performing as expected. Assist in the Creation of procedures to report incidents to customers Assisting in the Development of the team to ensure best practice and that their knowledge is up to date. In association with other colleagues provide an on-Call service to investigate and remedy security and technical issues in relation to the SOC service on a 24/7 basis . Skills and Experience Working knowledge of Various Operating systems including Windows and Linux. Experience of working with SIEM and IPS products within a SOC Environment. Good Analytical skills with the ability to manipulate, interrogate and analyse large data sets. Relevant cyber security analyst experience within a SOC environment. Knowledge of IT Networking, specifically in Firewalls and other Network security devices Strong interpersonal skills ability to assist other team members Excellent Communication Skills Constraints: Candidates submitted for this role must be British nationals, to confirm: They are a British citizen or hold dual nationality, and They have been a resident in the UK for at least two of the last 5 years Due to the nature of this work Government security clearance if not already held will need to be obtained. The minimum clearance required for this role is DV. (Although advantageous, it is not a requirement that an individual already holds Security Clearance.) Candidates who do not currently hold clearance must be able to obtain the appropriate level of clearance for the role specified. Short-listed candidates will be submitted for vetting procedures before being formally offered the position. This process can take 6-8 weeks. If this role is of interest and you meet the above criteria, then please apply immediately.
Dec 05, 2025
Contractor
SOC Practitioner Analyst £364.65p daily rate - PAYE £467.08p daily rate Umbrella Inside IR35 Full time 6 Month Contract Initially Milton Keynes / Hybrid 60% onsite working DV Clearance required Restrictions Apply Our government client is seeking an experienced level 1 SOC Practitioner Analyst to work in an existing team consisting of Cyber SOC Engineers and Cyber SOC Analysts on a temporary basis until a permanent position can be filled. Scope and Objectives To Work alongside an existing team of Cyber Engineer and Cyber Analysts within an established Security Operations Centre to provide level 1 triage analysis duties which include: Monitor, triage and investigate Security Alerts on the various monitoring tools to identify potential Security Incidents. Escalate suspected Security Incidents to the Lead Analysts. Assist Lead Analysts and Incident Response team with investigation and containment. Maintain knowledge of technology and cyber threats by reading Threat Intel, reports, attending Threat Intel briefings and self-study. Perform analysis of Security Event Data / Security Alerts to support Customers in responding to Security Incidents. Ensure Protective monitoring tools are performing as expected. Assist in the Creation of procedures to report incidents to customers Assisting in the Development of the team to ensure best practice and that their knowledge is up to date. In association with other colleagues provide an on-Call service to investigate and remedy security and technical issues in relation to the SOC service on a 24/7 basis . Skills and Experience Working knowledge of Various Operating systems including Windows and Linux. Experience of working with SIEM and IPS products within a SOC Environment. Good Analytical skills with the ability to manipulate, interrogate and analyse large data sets. Relevant cyber security analyst experience within a SOC environment. Knowledge of IT Networking, specifically in Firewalls and other Network security devices Strong interpersonal skills ability to assist other team members Excellent Communication Skills Constraints: Candidates submitted for this role must be British nationals, to confirm: They are a British citizen or hold dual nationality, and They have been a resident in the UK for at least two of the last 5 years Due to the nature of this work Government security clearance if not already held will need to be obtained. The minimum clearance required for this role is DV. (Although advantageous, it is not a requirement that an individual already holds Security Clearance.) Candidates who do not currently hold clearance must be able to obtain the appropriate level of clearance for the role specified. Short-listed candidates will be submitted for vetting procedures before being formally offered the position. This process can take 6-8 weeks. If this role is of interest and you meet the above criteria, then please apply immediately.
Location: Stevenage (onsite / shift patterns) Duration: 6 month initial contract Rate: 45ph UMB to 66ph UMB (Inside IR35) Due to the nature of the role, candidates must be eligible for UK Eyes Only Security Clearance. Role details: Our client, a leading defence company, are looking for a SOC Analyst to join their team in Stevenage. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. Responsibilities: This role will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of MBDA Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement What we are looking for in you: A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. Desirable Skillset/experience (Senior grade): Root cause analysis and leading T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and Hunting methodologies Note, shift patterns applicable. (The shift pattern rotates each cycle - it may start with lates -> Nights -> earlies and the next cycle could be: Nights -> earlies -> lates). Initially you may not be expected to do nights until the team grows. 31.5 hours per week Apply today via the link provided!
Dec 05, 2025
Contractor
Location: Stevenage (onsite / shift patterns) Duration: 6 month initial contract Rate: 45ph UMB to 66ph UMB (Inside IR35) Due to the nature of the role, candidates must be eligible for UK Eyes Only Security Clearance. Role details: Our client, a leading defence company, are looking for a SOC Analyst to join their team in Stevenage. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. Responsibilities: This role will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of MBDA Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement What we are looking for in you: A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. Desirable Skillset/experience (Senior grade): Root cause analysis and leading T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and Hunting methodologies Note, shift patterns applicable. (The shift pattern rotates each cycle - it may start with lates -> Nights -> earlies and the next cycle could be: Nights -> earlies -> lates). Initially you may not be expected to do nights until the team grows. 31.5 hours per week Apply today via the link provided!
Type: PermanentLocation: Hybrid Overview: We are looking for a detail-oriented and proactive Information Security Compliance Analyst to join our team on a permanent basis. This role is pivotal in supporting the development and continuous improvement of our global information security compliance program.You will be responsible for ensuring that all corporate and subsidiary operations comply with internal security policies, regulatory requirements, and internationally recognised frameworks such as ISO27001, NIST, SOX, GDPR, CMMC, amongst others. Key Responsibilities: Support the execution and enhancement of the global information security compliance program. Conduct internal audits, third-party risk assessments, and due diligence reviews. Ensure alignment with regulatory and industry standards including ISO27001, NIST, SOX, GDPR, SOC 2, HIPAA, CCPA, LGPD. Collaborate with cross-functional teams across multiple jurisdictions to drive compliance initiatives. Identify gaps in security controls and recommend corrective actions. Maintain and update security policies, procedures, and documentation. Monitor changes in global regulations and assess their impact on business operations. Minimum of 3 years experience. Skills Required: Proven experience in information security compliance, risk management, and audit. Strong understanding of international regulatory frameworks and standards. Hands-on experience with: ISO27001 audits and implementation GDPR compliance NIST cybersecurity framework SOX, SOC 2, HIPAA, CCPA, LGPD Ability to interpret complex regulatory requirements and translate them into actionable controls. Excellent communication and stakeholder engagement skills. Strong analytical and problem-solving capabilities. What We Offer: Competitive salary and benefits package Flexible hybrid working model Opportunities for professional development, certification & scope to grow. Collaborative and inclusive work environment If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now. If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion about your career. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
Nov 03, 2025
Full time
Type: PermanentLocation: Hybrid Overview: We are looking for a detail-oriented and proactive Information Security Compliance Analyst to join our team on a permanent basis. This role is pivotal in supporting the development and continuous improvement of our global information security compliance program.You will be responsible for ensuring that all corporate and subsidiary operations comply with internal security policies, regulatory requirements, and internationally recognised frameworks such as ISO27001, NIST, SOX, GDPR, CMMC, amongst others. Key Responsibilities: Support the execution and enhancement of the global information security compliance program. Conduct internal audits, third-party risk assessments, and due diligence reviews. Ensure alignment with regulatory and industry standards including ISO27001, NIST, SOX, GDPR, SOC 2, HIPAA, CCPA, LGPD. Collaborate with cross-functional teams across multiple jurisdictions to drive compliance initiatives. Identify gaps in security controls and recommend corrective actions. Maintain and update security policies, procedures, and documentation. Monitor changes in global regulations and assess their impact on business operations. Minimum of 3 years experience. Skills Required: Proven experience in information security compliance, risk management, and audit. Strong understanding of international regulatory frameworks and standards. Hands-on experience with: ISO27001 audits and implementation GDPR compliance NIST cybersecurity framework SOX, SOC 2, HIPAA, CCPA, LGPD Ability to interpret complex regulatory requirements and translate them into actionable controls. Excellent communication and stakeholder engagement skills. Strong analytical and problem-solving capabilities. What We Offer: Competitive salary and benefits package Flexible hybrid working model Opportunities for professional development, certification & scope to grow. Collaborative and inclusive work environment If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now. If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion about your career. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)