This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
To strengthen the organisation’s Detection and Response capability by providing threat hunting, incident investigation and malware analysis. This is a technical role for a high‑calibre analyst ready to take a step up. The role works closely with the Senior Security Engineer to ensure that findings translate into durable remediation and improved operational security.
Job Responsibility:
Perform threat hunting using a suite of tooling and available telemetry from Microsoft and third‑party security services
Investigate security incidents: triage, analysis, containment recommendations, and support to eradication and recovery
Conduct malware triage and analysis to determine impact, behaviour and required mitigations
Develop and tune detection logic and playbooks, in collaboration with the SOC service and wider Security team
Provide operational evidence and metrics to support Cyber Essentials Plus (annual) and customer audits
Support vulnerability and patch compliance activities by validating remediation and verifying closure
Contribute to Penetration testing response
Contribute to cyber communications: short briefings, lessons learned, and targeted awareness messaging
Support the maintenance of ITSM, and address Cyber related tickets
Requirements:
Degree in Cyber Security (or closely related discipline)
2–3 years’ post‑graduation experience in a commercial security role (SOC, IR, security operations, or similar)
Strong analytical capability and curiosity
able to form hypotheses and test them against telemetry
Understanding of incident response lifecycle and basic forensic principles
Clear written and verbal communication, with the confidence to escalate and explain findings
Self‑starter mindset suited to a hybrid/WFH environment
Nice to have:
Experience with SIEM/EDR tooling
Practical malware analysis experience (static or dynamic triage)
Experience contributing to Cyber Essentials Plus evidence gathering or audit support
Motivation to develop a cyber security career through personal development and performance in threat hunting and incident response