MALWARE ANALYSIS LEAD jobs in United Kingdom

audiences. Performing malware analysis and reverse engineering. Conducting threat assessments and defining threat intelligence... of malware behaviour and techniques employed by attackers to evade security controls. Intermediate knowledge of malware analysis...

BAE Systems

and most plausible disruptive scenarios. As a Senior Lead Cybersecurity Architect in FTR, you will be an integral part of a dynamic... Lead Cybersecurity Architect, with a focus on resiliency you would be expected to lead and promote resilient architecture...

JPMorgan Chase

technical analysis of security events, as well as malware analysis, incident triage and escalation, and other general incident... - Expertise in performing or overseeing malware analysis and overseeing digital forensics for incident response...

engagement Risk Management Threat Hunting Threat Analysis Use of vulnerability management tools Malware reverse engineering...

LA International

, macOS). Knowledge with command line tools across Windows and Linux. Familiarity with malware analysis (both static... the Attack Analysis team in how we secure, monitor and respond to incidents in both private and public cloud environments...

JPMorgan Chase

. WHAT YOU'LL DO Lead the identification, analysis, and response to advanced security threats and incidents, including advanced... cloud security best practices Conduct forensic analysis, malware reverse engineering, and threat hunting activities...

Fortra

security program and identify potential gaps around our people, process, and technology. Responsibilities Plan, lead... engagements. Effectively report analysis and findings in the most accessible way (written reports, Jira, tickets, presentations...

TORA

and Fiddler. 5. You have passion for reverse engineering, adware/malware analysis, threat detection and threat hunting. 6... to tools to understand not only what a particular piece of malware for perpetrating ad fraud can do but also how it does it...

Amazon

, Firewall and proxy technologies, cloud solutions, anti-virus, static and dynamic malware analysis techniques Experience.... Your new role Reporting to our Global Security Operations Lead, you'll be providing effective and proactive response to cyber...

QBE Insurance

, with that team management experience is required for the role. The Head of Security Operations will also get the opportunity to lead...: Operational Oversight: Lead daily operations of the Security Operations Team, including detection, response, and resolution...

Secure Recruitment

and lead to a CAREER. If you're attracted to a work hard, play hard environment and seek the guidance, training and experience... Assisting project teams in onboarding new clients and O365 and Sharepoint migrations Perform rapid analysis of workstation...

Thrive

security posture Perform malware analysis and digital forensics where appropriate Drive internal phishing campaigns (KnowBe4... cyber threats. Lead incident response activities and investigations into security breaches. Conduct regular risk...

Gold Group

, static and dynamic malware analysis / reverse engineering, advanced mobile device forensics Advanced experience in industry... as part of a growing team. You will be expected to lead a number of incident response case managers and practitioners...

KPMG

management. Knowledge of network protocols, architecture, and security controls. Understanding of malware analysis, intrusion.... You will be evaluated based on metrics such as reduced attacks, shorter response times, and compliance. Your efforts lead to a secure Tech...

Boohoo

management. Knowledge of network protocols, architecture, and security controls. Understanding of malware analysis, intrusion.... You will be evaluated based on metrics such as reduced attacks, shorter response times, and compliance. Your efforts lead to a secure Tech...

Boohoo

(SIEM) Network Analysis tools - Wireshark, “tcpdump” Advanced Malware Analysis Exceptional understanding of Windows... to deliver both new and further improve existing capability within a CSIRT. Demonstrated ability to lead the response...

National Grid

disclosures, and security analysis techniques. Knowledge of malware families, botnets, threats by sector, attack campaigns... sources for governance meetings with leadership. Create support materials, including process documentation, testing analysis...

Helly Hansen