SOC Manager Exeter (Hybrid - 2 days onsite) Day Rate: £850 (Umbrella)/£616.61 (PAYE) SC Cleared An enterprise government backed organisation is seeking a SOC manager to provide day to day leadership of incidents and mangment of the SOC Analysts. This is a critical leadership role, responsible for protecting the organisation against Real Time cyber threats, driving incident response, and ensuring resilience across a complex technology estate. Our client is offering a 6 month rolling contract, paying up to £850 PD Inside IR 35 to start ASAP to be based in Exeter 2 days per week. This is a high-impact opportunity to shape cyber strategy at an enterprise level, working closely with senior stakeholders and external agencies to strengthen security posture and response capability. You will play a key role in building and evolving the CSOC capability, operating within a highly visible and business-critical function, with regular engagement across senior leadership and external partners. To be successful, you will hold active SC clearance and bring proven experience working within Central Government, the Public Sector, or highly regulated scientific environments. Key Responsibilities Define and lead the Cyber Security Operations Centre (CSOC), ensuring effective detection, response, and remediation of cyber incidents Own and continuously improve the cyber incident response plan, ensuring readiness across the organisation Provide strategic cyber security advice to senior leadership on monitoring, logging, and threat response Establish a use-case driven monitoring and alerting capability to improve threat detection and response times Oversee threat intelligence, vulnerability management, and proactive risk mitigation across the estate Lead the analysis of network traffic and behaviours, identifying threats and communicating insights to the wider business Define and manage cyber security operations strategy, aligned to organisational risk appetite and government guidance Manage stakeholders and external agencies, including regulatory bodies where required Identify and plan cyber investment requirements across tooling, governance, and team capability Core Experience Required Proven experience leading a Security Operations Centre (SOC/CSOC) or cyber security operations function Strong background in incident response, threat detection, and cyber resilience Hands-on experience with SIEM, IDS/IPS, endpoint security, and monitoring tools Solid understanding of threat intelligence, vulnerability management, and remediation practices Knowledge of cyber frameworks and regulations including GDPR, NIS, and National Cyber Security Centre guidance Familiarity with frameworks such as MITRE ATT&CK and ITIL processes Experience operating within complex, regulated environments (eg public sector, financial services) Strong stakeholder management skills, with the ability to influence at senior level
May 13, 2026
Contractor
SOC Manager Exeter (Hybrid - 2 days onsite) Day Rate: £850 (Umbrella)/£616.61 (PAYE) SC Cleared An enterprise government backed organisation is seeking a SOC manager to provide day to day leadership of incidents and mangment of the SOC Analysts. This is a critical leadership role, responsible for protecting the organisation against Real Time cyber threats, driving incident response, and ensuring resilience across a complex technology estate. Our client is offering a 6 month rolling contract, paying up to £850 PD Inside IR 35 to start ASAP to be based in Exeter 2 days per week. This is a high-impact opportunity to shape cyber strategy at an enterprise level, working closely with senior stakeholders and external agencies to strengthen security posture and response capability. You will play a key role in building and evolving the CSOC capability, operating within a highly visible and business-critical function, with regular engagement across senior leadership and external partners. To be successful, you will hold active SC clearance and bring proven experience working within Central Government, the Public Sector, or highly regulated scientific environments. Key Responsibilities Define and lead the Cyber Security Operations Centre (CSOC), ensuring effective detection, response, and remediation of cyber incidents Own and continuously improve the cyber incident response plan, ensuring readiness across the organisation Provide strategic cyber security advice to senior leadership on monitoring, logging, and threat response Establish a use-case driven monitoring and alerting capability to improve threat detection and response times Oversee threat intelligence, vulnerability management, and proactive risk mitigation across the estate Lead the analysis of network traffic and behaviours, identifying threats and communicating insights to the wider business Define and manage cyber security operations strategy, aligned to organisational risk appetite and government guidance Manage stakeholders and external agencies, including regulatory bodies where required Identify and plan cyber investment requirements across tooling, governance, and team capability Core Experience Required Proven experience leading a Security Operations Centre (SOC/CSOC) or cyber security operations function Strong background in incident response, threat detection, and cyber resilience Hands-on experience with SIEM, IDS/IPS, endpoint security, and monitoring tools Solid understanding of threat intelligence, vulnerability management, and remediation practices Knowledge of cyber frameworks and regulations including GDPR, NIS, and National Cyber Security Centre guidance Familiarity with frameworks such as MITRE ATT&CK and ITIL processes Experience operating within complex, regulated environments (eg public sector, financial services) Strong stakeholder management skills, with the ability to influence at senior level
SOC / Cyber Threat Detection Analyst - SANS/GIAC Cyber Threat Detection Analyst Location: Wokingham, Berkshire (On-site) Salary: Competitive (dependent on experience) + excellent benefits & training Security Clearance: Ideally SC Cleared or eligible for SC Role Overview As a Cyber Threat Detection Analyst, you will play a hands-on role within an advanced cyber defence function, focused on proactive threat hunting, adversary behaviour analysis, and high-fidelity threat detection across enterprise environments. This role goes beyond reactive alert handling. You will actively hunt for malicious activity using telemetry, SIEM data, and threat intelligence, develop hypotheses based on MITRE ATT&CK Tactics, Techniques, and Procedures (TTPs), and support incident management and response activities when threats are identified. We are open to experienced SOC Analysts where threat hunting, investigations, and proactive detection have formed a significant part of their role, and who are looking to further develop in a more hunting-led environment. This position is well suited to analysts who enjoy thinking like an attacker, have worked alongside or supported red team or purple team activities, and want to deepen their expertise in threat detection and detection engineering. Skills & Experience We're Seeking Experience in threat hunting, cyber threat detection, SOC, blue team, or cyber defence environments, with ideally around five years hands on experience. Strong hands-on experience using SIEM platforms, including: Microsoft Sentinel (KQL) Splunk (SPL) Elastic Security/Kibana (KQL, ESQL) Practical and operational understanding of MITRE ATT&CK, attacker techniques, and adversary tradecraft Experience working with Indicators of Compromise (IOCs) and threat intelligence feeds Solid experience across the security event life cycle, including detection, investigation, and incident management Hands-on experience with EDR/XDR technologies such as Microsoft Defender, CrowdStrike, SentinelOne, or Carbon Black Strong knowledge of networking fundamentals (TCP/IP, DNS, HTTP/S, Firewalls, VPNs, Proxy technologies) Experience analysing telemetry from Windows, Linux, identity, endpoint, and network sources Strong analytical mindset with the ability to clearly communicate findings, impact, and risk Key Responsibilities Conduct proactive threat hunting activities across log, endpoint, and network telemetry to identify suspicious, stealthy, or previously unknown threats Develop and execute hunt hypotheses aligned to MITRE ATT&CK TTPs, adversary behaviours, and emerging threat intelligence Write, refine, and optimise SIEM queries using KQL, SPL, Elastic/ESQL, and Kibana Query Language Perform IOC analysis, enrichment, and validation, integrating internal and external threat intelligence sources Lead investigations from initial detection through scoping, root cause analysis, and impact assessment Support incident management and incident response activities, including containment, remediation, escalation, and lessons learned Collaborate closely with SOC teams, incident responders, red teams, and purple teams to validate detections and improve defensive coverage Contribute to detection logic improvements, use-case development, and continuous enhancement of hunting methodologies Produce clear investigation write-ups, timelines, and recommendations for technical and non-technical stakeholders Security Certifications (Highly Beneficial) SANS/GIAC certifications, including but not limited to: GCIH - Incident Handler GCIA - Intrusion Analyst GCED - Enterprise Defender GCTI - Cyber Threat Intelligence GMON - Continuous Monitoring GDAT - Defending Advanced Threats GCAT - Advanced Threat Intelligence OSCP or equivalent offensive security qualifications Crest certifications, such as: Crest Practitioner Intrusion Analyst (CPIA) Crest Registered Intrusion Analyst (CRIA) Crest Certified Threat Intelligence Analyst (CCTIA) Crest Certified Blue Team Professional (CCBTP) Microsoft SC-200 or related detection and response certifications Other recognised cyber security or threat intelligence credentials
May 10, 2026
Full time
SOC / Cyber Threat Detection Analyst - SANS/GIAC Cyber Threat Detection Analyst Location: Wokingham, Berkshire (On-site) Salary: Competitive (dependent on experience) + excellent benefits & training Security Clearance: Ideally SC Cleared or eligible for SC Role Overview As a Cyber Threat Detection Analyst, you will play a hands-on role within an advanced cyber defence function, focused on proactive threat hunting, adversary behaviour analysis, and high-fidelity threat detection across enterprise environments. This role goes beyond reactive alert handling. You will actively hunt for malicious activity using telemetry, SIEM data, and threat intelligence, develop hypotheses based on MITRE ATT&CK Tactics, Techniques, and Procedures (TTPs), and support incident management and response activities when threats are identified. We are open to experienced SOC Analysts where threat hunting, investigations, and proactive detection have formed a significant part of their role, and who are looking to further develop in a more hunting-led environment. This position is well suited to analysts who enjoy thinking like an attacker, have worked alongside or supported red team or purple team activities, and want to deepen their expertise in threat detection and detection engineering. Skills & Experience We're Seeking Experience in threat hunting, cyber threat detection, SOC, blue team, or cyber defence environments, with ideally around five years hands on experience. Strong hands-on experience using SIEM platforms, including: Microsoft Sentinel (KQL) Splunk (SPL) Elastic Security/Kibana (KQL, ESQL) Practical and operational understanding of MITRE ATT&CK, attacker techniques, and adversary tradecraft Experience working with Indicators of Compromise (IOCs) and threat intelligence feeds Solid experience across the security event life cycle, including detection, investigation, and incident management Hands-on experience with EDR/XDR technologies such as Microsoft Defender, CrowdStrike, SentinelOne, or Carbon Black Strong knowledge of networking fundamentals (TCP/IP, DNS, HTTP/S, Firewalls, VPNs, Proxy technologies) Experience analysing telemetry from Windows, Linux, identity, endpoint, and network sources Strong analytical mindset with the ability to clearly communicate findings, impact, and risk Key Responsibilities Conduct proactive threat hunting activities across log, endpoint, and network telemetry to identify suspicious, stealthy, or previously unknown threats Develop and execute hunt hypotheses aligned to MITRE ATT&CK TTPs, adversary behaviours, and emerging threat intelligence Write, refine, and optimise SIEM queries using KQL, SPL, Elastic/ESQL, and Kibana Query Language Perform IOC analysis, enrichment, and validation, integrating internal and external threat intelligence sources Lead investigations from initial detection through scoping, root cause analysis, and impact assessment Support incident management and incident response activities, including containment, remediation, escalation, and lessons learned Collaborate closely with SOC teams, incident responders, red teams, and purple teams to validate detections and improve defensive coverage Contribute to detection logic improvements, use-case development, and continuous enhancement of hunting methodologies Produce clear investigation write-ups, timelines, and recommendations for technical and non-technical stakeholders Security Certifications (Highly Beneficial) SANS/GIAC certifications, including but not limited to: GCIH - Incident Handler GCIA - Intrusion Analyst GCED - Enterprise Defender GCTI - Cyber Threat Intelligence GMON - Continuous Monitoring GDAT - Defending Advanced Threats GCAT - Advanced Threat Intelligence OSCP or equivalent offensive security qualifications Crest certifications, such as: Crest Practitioner Intrusion Analyst (CPIA) Crest Registered Intrusion Analyst (CRIA) Crest Certified Threat Intelligence Analyst (CCTIA) Crest Certified Blue Team Professional (CCBTP) Microsoft SC-200 or related detection and response certifications Other recognised cyber security or threat intelligence credentials
SOC Lead 6 months Bath - hybrid x3 days onsite x2 remote Active SC/DV clearance required 700 per day outside IR35 The SOC Lead - Threat Hunting & Investigations is responsible for leading advanced threat detection, proactive threat hunting, and complex security investigations across the enterprise. This role focuses on identifying unknown threats, coordinating deep-dive investigations, and elevating the maturity of SOC investigative and hunting capabilities. The role combines technical leadership, hands-on expertise, and mentorship of analysts. Key Responsibilities Threat Hunting Lead proactive, hypothesis-driven threat hunting activities across endpoint, network, cloud, identity, and SaaS environments Develop and maintain threat hunting playbooks aligned to MITRE ATT&CK techniques Identify stealthy, low-and-slow, and novel attack patterns not detected by automated controls Translate threat intelligence into actionable hunt hypotheses Continuously refine detection logic based on hunt outcomes and emerging threats Investigations & Incident Response Lead complex and high-severity security investigations from triage through containment and remediation Act as the technical escalation point for advanced SOC investigations Conduct root cause analysis and attacker kill-chain reconstruction Produce clear, defensible investigation documentation suitable for executive, legal, and regulatory audiences Coordinate incident response activities with IR, IT, Legal, Risk, and external partners as required SOC Technical Leadership Define investigation standards, workflows, and quality benchmarks Mentor and upskill SOC analysts in hunting methodologies and investigative techniques Review and improve alert fidelity, detection coverage, and response effectiveness Provide technical oversight for tooling such as SIEM, EDR/XDR, NDR, SOAR, and cloud-native security platforms Detection Engineering & Improvement Collaborate with detection engineers to convert hunt findings into new or improved detections Identify visibility gaps and recommend logging, telemetry, and tooling improvements Validate detection performance through purple team activities and simulation Threat Intelligence & Collaboration Consume and operationalise internal and external threat intelligence Maintain awareness of attacker tactics, tools, and campaigns relevant to the organisation Act as a key interface between SOC, Threat Intel, Red Team, and Vulnerability Management Reporting & Metrics Track and report on hunt coverage, outcomes, dwell time, MTTR, and investigation quality Provide regular insights to senior leadership on threat trends and risk posture Required Skills & Experience Technical Experience 7+ years in Security Operations, Threat Hunting, or Incident Response Proven experience leading investigations involving advanced persistent threats, insider threats, or targeted attacks Strong hands-on expertise with: SIEM platforms (e.g. Sentinel, Splunk, Elastic) EDR/XDR solutions (e.g. Defender, CrowdStrike, SentinelOne) Network and cloud security telemetry Strong understanding of: MITRE ATT&CK Windows, Linux, and cloud attack techniques Malware behaviours, credential abuse, lateral movement, and persistence mechanisms Leadership & Soft Skills Demonstrated ability to lead and mentor technical teams Strong investigative mindset with attention to detail Excellent written and verbal communication skills Ability to translate technical findings into business and risk context Desirable Skills Experience with detection engineering or SOAR automation Purple team or red team collaboration experience Forensic analysis experience (memory, disk, network) Exposure to regulatory environments (e.g. ISO 27001, NIST, GDPR) Apply now to be part of this impactful opportunity!
May 09, 2026
Contractor
SOC Lead 6 months Bath - hybrid x3 days onsite x2 remote Active SC/DV clearance required 700 per day outside IR35 The SOC Lead - Threat Hunting & Investigations is responsible for leading advanced threat detection, proactive threat hunting, and complex security investigations across the enterprise. This role focuses on identifying unknown threats, coordinating deep-dive investigations, and elevating the maturity of SOC investigative and hunting capabilities. The role combines technical leadership, hands-on expertise, and mentorship of analysts. Key Responsibilities Threat Hunting Lead proactive, hypothesis-driven threat hunting activities across endpoint, network, cloud, identity, and SaaS environments Develop and maintain threat hunting playbooks aligned to MITRE ATT&CK techniques Identify stealthy, low-and-slow, and novel attack patterns not detected by automated controls Translate threat intelligence into actionable hunt hypotheses Continuously refine detection logic based on hunt outcomes and emerging threats Investigations & Incident Response Lead complex and high-severity security investigations from triage through containment and remediation Act as the technical escalation point for advanced SOC investigations Conduct root cause analysis and attacker kill-chain reconstruction Produce clear, defensible investigation documentation suitable for executive, legal, and regulatory audiences Coordinate incident response activities with IR, IT, Legal, Risk, and external partners as required SOC Technical Leadership Define investigation standards, workflows, and quality benchmarks Mentor and upskill SOC analysts in hunting methodologies and investigative techniques Review and improve alert fidelity, detection coverage, and response effectiveness Provide technical oversight for tooling such as SIEM, EDR/XDR, NDR, SOAR, and cloud-native security platforms Detection Engineering & Improvement Collaborate with detection engineers to convert hunt findings into new or improved detections Identify visibility gaps and recommend logging, telemetry, and tooling improvements Validate detection performance through purple team activities and simulation Threat Intelligence & Collaboration Consume and operationalise internal and external threat intelligence Maintain awareness of attacker tactics, tools, and campaigns relevant to the organisation Act as a key interface between SOC, Threat Intel, Red Team, and Vulnerability Management Reporting & Metrics Track and report on hunt coverage, outcomes, dwell time, MTTR, and investigation quality Provide regular insights to senior leadership on threat trends and risk posture Required Skills & Experience Technical Experience 7+ years in Security Operations, Threat Hunting, or Incident Response Proven experience leading investigations involving advanced persistent threats, insider threats, or targeted attacks Strong hands-on expertise with: SIEM platforms (e.g. Sentinel, Splunk, Elastic) EDR/XDR solutions (e.g. Defender, CrowdStrike, SentinelOne) Network and cloud security telemetry Strong understanding of: MITRE ATT&CK Windows, Linux, and cloud attack techniques Malware behaviours, credential abuse, lateral movement, and persistence mechanisms Leadership & Soft Skills Demonstrated ability to lead and mentor technical teams Strong investigative mindset with attention to detail Excellent written and verbal communication skills Ability to translate technical findings into business and risk context Desirable Skills Experience with detection engineering or SOAR automation Purple team or red team collaboration experience Forensic analysis experience (memory, disk, network) Exposure to regulatory environments (e.g. ISO 27001, NIST, GDPR) Apply now to be part of this impactful opportunity!
One of the global advisory companies is hiring an associate director to join its strategic intelligence practice with a focus on Japan. They are seeking an independent, organised, and experienced project manager with a 5-to-7-year track record in the business intelligence sector or another field of consulting, such as strategy and management, regulatory, or political risk and geopolitical consulting. The role will be based in our Tokyo office, with at least three to six months of initial training at our headquarters in London. The Role Independently manage enhanced due diligence and strategic intelligence investigations across jurisdictions in the APAC region, with a focus on Japan, including by: Deciding on and structuring lines of inquiry based on an assessment of potential commercial, regulatory, and political risks and opportunities; Identifying human sources in and outside of their network and drafting strategies to engage relevant sources; Developing an investigative plan for pursuing multiple lines of enquiry through a combination of open source research and human source enquiries; and Identifying, vetting, and cultivating a range of human sources across Japan and major Asian geographies. Oversee the management and operations of their Tokyo office, including: Line management of junior colleagues such as analysts, senior analysts, and managers; Liaising with other members of the Asia team across their London and Singapore offices; Developing training plans and initiatives to improve operations and processes for the Tokyo office; and Assisting the Head of Japan with operational and business development responsibilities as needed. Debriefing clients (mainly private equity and multinational corporates), i.e.: Preparing verbal briefings tailored to commercial audiences following consulting best practices; and Managing high-pressure client interactions in meetings with deal teams, legal teams and/or C-suites. Drafting written deliverables for their clients, which includes: Synthesising, analysing, and creating value from intelligence sources; Identifying and benchmarking risks and opportunities within the context of a wider sector or geography; and Presenting clearly structured, narrative-driven reports to a commercial audience. Qualifications & capabilities Fluency in English at the highest level of written and verbal communication; Professional working proficiency in Japanese; High level of cultural awareness of working in Japan and with Japanese clients; A minimum of 5 years of professional experience in the business intelligence industry, or a relevant industry such as strategy and management, regulatory, or political risk and geopolitical consulting; and Foundational understanding of the main business, as well as political and regulatory trends in Asia, with a focus on Japan. Key competencies include High levels of commercial awareness, including an ability to quickly grasp a target company's value chain and business model, and exposure to commercial, regulatory, and political risks; Ability to manage and cultivate a strong team culture; Strong verbal and written communication skills; Strong attention to detail and analytical skills; Robust professional judgement across the areas of project execution and client management; A self-starter mentality and ability to produce high-quality deliverables with minimal oversight; and Experience of living and working in Japan would be highly advantageous.
May 09, 2026
Full time
One of the global advisory companies is hiring an associate director to join its strategic intelligence practice with a focus on Japan. They are seeking an independent, organised, and experienced project manager with a 5-to-7-year track record in the business intelligence sector or another field of consulting, such as strategy and management, regulatory, or political risk and geopolitical consulting. The role will be based in our Tokyo office, with at least three to six months of initial training at our headquarters in London. The Role Independently manage enhanced due diligence and strategic intelligence investigations across jurisdictions in the APAC region, with a focus on Japan, including by: Deciding on and structuring lines of inquiry based on an assessment of potential commercial, regulatory, and political risks and opportunities; Identifying human sources in and outside of their network and drafting strategies to engage relevant sources; Developing an investigative plan for pursuing multiple lines of enquiry through a combination of open source research and human source enquiries; and Identifying, vetting, and cultivating a range of human sources across Japan and major Asian geographies. Oversee the management and operations of their Tokyo office, including: Line management of junior colleagues such as analysts, senior analysts, and managers; Liaising with other members of the Asia team across their London and Singapore offices; Developing training plans and initiatives to improve operations and processes for the Tokyo office; and Assisting the Head of Japan with operational and business development responsibilities as needed. Debriefing clients (mainly private equity and multinational corporates), i.e.: Preparing verbal briefings tailored to commercial audiences following consulting best practices; and Managing high-pressure client interactions in meetings with deal teams, legal teams and/or C-suites. Drafting written deliverables for their clients, which includes: Synthesising, analysing, and creating value from intelligence sources; Identifying and benchmarking risks and opportunities within the context of a wider sector or geography; and Presenting clearly structured, narrative-driven reports to a commercial audience. Qualifications & capabilities Fluency in English at the highest level of written and verbal communication; Professional working proficiency in Japanese; High level of cultural awareness of working in Japan and with Japanese clients; A minimum of 5 years of professional experience in the business intelligence industry, or a relevant industry such as strategy and management, regulatory, or political risk and geopolitical consulting; and Foundational understanding of the main business, as well as political and regulatory trends in Asia, with a focus on Japan. Key competencies include High levels of commercial awareness, including an ability to quickly grasp a target company's value chain and business model, and exposure to commercial, regulatory, and political risks; Ability to manage and cultivate a strong team culture; Strong verbal and written communication skills; Strong attention to detail and analytical skills; Robust professional judgement across the areas of project execution and client management; A self-starter mentality and ability to produce high-quality deliverables with minimal oversight; and Experience of living and working in Japan would be highly advantageous.
About the Role: CrowdStrike is looking for highly motivated, self-driven, technical analysts dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world. Our CrowdStrike virtual security operations center offers opportunities to expand your skill set through a wide variety of experiences, detecting and responding to incidents as they occur in real-time for our customers. What You'll Do: Conduct monitoring and perform in-depth analysis of security alerts. Exercise incident handling processes across Windows, Mac, and Linux platforms. Perform malware analysis. Perform remote remediation of malware or malicious activity. Develop and improve processes for incident detection, triage, and the execution of countermeasures Produce high-quality written and verbal communications, recommendations, and findings to customer management. Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events. Manage internal programs or teams. Serve as the technical escalation point and mentor for lower-level analysts. Provide oversight and quality assurance for issues worked by lower-level analysts. Assist in the advancement of security processes and procedures. What You'll Need: Successful candidates will have experience in one or more of the following areas: Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists. Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise. Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation. Network Forensic Analysis: knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs. Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations. Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations. Programming/Scripting: experience coding in Powershell, C, C#, VB, Python, Perl, Ruby on Rails, and.NET. Education: BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or a related field. Bonus Points: 4-6 years of relevant incident handling experience At least one relevant security certification Strong verbal and communication skills Strong problem solving skills Strong experience with Mac OS, Windows, and Unix operating systems. Ability to handle high pressure situations in a productive and professional manner. Strong time management skills with the ability to multi-task Benefits of Working at CrowdStrike: Market leader in compensation and equity awards Comprehensive physical and mental wellness programs Competitive vacation and holidays for recharge Paid parental and adoption leaves Professional development opportunities for all employees regardless of level or role Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections Vibrant office culture with world class amenities Great Place to Work Certified(TM) across the globeCrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs on valid job requirements.If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at for further assistance.
May 08, 2026
Full time
About the Role: CrowdStrike is looking for highly motivated, self-driven, technical analysts dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world. Our CrowdStrike virtual security operations center offers opportunities to expand your skill set through a wide variety of experiences, detecting and responding to incidents as they occur in real-time for our customers. What You'll Do: Conduct monitoring and perform in-depth analysis of security alerts. Exercise incident handling processes across Windows, Mac, and Linux platforms. Perform malware analysis. Perform remote remediation of malware or malicious activity. Develop and improve processes for incident detection, triage, and the execution of countermeasures Produce high-quality written and verbal communications, recommendations, and findings to customer management. Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events. Manage internal programs or teams. Serve as the technical escalation point and mentor for lower-level analysts. Provide oversight and quality assurance for issues worked by lower-level analysts. Assist in the advancement of security processes and procedures. What You'll Need: Successful candidates will have experience in one or more of the following areas: Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists. Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise. Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation. Network Forensic Analysis: knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs. Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations. Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations. Programming/Scripting: experience coding in Powershell, C, C#, VB, Python, Perl, Ruby on Rails, and.NET. Education: BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or a related field. Bonus Points: 4-6 years of relevant incident handling experience At least one relevant security certification Strong verbal and communication skills Strong problem solving skills Strong experience with Mac OS, Windows, and Unix operating systems. Ability to handle high pressure situations in a productive and professional manner. Strong time management skills with the ability to multi-task Benefits of Working at CrowdStrike: Market leader in compensation and equity awards Comprehensive physical and mental wellness programs Competitive vacation and holidays for recharge Paid parental and adoption leaves Professional development opportunities for all employees regardless of level or role Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections Vibrant office culture with world class amenities Great Place to Work Certified(TM) across the globeCrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs on valid job requirements.If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at for further assistance.
Technology Security Analyst Glasgow, Edinburgh, Portsmouth £55.5k-£66.7k per annum (Dependent on skills & qualifications) Full-time Joint-contribution pension from 6% (12% total) - Enhanced maternity & family leave - Life assurance - HolidayPlus - Virtual GP & Employee Assistance Programme plus retail and leisure discounts & many more. REQ5619 We are looking for a Security Operations Analyst to join us and ensure our IT and OT networks are secure and compliant. You will act as an SGN Security subject matter expert and act as the primary contact when assisting with Security incident remediation. We deliver safety, warmth, and comfort to homes and businesses. Every role, whether in the office or on the front line, plays a key part in this mission. Here's how you will contribute Providing support to different Security functions, including OT Security, Governance Risk and Compliance, Security Assurance and other key business needs Ensuring security metrics are well documented and presented at monthly reviews Being a subject matter expert and remaining up to date on cutting-edge technology, providing technical/nontechnical security support to the wider SGN Security team and organisation Working alongside third-party network vendors, coordinating security activities Support with varied tasks, including internal and external audits, penetration testing activities and input into Incident & Lessons Learnt calls to identify solutions Ensuring security policies are enforced and completing routine technical vulnerability assessments, working with IT Security Leads to propose and coordinate delivery of mitigating actions and required solutions Attend head office in Portsmouth at least once a quarter What you will need We're looking for a blend of skills and attributes that make you a great fit for this role. If you don't tick every box, don't worry - we provide tailored learning and development programs to help you grow and succeed with us. You hold a degree or equivalent career experience in a relevant discipline Experience with cloud computing services (IaaS, PaaS, SaaS), in particular AWS, MS Sentinel and Defender Proven experience in some or all of the following Sec Ops domain areas: Monitoring, investigating & performing triage on security alerts, Threat & Vulnerability Management, Security Incident handling, Security Intelligence analysis, SOC Tools administration & Security Forensics, Security Engineering You have good understanding and experience of Cyber Security Frameworks and standards (NCSC security principles, NIST Framework, ISO 27001, ISO27005, IEC62443 etc) You have great attention to detail, a confident communicator across various business levels and decision-maker when required Having experience in a cyber security role, IT support role and/or a background in infrastructure/endpoint support is essential Not sure you meet every requirement? Research shows some people - particularly women and those from underrepresented backgrounds - may hesitate to apply unless they meet every criteria. At SGN, we value diverse backgrounds, experiences and perspectives. If this role interests you but you're not sure you tick every box, we'd still love to hear from you. You might be just who we're looking for - now or in the future. Why SGN? SGN leads pioneering research and development for a energy system. Our innovative technologies are transforming the gas industry while keeping people safe and warm. We are an award-winning employer, including CCA Gold Awards for Great Places to Work and Inclusivity and Accessibility , and a proud Gold member of the Armed Forces Covenant. If you require any accommodations or support during the application process, reach out to us. We're here to help ensure an inclusive and accessible experience for everyone.
May 08, 2026
Full time
Technology Security Analyst Glasgow, Edinburgh, Portsmouth £55.5k-£66.7k per annum (Dependent on skills & qualifications) Full-time Joint-contribution pension from 6% (12% total) - Enhanced maternity & family leave - Life assurance - HolidayPlus - Virtual GP & Employee Assistance Programme plus retail and leisure discounts & many more. REQ5619 We are looking for a Security Operations Analyst to join us and ensure our IT and OT networks are secure and compliant. You will act as an SGN Security subject matter expert and act as the primary contact when assisting with Security incident remediation. We deliver safety, warmth, and comfort to homes and businesses. Every role, whether in the office or on the front line, plays a key part in this mission. Here's how you will contribute Providing support to different Security functions, including OT Security, Governance Risk and Compliance, Security Assurance and other key business needs Ensuring security metrics are well documented and presented at monthly reviews Being a subject matter expert and remaining up to date on cutting-edge technology, providing technical/nontechnical security support to the wider SGN Security team and organisation Working alongside third-party network vendors, coordinating security activities Support with varied tasks, including internal and external audits, penetration testing activities and input into Incident & Lessons Learnt calls to identify solutions Ensuring security policies are enforced and completing routine technical vulnerability assessments, working with IT Security Leads to propose and coordinate delivery of mitigating actions and required solutions Attend head office in Portsmouth at least once a quarter What you will need We're looking for a blend of skills and attributes that make you a great fit for this role. If you don't tick every box, don't worry - we provide tailored learning and development programs to help you grow and succeed with us. You hold a degree or equivalent career experience in a relevant discipline Experience with cloud computing services (IaaS, PaaS, SaaS), in particular AWS, MS Sentinel and Defender Proven experience in some or all of the following Sec Ops domain areas: Monitoring, investigating & performing triage on security alerts, Threat & Vulnerability Management, Security Incident handling, Security Intelligence analysis, SOC Tools administration & Security Forensics, Security Engineering You have good understanding and experience of Cyber Security Frameworks and standards (NCSC security principles, NIST Framework, ISO 27001, ISO27005, IEC62443 etc) You have great attention to detail, a confident communicator across various business levels and decision-maker when required Having experience in a cyber security role, IT support role and/or a background in infrastructure/endpoint support is essential Not sure you meet every requirement? Research shows some people - particularly women and those from underrepresented backgrounds - may hesitate to apply unless they meet every criteria. At SGN, we value diverse backgrounds, experiences and perspectives. If this role interests you but you're not sure you tick every box, we'd still love to hear from you. You might be just who we're looking for - now or in the future. Why SGN? SGN leads pioneering research and development for a energy system. Our innovative technologies are transforming the gas industry while keeping people safe and warm. We are an award-winning employer, including CCA Gold Awards for Great Places to Work and Inclusivity and Accessibility , and a proud Gold member of the Armed Forces Covenant. If you require any accommodations or support during the application process, reach out to us. We're here to help ensure an inclusive and accessible experience for everyone.
Job Description We're recruiting a Senior Information Security Analyst to support the Chief Information Security Officer in protecting and enhancing the organisation's security posture across Technology Services. This is a hands-on, operational role focused on monitoring, analysing and responding to security threats, while driving continuous improvement across our security operations capability. You'll play a key role in incident response, threat intelligence, vulnerability management and ensuring effective use of our security tools and processes to reduce risk across the technology estate. Key responsibilities Monitor, triage and respond to security alerts and events, ensuring effective prioritisation based on risk and impact Act as a first responder for security incidents, including participation in on-call support Analyse security data and alerts to identify trends, risks and potential threats Act as an escalation point for information security queries from colleagues and service delivery teams Support and coordinate patch management activities, validating effectiveness through vulnerability scanning Oversee and operate key security technologies, including SIEM, email and web gateways, and endpoint protection tools Monitor external threat intelligence sources and assess relevance to the organisation Produce and report on security metrics, KPIs and operational performance Technical expertise Good understanding of information security principles, risk management and the threat landscape Experience of operating and monitoring security tooling, including SIEM, endpoint protection, and email/web security solutions Ability to proactively conduct threat hunting activities and develop or enhance detection analytics to improve identification of malicious activity Awareness of cloud security controls and standards Experience of managing enterprise systems, including Microsoft Active Directory, Windows and Linux Knowledge of network security technologies, including proxies, end point security tools and data loss prevention controls are highly advantageous Skills and experience Experience working within recognised information security frameworks (e.g. ISO27001, NIST) Proven experience in an information security role, preferably within financial services or e-commerce Strong analytical capability, with the ability to interpret data and support decision-making Ability to take ownership of tasks and deliver through to completion Confident in providing challenge to improve security outcomes Effective communication skills, both written and verbal Well organised, with strong attention to detail and the ability to manage competing priorities Demonstrates a commitment to continuous professional development (e.g. CISSP or equivalent) About AJ Bell AJ Bell is one of the UK's fastest-growing investment platform businesses, providing award-winning solutions for everyone, from professional financial advisers to first-time investors. Today, over 644,000 customers trust us to manage more than £103.3 billion of assets. By continually striving to make investing simpler and more accessible, we're helping more people take control of their financial futures. We're proud to be recognised as one of the UK's Best 100 Companies to Work For, for six consecutive years, and a Great Place to Work in 2025 and 2026 a reflection of our supportive and collaborative culture. What we offer 26 days holiday, increasing with service + buy/sell scheme + bank holidays 7% Pension with matched contributions Discretionary bonus scheme Share schemes (including free shares and BAYE) Health Cash Plan and discounted private healthcare Free onsite gym Enhanced family leave (subject to qualifying criteria) Travel and bike loan schemes Employee Assistance Programme Life at AJ Bell Regular social events including summer and Christmas parties Learning and development opportunities tailored to you Casual dress code Friendly, supportive team environment Our ways of working We offer hybrid working, with a minimum of 50% of your working time per month spent in the office. For new starters, there's an initial period of full-time office working to help you settle in and build relationships. Inclusion & diversity We're committed to creating an inclusive environment where everyone feels respected and able to be themselves at work. We welcome applications from all backgrounds and make hiring decisions based on skills, experience and potential.
May 08, 2026
Full time
Job Description We're recruiting a Senior Information Security Analyst to support the Chief Information Security Officer in protecting and enhancing the organisation's security posture across Technology Services. This is a hands-on, operational role focused on monitoring, analysing and responding to security threats, while driving continuous improvement across our security operations capability. You'll play a key role in incident response, threat intelligence, vulnerability management and ensuring effective use of our security tools and processes to reduce risk across the technology estate. Key responsibilities Monitor, triage and respond to security alerts and events, ensuring effective prioritisation based on risk and impact Act as a first responder for security incidents, including participation in on-call support Analyse security data and alerts to identify trends, risks and potential threats Act as an escalation point for information security queries from colleagues and service delivery teams Support and coordinate patch management activities, validating effectiveness through vulnerability scanning Oversee and operate key security technologies, including SIEM, email and web gateways, and endpoint protection tools Monitor external threat intelligence sources and assess relevance to the organisation Produce and report on security metrics, KPIs and operational performance Technical expertise Good understanding of information security principles, risk management and the threat landscape Experience of operating and monitoring security tooling, including SIEM, endpoint protection, and email/web security solutions Ability to proactively conduct threat hunting activities and develop or enhance detection analytics to improve identification of malicious activity Awareness of cloud security controls and standards Experience of managing enterprise systems, including Microsoft Active Directory, Windows and Linux Knowledge of network security technologies, including proxies, end point security tools and data loss prevention controls are highly advantageous Skills and experience Experience working within recognised information security frameworks (e.g. ISO27001, NIST) Proven experience in an information security role, preferably within financial services or e-commerce Strong analytical capability, with the ability to interpret data and support decision-making Ability to take ownership of tasks and deliver through to completion Confident in providing challenge to improve security outcomes Effective communication skills, both written and verbal Well organised, with strong attention to detail and the ability to manage competing priorities Demonstrates a commitment to continuous professional development (e.g. CISSP or equivalent) About AJ Bell AJ Bell is one of the UK's fastest-growing investment platform businesses, providing award-winning solutions for everyone, from professional financial advisers to first-time investors. Today, over 644,000 customers trust us to manage more than £103.3 billion of assets. By continually striving to make investing simpler and more accessible, we're helping more people take control of their financial futures. We're proud to be recognised as one of the UK's Best 100 Companies to Work For, for six consecutive years, and a Great Place to Work in 2025 and 2026 a reflection of our supportive and collaborative culture. What we offer 26 days holiday, increasing with service + buy/sell scheme + bank holidays 7% Pension with matched contributions Discretionary bonus scheme Share schemes (including free shares and BAYE) Health Cash Plan and discounted private healthcare Free onsite gym Enhanced family leave (subject to qualifying criteria) Travel and bike loan schemes Employee Assistance Programme Life at AJ Bell Regular social events including summer and Christmas parties Learning and development opportunities tailored to you Casual dress code Friendly, supportive team environment Our ways of working We offer hybrid working, with a minimum of 50% of your working time per month spent in the office. For new starters, there's an initial period of full-time office working to help you settle in and build relationships. Inclusion & diversity We're committed to creating an inclusive environment where everyone feels respected and able to be themselves at work. We welcome applications from all backgrounds and make hiring decisions based on skills, experience and potential.
Automotive Compliance Support Analyst Location : Remote / Home Based with Limited UK Travel Salary : £30,000 £33,000 per annum DOE Contract : Permanent, Full time Benefits : 25 days annual leave plus bank holidays, Holiday buy and sell scheme, Private health insurance, Pension contribution, Employee referral scheme, Electric vehicle salary sacrifice scheme, Eye test vouchers and Employee Assistance Programme (EAP). About Us We are DEKRA Automotive, part of a global organisation employing over 49,000 people in more than 60 countries! In the UK, we deliver a wide range of services spanning the automotive, oil and gas, insurance, and chemical and process safety industries. Step into the world of luxury. Join DEKRA Automotive Ltd as an Automotive Brand Compliance Specialist and help uphold the exceptional standards of one of our prestigious global automotive clients, whilst enjoying the flexibility and balance of working from home. This opportunity is designed for talented professionals who seek a home-based role for personal reasons and want to be part of a luxury automotive brand, collaborating with like-minded peers. You ll play a key part in ensuring client brand integrity, supporting their retailers, and identifying emerging trends in compliance. As our Automotive Brand Compliance Specialist you will be responsible for: • Analysing retailer vehicle order data, investigating activities for non-compliance, and preparing clear, insightful reports for the client. • Using internal and external resources to dig deeper into findings and build robust, evidence-based portfolios for each case. • Communicating with the retailer network to resolve queries, provide support, and issue guidance or corrective actions through approachable and expert advice. • Presenting findings clearly to the client and lead virtual training sessions for retailer managers on due diligence and best practice, primarily via Microsoft Teams. • Partnering with internal and external stakeholders to champion a culture of compliance and premium customer service, using empathy, emotional intelligence, and polished communication at every stage. • Leveraging modern technology to maintain and update living documents, workflows, and client-facing presentations. Skills and Knowledge Required to Thrive Here: • Excellent analytical and organisational skills, taking personal pride in producing accurate and detailed reports. • Modern communication skills, confident presenting online, building rapport remotely, and collaborating in a virtual setting. • Intermediate tech proficiency (Excel, Word, PowerPoint, Teams); open to using new digital tools as the role evolves. • Genuine interest in compliance, with the ability to balance persuasive support with compliance standards. • Have a very positive and proactive approach to daily working requirements and be able to self-manage and contribute to achieving all programme-specific service level agreement elements. If the prospect of representing a luxury automotive brand while enjoying the benefits of flexible, remote work appeals to you, we invite you to join our team. Share your expertise, and let s work together to maintain brand-specific compliance standards. No agencies please.
Oct 07, 2025
Full time
Automotive Compliance Support Analyst Location : Remote / Home Based with Limited UK Travel Salary : £30,000 £33,000 per annum DOE Contract : Permanent, Full time Benefits : 25 days annual leave plus bank holidays, Holiday buy and sell scheme, Private health insurance, Pension contribution, Employee referral scheme, Electric vehicle salary sacrifice scheme, Eye test vouchers and Employee Assistance Programme (EAP). About Us We are DEKRA Automotive, part of a global organisation employing over 49,000 people in more than 60 countries! In the UK, we deliver a wide range of services spanning the automotive, oil and gas, insurance, and chemical and process safety industries. Step into the world of luxury. Join DEKRA Automotive Ltd as an Automotive Brand Compliance Specialist and help uphold the exceptional standards of one of our prestigious global automotive clients, whilst enjoying the flexibility and balance of working from home. This opportunity is designed for talented professionals who seek a home-based role for personal reasons and want to be part of a luxury automotive brand, collaborating with like-minded peers. You ll play a key part in ensuring client brand integrity, supporting their retailers, and identifying emerging trends in compliance. As our Automotive Brand Compliance Specialist you will be responsible for: • Analysing retailer vehicle order data, investigating activities for non-compliance, and preparing clear, insightful reports for the client. • Using internal and external resources to dig deeper into findings and build robust, evidence-based portfolios for each case. • Communicating with the retailer network to resolve queries, provide support, and issue guidance or corrective actions through approachable and expert advice. • Presenting findings clearly to the client and lead virtual training sessions for retailer managers on due diligence and best practice, primarily via Microsoft Teams. • Partnering with internal and external stakeholders to champion a culture of compliance and premium customer service, using empathy, emotional intelligence, and polished communication at every stage. • Leveraging modern technology to maintain and update living documents, workflows, and client-facing presentations. Skills and Knowledge Required to Thrive Here: • Excellent analytical and organisational skills, taking personal pride in producing accurate and detailed reports. • Modern communication skills, confident presenting online, building rapport remotely, and collaborating in a virtual setting. • Intermediate tech proficiency (Excel, Word, PowerPoint, Teams); open to using new digital tools as the role evolves. • Genuine interest in compliance, with the ability to balance persuasive support with compliance standards. • Have a very positive and proactive approach to daily working requirements and be able to self-manage and contribute to achieving all programme-specific service level agreement elements. If the prospect of representing a luxury automotive brand while enjoying the benefits of flexible, remote work appeals to you, we invite you to join our team. Share your expertise, and let s work together to maintain brand-specific compliance standards. No agencies please.
Senior Cyber Security Analyst Location: London hybrid working IR35: Inside via Triumph Consultants you will be paid PAYE for the length of the 3 month contract It is essential for candidates to have advanced proficiency in using Splunk for security monitoring, log analysis, threat detection, and reporting The role: The Cyber Defence team at the delivers threat intelligence, threat detection, incident response, and vulnerability management to defend both internal IT infrastructure and citizen-facing services. They are looking for a Senior Cyber Security Analyst with proven experience in incident response and Splunk to take a leading role in strengthening the organisation's cyber defence capability. Key Accountabilities: Lead investigations into security alerts and cyber incidents. Perform forensic analysis of systems, files, network traffic, and cloud environments. Drive technical response actions including containment, eradication, and recovery. Coordinate cyber incident responses across teams and stakeholders. Identify lessons learned and embed continual improvement. Develop and update incident response playbooks and knowledge base articles. Act as an escalation point and mentor for security analysts. Provide leadership and line management within the team. Join the out-of-hours on-call rota to support 24/7 incident response. Key Criteria: 5+ years' experience investigating and responding to cyber incidents in large organisations. Strong track record with incident response coordination. Significant hands-on experience with Splunk and security tools (eg, EDR, SIEM). Analytical, problem-solving, and forensic investigation skills. Proven experience coaching or mentoring junior staff. Strong understanding of threat actor tools, techniques, and procedures. Experience of cloud environments such as AWS Excellent written and verbal communication skills. How to Apply Quote the Job Title and Reference Number in your application. Submit your CV in Word format. Applications are reviewed on a rolling basis-early submission is recommended. We will also add your details to our mail out lists. Please note you may receive details of roles outside of your immediate vicinity, as many candidates are able to relocate temporarily for work. Please disregard any such emails that are not of interest and let us know if you would rather not receive such mailouts and/or if you wish us to delete your details and prefer to apply direct to our advertised roles. If you do not hear from us within three working days, unfortunately your application has not been shortlisted on this occasion. Thank you for your interest in working with us.
Oct 07, 2025
Contractor
Senior Cyber Security Analyst Location: London hybrid working IR35: Inside via Triumph Consultants you will be paid PAYE for the length of the 3 month contract It is essential for candidates to have advanced proficiency in using Splunk for security monitoring, log analysis, threat detection, and reporting The role: The Cyber Defence team at the delivers threat intelligence, threat detection, incident response, and vulnerability management to defend both internal IT infrastructure and citizen-facing services. They are looking for a Senior Cyber Security Analyst with proven experience in incident response and Splunk to take a leading role in strengthening the organisation's cyber defence capability. Key Accountabilities: Lead investigations into security alerts and cyber incidents. Perform forensic analysis of systems, files, network traffic, and cloud environments. Drive technical response actions including containment, eradication, and recovery. Coordinate cyber incident responses across teams and stakeholders. Identify lessons learned and embed continual improvement. Develop and update incident response playbooks and knowledge base articles. Act as an escalation point and mentor for security analysts. Provide leadership and line management within the team. Join the out-of-hours on-call rota to support 24/7 incident response. Key Criteria: 5+ years' experience investigating and responding to cyber incidents in large organisations. Strong track record with incident response coordination. Significant hands-on experience with Splunk and security tools (eg, EDR, SIEM). Analytical, problem-solving, and forensic investigation skills. Proven experience coaching or mentoring junior staff. Strong understanding of threat actor tools, techniques, and procedures. Experience of cloud environments such as AWS Excellent written and verbal communication skills. How to Apply Quote the Job Title and Reference Number in your application. Submit your CV in Word format. Applications are reviewed on a rolling basis-early submission is recommended. We will also add your details to our mail out lists. Please note you may receive details of roles outside of your immediate vicinity, as many candidates are able to relocate temporarily for work. Please disregard any such emails that are not of interest and let us know if you would rather not receive such mailouts and/or if you wish us to delete your details and prefer to apply direct to our advertised roles. If you do not hear from us within three working days, unfortunately your application has not been shortlisted on this occasion. Thank you for your interest in working with us.
A career at Lombard Odier means working for a renowned global wealth and asset manager, with a strong focus on sustainable investing. An innovative bank of choice for private and institutional clients, our independently owned Firm is one of the best-capitalised banking groups in the world, managing close to CHF 300 billion and operating from over 25 offices across 4 continents. With a history spanning over 225 years, Lombard Odier is an investment house providing a comprehensive offering of discretionary and advisory portfolio management, wealth services and custody. We also offer asset management services and investment strategies through Lombard Odier Investment Managers and provide advanced banking technology to other financial institutions. "Rethink Everything" is our philosophy - it is at the heart of everything we do. We have grown stronger through more than 40 financial crises by rethinking the world around us to provide a fresh investment perspective for our clients. Lombard Odier Investment Managers ("LOIM") is the asset management business of the Lombard Odier Group. In order to strengthen our Investment Risk team, we are looking for a: Investment Risk Data Analyst You will join a global business of more than 400 investment professionals and a network of 13 offices across Europe, Asia and North America. You will report to the Global Chief Risk Officer and support the Risk function by managing and analyzing data across platforms such as Bloomberg PORT and MARS, while ensuring data quality, developing risk analytics, and enhancing automation in risk management. The role can be based in Geneva, London or Luxembourg. YOUR ROLE Engagement with LOIM Investment Risk Managers and other primary stakeholders to design, develop and implement clear analytical solutions across all asset classes Take ownership of risk and performance dashboards and underlying data sourcing processes Help drive the migration of existing processes to automated processes and platforms in line with the team vision to increasingly leverage Artificial Intelligence. Management of existing data sets, ensuring the analytics tools are correctly sourcing data from data sources external to the immediate team Maintaining risk calculations and process feeds to external calculators Respond and prioritize ad-hoc requests for information as they arise Challenge existing processes and data feeds with the wider LOIM-IT and data community YOUR PROFILE You hold a Degree in Mathematics, Data Science, Finance or Statistics, You have experience in data analysis of large-scale, distributed data sets, in process automation You are interested in the financial industry and have domain knowledge of investment and securities and/or Artificial Intelligence applications. Understanding of risk management concepts including VaR, stress testing, and scenario analysis. You have the ability to challenge and provide supportive criticism You are familiar with BI tools (ie Tableau), process workflow automation tools (ie Alteryx), programming languages (Python). You have strong analytical and data manipulation skills and excellent statistical modelling skills Autonomous and self-motivated, you pay strong attention to detail. Flexible and results-oriented, with excellent problem-solving skills. Our Maison's DNA is defined by five core values. Excellence drives us to be the best at what we do, while Innovation fuels our progress. Respect underpins every interaction, and Integrity shapes our actions. Together, we are One Team, united in serving our clients with unwavering dedication. As a responsible and supportive employer, we promote a diverse and inclusive work environment for our employees and candidates. Diversity, Equity and Inclusion are woven into the fabric of our Maison's DNA, and we strive to ensure that our employees can fulfill both their personal and professional aspirations by encouraging internal mobility and individual upskilling programs. We firmly believe that building Diverse Teams contributes to our successes and to deliver on this, we actively embed Diversity, Equity and Inclusion in our business strategy. It is an exciting time to join our Teams. All applications will be handled in the strictest confidence.
Oct 05, 2025
Full time
A career at Lombard Odier means working for a renowned global wealth and asset manager, with a strong focus on sustainable investing. An innovative bank of choice for private and institutional clients, our independently owned Firm is one of the best-capitalised banking groups in the world, managing close to CHF 300 billion and operating from over 25 offices across 4 continents. With a history spanning over 225 years, Lombard Odier is an investment house providing a comprehensive offering of discretionary and advisory portfolio management, wealth services and custody. We also offer asset management services and investment strategies through Lombard Odier Investment Managers and provide advanced banking technology to other financial institutions. "Rethink Everything" is our philosophy - it is at the heart of everything we do. We have grown stronger through more than 40 financial crises by rethinking the world around us to provide a fresh investment perspective for our clients. Lombard Odier Investment Managers ("LOIM") is the asset management business of the Lombard Odier Group. In order to strengthen our Investment Risk team, we are looking for a: Investment Risk Data Analyst You will join a global business of more than 400 investment professionals and a network of 13 offices across Europe, Asia and North America. You will report to the Global Chief Risk Officer and support the Risk function by managing and analyzing data across platforms such as Bloomberg PORT and MARS, while ensuring data quality, developing risk analytics, and enhancing automation in risk management. The role can be based in Geneva, London or Luxembourg. YOUR ROLE Engagement with LOIM Investment Risk Managers and other primary stakeholders to design, develop and implement clear analytical solutions across all asset classes Take ownership of risk and performance dashboards and underlying data sourcing processes Help drive the migration of existing processes to automated processes and platforms in line with the team vision to increasingly leverage Artificial Intelligence. Management of existing data sets, ensuring the analytics tools are correctly sourcing data from data sources external to the immediate team Maintaining risk calculations and process feeds to external calculators Respond and prioritize ad-hoc requests for information as they arise Challenge existing processes and data feeds with the wider LOIM-IT and data community YOUR PROFILE You hold a Degree in Mathematics, Data Science, Finance or Statistics, You have experience in data analysis of large-scale, distributed data sets, in process automation You are interested in the financial industry and have domain knowledge of investment and securities and/or Artificial Intelligence applications. Understanding of risk management concepts including VaR, stress testing, and scenario analysis. You have the ability to challenge and provide supportive criticism You are familiar with BI tools (ie Tableau), process workflow automation tools (ie Alteryx), programming languages (Python). You have strong analytical and data manipulation skills and excellent statistical modelling skills Autonomous and self-motivated, you pay strong attention to detail. Flexible and results-oriented, with excellent problem-solving skills. Our Maison's DNA is defined by five core values. Excellence drives us to be the best at what we do, while Innovation fuels our progress. Respect underpins every interaction, and Integrity shapes our actions. Together, we are One Team, united in serving our clients with unwavering dedication. As a responsible and supportive employer, we promote a diverse and inclusive work environment for our employees and candidates. Diversity, Equity and Inclusion are woven into the fabric of our Maison's DNA, and we strive to ensure that our employees can fulfill both their personal and professional aspirations by encouraging internal mobility and individual upskilling programs. We firmly believe that building Diverse Teams contributes to our successes and to deliver on this, we actively embed Diversity, Equity and Inclusion in our business strategy. It is an exciting time to join our Teams. All applications will be handled in the strictest confidence.
A career at Lombard Odier means working for a renowned global wealth and asset manager, with a strong focus on sustainable investing. An innovative bank of choice for private and institutional clients, our independently owned Firm is one of the best-capitalised banking groups in the world, managing close to CHF 300 billion and operating from over 25 offices across 4 continents. With a history spanning over 225 years, Lombard Odier is an investment house providing a comprehensive offering of discretionary and advisory portfolio management, wealth services and custody. We also offer asset management services and investment strategies through Lombard Odier Investment Managers and provide advanced banking technology to other financial institutions. "Rethink Everything" is our philosophy - it is at the heart of everything we do. We have grown stronger through more than 40 financial crises by rethinking the world around us to provide a fresh investment perspective for our clients. Lombard Odier Investment Managers ("LOIM") is the asset management business of the Lombard Odier Group. In order to strengthen our Investment Risk team, we are looking for a: Investment Risk Data Analyst You will join a global business of more than 400 investment professionals and a network of 13 offices across Europe, Asia and North America. You will report to the Global Chief Risk Officer and support the Risk function by managing and analyzing data across platforms such as Bloomberg PORT and MARS, while ensuring data quality, developing risk analytics, and enhancing automation in risk management. The role can be based in Geneva, London or Luxembourg. YOUR ROLE Engagement with LOIM Investment Risk Managers and other primary stakeholders to design, develop and implement clear analytical solutions across all asset classes Take ownership of risk and performance dashboards and underlying data sourcing processes Help drive the migration of existing processes to automated processes and platforms in line with the team vision to increasingly leverage Artificial Intelligence. Management of existing data sets, ensuring the analytics tools are correctly sourcing data from data sources external to the immediate team Maintaining risk calculations and process feeds to external calculators Respond and prioritize ad-hoc requests for information as they arise Challenge existing processes and data feeds with the wider LOIM-IT and data community YOUR PROFILE You hold a Degree in Mathematics, Data Science, Finance or Statistics, You have experience in data analysis of large-scale, distributed data sets, in process automation You are interested in the financial industry and have domain knowledge of investment and securities and/or Artificial Intelligence applications. Understanding of risk management concepts including VaR, stress testing, and scenario analysis. You have the ability to challenge and provide supportive criticism You are familiar with BI tools (ie Tableau), process workflow automation tools (ie Alteryx), programming languages (Python). You have strong analytical and data manipulation skills and excellent statistical modelling skills Autonomous and self-motivated, you pay strong attention to detail. Flexible and results-oriented, with excellent problem-solving skills. Our Maison's DNA is defined by five core values. Excellence drives us to be the best at what we do, while Innovation fuels our progress. Respect underpins every interaction, and Integrity shapes our actions. Together, we are One Team, united in serving our clients with unwavering dedication. As a responsible and supportive employer, we promote a diverse and inclusive work environment for our employees and candidates. Diversity, Equity and Inclusion are woven into the fabric of our Maison's DNA, and we strive to ensure that our employees can fulfill both their personal and professional aspirations by encouraging internal mobility and individual upskilling programs. We firmly believe that building Diverse Teams contributes to our successes and to deliver on this, we actively embed Diversity, Equity and Inclusion in our business strategy. It is an exciting time to join our Teams. All applications will be handled in the strictest confidence.
Oct 05, 2025
Full time
A career at Lombard Odier means working for a renowned global wealth and asset manager, with a strong focus on sustainable investing. An innovative bank of choice for private and institutional clients, our independently owned Firm is one of the best-capitalised banking groups in the world, managing close to CHF 300 billion and operating from over 25 offices across 4 continents. With a history spanning over 225 years, Lombard Odier is an investment house providing a comprehensive offering of discretionary and advisory portfolio management, wealth services and custody. We also offer asset management services and investment strategies through Lombard Odier Investment Managers and provide advanced banking technology to other financial institutions. "Rethink Everything" is our philosophy - it is at the heart of everything we do. We have grown stronger through more than 40 financial crises by rethinking the world around us to provide a fresh investment perspective for our clients. Lombard Odier Investment Managers ("LOIM") is the asset management business of the Lombard Odier Group. In order to strengthen our Investment Risk team, we are looking for a: Investment Risk Data Analyst You will join a global business of more than 400 investment professionals and a network of 13 offices across Europe, Asia and North America. You will report to the Global Chief Risk Officer and support the Risk function by managing and analyzing data across platforms such as Bloomberg PORT and MARS, while ensuring data quality, developing risk analytics, and enhancing automation in risk management. The role can be based in Geneva, London or Luxembourg. YOUR ROLE Engagement with LOIM Investment Risk Managers and other primary stakeholders to design, develop and implement clear analytical solutions across all asset classes Take ownership of risk and performance dashboards and underlying data sourcing processes Help drive the migration of existing processes to automated processes and platforms in line with the team vision to increasingly leverage Artificial Intelligence. Management of existing data sets, ensuring the analytics tools are correctly sourcing data from data sources external to the immediate team Maintaining risk calculations and process feeds to external calculators Respond and prioritize ad-hoc requests for information as they arise Challenge existing processes and data feeds with the wider LOIM-IT and data community YOUR PROFILE You hold a Degree in Mathematics, Data Science, Finance or Statistics, You have experience in data analysis of large-scale, distributed data sets, in process automation You are interested in the financial industry and have domain knowledge of investment and securities and/or Artificial Intelligence applications. Understanding of risk management concepts including VaR, stress testing, and scenario analysis. You have the ability to challenge and provide supportive criticism You are familiar with BI tools (ie Tableau), process workflow automation tools (ie Alteryx), programming languages (Python). You have strong analytical and data manipulation skills and excellent statistical modelling skills Autonomous and self-motivated, you pay strong attention to detail. Flexible and results-oriented, with excellent problem-solving skills. Our Maison's DNA is defined by five core values. Excellence drives us to be the best at what we do, while Innovation fuels our progress. Respect underpins every interaction, and Integrity shapes our actions. Together, we are One Team, united in serving our clients with unwavering dedication. As a responsible and supportive employer, we promote a diverse and inclusive work environment for our employees and candidates. Diversity, Equity and Inclusion are woven into the fabric of our Maison's DNA, and we strive to ensure that our employees can fulfill both their personal and professional aspirations by encouraging internal mobility and individual upskilling programs. We firmly believe that building Diverse Teams contributes to our successes and to deliver on this, we actively embed Diversity, Equity and Inclusion in our business strategy. It is an exciting time to join our Teams. All applications will be handled in the strictest confidence.
Principal Cyber Security Incident Response Analyst 60,000 - 70,000 Full Time / Permanent West Midlands / Hybrid (1-2 days a month in the office ideally) The Role I am looking for a driven and experienced Principal Cyber Security Incident Response Analyst to join a large nationally recognised brand head quartered in the West Midlands. As a Principal Cyber Security Incident Response Analyst, you will play a pivotal role in protecting critical systems, assets, and people from cyber security threats. You'll be part of a world-class team, working at the forefront of threat detection and response. We are ideally looking for someone Midlands based who can be on site in Warwickshire 1-2 days a month on average. Responsibilities: Provide leadership and mentorship to Analysts and Senior Analysts, fostering a culture of excellence and continuous development. Drive the evolution and enhancement of the Cyber Security Incident Response function, ensuring the team consistently meets and exceeds key performance indicators. Lead investigations and remediation efforts for cyber security incidents and alerts across diverse sources, including network, endpoint, cloud environments, and threat intelligence feeds. Perform in-depth trend analysis to identify patterns and inform improvements in organisational controls and threat detection capabilities. Develop, maintain, and continuously improve documentation and reporting frameworks to support transparency, consistency, and strategic decision-making. Experience required: Previous experience in a similar Cyber Incident Response Analyst role, preferably in a senior or lead capacity. Strong experience in security monitoring across diverse systems and environments, including cloud and on-premises. Proven leadership in incident response within SOC settings. Deep understanding of the cyber threat landscape, attack vectors, and detection techniques. Proficient in cybersecurity tools, regulations, and compliance standards. Excellent communication and stakeholder engagement skills, with the ability to convey technical insights to varied audiences. Please apply via the link or contact (url removed) for more information Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers in the UK. Modis Europe Ltd provide a variety of international solutions that connect clients to the best talent in the world. For all positions based in Switzerland, Modis Europe Ltd works with its licensed Swiss partner Accurity GmbH to ensure that candidate applications are handled in accordance with Swiss law. Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers. By applying for this role your details will be submitted to Modis International Ltd and/ or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website.
Oct 04, 2025
Full time
Principal Cyber Security Incident Response Analyst 60,000 - 70,000 Full Time / Permanent West Midlands / Hybrid (1-2 days a month in the office ideally) The Role I am looking for a driven and experienced Principal Cyber Security Incident Response Analyst to join a large nationally recognised brand head quartered in the West Midlands. As a Principal Cyber Security Incident Response Analyst, you will play a pivotal role in protecting critical systems, assets, and people from cyber security threats. You'll be part of a world-class team, working at the forefront of threat detection and response. We are ideally looking for someone Midlands based who can be on site in Warwickshire 1-2 days a month on average. Responsibilities: Provide leadership and mentorship to Analysts and Senior Analysts, fostering a culture of excellence and continuous development. Drive the evolution and enhancement of the Cyber Security Incident Response function, ensuring the team consistently meets and exceeds key performance indicators. Lead investigations and remediation efforts for cyber security incidents and alerts across diverse sources, including network, endpoint, cloud environments, and threat intelligence feeds. Perform in-depth trend analysis to identify patterns and inform improvements in organisational controls and threat detection capabilities. Develop, maintain, and continuously improve documentation and reporting frameworks to support transparency, consistency, and strategic decision-making. Experience required: Previous experience in a similar Cyber Incident Response Analyst role, preferably in a senior or lead capacity. Strong experience in security monitoring across diverse systems and environments, including cloud and on-premises. Proven leadership in incident response within SOC settings. Deep understanding of the cyber threat landscape, attack vectors, and detection techniques. Proficient in cybersecurity tools, regulations, and compliance standards. Excellent communication and stakeholder engagement skills, with the ability to convey technical insights to varied audiences. Please apply via the link or contact (url removed) for more information Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers in the UK. Modis Europe Ltd provide a variety of international solutions that connect clients to the best talent in the world. For all positions based in Switzerland, Modis Europe Ltd works with its licensed Swiss partner Accurity GmbH to ensure that candidate applications are handled in accordance with Swiss law. Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers. By applying for this role your details will be submitted to Modis International Ltd and/ or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website.
Job Title: Senior Cyber Security Analyst - SC Location : Hybrid/London - 3 days a week on site Contract Duration : 3 months initially Daily Rate: £800/day (Umbrella - Maximum) IR35 Status: Inside IR35 Minimum requirement: Experience of investigating and responding to cyber incidents, coordinating incident response in large org 5+ years' experience with SPLUNK EDR (Endpoint Detection and Response) Analytical, problem solving Security Clearance: SC Senior Cyber Security Analyst The Cyber Defence team delivers cyber threat intelligence, threat detection, incident response and Vulnerability management capabilities for the organisation, and is responsible for defending both internal IT infrastructure and citizen-facing services. As a senior security analyst, you'll take a leading role in building and delivering these core capabilities, focusing on incident response. As a senior security analyst with responsibility for incident response, you will l: Lead the investigation of security alerts to understand the nature and extent of possible cyber incidents Lead the forensic analysis of systems, files, network traffic and cloud environments Lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions Support the wider coordination of cyber incidents Review previous incidents to identify lessons and actions Identify and deliver opportunities for continual improvement of the incident response capability Work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities Develop and update internal plans, playbooks and knowledge base articles Act as an escalation point for, and provide coaching and mentoring to, security analysts Be responsible for leadership and line management of security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join. We're interested in people who have: Significant experience investigating and responding to cyber incidents Significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience managing and coordinating the response to cyber incidents Experience coaching and mentoring junior staff An in-depth understanding of the tools, techniques and procedures used by threat actors Excellent analytical and problem solving skills Excellent verbal and written communication skills Experience with Splunk Experience working in an Agile environment Experience with cloud environments such as AWS Disability Confident As a member of the disability confident scheme, CLIENT guarantees to interview all candidates who have a disability and who meet all the essential criteria for the vacancy. In cases where we have a high volume of candidates who have a disability who meet all the essential criteria, we will interview the best candidates from within that group. Armed Forces Covenant CLIENT is proud to support the Armed Forces Covenant and as such, we guarantee to interview all veterans or spouses/partners of military personnel who meet all the essential criteria for the vacancy. In cases where we have a high volume of ex-military candidates/military spouses or partners, who meet all of the essential criteria, we will interview the best candidates from within that group. If you qualify for the above, please notify us. We will be in touch to discuss your suitability and arrange your Guaranteed Interview. Should you require reasonable adjustments at any point during the recruitment process or if there is a more accessible way for us to communicate, please do let me know. To apply for this role please submit your latest CV or contact Aspect Resources
Oct 03, 2025
Contractor
Job Title: Senior Cyber Security Analyst - SC Location : Hybrid/London - 3 days a week on site Contract Duration : 3 months initially Daily Rate: £800/day (Umbrella - Maximum) IR35 Status: Inside IR35 Minimum requirement: Experience of investigating and responding to cyber incidents, coordinating incident response in large org 5+ years' experience with SPLUNK EDR (Endpoint Detection and Response) Analytical, problem solving Security Clearance: SC Senior Cyber Security Analyst The Cyber Defence team delivers cyber threat intelligence, threat detection, incident response and Vulnerability management capabilities for the organisation, and is responsible for defending both internal IT infrastructure and citizen-facing services. As a senior security analyst, you'll take a leading role in building and delivering these core capabilities, focusing on incident response. As a senior security analyst with responsibility for incident response, you will l: Lead the investigation of security alerts to understand the nature and extent of possible cyber incidents Lead the forensic analysis of systems, files, network traffic and cloud environments Lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions Support the wider coordination of cyber incidents Review previous incidents to identify lessons and actions Identify and deliver opportunities for continual improvement of the incident response capability Work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities Develop and update internal plans, playbooks and knowledge base articles Act as an escalation point for, and provide coaching and mentoring to, security analysts Be responsible for leadership and line management of security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join. We're interested in people who have: Significant experience investigating and responding to cyber incidents Significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience managing and coordinating the response to cyber incidents Experience coaching and mentoring junior staff An in-depth understanding of the tools, techniques and procedures used by threat actors Excellent analytical and problem solving skills Excellent verbal and written communication skills Experience with Splunk Experience working in an Agile environment Experience with cloud environments such as AWS Disability Confident As a member of the disability confident scheme, CLIENT guarantees to interview all candidates who have a disability and who meet all the essential criteria for the vacancy. In cases where we have a high volume of candidates who have a disability who meet all the essential criteria, we will interview the best candidates from within that group. Armed Forces Covenant CLIENT is proud to support the Armed Forces Covenant and as such, we guarantee to interview all veterans or spouses/partners of military personnel who meet all the essential criteria for the vacancy. In cases where we have a high volume of ex-military candidates/military spouses or partners, who meet all of the essential criteria, we will interview the best candidates from within that group. If you qualify for the above, please notify us. We will be in touch to discuss your suitability and arrange your Guaranteed Interview. Should you require reasonable adjustments at any point during the recruitment process or if there is a more accessible way for us to communicate, please do let me know. To apply for this role please submit your latest CV or contact Aspect Resources
A career at Lombard Odier means working for a renowned global wealth and asset manager, with a strong focus on sustainable investing. An innovative bank of choice for private and institutional clients, our independently owned Firm is one of the best-capitalised banking groups in the world, managing close to CHF 300 billion and operating from over 25 offices across 4 continents. With a history spanning over 225 years, Lombard Odier is an investment house providing a comprehensive offering of discretionary and advisory portfolio management, wealth services and custody. We also offer asset management services and investment strategies through Lombard Odier Investment Managers and provide advanced banking technology to other financial institutions. "Rethink Everything" is our philosophy - it is at the heart of everything we do. We have grown stronger through more than 40 financial crises by rethinking the world around us to provide a fresh investment perspective for our clients. Lombard Odier Investment Managers ("LOIM") is the asset management business of the Lombard Odier Group. In order to strengthen our Investment Risk team, we are looking for a: Investment Risk Data Analyst You will join a global business of more than 400 investment professionals and a network of 13 offices across Europe, Asia and North America. You will report to the Global Chief Risk Officer and support the Risk function by managing and analyzing data across platforms such as Bloomberg PORT and MARS, while ensuring data quality, developing risk analytics, and enhancing automation in risk management. The role can be based in Geneva, London or Luxembourg. YOUR ROLE Engagement with LOIM Investment Risk Managers and other primary stakeholders to design, develop and implement clear analytical solutions across all asset classes Take ownership of risk and performance dashboards and underlying data sourcing processes Help drive the migration of existing processes to automated processes and platforms in line with the team vision to increasingly leverage Artificial Intelligence. Management of existing data sets, ensuring the analytics tools are correctly sourcing data from data sources external to the immediate team Maintaining risk calculations and process feeds to external calculators Respond and prioritize ad-hoc requests for information as they arise Challenge existing processes and data feeds with the wider LOIM-IT and data community YOUR PROFILE You hold a Degree in Mathematics, Data Science, Finance or Statistics, You have experience in data analysis of large-scale, distributed data sets, in process automation You are interested in the financial industry and have domain knowledge of investment and securities and/or Artificial Intelligence applications. Understanding of risk management concepts including VaR, stress testing, and scenario analysis. You have the ability to challenge and provide supportive criticism You are familiar with BI tools (ie Tableau), process workflow automation tools (ie Alteryx), programming languages (Python). You have strong analytical and data manipulation skills and excellent statistical modelling skills Autonomous and self-motivated, you pay strong attention to detail. Flexible and results-oriented, with excellent problem-solving skills. Our Maison's DNA is defined by five core values. Excellence drives us to be the best at what we do, while Innovation fuels our progress. Respect underpins every interaction, and Integrity shapes our actions. Together, we are One Team, united in serving our clients with unwavering dedication. As a responsible and supportive employer, we promote a diverse and inclusive work environment for our employees and candidates. Diversity, Equity and Inclusion are woven into the fabric of our Maison's DNA, and we strive to ensure that our employees can fulfill both their personal and professional aspirations by encouraging internal mobility and individual upskilling programs. We firmly believe that building Diverse Teams contributes to our successes and to deliver on this, we actively embed Diversity, Equity and Inclusion in our business strategy. It is an exciting time to join our Teams. All applications will be handled in the strictest confidence.
Oct 03, 2025
Full time
A career at Lombard Odier means working for a renowned global wealth and asset manager, with a strong focus on sustainable investing. An innovative bank of choice for private and institutional clients, our independently owned Firm is one of the best-capitalised banking groups in the world, managing close to CHF 300 billion and operating from over 25 offices across 4 continents. With a history spanning over 225 years, Lombard Odier is an investment house providing a comprehensive offering of discretionary and advisory portfolio management, wealth services and custody. We also offer asset management services and investment strategies through Lombard Odier Investment Managers and provide advanced banking technology to other financial institutions. "Rethink Everything" is our philosophy - it is at the heart of everything we do. We have grown stronger through more than 40 financial crises by rethinking the world around us to provide a fresh investment perspective for our clients. Lombard Odier Investment Managers ("LOIM") is the asset management business of the Lombard Odier Group. In order to strengthen our Investment Risk team, we are looking for a: Investment Risk Data Analyst You will join a global business of more than 400 investment professionals and a network of 13 offices across Europe, Asia and North America. You will report to the Global Chief Risk Officer and support the Risk function by managing and analyzing data across platforms such as Bloomberg PORT and MARS, while ensuring data quality, developing risk analytics, and enhancing automation in risk management. The role can be based in Geneva, London or Luxembourg. YOUR ROLE Engagement with LOIM Investment Risk Managers and other primary stakeholders to design, develop and implement clear analytical solutions across all asset classes Take ownership of risk and performance dashboards and underlying data sourcing processes Help drive the migration of existing processes to automated processes and platforms in line with the team vision to increasingly leverage Artificial Intelligence. Management of existing data sets, ensuring the analytics tools are correctly sourcing data from data sources external to the immediate team Maintaining risk calculations and process feeds to external calculators Respond and prioritize ad-hoc requests for information as they arise Challenge existing processes and data feeds with the wider LOIM-IT and data community YOUR PROFILE You hold a Degree in Mathematics, Data Science, Finance or Statistics, You have experience in data analysis of large-scale, distributed data sets, in process automation You are interested in the financial industry and have domain knowledge of investment and securities and/or Artificial Intelligence applications. Understanding of risk management concepts including VaR, stress testing, and scenario analysis. You have the ability to challenge and provide supportive criticism You are familiar with BI tools (ie Tableau), process workflow automation tools (ie Alteryx), programming languages (Python). You have strong analytical and data manipulation skills and excellent statistical modelling skills Autonomous and self-motivated, you pay strong attention to detail. Flexible and results-oriented, with excellent problem-solving skills. Our Maison's DNA is defined by five core values. Excellence drives us to be the best at what we do, while Innovation fuels our progress. Respect underpins every interaction, and Integrity shapes our actions. Together, we are One Team, united in serving our clients with unwavering dedication. As a responsible and supportive employer, we promote a diverse and inclusive work environment for our employees and candidates. Diversity, Equity and Inclusion are woven into the fabric of our Maison's DNA, and we strive to ensure that our employees can fulfill both their personal and professional aspirations by encouraging internal mobility and individual upskilling programs. We firmly believe that building Diverse Teams contributes to our successes and to deliver on this, we actively embed Diversity, Equity and Inclusion in our business strategy. It is an exciting time to join our Teams. All applications will be handled in the strictest confidence.
A career at Lombard Odier means working for a renowned global wealth and asset manager, with a strong focus on sustainable investing. An innovative bank of choice for private and institutional clients, our independently owned Firm is one of the best-capitalised banking groups in the world, managing close to CHF 300 billion and operating from over 25 offices across 4 continents. With a history spanning over 225 years, Lombard Odier is an investment house providing a comprehensive offering of discretionary and advisory portfolio management, wealth services and custody. We also offer asset management services and investment strategies through Lombard Odier Investment Managers and provide advanced banking technology to other financial institutions. "Rethink Everything" is our philosophy - it is at the heart of everything we do. We have grown stronger through more than 40 financial crises by rethinking the world around us to provide a fresh investment perspective for our clients. Lombard Odier Investment Managers ("LOIM") is the asset management business of the Lombard Odier Group. In order to strengthen our Investment Risk team, we are looking for a: Investment Risk Data Analyst You will join a global business of more than 400 investment professionals and a network of 13 offices across Europe, Asia and North America. You will report to the Global Chief Risk Officer and support the Risk function by managing and analyzing data across platforms such as Bloomberg PORT and MARS, while ensuring data quality, developing risk analytics, and enhancing automation in risk management. The role can be based in Geneva, London or Luxembourg. YOUR ROLE Engagement with LOIM Investment Risk Managers and other primary stakeholders to design, develop and implement clear analytical solutions across all asset classes Take ownership of risk and performance dashboards and underlying data sourcing processes Help drive the migration of existing processes to automated processes and platforms in line with the team vision to increasingly leverage Artificial Intelligence. Management of existing data sets, ensuring the analytics tools are correctly sourcing data from data sources external to the immediate team Maintaining risk calculations and process feeds to external calculators Respond and prioritize ad-hoc requests for information as they arise Challenge existing processes and data feeds with the wider LOIM-IT and data community YOUR PROFILE You hold a Degree in Mathematics, Data Science, Finance or Statistics, You have experience in data analysis of large-scale, distributed data sets, in process automation You are interested in the financial industry and have domain knowledge of investment and securities and/or Artificial Intelligence applications. Understanding of risk management concepts including VaR, stress testing, and scenario analysis. You have the ability to challenge and provide supportive criticism You are familiar with BI tools (ie Tableau), process workflow automation tools (ie Alteryx), programming languages (Python). You have strong analytical and data manipulation skills and excellent statistical modelling skills Autonomous and self-motivated, you pay strong attention to detail. Flexible and results-oriented, with excellent problem-solving skills. Our Maison's DNA is defined by five core values. Excellence drives us to be the best at what we do, while Innovation fuels our progress. Respect underpins every interaction, and Integrity shapes our actions. Together, we are One Team, united in serving our clients with unwavering dedication. As a responsible and supportive employer, we promote a diverse and inclusive work environment for our employees and candidates. Diversity, Equity and Inclusion are woven into the fabric of our Maison's DNA, and we strive to ensure that our employees can fulfill both their personal and professional aspirations by encouraging internal mobility and individual upskilling programs. We firmly believe that building Diverse Teams contributes to our successes and to deliver on this, we actively embed Diversity, Equity and Inclusion in our business strategy. It is an exciting time to join our Teams. All applications will be handled in the strictest confidence.
Oct 03, 2025
Full time
A career at Lombard Odier means working for a renowned global wealth and asset manager, with a strong focus on sustainable investing. An innovative bank of choice for private and institutional clients, our independently owned Firm is one of the best-capitalised banking groups in the world, managing close to CHF 300 billion and operating from over 25 offices across 4 continents. With a history spanning over 225 years, Lombard Odier is an investment house providing a comprehensive offering of discretionary and advisory portfolio management, wealth services and custody. We also offer asset management services and investment strategies through Lombard Odier Investment Managers and provide advanced banking technology to other financial institutions. "Rethink Everything" is our philosophy - it is at the heart of everything we do. We have grown stronger through more than 40 financial crises by rethinking the world around us to provide a fresh investment perspective for our clients. Lombard Odier Investment Managers ("LOIM") is the asset management business of the Lombard Odier Group. In order to strengthen our Investment Risk team, we are looking for a: Investment Risk Data Analyst You will join a global business of more than 400 investment professionals and a network of 13 offices across Europe, Asia and North America. You will report to the Global Chief Risk Officer and support the Risk function by managing and analyzing data across platforms such as Bloomberg PORT and MARS, while ensuring data quality, developing risk analytics, and enhancing automation in risk management. The role can be based in Geneva, London or Luxembourg. YOUR ROLE Engagement with LOIM Investment Risk Managers and other primary stakeholders to design, develop and implement clear analytical solutions across all asset classes Take ownership of risk and performance dashboards and underlying data sourcing processes Help drive the migration of existing processes to automated processes and platforms in line with the team vision to increasingly leverage Artificial Intelligence. Management of existing data sets, ensuring the analytics tools are correctly sourcing data from data sources external to the immediate team Maintaining risk calculations and process feeds to external calculators Respond and prioritize ad-hoc requests for information as they arise Challenge existing processes and data feeds with the wider LOIM-IT and data community YOUR PROFILE You hold a Degree in Mathematics, Data Science, Finance or Statistics, You have experience in data analysis of large-scale, distributed data sets, in process automation You are interested in the financial industry and have domain knowledge of investment and securities and/or Artificial Intelligence applications. Understanding of risk management concepts including VaR, stress testing, and scenario analysis. You have the ability to challenge and provide supportive criticism You are familiar with BI tools (ie Tableau), process workflow automation tools (ie Alteryx), programming languages (Python). You have strong analytical and data manipulation skills and excellent statistical modelling skills Autonomous and self-motivated, you pay strong attention to detail. Flexible and results-oriented, with excellent problem-solving skills. Our Maison's DNA is defined by five core values. Excellence drives us to be the best at what we do, while Innovation fuels our progress. Respect underpins every interaction, and Integrity shapes our actions. Together, we are One Team, united in serving our clients with unwavering dedication. As a responsible and supportive employer, we promote a diverse and inclusive work environment for our employees and candidates. Diversity, Equity and Inclusion are woven into the fabric of our Maison's DNA, and we strive to ensure that our employees can fulfill both their personal and professional aspirations by encouraging internal mobility and individual upskilling programs. We firmly believe that building Diverse Teams contributes to our successes and to deliver on this, we actively embed Diversity, Equity and Inclusion in our business strategy. It is an exciting time to join our Teams. All applications will be handled in the strictest confidence.
A career at Lombard Odier means working for a renowned global wealth and asset manager, with a strong focus on sustainable investing. An innovative bank of choice for private and institutional clients, our independently owned Firm is one of the best-capitalised banking groups in the world, managing close to CHF 300 billion and operating from over 25 offices across 4 continents. With a history spanning over 225 years, Lombard Odier is an investment house providing a comprehensive offering of discretionary and advisory portfolio management, wealth services and custody. We also offer asset management services and investment strategies through Lombard Odier Investment Managers and provide advanced banking technology to other financial institutions. "Rethink Everything" is our philosophy - it is at the heart of everything we do. We have grown stronger through more than 40 financial crises by rethinking the world around us to provide a fresh investment perspective for our clients. Lombard Odier Investment Managers ("LOIM") is the asset management business of the Lombard Odier Group. In order to strengthen our Investment Risk team, we are looking for a: Investment Risk Data Analyst You will join a global business of more than 400 investment professionals and a network of 13 offices across Europe, Asia and North America. You will report to the Global Chief Risk Officer and support the Risk function by managing and analyzing data across platforms such as Bloomberg PORT and MARS, while ensuring data quality, developing risk analytics, and enhancing automation in risk management. The role can be based in Geneva, London or Luxembourg. YOUR ROLE Engagement with LOIM Investment Risk Managers and other primary stakeholders to design, develop and implement clear analytical solutions across all asset classes Take ownership of risk and performance dashboards and underlying data sourcing processes Help drive the migration of existing processes to automated processes and platforms in line with the team vision to increasingly leverage Artificial Intelligence. Management of existing data sets, ensuring the analytics tools are correctly sourcing data from data sources external to the immediate team Maintaining risk calculations and process feeds to external calculators Respond and prioritize ad-hoc requests for information as they arise Challenge existing processes and data feeds with the wider LOIM-IT and data community YOUR PROFILE You hold a Degree in Mathematics, Data Science, Finance or Statistics, You have experience in data analysis of large-scale, distributed data sets, in process automation You are interested in the financial industry and have domain knowledge of investment and securities and/or Artificial Intelligence applications. Understanding of risk management concepts including VaR, stress testing, and scenario analysis. You have the ability to challenge and provide supportive criticism You are familiar with BI tools (ie Tableau), process workflow automation tools (ie Alteryx), programming languages (Python). You have strong analytical and data manipulation skills and excellent statistical modelling skills Autonomous and self-motivated, you pay strong attention to detail. Flexible and results-oriented, with excellent problem-solving skills. Our Maison's DNA is defined by five core values. Excellence drives us to be the best at what we do, while Innovation fuels our progress. Respect underpins every interaction, and Integrity shapes our actions. Together, we are One Team, united in serving our clients with unwavering dedication. As a responsible and supportive employer, we promote a diverse and inclusive work environment for our employees and candidates. Diversity, Equity and Inclusion are woven into the fabric of our Maison's DNA, and we strive to ensure that our employees can fulfill both their personal and professional aspirations by encouraging internal mobility and individual upskilling programs. We firmly believe that building Diverse Teams contributes to our successes and to deliver on this, we actively embed Diversity, Equity and Inclusion in our business strategy. It is an exciting time to join our Teams. All applications will be handled in the strictest confidence.
Oct 02, 2025
Full time
A career at Lombard Odier means working for a renowned global wealth and asset manager, with a strong focus on sustainable investing. An innovative bank of choice for private and institutional clients, our independently owned Firm is one of the best-capitalised banking groups in the world, managing close to CHF 300 billion and operating from over 25 offices across 4 continents. With a history spanning over 225 years, Lombard Odier is an investment house providing a comprehensive offering of discretionary and advisory portfolio management, wealth services and custody. We also offer asset management services and investment strategies through Lombard Odier Investment Managers and provide advanced banking technology to other financial institutions. "Rethink Everything" is our philosophy - it is at the heart of everything we do. We have grown stronger through more than 40 financial crises by rethinking the world around us to provide a fresh investment perspective for our clients. Lombard Odier Investment Managers ("LOIM") is the asset management business of the Lombard Odier Group. In order to strengthen our Investment Risk team, we are looking for a: Investment Risk Data Analyst You will join a global business of more than 400 investment professionals and a network of 13 offices across Europe, Asia and North America. You will report to the Global Chief Risk Officer and support the Risk function by managing and analyzing data across platforms such as Bloomberg PORT and MARS, while ensuring data quality, developing risk analytics, and enhancing automation in risk management. The role can be based in Geneva, London or Luxembourg. YOUR ROLE Engagement with LOIM Investment Risk Managers and other primary stakeholders to design, develop and implement clear analytical solutions across all asset classes Take ownership of risk and performance dashboards and underlying data sourcing processes Help drive the migration of existing processes to automated processes and platforms in line with the team vision to increasingly leverage Artificial Intelligence. Management of existing data sets, ensuring the analytics tools are correctly sourcing data from data sources external to the immediate team Maintaining risk calculations and process feeds to external calculators Respond and prioritize ad-hoc requests for information as they arise Challenge existing processes and data feeds with the wider LOIM-IT and data community YOUR PROFILE You hold a Degree in Mathematics, Data Science, Finance or Statistics, You have experience in data analysis of large-scale, distributed data sets, in process automation You are interested in the financial industry and have domain knowledge of investment and securities and/or Artificial Intelligence applications. Understanding of risk management concepts including VaR, stress testing, and scenario analysis. You have the ability to challenge and provide supportive criticism You are familiar with BI tools (ie Tableau), process workflow automation tools (ie Alteryx), programming languages (Python). You have strong analytical and data manipulation skills and excellent statistical modelling skills Autonomous and self-motivated, you pay strong attention to detail. Flexible and results-oriented, with excellent problem-solving skills. Our Maison's DNA is defined by five core values. Excellence drives us to be the best at what we do, while Innovation fuels our progress. Respect underpins every interaction, and Integrity shapes our actions. Together, we are One Team, united in serving our clients with unwavering dedication. As a responsible and supportive employer, we promote a diverse and inclusive work environment for our employees and candidates. Diversity, Equity and Inclusion are woven into the fabric of our Maison's DNA, and we strive to ensure that our employees can fulfill both their personal and professional aspirations by encouraging internal mobility and individual upskilling programs. We firmly believe that building Diverse Teams contributes to our successes and to deliver on this, we actively embed Diversity, Equity and Inclusion in our business strategy. It is an exciting time to join our Teams. All applications will be handled in the strictest confidence.
Incident Response Analyst Permanent - 52k - 57k + strong benefits Location: Hybrid - South Wales Your new company I am looking to recruit an Incident Response Analyst to join a leader in the utilities space. The business have been investing in their cyber security and IT estate and are continuing to grow and enhance their security posture. The company has a strong reputation, and we have placed numerous people into careers there, with strong feedback. Your new role This is an interesting opportunity to help deliver strategy which will enhance the organisation's security resilience, proactively contributing to mitigating threats, at a good time when the company is expanding and investing in its IT and cyber security estate. Working alongside the SOC, the primary responsibility of an incident responder is to rapidly investigate and document cybersecurity incidents within the organisation. Key parts of the role: Monitor and analyse network traffic, system logs, and other data sources to identify potential security incidents. Investigate alerts and suspicious activity to determine if an incident has occurred. Contain affected systems and networks to prevent the incident from spreading. Implement temporary measures to mitigate the impact of the incident. Work with other teams, such as IT and security operations, to develop and implement a containment strategy. Analyse incident data to determine the root cause of the incident and identify recommendations for improvement. Document and report incidents to the incident response team and other relevant stakeholders. Stay informed about emerging cyber threats and vulnerabilities. What you'll need to succeed Experience in a similar role, ideally around CNI and OT, with exposure to cyber plans. Proven experience operating in a SOC or a related cyber security role. In-depth knowledge of cyber threats, threat intelligence frameworks and cyber security best practice. Strong analytical and problem-solving skills. Ability to work independently and as part of a team. Excellent communication and interpersonal skills. Ability to obtain UK Security Clearance What you'll get in return Salary of between 52k- 57k Hybrid working 2/3 days in South Wales per week Possible bonus 5% pension contribution from you, the company pays 10% Enhanced pay for parental leave And more! What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV. If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion about your career. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
Oct 02, 2025
Full time
Incident Response Analyst Permanent - 52k - 57k + strong benefits Location: Hybrid - South Wales Your new company I am looking to recruit an Incident Response Analyst to join a leader in the utilities space. The business have been investing in their cyber security and IT estate and are continuing to grow and enhance their security posture. The company has a strong reputation, and we have placed numerous people into careers there, with strong feedback. Your new role This is an interesting opportunity to help deliver strategy which will enhance the organisation's security resilience, proactively contributing to mitigating threats, at a good time when the company is expanding and investing in its IT and cyber security estate. Working alongside the SOC, the primary responsibility of an incident responder is to rapidly investigate and document cybersecurity incidents within the organisation. Key parts of the role: Monitor and analyse network traffic, system logs, and other data sources to identify potential security incidents. Investigate alerts and suspicious activity to determine if an incident has occurred. Contain affected systems and networks to prevent the incident from spreading. Implement temporary measures to mitigate the impact of the incident. Work with other teams, such as IT and security operations, to develop and implement a containment strategy. Analyse incident data to determine the root cause of the incident and identify recommendations for improvement. Document and report incidents to the incident response team and other relevant stakeholders. Stay informed about emerging cyber threats and vulnerabilities. What you'll need to succeed Experience in a similar role, ideally around CNI and OT, with exposure to cyber plans. Proven experience operating in a SOC or a related cyber security role. In-depth knowledge of cyber threats, threat intelligence frameworks and cyber security best practice. Strong analytical and problem-solving skills. Ability to work independently and as part of a team. Excellent communication and interpersonal skills. Ability to obtain UK Security Clearance What you'll get in return Salary of between 52k- 57k Hybrid working 2/3 days in South Wales per week Possible bonus 5% pension contribution from you, the company pays 10% Enhanced pay for parental leave And more! What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV. If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion about your career. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)