Associate Threat Hunter

Salary/Rate:£40,000
Job type:Perm
Town/City:Remote
County/State/Region:Remote
Job ref:1878
Post Date:03.03.25
Scroll

Meet Our Recruiter

About the Role

Role Overview

We are working with a leading cybersecurity company to recruit an Associate Threat Hunter to join their growing Detection & Response Team (DRT). This organization is well known for its cutting-edge cybersecurity solutions, including Endpoint Protection, Cyber Consulting, and Managed Detection and Response (MDR) services.

Their MDR division provides a world-class managed service that detects and responds to cyber threats on behalf of clients, leveraging a combination of expert personnel, advanced processes, and in-house technology. The DRT plays a crucial role in identifying adversaries within client networks and responding to cyberattacks using incident response expertise.

This is a fantastic opportunity for someone with a passion for cybersecurity, a drive to enhance their security knowledge, and a desire to protect clients from emerging threats.

Key Responsibilities

As an Associate Threat Hunter, you will have the opportunity to:

  • Proactively investigate security events across host, network, and log data.

  • Manage security incidents from detection through to resolution.

  • Conduct malware analysis.

  • Perform advanced host, network, and memory forensics.

  • Research and develop new attack detection techniques.

  • Communicate technical findings to clients in a clear and business-relevant manner.

  • Contribute to the ongoing development of the organization’s cybersecurity services.

Who We’re Looking For

If any of the following resonate with you, this role could be a great fit:

  • Terms like “threat hunting,” “malware analysis,” “process injection,” “covert C2,” “EDR,” and “APT” excite you.

  • You enjoy researching adversary techniques and developing strategies to detect and respond to cyber threats.

  • You are passionate about using and developing cutting-edge tools for detection and response.

  • You have experience handling a wide range of cyber threats, from script kiddies to nation-state actors, and enjoy sharing knowledge with your peers.

  • You stay up to date with the latest cybersecurity developments and regularly engage with industry content.

Skills & Experience

This role provides an opportunity to develop expertise in:

  • Core IP networking and common protocols.

  • Windows and Linux internals.

  • Network, memory, and host forensics.

  • Automated and manual malware analysis (both static and dynamic).

  • Incident investigation and response to advanced attackers.

  • A blend of offensive and defensive security methodologies.

  • Development and scripting for cybersecurity applications.

  • Analysis of modern offensive techniques and Advanced Persistent Threat (APT) tactics.

  • Use of network traffic analysis platforms and SIEM solutions.

What You Can Expect

  • The freedom to shape how cybersecurity services are delivered and continuously improved.

  • The opportunity to work with some of the brightest minds in the industry.

  • Recognition for your contributions, both internally and externally.

  • Support from leadership at all levels of the organization.

Culture & Growth

This organization values a dynamic and inclusive workplace, encouraging individuals to explore different specializations and career pathways. They prioritize personal growth, ensuring employees have opportunities to develop their expertise in line with their passions and interests.

If you’re looking to take the next step in your cybersecurity career and want to be part of a forward-thinking, research-led team, we encourage you to apply!

 

More jobs from this recruiter

View All

Associate Threat Hunter

Remote
Remote
£40,000
Role Overview We are working with a leading cybersecurity company to recruit an Associate Threat Hunter to join their growing Detection & Response Team (DRT). This organization is well known for its cutting-edge cybersecurity solutions, including Endpoint Protection, Cyber Consulting, and Managed Detection and Response (MDR) services. Their MDR division provides a world-class managed service that detects and responds to cyber threats on behalf of clients, leveraging a combination of expert personnel, advanced processes, and in-house technology. The DRT plays a crucial role in identifying adversaries within client networks and responding to cyberattacks using incident response expertise. This is a fantastic opportunity for someone with a passion for cybersecurity, a drive to enhance their security knowledge, and a desire to protect clients from emerging threats. Key Responsibilities As an Associate Threat Hunter, you will have the opportunity to: Proactively investigate security events across host, network, and log data. Manage security incidents from detection through to resolution. Conduct malware analysis. Perform advanced host, network, and memory forensics. Research and develop new attack detection techniques. Communicate technical findings to clients in a clear and business-relevant manner. Contribute to the ongoing development of the organization’s cybersecurity services. Who We’re Looking For If any of the following resonate with you, this role could be a great fit: Terms like “threat hunting,” “malware analysis,” “process injection,” “covert C2,” “EDR,” and “APT” excite you. You enjoy researching adversary techniques and developing strategies to detect and respond to cyber threats. You are passionate about using and developing cutting-edge tools for detection and response. You have experience handling a wide range of cyber threats, from script kiddies to nation-state actors, and enjoy sharing knowledge with your peers. You stay up to date with the latest cybersecurity developments and regularly engage with industry content. Skills & Experience This role provides an opportunity to develop expertise in: Core IP networking and common protocols. Windows and Linux internals. Network, memory, and host forensics. Automated and manual malware analysis (both static and dynamic). Incident investigation and response to advanced attackers. A blend of offensive and defensive security methodologies. Development and scripting for cybersecurity applications. Analysis of modern offensive techniques and Advanced Persistent Threat (APT) tactics. Use of network traffic analysis platforms and SIEM solutions. What You Can Expect The freedom to shape how cybersecurity services are delivered and continuously improved. The opportunity to work with some of the brightest minds in the industry. Recognition for your contributions, both internally and externally. Support from leadership at all levels of the organization. Culture & Growth This organization values a dynamic and inclusive workplace, encouraging individuals to explore different specializations and career pathways. They prioritize personal growth, ensuring employees have opportunities to develop their expertise in line with their passions and interests. If you’re looking to take the next step in your cybersecurity career and want to be part of a forward-thinking, research-led team, we encourage you to apply!

L2 Security Analyst

Remote
Remote
£45,000
Are you looking to join a growing MSSP to help build out their cyber security function here within the UK? The role will be fully remote and will offer excellent progression to work with the leadership team. This is a great opportunity for an experienced Analyst to join a specialist security consultancy and help build this exciting new project. Must either already be BPSS/SC cleared; or be happy to go through clearance. The role Technical resource in support of SOC team - Incident lifecycle management from identification through triage and containment. Assist with scoping prospective engagements Strong network analysis knowledge and skill set. Thorough understanding of enterprise security controls in Active Directory / Windows environments Knowledge of SIEM, EDR and Intrusion Detection Systems and methods of security hacking/penetration testing Experience: Must have previous experience working in some sort of SOC/XDR background, preferably MSSP but happy to look at candidates currently/previously working for internal SOCs Must have some previous experience relating to the above where they have monitored SIEM/EDR tools. Preferably this would include Microsoft Sentinel/Defender and related KQL knowledge, Crowdstrike, Cynet, LogRhythm Any experience with using any of the following tools - (Chronicle SOAR, Hatching Triage, Recorded Future, Service Now) being a huge bonus, but not essential. Any experience dealing with Phishing Emails being a huge bonus, but not essential. Any experience dealing with Malware Analysis being a huge bonus, but not essential. Certifications: SANS: Qualifications in Security Essentials (GSEC), Hacker Techniques & Incident Handling (GIH), Host (GCFE/GCFA) & Network (GNFA) Forensics, Malware Analysis (GREM) and any Digital Forensics specialisations. CREST certifications Certified Ethical Hacker Technical skills required: Host Intrusion Analysis Security Incident Escalations Network Intrusion Analysis Unix Familiarity with categories of Malware and Malware Reverse Engineering techniques Experience working with security tools for the purposes of detection, diagnosis, containment, and remediation This is an exciting time to join this rapidly growing MSSP, and a real opportunity to be a part of something special! Go ahead and apply now!

CSOC SDM

Remote
Remote
£45,000
Role Overview We are working with a leading cybersecurity company to recruit a talented Technical Service Delivery Manager. This company provides top-tier, Microsoft-verified Managed Extended Detection & Response (MXDR) services to clients and partners through their UK-based, 24/7/365 Cyber Security Operations Centre (CSOC), utilizing the Microsoft security suite. If you are passionate about cybersecurity and excel at building strong client relationships, this could be the perfect opportunity for you. In this role, you will help clients enhance their security posture, maximize the benefits of their services, and simplify complex security challenges. The ideal candidate will have experience in cybersecurity operations, excellent interpersonal skills, and a strong desire to continuously develop and enhance both technical and operational service delivery. Key Responsibilities Manage operational relationships with partners and clients, maintaining consistent communication and providing updates on service performance. Investigate and respond to security incidents, security reports, and client concerns, ensuring appropriate follow-up actions to prevent recurrence. Support operational teams in resolving issues that arise during service delivery. Advocate for clients, ensuring their needs and expectations are met effectively. Work with the engineering team to identify and implement technical enhancements to services. Serve as a subject matter expert (SME) to improve the quality of service provided to clients. Assist with client reporting, including SLA performance, response times, incident investigations, threat intelligence insights, data ingestion billing, and vulnerability management. Support the onboarding of new clients, gaining a thorough understanding of their businesses and associated risks while providing guidance during the early stages of engagement. Develop technical documentation to support team operations. Collaborate with the sales team to facilitate successful contract renewals with existing clients and partners. Desirable Skills & Experience While not essential, the following skills and experience would be advantageous: Strong understanding of Security Operations Centres (SOCs) and experience with SIEM/SOAR platforms for detecting and responding to cyber threats. Knowledge of emerging threats, threat actors, and vulnerabilities. Technical expertise in Microsoft security solutions, particularly Azure, Microsoft Sentinel, and Microsoft Defender XDR. Familiarity with security frameworks such as MITRE ATT&CK, as well as regulatory compliance standards like ISO27001, NIS2, and Cyber Essentials+. Microsoft Security certifications or equivalent practical experience. If you do not meet all of the above criteria, don’t worry. We are looking for someone with a proactive mindset, a passion for learning, and a commitment to overcoming challenges. If this sounds like you, we encourage you to apply and take the next step in your cybersecurity career!