Security Analyst
LondonLondon£40,000 to £50,000
Our client, a leading organisation in the media sector, is seeking a Cyber Security Analyst to join their growing Security Operations team.
This is an exceptional opportunity to work with a forward-thinking company that values innovation and security in a digital-first environment.
Technology is at the core of their business, enabling them to create and distribute exceptional content, drive commercial success, and foster seamless collaboration. As they continue their digital transformation, their security team plays a vital role in ensuring efficiency and resilience.
This is an exciting time to be part of their journey, offering a dynamic and inclusive work environment with opportunities for career growth and impact.
About the Role
As a Cyber Security Analyst, you will play a key role in monitoring and responding to security incidents, ensuring that the company’s systems and networks remain secure. You will collaborate with internal teams and stakeholders to identify risks, implement protective measures, and contribute to security awareness initiatives.
Key Responsibilities
Monitor, assess, and protect network infrastructure, applications, and assets from potential threats.
Respond to security alerts and incidents, ensuring prompt resolution and mitigation.
Utilize industry-leading security tools, including SIEM, MDR, endpoint protection, and cloud security solutions.
Contribute to the continuous improvement of security runbooks and incident response processes.
Identify opportunities for enhancing security technologies, processes, and strategies.
Support cyber awareness training initiatives and promote security best practices across the business.
Monitor open-source intelligence sources for emerging threats and recommend appropriate actions.
Essential Skills & Experience
Understanding of cybersecurity frameworks and best practices, including OWASP top ten.
Familiarity with public cloud security concepts.
Hands-on experience in managing security incidents.
Awareness of the evolving cybersecurity threat landscape and the ability to apply knowledge effectively.
Ability to work independently and collaboratively to solve complex security challenges.
Preferred Skills & Attributes
Strong communication and influencing skills.
Ability to build and maintain effective working relationships.
Proactive approach to problem-solving and process improvements.
Willingness to support out-of-hours security incidents when necessary.
Commitment to Diversity & Inclusion
Our client is committed to fostering a diverse and inclusive workplace. Applications from individuals with disabilities are strongly encouraged, and reasonable accommodations can be provided during the application and selection process. If you require adjustments, please get in touch with our recruitment team.
Employee Benefits
Flexible working arrangements.
Generous annual leave allowance, with the option to purchase additional days.
Performance-based annual bonus.
Competitive pension contributions.
Employee share purchase schemes.
Wellbeing and volunteer days to support a balanced lifestyle.
For more details on this exciting opportunity, please reach out to our recruitment team.
Sales Engineer - Europe
RemoteRemote£110,000
Trident Search is partnering with a leading threat intelligence provider to find a talented Sales Engineer to join their growing team.
The Role
As a Sales Engineer, you will play a critical role in supporting the company's most important customers and driving successful implementations. You will become a subject matter expert on their software suite, crafting tailored demonstrations and technical solutions to address specific customer needs. You will also work closely with the sales team to qualify leads, ensure smooth handovers to customer success, and contribute to the overall sales and customer success strategy.
Key Responsibilities:
Develop deep expertise in the company's software suite
Design and deliver customised product demonstrations
Collaborate with sales leadership on defining customer engagement strategies
Build technical solutions aligned with prospect use cases and architectural requirements
Maintain the health and functionality of prospect environments
Ensure seamless handover of prospects to the customer success team
Build trust and rapport with customers and the community by understanding their challenges
Partner with the CEO, CRO, and sales team to refine and execute sales and customer success strategies
Leverage your technical knowledge and customer focus to drive discussions on threat intelligence, cybersecurity, and crisis management
Engage with a diverse range of stakeholders, from developers to C-suite executives
Collaborate with product management, marketing, and engineering teams on product roadmap and vision
Troubleshoot and resolve customer issues during solution implementation
Qualifications
Experience in a similar role as a Technical Account Manager, Consultant, Solutions Architect, Cyber Threat Intelligence Analyst, Crisis Management Advisor, etc.
Solid understanding of both functional (business) and technical aspects of cybersecurity and crisis management
Proven ability to deliver high-quality training, workshops, and support to internal and external audiences
Adaptability and ability to thrive in a fast-paced and dynamic environment
Growth mindset, a sense of humour, and a passion for learning and development
Fluency in English, and either Spanish or Italian
Why Join This Company?
Be part of a growing company at the forefront of open-source cybersecurity solutions
Work with a rich ecosystem and diverse customer base
Contribute to a culture of success, collaboration, and inclusivity
Own your work and have a significant impact on the company's direction
Senior CTI Analyst
RemoteRemote~£65,000 + 10% bonus
Trident Search have exclusively partnered with a end user who are looking to hire their next Senior Cyber Threat Intelligence Analyst
This opportunity is like no other. At a relatively early stage of your career, you'll get the opportunity to engage directly as board level.
Responsibilities:
Deliver strategic-level threat intelligence across global operations
Provide monthly board-level threat intelligence updates
Respond to Executive Flash Reports from Board/GISO/CISO's
Develop Global Threat Horizon Reports and Regional Threat Assessments with half yearly intel refreshes
Coordinate with market unit security teams across UK, Europe, Latin America, and APAC regions
Work independently within broader security team structure Key
Requirements:
Strategic threat intelligence experience (SOC analyst experience alone insufficient)
Strong board-level presentation and communication skills
CREST certification (or willingness to obtain)
Ability to work independently
Experience delivering executive-level threat intelligence reports
Global threat landscape understanding
If the role is interest, please reach out to Gareth Davies @ Trident Search
Security Analyst - Australia
RemoteRemote$100,000 to $150,000
An award-winning MSP are adding to their growing SOC and are looking for a passionate senior cyber security individual to be part of their team leveraging the Microsoft security stack.
This role is based in Australia, adding another element to our clients cyber services.
You will be working alongside the UK SOC to deliver fast response incident management, threat hunting capabilities and elite customer service.
As a service driven organisation our client prides themselves on attracting and retaining the best people in our industry which in turn is fundamental to the strong culture and identity they foster.
Key experience
3-4 years in a SOC/security team
Degree in a Computer Science discipline OR equivalent work experience.
Experience in understanding the Mitre Att&ck framework or any other security defence framework.
Experience mentoring lesser experienced analysts
Experience in Microsoft Azure or any other Cloud based technology.
Main Responsibilities
Responsible for monitoring the Microsoft technology stack, EDR, CASB, SIEM, SOAR tools.
Proactive threat hunting is actively encouraged, especially when no alerts have been generated.
Create and improve playbooks or runbooks.
Creating and documenting process and procedures
Respond to security alerts which are obtained from any of the security technology stacks.
Be proactive and make use of available toolsets to look for compromises within customer environments.
To work with our other internal teams within the company and be a SME on security
Create technical documentation in the form of use cases of playbooks
Asses new threats and propose detection logic for new rule sets.
Utilise tools available, as a Microsoft Gold partner you will have the opportunity to work exclusively on a Microsoft stack environment.
Keep your knowledge up to date around the current world threat landscape.
Responsible for design of security alerts and incidents
Follow all company procedures and maintain awareness around the security and regulatory landscape.
This is an exciting time to join a fast growing SOC team in Aus, and a real opportunity to be a part of something special! Go ahead and apply now!
L1 SOC Analyst
RemoteRemote£32,000 + 15% Shift Allowance
*Unfortunately we're unable to offer sponsorship of this opportunity, you will need to be eligible for SC clearance*
Trident Search have exclusively partnered with a award winning MSSP who have seen great growth over the last 24 months. They are now one of the largest consultancies that offer offensive and defensive security services.
You'll work fully remote as a L1 SOC Analyst – this isn’t your typical L1 where you act as a “ticket monkey”. You will be fully emerged in the investigation, and you’ll work with your seniors through to remediation.
This is a 24/7 SOC and you'll work 4 on 4 off, days and nights: 7am-7pm, 7pm-7am.
Responsibilities
• Continuous monitoring of MS tooling: Sentinel and Defender included. You will also get access to Darktrace, Crowdstrike and a bit of Elastic
• Proactive threat hunting, utilizing KQL
• Risk remediation and mitigation through technical controls within the stack mentioned above
• Proactive security assessments - Phishing campaigns, SSO, etc..
Experience:
• We’re looking for a minimum of 6-12 months experience as a SOC analyst
• Sentinel experience is mandatory, if you can bring experience across Defender, Crowdstrike and Darktrace – that’d be a huge bonus.
• Basic KQL query ability – greedy searches, filtering etc.
• Experience of deploying, managing, and supporting of endpoint security platforms
• Ability to standardize processes for efficiency and productivity, leveraging automation where applicable/possible
Bonus:
• Industry certs SC100, SC200 etc.
• Powershell experience
Please reach out to Gareth Davies @ Trident Search
SDR - Benelux
AmsterdamAmsterdam€50,000
Kickstart Your Sales Career with One of Europe’s Fastest-Growing Cybersecurity Startups!
Are you a motivated sales professional in The Netherlands looking to fast-track your career? Trident Search is excited to present a fantastic opportunity to join a cutting-edge cybersecurity startup that’s reshaping the industry across Europe.
The Role:
As a Sales Development Representative (SDR), you’ll play a key role in expanding our footprint across the BENELUX region. Your mission: connect with potential clients and book qualified meetings for our talented Account Executives. You'll gain hands-on experience in sales strategies, build valuable skills, and make a real impact on our growing team!
What You’ll Be Doing:
Creating Opportunities: Use calls, emails, and LinkedIn to build a strong pipeline of new business.
Engaging Prospects: Reach out to leads through multi-touch campaigns and marketing initiatives.
Collaborating: Work closely with marketing and sales teams on account-based strategies.
Making an Impact: Schedule quality meetings that drive growth and open doors for the sales team.
What You Bring to the Table:
Language Skills: Fluent in both Dutch and English.
Proven Success: At least 1 year of experience as an SDR or BDR, ideally in cybersecurity.
Sales Savvy: Skilled in outbound and multi-touch campaigns, with a passion for picking up the phone.
Ambition: A self-starter with a drive to grow your career and succeed in a fast-paced environment.
Bonus Points: Experience in startups or thriving in a hands-on, low-support setting (but not essential).
If you’re ready to be part of something big, apply today and take the next step in your sales journey!
Account Executive - Benelux (French Speaking)
AmsterdamAmsterdam€100,000
Trident Search has an awesome opportunity with one of the fastest growing cyber security start-ups in Europe. We are looking to speak with revenue generating candidates in The Netherlands who are looking to propel their career.
As one of the first people to join this rapidly growing go-to-market team, you will play a pivotal role as this vendor looks to grow into new territories. We are looking for someone with experience in cyber security sales who has taken ownership of the entire sales process, from cradle to grave.
The Role
Initiate conversations and build relationships with potential customers through phone calls, emails, LinkedIn messages, and in-person events. Target to engage with new prospects on a weekly basis to maintain at least 5x pipeline coverage.
Collaborate closely with the marketing team to iterate on messaging used in outbound communications.
Work with internal teams to devise. strategies for driving pipeline growth within the Benelux territory.
Take charge of both outbound prospecting and inbound lead follow-up.
Dive deep into accounts to identify key decision-makers and champions. Craft personalized messaging that resonates with the target audience and qualifies their interest.
Demonstrate a deep understanding of our clients’ solutions and their
value proposition. Engage with C-level executives, providing industry insights and
positioning our solutions effectively.
Foster and maintain relationships with key business units and stakeholders.
Adopt a consultative approach, listening to customer needs and adjusting strategies accordingly.
Consistently meet or exceed quarterly sales quotas, while maintain core values and objectives.
The Person.
Have minimum 3-4 years of lead generation and sales experience selling cyber security SaaS solutions.
Are experienced in cold outreach and generating significant pipeline for account executives.
Fluent in Dutch & English is preferential.
Have a proven track record of hitting or exceeding sales quotas with minimal account churn.
Are flexible in adapting to real-time feedback during discussions.
Have strong previous relationships with sales enablement and operation teams.
Have experience with CRM tools like Salesforce or HubSpot.
Familiarity with the MEDDPICC qualification framework.
Previous experience in a startup or low-support environment.
L3 SOC Analyst
BerkshireLondon£67,000-£75,000 + bonuses
Trident Search have exclusively partnered with one of the strongest security teams in the UK to bring in a L3 analyst to their team. They are integral to the UK CNI and are a household name. You will investigate and validate threats through data analysis, using a wide range of security tolls and defense products. A stand out candidate might come from a malware/threat hunting strong environment, or might have a keen interest in the field.
Job Title: L3 SOC Analyst
Location: 4 days on site per MONTH in Berkshire / Central London
Hours: 09:00-17:30
Key Responsibilities:
Lead the resolution of escalated security incidents such as sophisticated malware, APTs, and complex intrusions. Use expert-level forensic analysis and threat hunting techniques to contain and recover from incidents.
Drive security event analysis to address emerging cyber threats and ensure comprehensive post-incident analysis..
Fine-tune SIEM configurations to filter false positives, detect advanced threats, and optimize alerting.
Refine SOAR playbooks to automate response actions and improve incident response efficiency.
Act as an escalation point for junior analysts, offering guidance and promoting knowledge sharing within the team.
Contribute to threat response activities and collaborate with blue team efforts to identify threat group activities.
Skills and Experience
Proven SOC analyst experience (Level 2 or above) with extensive hands-on experience in security event analysis and incident response.
If you have a passion for malware or come from a DFIR background, that would be advantageous.
Strong understanding of networking protocols
Expertise in Windows/Linux o/s and a variety of security technologies
Familiarity with SOAR technologies
Experience with security frameworks such as MITRE, Cyber Kill Chain, and APT strategies.
Knowledge of cloud platforms (Azure, AWS, Google Cloud) and cloud security best practices.
If you're seeking a opportunity where you'll be working with one of the strongest security teams in the UK, please reach out to Gareth Davies @ Trident Search.