Associate Threat Hunter
RemoteRemote£40,000
Role Overview
We are working with a leading cybersecurity company to recruit an Associate Threat Hunter to join their growing Detection & Response Team (DRT). This organization is well known for its cutting-edge cybersecurity solutions, including Endpoint Protection, Cyber Consulting, and Managed Detection and Response (MDR) services.
Their MDR division provides a world-class managed service that detects and responds to cyber threats on behalf of clients, leveraging a combination of expert personnel, advanced processes, and in-house technology. The DRT plays a crucial role in identifying adversaries within client networks and responding to cyberattacks using incident response expertise.
This is a fantastic opportunity for someone with a passion for cybersecurity, a drive to enhance their security knowledge, and a desire to protect clients from emerging threats.
Key Responsibilities
As an Associate Threat Hunter, you will have the opportunity to:
Proactively investigate security events across host, network, and log data.
Manage security incidents from detection through to resolution.
Conduct malware analysis.
Perform advanced host, network, and memory forensics.
Research and develop new attack detection techniques.
Communicate technical findings to clients in a clear and business-relevant manner.
Contribute to the ongoing development of the organization’s cybersecurity services.
Who We’re Looking For
If any of the following resonate with you, this role could be a great fit:
Terms like “threat hunting,” “malware analysis,” “process injection,” “covert C2,” “EDR,” and “APT” excite you.
You enjoy researching adversary techniques and developing strategies to detect and respond to cyber threats.
You are passionate about using and developing cutting-edge tools for detection and response.
You have experience handling a wide range of cyber threats, from script kiddies to nation-state actors, and enjoy sharing knowledge with your peers.
You stay up to date with the latest cybersecurity developments and regularly engage with industry content.
Skills & Experience
This role provides an opportunity to develop expertise in:
Core IP networking and common protocols.
Windows and Linux internals.
Network, memory, and host forensics.
Automated and manual malware analysis (both static and dynamic).
Incident investigation and response to advanced attackers.
A blend of offensive and defensive security methodologies.
Development and scripting for cybersecurity applications.
Analysis of modern offensive techniques and Advanced Persistent Threat (APT) tactics.
Use of network traffic analysis platforms and SIEM solutions.
What You Can Expect
The freedom to shape how cybersecurity services are delivered and continuously improved.
The opportunity to work with some of the brightest minds in the industry.
Recognition for your contributions, both internally and externally.
Support from leadership at all levels of the organization.
Culture & Growth
This organization values a dynamic and inclusive workplace, encouraging individuals to explore different specializations and career pathways. They prioritize personal growth, ensuring employees have opportunities to develop their expertise in line with their passions and interests.
If you’re looking to take the next step in your cybersecurity career and want to be part of a forward-thinking, research-led team, we encourage you to apply!
L2 Security Analyst
RemoteRemote£45,000
Are you looking to join a growing MSSP to help build out their cyber security function here within the UK?
The role will be fully remote and will offer excellent progression to work with the leadership team.
This is a great opportunity for an experienced Analyst to join a specialist security consultancy and help build this exciting new project.
Must either already be BPSS/SC cleared; or be happy to go through clearance.
The role
Technical resource in support of SOC team - Incident lifecycle management from identification through triage and containment.
Assist with scoping prospective engagements
Strong network analysis knowledge and skill set.
Thorough understanding of enterprise security controls in Active Directory / Windows environments
Knowledge of SIEM, EDR and Intrusion Detection Systems and methods of security hacking/penetration testing
Experience:
Must have previous experience working in some sort of SOC/XDR background, preferably MSSP but happy to look at candidates currently/previously working for internal SOCs
Must have some previous experience relating to the above where they have monitored SIEM/EDR tools. Preferably this would include Microsoft Sentinel/Defender and related KQL knowledge, Crowdstrike, Cynet, LogRhythm
Any experience with using any of the following tools - (Chronicle SOAR, Hatching Triage, Recorded Future, Service Now) being a huge bonus, but not essential.
Any experience dealing with Phishing Emails being a huge bonus, but not essential.
Any experience dealing with Malware Analysis being a huge bonus, but not essential.
Certifications:
SANS: Qualifications in Security Essentials (GSEC), Hacker Techniques & Incident Handling (GIH), Host (GCFE/GCFA) & Network (GNFA) Forensics, Malware Analysis (GREM) and any Digital Forensics specialisations.
CREST certifications
Certified Ethical Hacker
Technical skills required:
Host Intrusion Analysis
Security Incident Escalations
Network Intrusion Analysis
Unix
Familiarity with categories of Malware and Malware Reverse Engineering techniques
Experience working with security tools for the purposes of detection, diagnosis, containment, and remediation
This is an exciting time to join this rapidly growing MSSP, and a real opportunity to be a part of something special! Go ahead and apply now!
CSOC Analyst - Australia
RemoteRemote$100,000 to $150,000
An award-winning MSP are adding to their growing SOC and are looking for a passionate senior cyber security individual to be part of their team leveraging the Microsoft security stack.
This role is based in Australia, adding another element to our clients cyber services.
You will be working alongside the UK SOC to deliver fast response incident management, threat hunting capabilities and elite customer service.
As a service driven organisation our client prides themselves on attracting and retaining the best people in our industry which in turn is fundamental to the strong culture and identity they foster.
Key experience
3-4 years in a SOC/security team
Degree in a Computer Science discipline OR equivalent work experience.
Experience in understanding the Mitre Att&ck framework or any other security defence framework.
Experience mentoring lesser experienced analysts
Experience in Microsoft Azure or any other Cloud based technology.
Main Responsibilities
Responsible for monitoring the Microsoft technology stack, EDR, CASB, SIEM, SOAR tools.
Proactive threat hunting is actively encouraged, especially when no alerts have been generated.
Create and improve playbooks or runbooks.
Creating and documenting process and procedures
Respond to security alerts which are obtained from any of the security technology stacks.
Be proactive and make use of available toolsets to look for compromises within customer environments.
To work with our other internal teams within the company and be a SME on security
Create technical documentation in the form of use cases of playbooks
Asses new threats and propose detection logic for new rule sets.
Utilise tools available, as a Microsoft Gold partner you will have the opportunity to work exclusively on a Microsoft stack environment.
Keep your knowledge up to date around the current world threat landscape.
Responsible for design of security alerts and incidents
Follow all company procedures and maintain awareness around the security and regulatory landscape.
This is an exciting time to join a fast growing SOC team in Aus, and a real opportunity to be a part of something special! Go ahead and apply now!
CSOC SDM
RemoteRemote£45,000
Role Overview
We are working with a leading cybersecurity company to recruit a talented Technical Service Delivery Manager. This company provides top-tier, Microsoft-verified Managed Extended Detection & Response (MXDR) services to clients and partners through their UK-based, 24/7/365 Cyber Security Operations Centre (CSOC), utilizing the Microsoft security suite.
If you are passionate about cybersecurity and excel at building strong client relationships, this could be the perfect opportunity for you. In this role, you will help clients enhance their security posture, maximize the benefits of their services, and simplify complex security challenges.
The ideal candidate will have experience in cybersecurity operations, excellent interpersonal skills, and a strong desire to continuously develop and enhance both technical and operational service delivery.
Key Responsibilities
Manage operational relationships with partners and clients, maintaining consistent communication and providing updates on service performance.
Investigate and respond to security incidents, security reports, and client concerns, ensuring appropriate follow-up actions to prevent recurrence.
Support operational teams in resolving issues that arise during service delivery.
Advocate for clients, ensuring their needs and expectations are met effectively.
Work with the engineering team to identify and implement technical enhancements to services.
Serve as a subject matter expert (SME) to improve the quality of service provided to clients.
Assist with client reporting, including SLA performance, response times, incident investigations, threat intelligence insights, data ingestion billing, and vulnerability management.
Support the onboarding of new clients, gaining a thorough understanding of their businesses and associated risks while providing guidance during the early stages of engagement.
Develop technical documentation to support team operations.
Collaborate with the sales team to facilitate successful contract renewals with existing clients and partners.
Desirable Skills & Experience
While not essential, the following skills and experience would be advantageous:
Strong understanding of Security Operations Centres (SOCs) and experience with SIEM/SOAR platforms for detecting and responding to cyber threats.
Knowledge of emerging threats, threat actors, and vulnerabilities.
Technical expertise in Microsoft security solutions, particularly Azure, Microsoft Sentinel, and Microsoft Defender XDR.
Familiarity with security frameworks such as MITRE ATT&CK, as well as regulatory compliance standards like ISO27001, NIS2, and Cyber Essentials+.
Microsoft Security certifications or equivalent practical experience.
If you do not meet all of the above criteria, don’t worry. We are looking for someone with a proactive mindset, a passion for learning, and a commitment to overcoming challenges. If this sounds like you, we encourage you to apply and take the next step in your cybersecurity career!
L2 SOC Analyst
RemoteRemote£50,000 + 15%
The ideal candidate is someone currently operating at a Tier 2. Training will also be provided in the solutions that you will be interacting with, however experience within Detect and Response operations within a SOC environment would be essential. Eligible for SC Clearance is necessary for this role.
High Level Overview:
You will be there to support the L1’s when they escalate true positives and be able to offer confidence in your triage, investigation, escalation and remediation. This is an essential part of our growth as we have already moved to a 24/7 SOC. There will be support available from the on-call supervisor, however we would need you to be confident in identifying the above.
Responsibilities.
Monitor and analyse traffic and events/alerts and advise on remediation actions.
Investigate intrusion attempts and perform in-depth analysis of the attempt by correlating various sources and determining which system or data set is affected.
Carry out Incident Response actions upon client infrastructure to mitigate and contain verified incidents or intrusion attempts.
Follow standard operating procedures for detecting, classifying, and reporting incidents.
Demonstrate security expertise to support timely and effective decision making of when to declare an incident.
Conduct proactive threat research, with the goal to ingest additional IoC’s or create detection rules based off threat actor TTP’s.
Create detection rules off the emerging threat landscape and new techniques used.
Analyse a variety of network and host-based security appliance logs (Windows Security Events, Sysmon, Firewalls, NIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each incident, or how to effectively tune out false positives without hindering the effectiveness of the ruleset.
Create playbooks and workbooks within the Azure Sentinel Solution
Track trends and configure systems as required to reduce false positives from true events.
Document all activities during an incident in order to ensure that the report and updates escalated to a client provides all necessary information, whilst also offering effective remediation actions and any reference material required.
Escalate information regarding intrusion events, security incidents, and other threat indications and warning information to the client in a readable manner.
Assist with the development of processes and procedures to improve incident response times, analysis of incident, and overall SOC functions
Create monthly Managed Detect and Respond (MDR) reports for clients
Create articles for publication based off CTI investigations that have been undertaken
Modify use cases and manage tuning for multiple clients
Provide a daily shift change report
Essential Experience Required
Experience with SIEM & EDR solutions (Azure Sentinel/AlienVault/Carbon Black/Defender for Endpoint), specifically with investigations and remediation actions.
Organizational skills and time management/prioritization.
Pro-active in maintaining their workload.
Comfortable working against deadlines in a fast-paced environment.
Solid foundation of core Information Security aspects (General Investigation process, overview knowledge of surrounding technologies and frameworks to improve an organisations security posture, pain points faced within the industry).
Prior SOC experience.
Qualifications:
Any industry recognized certifications are highly desirable, however we are very big on training and offer a generous training package.
L1 SOC Analyst
RemoteRemote£32,000 + 15% Shift Allowance
*Unfortunately we're unable to offer sponsorship of this opportunity, you will need to be eligible for SC clearance*
Trident Search have exclusively partnered with a award winning MSSP who have seen great growth over the last 24 months. They are now one of the largest consultancies that offer offensive and defensive security services.
You'll work fully remote as a L1 SOC Analyst – this isn’t your typical L1 where you act as a “ticket monkey”. You will be fully emerged in the investigation, and you’ll work with your seniors through to remediation.
This is a 24/7 SOC and you'll work 4 on 4 off, days and nights: 7am-7pm, 7pm-7am.
Responsibilities
• Continuous monitoring of MS tooling: Sentinel and Defender included. You will also get access to Darktrace, Crowdstrike and a bit of Elastic
• Proactive threat hunting, utilizing KQL
• Risk remediation and mitigation through technical controls within the stack mentioned above
• Proactive security assessments - Phishing campaigns, SSO, etc..
Experience:
• We’re looking for a minimum of 6-12 months experience as a SOC analyst
• Sentinel experience is mandatory, if you can bring experience across Defender, Crowdstrike and Darktrace – that’d be a huge bonus.
• Basic KQL query ability – greedy searches, filtering etc.
• Experience of deploying, managing, and supporting of endpoint security platforms
• Ability to standardize processes for efficiency and productivity, leveraging automation where applicable/possible
Bonus:
• Industry certs SC100, SC200 etc.
• Powershell experience
Please reach out to Gareth Davies @ Trident Search
SDR - Benelux
AmsterdamAmsterdam€50,000
Kickstart Your Sales Career with One of Europe’s Fastest-Growing Cybersecurity Startups!
Are you a motivated sales professional in The Netherlands looking to fast-track your career? Trident Search is excited to present a fantastic opportunity to join a cutting-edge cybersecurity startup that’s reshaping the industry across Europe.
The Role:
As a Sales Development Representative (SDR), you’ll play a key role in expanding our footprint across the BENELUX region. Your mission: connect with potential clients and book qualified meetings for our talented Account Executives. You'll gain hands-on experience in sales strategies, build valuable skills, and make a real impact on our growing team!
What You’ll Be Doing:
Creating Opportunities: Use calls, emails, and LinkedIn to build a strong pipeline of new business.
Engaging Prospects: Reach out to leads through multi-touch campaigns and marketing initiatives.
Collaborating: Work closely with marketing and sales teams on account-based strategies.
Making an Impact: Schedule quality meetings that drive growth and open doors for the sales team.
What You Bring to the Table:
Language Skills: Fluent in both Dutch and English.
Proven Success: At least 1 year of experience as an SDR or BDR, ideally in cybersecurity.
Sales Savvy: Skilled in outbound and multi-touch campaigns, with a passion for picking up the phone.
Ambition: A self-starter with a drive to grow your career and succeed in a fast-paced environment.
Bonus Points: Experience in startups or thriving in a hands-on, low-support setting (but not essential).
If you’re ready to be part of something big, apply today and take the next step in your sales journey!
Account Executive - Netherlands
AmsterdamAmsterdam€100,000
Trident Search has an awesome opportunity with one of the fastest growing cyber security start-ups in Europe. We are looking to speak with revenue generating candidates in The Netherlands who are looking to propel their career.
As one of the first people to join this rapidly growing go-to-market team, you will play a pivotal role as this vendor looks to grow into new territories. We are looking for someone with experience in cyber security sales who has taken ownership of the entire sales process, from cradle to grave.
The Role
Initiate conversations and build relationships with potential customers through phone calls, emails, LinkedIn messages, and in-person events. Target to engage with new prospects on a weekly basis to maintain at least 5x pipeline coverage.
Collaborate closely with the marketing team to iterate on messaging used in outbound communications.
Work with internal teams to devise. strategies for driving pipeline growth within the Benelux territory.
Take charge of both outbound prospecting and inbound lead follow-up.
Dive deep into accounts to identify key decision-makers and champions. Craft personalized messaging that resonates with the target audience and qualifies their interest.
Demonstrate a deep understanding of our clients’ solutions and their
value proposition. Engage with C-level executives, providing industry insights and
positioning our solutions effectively.
Foster and maintain relationships with key business units and stakeholders.
Adopt a consultative approach, listening to customer needs and adjusting strategies accordingly.
Consistently meet or exceed quarterly sales quotas, while maintain core values and objectives.
The Person.
Have minimum 3-4 years of lead generation and sales experience selling cyber security SaaS solutions.
Are experienced in cold outreach and generating significant pipeline for account executives.
Fluent in Dutch & English is preferential.
Have a proven track record of hitting or exceeding sales quotas with minimal account churn.
Are flexible in adapting to real-time feedback during discussions.
Have strong previous relationships with sales enablement and operation teams.
Have experience with CRM tools like Salesforce or HubSpot.
Familiarity with the MEDDPICC qualification framework.
Previous experience in a startup or low-support environment.