IT Cyber Security Analyst Ref: YC46941 A highly successful IT and telecommunications services company is currently recruiting an IT Cyber Security Analyst (Threat Intelligence Analyst) to work at their clients site in London. In this role, you will be responsible for identifying, analysing, and communicating cyber threats to support proactive defence strategies. The ideal candidate should have expertise in … threat intelligence analysis, collaboration across teams, familiarity with security tools, and strong analytical skills. ELIGIBLE APPLICANTS: (O) Eligible visa: Permanent residence, Spouse, Partner, Working holiday, Graduate (X) NOT eligible: Student visa, Requiring visa sponsorship, WORK TYPE: office-based VISA SUPPORT: No TYPE: 6 months rolling contract, full-time WORKING HOURS: Mon-Fri 9:00-17:00 SALARY: up to … 54k, depending on experience START: Nov-Dec 2025 LOCATION: London (office-based) Cyber Security Analyst Main Responsibilities: Monitor and analyse the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organization's business and technology environment Collaborate with Red Team, Blue Team, and Penetration Testing teams to integrate threat intelligence into testing scenarios More ❯
planning, dependency/risk management, quality gates). Establish and enforce best-in-class DevOps, trunk-based, CI/CD, and monitoring standards. Sponsor the adoption of secure SDLC, threatmodelling, vulnerability management, identity/authorisation, privacy by design; ISO27001/9001, security posture and customer due diligence. Cross-functional leadership Partner closely with Product leaders to ensure … career ladders, performance management, and fostering a high-bar engineering culture. Ability to drive reliability, performance, and cost efficiency in cloud environments. Skilled sponsor and champion of secure SDLC, threatmodelling, vulnerability management, and privacy by design. Ability to partner with product and legal teams on security trade-offs and customer due diligence. Skilled in agile delivery, quarterly More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Lawrence Harvey
of Security Engineering and lead in the build-out of their cloud-native Infrastructure capability . Highly technical position where you will be responsible for not just assessing and threatmodelling novel concepts and services to introduce across Security and the wider Tech functions; but leading in the actual design, configuration and implementation. Previous experience in Software Security … to put your stamp on one of the most ambitious Tech Transformations for one of the most renowned Investment Management firms in the UK. Responsibilities Perform hands-on security threatmodelling, risk assessment and vulnerability remediation. Evaluate, architect, implement and support security focused tools and services. Work closely with Development teams to ensure security and privacy are built More ❯
technical acumen to embrace data, technological and innovative approaches to deliver the best consulting outcomes for clients, as they work to address the challenges associated with today’s cyber threat landscape. Your Impact SOC Advisory: 4+ years of consulting experience in SOC, security engineering, SIEM administration, and incident management and demonstrated success with serving large, multinational organisations in designing … Security Incident and Event Management (SIEM) platforms, Security Orchestration and Response (SOAR) technologies, Endpoint Protection and Response/Next Gen Protection and Response (EDR/XDR) tools, Next GenFirewalls, Threat Intelligence and Hunting platforms Defensive Security Skills (desired) : Experience in security operations design, engineering and/or analysis and investigations, ideally in complex environments, with security event correlations across … security operations and capabilities to better protect, detect and rapidly respond to modern threats Demonstrated experience in improving an organisations security operations capabilities such as improvements in asset visibility, threat detection capabilities, automation techniques, case management, enablement of compliance and regulatory requirements Experience in conducting threat hunting and/or compromise assessments to identify active or dormant indicators More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Acumin
including Endpoint Protection, Cloud Security, Network Security, DevSecOps, SIEM/SOAR, and vulnerability management. Deep understanding of secure design principles, IAM, encryption, API security, and application security. Experience performing threatmodelling, security risk assessments, and control design validation. In-depth knowledge of industry standards and frameworks (ISO27001, NIST CSF, PCI DSS, CIS Controls). Minimum of 5 years More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Reed
the software development lifecycle and drive a risk-based approach to vulnerability management. Key Responsibilities Lead application security initiatives across cloud-native and enterprise environments. Promote secure design principles, threatmodelling, and best practices across teams. Own and evolve the technical vulnerability management programme. Implement and support security controls, particularly within Azure cloud environments. Evaluate and deploy best … techniques. Excellent communication and documentation skills. Relevant certifications (e.g. CISSP, SANS GCIA, Security+, CCNA/CCNP). Solid understanding of IT infrastructure, protocols, and security design. Desirable: Background in threat modelling. Degree in Computer Science or equivalent experience. Knowledge of ISO27001, Cyber Essentials Plus, and cloud certifications (e.g. CSA STAR). More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Anson McCade
and commercial awareness alongside deep technical expertise. Key areas of focus Define and implement enterprise-level AI/ML security strategies, policies, and architectures. Lead on AI risk assessment, threatmodelling, and mitigation planning. Ensure compliance with GDPR, the EU AI Act, and international security frameworks (ISO 27001, NIST, TOGAF, SABSA). Build and maintain secure AI architectures More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Anson McCade
AI/ML concepts, models, algorithms, and associated risks. Proven experience defining and implementing AI security frameworks and risk management processes. Deep knowledge of adversarial machine learning and AI threat modelling. Familiarity with key security frameworks such as NIST, ISO 27001, TOGAF, SABSA . Current certifications such as CISSP, CISM, or equivalent . Experience with cloud environments (Azure, AWS More ❯
ML security projects, including architecture, risk assessments, and governance frameworks. Design and implement security architectures for AI/ML systems and pipelines. Advise clients on AI security best practices, threat mitigation, and compliance. Develop AI/ML security policies, standards, and reference architectures. Conduct threatmodelling, adversarial testing, and design reviews. Drive business development activities and support More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Anson McCade
on secure AI adoption and architecture decisions Experience required 7+ years’ experience in cybersecurity, ideally at architecture or consultancy level Proven expertise in AI/ML security architecture and threatmodelling Deep understanding of AI algorithms, data security, and adversarial machine learning Strong grasp of ethical AI frameworks, governance, and compliance standards Professional certifications such as CISSP, CISM More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Logiq
ll do Secure product & platform delivery (cloud‐native focus) • Provide hands‐on cyber consultancy across digital product lifecycles, championing Secure by Design and privacy‐by‐default. • Conduct and iterate threat models for new features and integrations; translate findings into actionable design and control decisions. • Advise on secure architecture for modern platforms (segmentation, identity/access, encryption, data protection, secrets More ❯
ie cyber security asset management, attack surface management, etc) Pragmatic application of zero-trust philosophies Cloud based security (GCP, AWS and Azure) Pentest scoping and analysis experience Application security Threatmodelling To apply for this position please submit your CV. More ❯
ie cyber security asset management, attack surface management, etc) Pragmatic application of zero-trust philosophies Cloud based security (GCP, AWS and Azure) Pentest scoping and analysis experience Application security Threatmodelling To apply for this position please submit your CV. More ❯
ie cyber security asset management, attack surface management, etc) Pragmatic application of zero-trust philosophies Cloud based security (GCP, AWS and Azure) Pentest scoping and analysis experience Application security Threatmodelling To apply for this position please submit your CV. Carbon60, Lorien & SRG - The Impellam Group STEM Portfolio are acting as an Employment Business in relation to this More ❯
secure software at speed. 🧠 What You’ll Lead & Deliver Embed security into the SDLC from architecture through production Automate guardrails and integrate security tooling into CI/CD Drive threatmodelling + security design reviews for new features Create internal security tools, libraries, and developer workflows Mentor engineers and uplift security engineering craft Partner with product & platform teams More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Immersum
Docker. Embedding security into CI/CD pipelines (Jenkins, GitHub Actions, CodePipeline) through SAST/DAST and dependency scanning. Collaborating with developers and product teams to promote DevSecOps practices, threatmodelling and secure coding. Conducting security assessments, monitoring for vulnerabilities and leading remediation efforts. Operating and extending monitoring, logging and alerting systems for both performance and security. Managing More ❯
slough, south east england, united kingdom Hybrid / WFH Options
TRIA
Terraform, Kubernetes, and Docker. Embed security into the CI/CD pipeline including SAST/DAST and dependency scanning. Collaborate with developers and product teams to promote DevSecOps practices, threatmodelling, and secure coding standards. Conduct security assessments of applications, services, and infrastructure, identifying vulnerabilities and recommending remediation. Operate, tune, and extend monitoring, logging, and alerting systems for More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Anson McCade
hands-on experience securing ML/AI systems (not theoretical knowledge). Deep technical expertise in AI/ML architectures, data pipelines, and model lifecycle security. Strong understanding of threat modeling, risk assessment, and security controls in AI/ML contexts. Previous experience as a Security Architect or senior security consultant. Excellent problem-solving, communication, and stakeholder management skills. More ❯
currently seeking a DeFi Security Engineer for their London office. This role focuses on supporting the security of their Crypto trading infrastructure and OTC platform Responsibilities: Conduct vulnerability assessments, threat modeling, and penetration testing across infrastructure, smart contracts, and OTC-specific components Lead system hardening, network segmentation, identity management, and rapid incident response for DeFi and OTC environments Investigate More ❯
SOC Security Specialist We are looking for a highly capable and technically skilled Security Analyst to join our cybersecurity team. This role focuses on network and endpoint security operations, threat intelligence, and incident response within a Security Operations Centre (SOC) environment. The successful candidate will have hands-on experience with leading security platforms and demonstrate the ability to operate … at a team lead level. Key Responsibilities: Network Detection & Response: Administer and optimise Darktrace for network threat detection, model tuning, and behavioural analysis. Investigate anomalies and escalate incidents based on network telemetry. Endpoint Protection: Deploy and manage CrowdStrike Falcon agents across enterprise endpoints. Maintain and update detection rules, ensuring alignment with threat intelligence. Security Operations Centre (SOC): Act … a Level 2 SOC Analyst and Incident Handler. Triage, investigate, and respond to security alerts and incidents. Collaborate with other SOC team members to ensure timely resolution and documentation. Threat Intelligence & Insider Threat Monitoring: Monitor threat feeds and manage Indicators of Compromise (IOCs). Conduct insider threat analysis and support investigations. Cloud & Identity Security: Use Microsoft More ❯