of security tools such as SIEM, Firewalls and Cloud Security to monitor systems Providing Windows Server and Network Support Assess and respond to external threatintelligence reports Support ISO27001, Cyber Essentials Plus and other internal and external audit programme Implement and improve technical processes to create efficient and more »
Lead ThreatIntelligence Analyst – SC Cleared Location: Leeds, UK - Onsite Working Salary: Up to £72,000 per annum plus a 10% bonus. Are you passionate about defending against cyber threats and safeguarding critical assets? Join one of the UK's largest defence companies, dedicated to protecting the nation … against cyber threats worldwide. We are currently seeking a Lead ThreatIntelligence Analyst to join our team based in Leeds. In this role, you will play a pivotal role in identifying, analyzing, and mitigating cyber threats to ensure the security and resilience of our systems and infrastructure. Responsibilities … Lead a team of threatintelligence analysts in gathering, analyzing, and disseminating intelligence on cyber threats and adversaries. Monitor and analyze various sources of threatintelligence to identify emerging threats, vulnerabilities, and attack trends. Develop and maintain comprehensive threatintelligence profiles and assessments more »
Bristol, England, United Kingdom Hybrid / WFH Options
Computershare
Senior Cyber ThreatIntelligence AnalystThis is a hybrid position primarily based in Edinburgh or Bristol UK. We’re committed to your flexibility and wellbeing and our hybrid strategy currently requires two days a week in the office, giving you the option to work remotely for some of your … existing and emerging cyber security threats.ResponsibilitiesThe overall purpose of this role is to spearhead Computershare's CTI cybersecurity vision, crafting policies, overseeing real-time threat detection, engaging stakeholders, ensuring compliance, and managing day-to-day CTI activities for strategic and tactical adaptation in the global business landscape.The role will … be responsible for:Perform open-source threat collection and analysis activities identifying indications of cyber threats, malicious code, malicious websites, and vulnerabilities through automated and manual analysis using existing and purpose-built tools.Identify credible, new intelligence, and subject matter resources relative to current and emerging threats.Utilize knowledge of more »
a pivotal role in coordinating security operations within their IT environment. Your responsibilities will include managing cyber defence technologies, coordinating incident response, and leading threat hunting efforts. You will collaborate closely with internal teams and external partners to ensure the highest level of security across the organisation. Key Responsibilities … Standard Operating Procedures (SOPs) and other documentation to support cyber operations. Respond to cyber-related incidents, coordinating remediation efforts and post-incident reviews. Enable threat hunting through the fusion of threatintelligence and business risk analysis. Requirements: Strong understanding of network protocols, firewalls, and intrusion detection/… scale security technology deployments (SIEM/SOAR/EDR/NDR). Ability to lead technical teams and manage service providers effectively. Familiarity with threatintelligence sources and incident prioritization. Understanding of cybersecurity regulations and standards (e.g., GDPR, NIST). Working knowledge of the MITRE ATT&CK framework. more »
Job title: Cyber Security Analyst Experience Level: 4 years + Salary: £45,000-£50,000 Location: London/Hybrid Skills: Cyber Security, Incident Response, ThreatIntelligence, Vulnerability Management The role: My client are seeking a mid-level Cyber Security Analyst to join their team. The role will eventually … Security assessments Penetration tests Hardware and software compliance Working to maintain the Cyber Essentials and ISO27001 accreditations Providing Cyber related training to staff members ThreatIntelligence and hunting Vulnerability Management Knowledge of Windows environments including cloud The successful candidate will have experience in as many of these areas more »
collaboration with the wider information security community within the ICO and across strategic partners, such as NCSC, NCA, CPNI, you will ensure that the threat landscape across the regulatory sector and at national levels are understood; that priorities and direction reflect the changing credible threats to the ICO and … that our key systems and assets are appropriately secured, assessed, monitored. As Digital Security Consultant your main responsibilities will be: Vulnerability and remediation management Threat modelling and Threatintelligence Project and Change engagement Creation and updating of threat models for the core ICO services. Aligning these … threat models and delivering appropriate workstreams to ensure clear oversight of the controls in place for each service. Co-ordinating with relevant ICO departments to provide input and direction into areas such as physical and personnel security, and the ongoing review of credible threats to both staff and the more »
and systems are secure and resilient.Position Summary:As a SOC Analyst, you will be responsible for monitoring security events, conducting incident response, and providing threat intelligence. You will work closely with other SOC analysts to enhance security operations and protect clients from cyber threats.Key Responsibilities:Monitor security events and … logs to identify potential security incidents.Perform incident analysis, classification, and response actions.Provide proactive threatintelligence and recommend mitigation strategies.Collaborate with other SOC Analysts and Shift Leads on incident handling and investigations.Conduct threat hunting activities to identify potential security breaches.Assist in the tuning of security monitoring tools and … security methodologies, processes, and technologies (firewalls, SIEM, IDS/IPS).Proficiency in TCP/IP protocols, network analysis, and troubleshooting.Experience with incident response and threat intelligence.Excellent written and verbal communication skills.Ability to work independently and as part of a team.Eligible to obtain Security Clearance.Desired Qualifications:Relevant certifications (e.g., GCIH more »
systems are secure and resilient. Position Summary: As a SOC Analyst, you will be responsible for monitoring security events, conducting incident response, and providing threat intelligence. You will work closely with other SOC analysts to enhance security operations and protect clients from cyber threats. Key Responsibilities: Monitor security events … and logs to identify potential security incidents. Perform incident analysis, classification, and response actions. Provide proactive threatintelligence and recommend mitigation strategies. Collaborate with other SOC Analysts and Shift Leads on incident handling and investigations. Conduct threat hunting activities to identify potential security breaches. Assist in the … processes, and technologies (firewalls, SIEM, IDS/IPS). Proficiency in TCP/IP protocols, network analysis, and troubleshooting. Experience with incident response and threat intelligence. Excellent written and verbal communication skills. Ability to work independently and as part of a team. Eligible to obtain Security Clearance. Desired Qualifications more »
Corsham, England, United Kingdom Hybrid / WFH Options
J&C Associates Ltd
investigative methods using the SOC’s software toolsets to enhance recognition opportunities for specific analysis. • Maintain a baseline of system security according to latest threatintelligence and evolving trends. • Participate in root cause analysis of incidents in conjunction with engineers across the enterprise. • Provide Subject Matter Expertise (SME more »
Benefits + Bonuses Lead cross-functional post-incident process reviews to identify and implement continuous improvement initiatives. Partner with Legal, 2LoD, Major Incident Management, Threat Management, Vulnerability Management, Attack Surface Reduction, Software Engineering, Security Architecture, Platform Support both locally and globally. You will have experience in: Leading the response … management or risk management within an enterprise environment. Self-motivated interest in the latest cyber security threats and vulnerabilities and is able to integrate threatintelligence into incident response strategies to proactively defend against emerging risks. Nice to have would be: Deep technical knowledge of network fundamentals, common more »
network security controls.Conduct audits, certifications, and provide consultancy support.Utilise automation to enhance security posture and response capabilities.Liaise with stakeholders to enforce network security policies.Utilise threatintelligence to proactively defend against threats.Mentor junior security professionals and support incident response.Qualifications/Skills Required:Bachelor’s degree in Computer Science or more »
Swindon, England, United Kingdom Hybrid / WFH Options
WHSmith
cyber risks and safeguard critical information. What you will be doing Overseeing day-to-day security operations, including monitoring, incident response, vulnerability management, and threatintelligence, to maintain a strong security posture and promptly address any security incidents or vulnerabilities Establishing and maintaining cyber security policies, standards, and more »
Job DescriptionJob title: Cyber Security AnalystExperience Level: 4 years +Salary: £45,000-£50,000Location: London/Hybrid Skills: Cyber Security, Incident Response, ThreatIntelligence, Vulnerability ManagementThe role:My client are seeking a mid-level Cyber Security Analyst to join their team.The role will eventually lead to having some … the policy side.Core responsibilities:Security assessmentsPenetration testsHardware and software complianceWorking to maintain the Cyber Essentials and ISO27001 accreditationsProviding Cyber related training to staff membersThreat Intelligence and huntingVulnerability ManagementKnowledge of Windows environments including cloudThe successful candidate will have experience in as many of these areas as possible.Please apply ASAP for more »
Bristol, England, United Kingdom Hybrid / WFH Options
Computershare
appropriately and practically defend the enterprise in accordance with established policies, procedures, guidelines and practices.Prepare and document standard operating procedures and protocols.Work with the ThreatIntelligence and Cyber Assurance teams to monitor and research industry information sources for zero-day threats and vulnerabilities that impact Computershare.Establish and maintain … global and regional technology infrastructure, application, and architecture teams.Essential Experience:Relevant experience within any of the following:Identity Access ManagementSIEMData Loss PreventionIDS/IPSEmail Threat PreventionEndpoint Detection and ReponseIdentity ProtectionPrivileged Password ManagementCloud SecurityRewards designed for youFlexible work to help you find the best balance between work and lifestyle.Health and more »
Bristol, England, United Kingdom Hybrid / WFH Options
Computershare
practically defend the enterprise in accordance with established policies, procedures, guidelines and practices. Prepare and document standard operating procedures and protocols. Work with the ThreatIntelligence and Cyber Assurance teams to monitor and research industry information sources for zero-day threats and vulnerabilities that impact Computershare. Establish and … application, and architecture teams. Essential Experience: Relevant experience within any of the following: Identity Access Management SIEM Data Loss Prevention IDS/IPS Email Threat Prevention Endpoint Detection and Reponse Identity Protection Privileged Password Management Cloud Security Rewards designed for you Flexible work to help you find the best more »
have a broad remit ensuring high availability and performance, and currently have a particular focus on security system efficiency, monitoring and sustainability, looking at threatintelligence, IAM, data and application security across the Kubernetes and Linux based environments. For this position we will be looking for those from more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
Cyber ThreatIntelligence Analyst Salary – £40,000 - £55,000 + Bonus & Benefits Location – Manchester A growing MSSP organisation are looking to expand their state-of-the-art ThreatIntelligence capability and looking for someone to get involved in the tracking and identification of existing and emerging … threats. This is a great opportunity for a junior cyber threatintelligence analyst to gain exposure to a whole range of investigations and get training from some of the most experienced and talented senior ThreatIntelligence Analysts out there! Responsibilities: Perform open-source intelligence gathering … emerging threats against operational environment and work collaborating with the wider security teams for detection, mitigation, and remediation efforts. Provide situational awareness on current threat landscape and maintain knowledge of adversary activities including TTPs to brief varying teams. Requirements: In-depth knowledge of the current tactics, techniques and procedures more »
Bristol, England, United Kingdom Hybrid / WFH Options
Computershare
Senior Cyber ThreatIntelligence Analyst This is a hybrid position primarily based in Edinburgh or Bristol UK. We’re committed to your flexibility and wellbeing and our hybrid strategy currently requires two days a week in the office, giving you the option to work remotely for some of … emerging cyber security threats. Responsibilities The overall purpose of this role is to spearhead Computershare's CTI cybersecurity vision, crafting policies, overseeing real-time threat detection, engaging stakeholders, ensuring compliance, and managing day-to-day CTI activities for strategic and tactical adaptation in the global business landscape. The role … will be responsible for: Perform open-source threat collection and analysis activities identifying indications of cyber threats, malicious code, malicious websites, and vulnerabilities through automated and manual analysis using existing and purpose-built tools. Identify credible, new intelligence, and subject matter resources relative to current and emerging threats. more »
perform a business impact analysis on the security incident. You will leverage a deep understanding of information security technologies, you will aid in triaging threatintelligence from multiple sources and add contextual information to the security incident, perform additional analysis and based on the business impact will recommend … the response actions and escalation path. You will be guided by ThreatIntelligence which is actionable information (e.g. IOCs/TTPs), conduct threat hunting activities; leveraging and analyzing sources of information as available through the SIEM, in addition identify and investigate potential suspicious activity as well as … Security and security operations experience Microsoft MDE, MDI, Sentinel, Lighthouse and DevOps experience Experience of onboarding, tuning, reporting, and configuring SIEM solutions Experience of threatintelligence Leadership and mentoring experience and skills Understanding of low-level concepts including operating systems and networking Commercial experience in Penetration Testing and more »
Response: Lead and coordinate incident response activities, develop and maintain incident response plans, and escalate incidents as necessary, ensuring adherence to major incident processes. Intelligence: Stay updated on cybersecurity threats, integrate threatintelligence into security monitoring processes, and contribute to the development of threatintelligencemore »
safety and security of organizations through proactive monitoring and incident response. Responsibilities: Provide continuous protective monitoring using state-of-the-art SIEM, IDS, and threatintelligence technologies. Offer expert advice and guidance to clients targeted by cyber attacks, maintaining high standards of support. Ensure timely and accurate incident … reporting to facilitate efficient response strategies. Collaborate with SOC team members during security incidents and Threat Mining exercises, including assistance with tool deployment and administration tasks. Provide support in active directory administration and firewall management. Skills/Must have: Strong analytical skills with the ability to interpret complex data. … Excellent communication skills, both verbal and written. Proficiency in industry-leading SIEM, IDS, and threatintelligence technologies. Ability to work effectively under pressure and adapt to rapidly changing situations. Prior experience with active directory administration and firewall management is desirable. Benefits: Opportunity to work in a dynamic and more »
London, England, United Kingdom Hybrid / WFH Options
Starling Bank
experienced Vulnerability Manager to lead a growing vulnerability management team. A successful candidate will work with the team to analyse emerging vulnerabilities provided by threatintelligence sources and penetration testing. The vulnerability manager will collaborate with various technology and engineering teams to share vulnerability findings, provide guidance, and … the vulnerability management process. Responsibilities Lead a team of information security professionals to: Assess, investigate and provide guidance on emerging vulnerabilities, incorporating information from threatintelligence sources, internal software and infrastructure scans. Collate and prioritise applicable vulnerabilities based on Starling Bank's environmental factors and risk frameworks Collaborate … develop process and procedure improvements. Understand the assets and/or applications at risk from a vulnerability and be able to articulate the potential threat to the Bank in a way anyone in the business could understand. Alignment of risk assessment approach for vulnerabilities to the Bank's risk more »
with various other Security personnel Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incident response and threat hunting Working with threat management frameworks Threatintelligence and continuous improvement Security monitoring and traffic analysis Vulnerability management You will advise … 7pm on a shift basis to ensure that full coverage is achieved. The ideal candidate will have: Incident response and security monitoring Understanding of threat modelling Investigation experience into Information and Cyber security incidents Broad technical understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN more »
practical Consulting and Managed Services. Our suite of services blends together best-in-breed technologies to provide real time 24×7 monitoring, triage, remediation, threat assessment, vulnerability management, and Professional Services to give our Clients absolute peace of mind that their critical environments are protected. Our Security Operations Centre … SOC) delivers an array of services that provide our Customers with robust end-to-end cyber security protection, from monitoring services to threat relevant detection content, from leading threatintelligence to a Customer focus that enables us to become our Customers’ trusted partner. Role Description Talion is more »