Location(s): UK, Europe & Africa : UK : LeedsBAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments.Cyber Threat Intelligence and Vulnerability … LeadJob Title: Cyber Threat Intelligence and Vulnerability Lead Requisition ID: 121483Location: Leeds (this is a 100% office based role due to the nature of the project)Grade: GG10 – GG11Referral Bonus: £5,000 Role Description BAE Systems have been contracted to undertake the day to day operation of (and incremental improvement of) a dedicated Security Operations Centre (SOC) to … systems are subject to.This role requires a minimum of DV clearance.This role reports to the Service Delivery Manager. The Role You will be: Accountable for ensuring all relevant potential cyber threat and key vulnerabilities are detected, triaged and reported on daily Accountable for all regular reporting and ensuring the efficient delivery of all threat intelligence and vulnerability products More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
BAE Systems Applied Intelligence
Select how often (in days) to receive an alert: Create Alert BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. … Cyber Threat Hunter Job Title: Cyber Threat Analyst Requisition ID: 121703 Location: Leeds and surrounding area Grade: GG08 - GG09 Role Description BAE Systems have been contracted to undertake the day-to-day operation of (and incremental improvement of) a dedicated Security Operations Centre (SOC) to support the defence of a major UK Critical National Infrastructure (CNI) organisation. The … capacity that all ADHOC and regular products are completed and are at a sufficient quality for distribution In-depth knowledge of the various techniques and frameworks used within the Cyber Threat Intelligence Domain, Including the Cyber Kill Chain and MITRE ATT&CK Development of new analytics and playbooks that result in creation of new detection rules/ More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
Babcock
Cyber Threat Analyst - National Security West View more categories View less categories Clearance Level DV ,SC ,None/Undisclosed Sector Defence ,Engineering ,Information Technology Job Type Permanent Location(s): UK, Europe & Africa : UK : Leeds BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect … connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Cyber Threat Hunter Job Title: Cyber Threat Analyst Requisition ID: 121703 Location: Leeds and surrounding area Grade: GG08 - GG09 Referral Bonus: £5,000 Role Description BAE Systems have been contracted to undertake the day … capacity that all ADHOC and regular products are completed and are at a sufficient quality for distribution In-depth knowledge of the various techniques and frameworks used within the Cyber Threat Intelligence Domain, Including the Cyber Kill Chain and MITRE ATT&CK Development of new analytics and playbooks that result in creation of new detection rules/ More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
BAE
Location(s): UK, Europe & Africa : UK : Leeds BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Cyber Threat Hunter … Job Title: Cyber Threat Analyst Requisition ID: # Location: Leeds and surrounding area Grade: GG08 - GG09 Referral Bonus: £5,000 Role Description BAE Systems has been contracted to operate and improve a dedicated Security Operations Centre (SOC) supporting a major UK Critical National Infrastructure (CNI) organisation. The networks protected are mainly cloud-based, with numerous systems requiring safeguarding. The … queries independently Experienced in Incident Response and Management Ensuring high-quality Threat Hunt Reports and effective documentation Providing analysis, context, and predictions in deliverables Assessing and improving the threat intelligence function within the client Point of contact for intrusion analysis, forensics, and incident response queries Developing new analytics and playbooks for detection rules Requirements Technical 3+ years in CyberMore ❯
Functions provide professional management services to the firm, including the central operations of finance, information technology, marketing, risk, legal, operations and human resources. What You'll Do As a Cyber Security Incident Response Manager at BCG, you will be a key member of our Cyber Security Incident Response Team (CSIRT), responsible for identifying, analyzing, and mitigating cyber threats. This role requires a proactive approach to threat hunting, cyber threat intelligence, and incident response, ensuring the protection of BCG's global network. You will work closely with the Security Operations Center (SOC), Security Information and Event Management (SIEM), and Managed Security Service Provider (MSSP) to enhance detection and response capabilities. Your expertise will contribute to … strengthening our security posture and minimizing business risks associated with cyber threats. Act as a Tier 3 Incident Responder, supporting complex investigations into cyber security incidents. Conduct proactive threat hunting to detect and neutralize emerging threats. Monitor and analyze logs via SIEM, EDR, and network traffic analysis tools for potential attack indicators. Investigate security incidents, including malware infections More ❯
collaborative model across the firm and throughout all levels of the client organization, generating results that allow our clients to thrive. What You'll Do Position Overview As a Cyber Security Incident Response Manager at BCG, you will be a key member of our Cyber Security Incident Response Team (CSIRT), responsible for identifying, analyzing, and mitigating cyber threats. This role requires a proactive approach to threat hunting, cyber threat intelligence, and incident response, ensuring the protection of BCG’s global network. You will work closely with the Security Operations Center (SOC), Security Information and Event Management (SIEM), and Managed Security Service Provider (MSSP) to enhance detection and response capabilities. Your expertise will contribute to … strengthening our security posture and minimizing business risks associated with cyber threats. What Will You Do? Act as a Tier 3 Incident Responder, supporting complex investigations into cyber security incidents. Conduct proactive threat hunting to detect and neutralize emerging threats. Monitor and analyze logs via SIEM, EDR, and network traffic analysis tools for potential attack indicators. Investigate security More ❯
Incident Response Lead Analyst - Cyber Security Join to apply for the Incident Response Lead Analyst - Cyber Security role at Boston Consulting Group (BCG) Incident Response Lead Analyst - Cyber Security 1 day ago Be among the first 25 applicants Join to apply for the Incident Response Lead Analyst - Cyber Security role at Boston Consulting Group (BCG) Get … collaborative model across the firm and throughout all levels of the client organization, generating results that allow our clients to thrive. What You'll Do Position Overview As a Cyber Security Incident Response Manager at BCG, you will be a key member of our Cyber Security Incident Response Team (CSIRT), responsible for identifying, analyzing, and mitigating cyber threats. This role requires a proactive approach to threat hunting, cyber threat intelligence, and incident response, ensuring the protection of BCG’s global network. You will work closely with the Security Operations Center (SOC), Security Information and Event Management (SIEM), and Managed Security Service Provider (MSSP) to enhance detection and response capabilities. Your expertise will contribute to More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
BAE Systems
Location(s): UK, Europe & Africa: UK: Leeds BAE Systems Digital Intelligence employs 4,500 experts in digital, cyber, and intelligence fields. We collaborate across 10 countries to analyze complex data, enabling governments, armed forces, and businesses to gain a digital advantage in demanding environments. Cyber Threat Hunter Job Title: Cyber Threat Analyst Requisition ID … maturity, developing and delivering improvements. Serving as a point of contact for intrusion analysis, forensics, and incident response queries. Managing ADHOC and regular products during capacity constraints. Knowledge of Cyber Kill Chain, MITRE ATT&CK, and developing new analytics and playbooks. Requirements Technical: 3+ years in Cyber Threat Intelligence, research, and investigation. Experience in incident response and … Excellent open-source research skills. High-level knowledge of Windows, Azure, networking, and cloud platforms. Non-Technical: Bachelor’s in Cybersecurity, Computer Science, or equivalent. Experience in SOC, Threat Intelligence, or Vulnerability Management. Strong communication skills for technical and non-technical audiences. Team player, self-motivated, and capable of mentoring. Desirable Qualifications: Degree in Cyber Security or related. More ❯
My client, an International Financial Services firm, based in London, are looking for a Senior Cyber Threat Hunter to join their growing team. This role will require you to work two days per week in their offices close to Canary Wharf. About the Senior Cyber Threat Hunter Role: My client is seeking a highly motivated, and skilled Senior … Threat Hunter to join a global threat management team. The role will be located in London. The position will report to the Head of Cyber Threat Intelligence and will proactively identify, investigate, and mitigate advanced cyber threats across our organization's network and systems. Leveraging a deep understanding of the latest attack techniques, threat actor tactics, and … how they could impact our business. This role will also be responsible for mentoring others on the team. Key responsibilities include: Lead proactive efforts to identify and mitigate sophisticated cyber threats, leveraging a variety of tools, techniques, and data sources Research, document, and develop Use Cases and Hypotheses for proactive hunting in cyber security tools including SIEM, EDR More ❯
resources to better use. CLS products are designed to enable clients to manage risk most effectively across the full FX lifecycle - whether through more efficient processing tools or market intelligence derived from the largest single source of FX executed data available to the market. Our ambition to make a positive difference starts with our people. Our values - Protect, Improve … necessary improvements. Key member of the function who regularly reviews Security Policies, Standards and Controls and optimize position on areas associated to regulations and company strategy. Integrate processes with Cyber Threat Intelligence to ensure appropriate monitoring of the threat landscape for emerging security risks and ensure swift response to zero-day threats. Collaborating on Security Risk Management strategies … existing processes, streamline and simplify complexity, and incorporate new ideas and capabilities to enhance our security posture and make the team stronger and better. Decisive: provides clear direction during cyber incident response to the Security Operations team and all associated stakeholders. Identify risks: Able to synthesize capability gaps and articulate them so the Firm can manage risk in alignment More ❯
London, England, United Kingdom Hybrid / WFH Options
CLS-Group
resources to better use. CLS products are designed to enable clients to manage risk most effectively across the full FX lifecycle - whether through more efficient processing tools or market intelligence derived from the largest single source of FX executed data available to the market. Our ambition to make a positive difference starts with our people. Our values - Protect, Improve … necessary improvements. Key member of the function who regularly reviews Security Policies, Standards and Controls and optimize position on areas associated to regulations and company strategy. Integrate processes with Cyber Threat Intelligence to ensure appropriate monitoring of the threat landscape for emerging security risks and ensure swift response to zero-day threats. Collaborating on Security Risk Management strategies … existing processes, streamline and simplify complexity, and incorporate new ideas and capabilities to enhance our security posture and make the team stronger and better. Decisive: provides clear direction during cyber incident response to the Security Operations team and all associated stakeholders. Identify risks: Able to synthesize capability gaps and articulate them so the Firm can manage risk in alignment More ❯
environment (both on-prem and cloud) Be aware of the latest threats in cybersecurity to guide and advise the organization regarding the protection of systems Monitor and translate threat intelligence feeds into actionable detection and response actions Monitor and analyze security logs for attacker tactics, techniques and procedures (TTPs), filtering through suspicious activities to determine their root cause and … information systems, cybersecurity, or a related field Security certifications: GCIA, GCFA, GCFE, CISSP (Associate), CEH, or comps. Experience in one or more areas: identity and access management, security operations, cyber threat hunting, Endpoint Detection and Response (EDR), detection signatures and analytics Experience with open standards such as SAML, OAuth or Open ID Experience with encryption, logging, log aggregation and …/or Linux environments, cloud/hybrid environments Proficient in SIEM and log management configuration and analysis Experience with Security Orchestration Automation and Response tools Experience/familiarity with CyberIntelligence, Threat Operations, Penetration Testing, Red Teaming, Incident Response and Threat Hunting methodologies Experience with intrusion detection systems and intrusion prevention systems Familiarity with managing Linux servers Familiarity More ❯
London, England, United Kingdom Hybrid / WFH Options
NCC Group
our mission, to make the world safer and more secure. Take a look at our website here to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity You will be acting as a team member within the Operational Threat Intelligence team … reporting to the Operational Threat Intelligence Manager , and supported by the Operational TI Team Leads. This role involves analysis of cyber threats, the development of actionable intelligence, and collaboration with various teams. Your support to the wider organisation will be critical in the development of NCC Group’s Threat Intelligence capabilities and the broader service we … offer. Key Accountabilities T hreat Intelligence collection and a nalysis : Make use of OSINT and other intelligence sources to collect and then c onduct in-depth analysis of cyber threats, including malware, vulnerabilities, and TTPs (Tactics, Techniques, and Procedures). Monitor and analy s e emerging threats, industry trends, and geopolitical events to provide timely and relevant More ❯
Staines-upon-Thames, Middlesex, England, United Kingdom Hybrid / WFH Options
Bupa UK
Job Description: Senior Cyber Threat Intelligence Analyst Hybrid: Office/WFH London, Manchester or Staines Permanent Up to £75k + 10% bonus + fantastic benefits 37.5 hours per week We consider all types of flexibility, including locations, hours and working patterns. We make health happen At Bupa, we’re passionate about technology. With colleagues, customers, patients and residents … in mind you’ll have the opportunity to work on innovative projects and make a real impact on their lives. You will be responsible for all aspects of Cyber Threat Intelligence Management, Situational Awareness, Threat Hunting, and defense and prevention tuning activities to protect Bupa from all types of cyber adversaries. How you’ll help us make … health happen: Provide threat-driven cyber security expertise, overseeing end-to-end process design, implementation and coordination of all tactical and strategic activities Working with the Head of Threat Intelligence and Lead Threat Intelligence Analyst to ensure a proactive defensive security posture Ensure that all technology, cloud services, and third-party solutions follow the established Threat Management More ❯
Base pay range Leeds – 5 days on-site Up to £65,000 + DV Cleared Bonus Candidates must hold Active SC Clearance We are currently recruiting for a Threat Intelligence Lead to join one of the UK’s most critical national defence programmes. This is an opportunity to lead a high-performance team operating at the forefront of cyber threat intelligence, helping to protect sensitive cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: • Lead the development and delivery of threat intelligence and vulnerability products. • Select and profile key threat actors posing the greatest risk to the client’s estate. • Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. • Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. • Provide in-depth contextual More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
UK Home Office
Direct message the job poster from UK Home Office Lead Technical Recruiter (Cyber Security, Data & IT Operations) @ UK Home Office | HR, Recruiting, Hiring Location: Manchester (hybrid) Salary: £60,300 plus capability allowance of up to £20,100 Advert Close: 10th July 11:55pm Job summary Cyber Security at the Home Office is critical to protecting a large government … department and safeguarding critical digital infrastructure. The Cyber Security Operations Centre (CSOC) Threat Intelligence team is tasked with understanding and contextualising the Home Office’s cyber threat landscape. The team manages the department’s intelligence requirements, based on assessed threats to Home Office systems, then seeks to obtain and analyse data to identify threats and their … threats, allowing for the deployment of targeted defences and the sharing of timely and actionable guidance. The Threat Assessment Lead plays a critical role in the success of the Cyber Security Operations Centre (CSOC) by overseeing all threat intelligence activities. This includes defining intelligence requirements, managing collection and analysis, and ensuring timely dissemination of insights. The role More ❯
and will play a key role in expanding the portfolio of technical PwC SecOps services. You will help our clients improve their ability to prevent, detect and respond to cyber threats. You will work with CISOs and Security Operations leaders at a wide range of organisations, from small think tanks to global banks, and help them assess, enhance, and … improvement. Your role will span project delivery, technical leadership, and the opportunity to source and develop new projects. You will be supported by an excellent and growing team of cyber security architects, detection engineers, threat hunters, and incident responders. You will regularly interact with PwC technology alliance partners such as Microsoft, Google, and Palo Alto Networks. Roles & Responsibilities Design … strategies and identify tactical "quick wins" that mature our clients' SecOps capabilities, and improve their ability to detect and respond to cyber attacks, including in the wake of a network intrusion or other cyber incident. Plan and lead the delivery of complex SecOps consulting and engineering projects involving diverse technologies, and multidisciplinary delivery teams and stakeholder groups. Support More ❯
London, England, United Kingdom Hybrid / WFH Options
Bridewell
Join to apply for the Senior Project Manager - Cyber Security role at Bridewell Join to apply for the Senior Project Manager - Cyber Security role at Bridewell Get AI-powered advice on this job and more exclusive features. Direct message the job poster from Bridewell Talent Acquisition Business Partner at Bridewell About Bridewell One of the most exciting prospects … in the UK cyber security sector today, Bridewell is a leading cyber security services company specialising in protecting and transforming critical business functions for some of the world's most trusted organisations. We are the trusted partner for operators of essential services and provide end-to-end cyber security capabilities that help our clients overcome their security … several projects at any one time, with proven experience engaging and managing relationships with various stakeholders, including clients, vendors, and internal teams. Ideally, you'll have worked with a Cyber Security services provider or within a Cyber Security function, with knowledge of Cyber Security principles, standards, and technologies desirably resulting in at least a foundation level qualification More ❯
About the Role:We are seeking a highly motivated and detail-oriented SOC Analyst to join our on-site team in Wiltshire. This is a critical role within our cyber security operations, responsible for monitoring, detecting, and responding to security incidents, ensuring compliance, and maintaining the integrity of our systems and networks. Key Responsibilities: * Monitor and analyse security events … Collaborate with internal teams to enhance security posture* Document incidents, findings, and recommendations clearly and accurately* Stay current with emerging threats and vulnerabilities* Demonstrate an understanding of the wider cyber security landscape and risks Essential Skills & Experience: * Minimum of 2 years' experience in a SOC or cyber security role* Strong understanding of SIEM technologies and incident response processes … security monitoring, logging, and compliance frameworks* Excellent analytical skills and a keen eye for detail* Strong written and verbal communication skills Desirable: * An interest in or basic understanding of cyber threat intelligence, including how attackers operate and how to spot signs of compromise (e.g., suspicious files, unusual behaviour, or known attack patterns)* Relevant cyber security or networking More ❯
and Threat Operations services are central to this. We support PwC's clients in crisis across our global network to respond, remediate and recover from a wide variety of cyber attacks. We also support clients in developing detection engineering and threat hunting strategies for modern SecOps environments, and engineer automation and orchestration playbooks to streamline detection and response activities. … We design playbooks for investigation, response, and recovery. We are assured by the UK NCSC under its Enhanced Cyber Incident Response scheme, to respond to sophisticated attacks on networks of national significance. Recent incidents we have responded to include human-operated ransomware attacks on some of the world's largest corporations, and APT intrusions at NGOs. Our investigation work … spans cyber crime, corporate espionage and state affiliated threat actors. Our Incident and Threat Operations practice works closely alongside many other of our front-line technical teams to deliver an end to end incident response capability to clients, including our global threat intelligence team, our threat hunting team and our ethical hacking practice. We also work with PwC More ❯
About the Role: We are seeking a highly motivated and detail-oriented SOC Analyst to join our on-site team in Wiltshire. This is a critical role within our cyber security operations, responsible for monitoring, detecting, and responding to security incidents, ensuring compliance, and maintaining the integrity of our systems and networks. Key Responsibilities: Monitor and analyse security events … Collaborate with internal teams to enhance security posture Document incidents, findings, and recommendations clearly and accurately Stay current with emerging threats and vulnerabilities Demonstrate an understanding of the wider cyber security landscape and risks Essential Skills & Experience: Minimum of 2 years' experience in a SOC or cyber security role Strong understanding of SIEM technologies and incident response processes … security monitoring, logging, and compliance frameworks Excellent analytical skills and a keen eye for detail Strong written and verbal communication skills Desirable: An interest in or basic understanding of cyber threat intelligence, including how attackers operate and how to spot signs of compromise (e.g., suspicious files, unusual behaviour, or known attack patterns) Relevant cyber security or networking More ❯
necessary improvements. Key member of the function who regularly reviews Security Policies, Standards and Controls and optimize position on areas associated to regulations and company strategy. Integrate processes with Cyber Threat Intelligence to ensure appropriate monitoring of the threat landscape for emerging security risks and ensure swift response to zero-day threats. Collaborating on Security Risk Management strategies … existing processes, streamline and simplify complexity, and incorporate new ideas and capabilities to enhance our security posture and make the team stronger and better. Decisive: provides clear direction during cyber incident response to the Security Operations team and all associated stakeholders. Identify risks : Able to synthesize capability gaps and articulate them so the Firm can manage risk in alignment … degree in computer science, Cybersecurity, Information Technology, or related field. Master's degree preferred. CRISC, CISM, CISA, CDPSE, or similar advanced security certifications. Advantageous to have experience in Artificial Intelligence, post quantum computing and cyber risk quantification. Considerable experience in cybersecurity, with notable experience in a senior or managerial role focused on security policy, standards, controls testing, governance More ❯
necessary improvements. Key member of the function who regularly reviews Security Policies, Standards and Controls and optimize position on areas associated to regulations and company strategy. Integrate processes with Cyber Threat Intelligence to ensure appropriate monitoring of the threat landscape for emerging security risks and ensure swift response to zero-day threats. Collaborating on Security Risk Management strategies … existing processes, streamline and simplify complexity, and incorporate new ideas and capabilities to enhance our security posture and make the team stronger and better. Decisive: provides clear direction during cyber incident response to the Security Operations team and all associated stakeholders. Identify risks : Able to synthesize capability gaps and articulate them so the Firm can manage risk in alignment … degree in computer science, Cybersecurity, Information Technology, or related field. Master's degree preferred. CRISC, CISM, CISA, CDPSE, or similar advanced security certifications. Advantageous to have experience in Artificial Intelligence, post quantum computing and cyber risk quantification. Considerable experience in cybersecurity, with notable experience in a senior or managerial role focused on security policy, standards, controls testing, governance More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
detections to improve the CDO's efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with CDO analysts to identify repetitive tasks and automate them to improve operational efficiency. Collaborate with Threat Intelligence, Incident Response, and More ❯
Why it’s worth it: The ReliaQuest Threat Intelligence team provides timely, comprehensive intelligence that empowers high-fidelity detections, identifies known and emerging threats, and equips our customers with the knowledge to act decisively. Via our industry-leading security operations platform, GreyMatter, we produce operational, strategic, and tactical intelligence that delivers actionable insights into threat actor tactics … performance environment, this role will challenge you to push your boundaries, innovate continually, and operate at pace. The everyday hustle: Identify and evaluate trends, dynamics, and developments in the cyber threat landscape by conducting primary-source research and analyzing telemetry. Maintain the GreyMatter platform’s threat intelligence library by writing timely, accurate, and relevant customer-facing deliverables covering … threat actors, vulnerabilities, campaigns, and malware. Supply intelligence to internal teams to enrich our threat detection, containment, investigation, and response capabilities. Conduct investigations to support fast-turnaround and long-form customer requests for information, including in incident response scenarios. Publish emergency customer advisories to alert on impactful developments requiring immediate action. Carry out research and operations on the clear More ❯