support. As such, the need to protect and preserve the ability of HMRC to function and serve the public against threats posed by possible cyber-attacks is critical. CyberThreat Operations (CTO) is part of the Cyber Security Delivery (CSD) function in HMRC Security. CTO covers … a diverse range of responsibilities across the span of anti-phishing, brand abuse management, cyberthreat intelligence, data science, and threat hunting. We are seeking an G7 CyberThreat Intelligence Lead, who will report to the G6 Head of CTO. The successful candidate will manage … three SO CyberThreat Intelligence Managers and one SO Threat Hunting Manager. Job descriptionAs the CyberThreat Intelligence Lead, on a day-to-day basis you will be overseeing and directing the work of CyberThreat Intelligence and Threat Hunting which will More ❯
support. As such, the need to protect and preserve the ability of HMRC to function and serve the public against threats posed by possible cyber-attacks is critical. CyberThreat Operations (CTO) is part of the Cyber Security Delivery (CSD) function in HMRC Security. CTO covers … a diverse range of responsibilities across the span of anti-phishing, brand abuse management, cyberthreat intelligence, data science, and threat hunting. We are seeking an G7 CyberThreat Intelligence Lead, who will report to the G6 Head of CTO. The successful candidate will manage … three SO CyberThreat Intelligence Managers and one SO Threat Hunting Manager. Job description As the CyberThreat Intelligence Lead, on a day-to-day basis you will be overseeing and directing the work of CyberThreat Intelligence and Threat Hunting which More ❯
Telford, Shropshire, West Midlands, United Kingdom
HMRC
support. As such, the need to protect and preserve the ability of HMRC to function and serve the public against threats posed by possible cyber-attacks is critical. CyberThreat Operations (CTO) is part of the Cyber Security Delivery (CSD) function in HMRC Security. CTO covers … a diverse range of responsibilities across the span of anti-phishing, brand abuse management, cyberthreat intelligence, data science, and threat hunting. We are seeking an G7 CyberThreat Intelligence Lead, who will report to the G6 Head of CTO. The successful candidate will manage … three SO CyberThreat Intelligence Managers and one SO Threat Hunting Manager. Job description As the CyberThreat Intelligence Lead, on a day-to-day basis you will be overseeing and directing the work of CyberThreat Intelligence and Threat Hunting which More ❯
Job Description: CyberThreat Analyst Roles and Responsibilities Tier 2 Analyst You must hold a UK passport only due to the security clearance; we can only accept single national status (2nd passport holders, OCI & ILR candidates can't be accepted) and you must have been in the UK … and it covers a rotational 24x7 shift pattern. MUST have at least 6 months working experience in SIEM technologies. Job Description The Tier 2 Cyber Security Analyst is a mid-Tier position within the CyberThreatAnalysis Centre (CTAC), responsible for advancing the initial work conducted … by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organization. This role is crucial in the escalated investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts. The Tier 2 Analyst works closely with senior More ❯
Job Description: CyberThreat Analyst Roles and Responsibilities You must hold a UK passport only due to the security clearance; we can only accept single national status (2nd passport holders, OCI & ILR candidates can't be accepted) and you must have been in the UK for the last … DXC Erskine & Farnborough and covers a rotational 24x7 shift pattern. MUST have at least 6 months working experience in SIEM technologies. The Tier 1 Cyber Security Analyst plays a critical role in the initial triage, monitoring, and reporting of potential cyber threats within the CyberThreatAnalysis Centre (CTAC). Working under the guidance of more senior analysts, the Tier 1 Analyst will use their foundational knowledge of security information and event management (SIEM) solutions to support the security operations team. They will also be proficient in utilizing Kusto Query Language (KQL) for log More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Ashdown Group
CyberThreat Incident Manager - Global financial services company - Full time permanent role - Salary up to £100,000 plus bonus. Hybrid working (twice a week in the London office) A large global financial services firm is looking for an Incident Response Manager within its cyberthreat division. … This is a fantastic opportunity to join a large cyber and information security team that lead the way in technology and tooling in a 24/7 global environment. Duties will include: - Managing a team of CyberThreat Analysts that deliver services to global users - Being responsible … business requirements To be considered suitable for this Incident Response Manager role you will need the following skills and experience: - Experience in a technical cyber/incident response role - Previous team management experience - Good understanding of incident response frameworks and methodologies (ICERF) - Good understanding of threats, vulnerabilities and processes More ❯
London, Broad Street, United Kingdom Hybrid / WFH Options
Ashdown Group
Incident Response Manager (CyberThreat) - Global financial services company - Full time permanent role - Salary up to £100,000 plus bonus. Hybrid working (twice a week in the London office) A large global financial services firm is looking for an Incident Response Manager within its cyberthreat division. This is a fantastic opportunity to join a large cyber and information security team that lead the way in technology and tooling in a 24/7 global environment. Duties will include: - Managing a team of CyberThreat Analysts that deliver services to global users … business requirements To be considered suitable for this Incident Response Manager role you will need the following skills and experience: - Experience in a technical cyber/incident response role - Previous team management experience - Good understanding of incident response frameworks and methodologies (ICERF) - Good understanding of threats, vulnerabilities and processes More ❯
London, Broad Street, United Kingdom Hybrid / WFH Options
Ashdown Group
Security Incident Response Manager (CyberThreat) - Global financial services company - Full time permanent role - Salary up to £100,000 plus bonus. Hybrid working (twice a week in the London office) A large global financial services firm is looking for an Incident Response Manager within its cyberthreat division. This is a fantastic opportunity to join a large cyber and information security team that lead the way in technology and tooling in a 24/7 global environment. Duties will include: - Managing a team of CyberThreat Analysts that deliver services to global users … business requirements To be considered suitable for this Incident Response Manager role you will need the following skills and experience: - Experience in a technical cyber/incident response role - Previous team management experience - Good understanding of incident response frameworks and methodologies (ICERF) - Good understanding of threats, vulnerabilities and processes More ❯
per annum -ASAP Start Our market-leading global client requires a SOC Analyst (Tier 2) with a breadth of experience across Cyber Security to join the team, throughout an exciting period of Change & Innovation. The role will be working with a global IT & Consultancy company, based in Glasgow, on … multiple workstreams of a variety of complexity and scale. This is a mid-Tier position within the CyberThreatAnalysis Centre (CTAC), responsible for advancing the initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organisation. The … role is crucial in the investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts. The Tier 2 Analyst will work closely with senior and junior analysts to ensure a seamless SOC operation and act as a bridge between foundational and advanced More ❯
per annum -ASAP Start Our market-leading global client requires a SOC Analyst (Tier 2) with a breadth of experience across Cyber Security to join the team, throughout an exciting period of Change & Innovation. The role will be working with a global IT & Consultancy company, based in Glasgow, on … multiple workstreams of a variety of complexity and scale. This is a mid-Tier position within the CyberThreatAnalysis Centre (CTAC), responsible for advancing the initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organisation. The … role is crucial in the investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts. The Tier 2 Analyst will work closely with senior and junior analysts to ensure a seamless SOC operation and act as a bridge between foundational and advanced More ❯
per annum -ASAP Start Our market-leading global client requires a SOC Analyst (Tier 1) with a breadth of experience across Cyber Security to join the team, throughout an exciting period of Change & Innovation. The role will be working with a global IT & Consultancy company, based in Glasgow, on … multiple workstreams of a variety of complexity and scale. The role plays a critical role in the initial triage, monitoring, and reporting of potential cyber threats within the CyberThreatAnalysis Centre (CTAC). Tier 1 Analysts will use their foundational knowledge of security information and … in using multiple ticketing systems to manage incidents effectively, ensuring service level objectives are adhered to. Experience utilising Kusto Query Language (KQL) for log analysis will also be beneficial. This is a full-time on-site role, covering a 24x7 shift pattern, which will come with a shift allowance. More ❯