support. As such, the need to protect and preserve the ability of HMRC to function and serve the public against threats posed by possible cyber-attacks is critical. CyberThreat Operations (CTO) is part of the Cyber Security Delivery (CSD) function in HMRC Security. CTO covers … a diverse range of responsibilities across the span of anti-phishing, brand abuse management, cyberthreatintelligence, data science, and threat hunting. We are seeking an G7 CyberThreatIntelligence Lead, who will report to the G6 Head of CTO. The successful candidate … will manage three SO CyberThreatIntelligence Managers and one SO Threat Hunting Manager. Job description As the CyberThreatIntelligence Lead, on a day-to-day basis you will be overseeing and directing the work of CyberThreatIntelligenceMore ❯
Location(s): UK, Europe & Africa : UK : Leeds BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital … advantage in the most demanding environments. CyberThreatIntelligence and Vulnerability Lead Job Title: CyberThreatIntelligence and Vulnerability Lead Requisition ID: 121483 Location: Leeds (this is a 100% office based role due to the nature of the project) Grade: GG10 - GG11 Referral Bonus … The customer is committed to development of this improved SOC to be a benchmark of best practice and excellence in reflection of the significant threat that the protected systems are subject to. This role requires a minimum of DV clearance. This role reports to the Service Delivery Manager. The More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom
Anson McCade
must be British-born. Are you ready to lead in one of the most critical roles in the cybersecurity industry? We are seeking a CyberThreatIntelligence and Vulnerability Lead to play a pivotal role in the operation and improvement of a Security Operations Centre (SOC) dedicated … organisation. This position offers an opportunity to make a tangible impact in protecting the systems that power the nation. About the Role As the CyberThreatIntelligence and Vulnerability Lead, you will: Take accountability for detecting, triaging, and reporting potential cyber threats and key vulnerabilities daily. … Oversee the delivery and quality of all threatintelligence and vulnerability products, ensuring deadlines are met with excellence. Develop and continuously review tailored Priority Intelligence Requirements (PIRs) and collection plans to align intelligence products with client needs. Provide in-depth analysis, context, and predictive insights to More ❯
Location(s): UK, Europe & Africa : UK : Leeds BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital … advantage in the most demanding environments. CyberThreatIntelligence and Vulnerability Lead Job Title: CyberThreatIntelligence and Vulnerability Lead Requisition ID: 121483 Location: Leeds (this is a 100% office based role due to the nature of the project) Grade: GG10 - GG11 Referral Bonus … The customer is committed to development of this improved SOC to be a benchmark of best practice and excellence in reflection of the significant threat that the protected systems are subject to. This role requires a minimum of DV clearance. This role reports to the Service Delivery Manager. The More ❯
Location(s): UK, Europe & Africa : UK : Leeds BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital … The customer is committed to development of this improved SOC to be a benchmark of best practice and excellence in reflection of the significant threat that the protected systems are subject to. The SOC will be staffed by a blend of customer and BAE Systems staff, based in multiple … the incoming shift Monitor, triage, analyse and investigate alerts, log data and network traffic using the Protective Monitoring platform and Internet resources to identify cyber-attacks/security incidents. Categorise all suspected incidents in line with the Security Incident policy Recognise potential, successful and unsuccessful intrusion attempts and compromises More ❯
network traffic using SIEM tools. Analyse and categorise security incidents in line with internal policies. Conduct in-depth incident investigations, reporting, and remediation. Utilise threatintelligence to detect and respond to potential threats. Support incident response activities for national-scale cyber events. Help improve SOC workflows, including … automation and threat detection use cases. Coach junior analysts and contribute to continuous improvement across the team. Essential Skills & Experience: Hands-on experience with Microsoft Sentinel (critical to this role). Experience in security operations, including SIEM tools (e.g., Sentinel, Splunk). Solid understanding of cloud environments (Azure and …/or AWS). Knowledge of network protocols, threat actors, and attack vectors. Ability to analyse complex data and deliver actionable insights. Familiarity with scripting (Python or similar) and security automation (SOAR). Understanding of threatintelligence and its operational use. Desirable Skills: Experience in software engineering More ❯
A global leader in defence and security solutions is seeking a Senior SOC Analyst to take charge of security operations, incident management, and threat detection strategies. This is an excellent opportunity for an experienced SOC analyst to step into a leadership role and help protect critical systems from evolving … cyber threats. As a Senior SOC Analyst, you will be responsible for identifying, investigating, and mitigating security incidents in a high-stakes environment. You will work with a team of experts, leveraging advanced security technologies to safeguard national security interests. Key Responsibilities: Lead and mentor a team of SOC … security environment. Oversee real-time security monitoring and incident response activities. Investigate, triage, and manage security incidents using SIEM, EDR, and NDR tools. Coordinate threatintelligence integration to enhance detection capabilities. Develop and refine SOC processes to improve efficiency and resilience. Requirements: 5+ years in Security Operations, with More ❯
support. As such, the need to protect and preserve the ability of HMRC to function and serve the public against threats posed by possible cyber-a click apply for full job details More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom
Communicate Technology
Security Services Provider, we operate our own Security Operations Centre (SOC) in Leeds city centre. Our mission is to protect our clients from evolving cyber threats while maintaining strong relationships built on trust and value. As we continue to grow, we are seeking a skilled SOC Team Lead to … with recruitment and onboarding of new SOC team members Act as the primary technical escalation point for complex security incidents and investigations Support advanced threat hunting, incident response, and forensic analysis Ensure the SOC follows best practices and industry standards Client Engagement & Technical Account Management Oversee security tool deployments … a SOC environment, with at least 1 year in a leadership role Strong technical knowledge of security tools, including SIEM, SOAR, EDR, Firewalls, and ThreatIntelligence platforms Hands-on experience with security incident handling, threat hunting, and forensic analysis Excellent understanding of attack tactics, techniques, and procedures More ❯
Identify and raise awareness of security risks Develop and enhance security policies, processes, procedures, and technical controls to strengthen security capabilities and resilience to cyber threats Take a proactive role in identifying security risks, mitigations, and opportunities to strengthen resilience to cyber-attacks and security incidents Participate in … and enhancement The Requirements Hands-on experience of security and/or infrastructure within an enterprise environment Exposure to enterprise information security standards including Cyber Essentials, ISO 27001, 27002 etc. Data Protection Act and the General Data Protection Regulation Microsoft O365 Security solutions; Networking; Security operations; Vulnerability Management Security … principles, including experience of vulnerability scanning, identifying, resolving, and reporting risks Experience of formal document creation, such as the creation of reports or procedures ThreatIntelligence analysis and best practice Security Incident Response processes, procedures, and best practices Disaster Recovery and Business Continuity principles Event and log analysis More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Radar Healthcare
software development practices (DevSecOps, secure coding standards, OWASP top 10) into everyday processes. Oversee the security posture of cloud environments, ensuring secure configurations, proactive threat monitoring, and resilience planning. Establish and maintain a robust risk management framework, proactively identifying, assessing, and mitigating cybersecurity risks in alignment with business goals. … Define standards for operational security including vulnerability management, incident detection and response, threatintelligence, and third-party/vendor security management. Act as the key internal and external security spokesperson, confidently communicating security strategy, risks, and controls to the Board, customers, regulators, and other stakeholders. Serve as the More ❯
the right attitude, a thirst for technology and someone who is driven to succeed. Please do not waste anytime and apply right now! Skillset: ** Cyber Essentials ** ISO 27001/27002 ** Networking Security ** O365 Security Solutions ** Security Testing Principles ** ThreatIntelligence Analysis Desirable: ** Disaster Recovery ** Security Incident Response More ❯