Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
Job title Senior CyberThreat Intelligence Analyst Ref 40789 Division Digital Transformation Location Reading - Clearwater Court - RG1 8DB Contract type Permanent Full/Part-time Full-time Hours 36 Salary Offering up to £65,000 per annum depending on experience Job grade B Closing date 15/…/2025 As a Senior CyberThreat Intelligence Analyst , you will play a key role in protecting Thames Water's digital infrastructure by researching, analysing, and communicating the latest cyberthreats facing the organisation. You'll evaluate global risks, provide actionable intelligence to stakeholders, and … of the incident response team where appropriate and deliver cyber intelligence insights during security events. Threat Research & Intelligence: Research emerging threats, threat actors, TTPs and IoCs to support threat hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
GCS
As a Senior CyberThreat Intelligence Analyst , you will play a key role in protecting the company's digital infrastructure by researching, analysing, and communicating the latest cyberthreats facing the organisation. You'll evaluate global risks, provide actionable intelligence to stakeholders, and support the … development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … of the incident response team where appropriate and deliver cyber intelligence insights during security events. Threat Research & Intelligence: Research emerging threats, threat actors, TTPs and IoCs to support threat hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
GCS
As a Senior CyberThreat Intelligence Analyst , you will play a key role in protecting the company's digital infrastructure by researching, analysing, and communicating the latest cyberthreats facing the organisation. You'll evaluate global risks, provide actionable intelligence to stakeholders, and support the … development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … of the incident response team where appropriate and deliver cyber intelligence insights during security events. Threat Research & Intelligence: Research emerging threats, threat actors, TTPs and IoCs to support threat hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Banco Santander SA
threats, this role could be for you! The difference you'll make: Review and analyze security logs and data to investigate alerts Support proactive threat hunting on the network Provide SME support within Cyber Security and the wider bank Develop and refine detection use cases Manage workload … of security alerts, ensuring thorough investigations Participate in a 24/7 on-call rotation for cyberthreat response What you'll bring: Essential requirements: Knowledge and experience in Cyber Security disciplines such as network analysis, host analysis, malware analysis, penetration testing, EDR, SIEM, vulnerability … management, or incident response in cloud environments Experience working within a SOC or similar team investigating security alerts Understanding of Threat Actor Tactics, Techniques, and Procedures Knowledge of operating systems and relevant logs/artifacts for threat detection Desirable qualifications: Degree or equivalent in a security-related field More ❯
Sindlesham, Berkshire, United Kingdom Hybrid / WFH Options
National Grid plc
to the development of essential architecture strategies and patterns for NESO. Building and managing relationships with the business is key to delivering our cyber security strategy. Whether implementing new solutions, driving operational effectiveness and efficiency, or providing guidance to further enhance our strategy, the Senior Security Architect will … mindset. A proactive approach to problem-solving, with the ability to think critically and strategically about architectural challenges and opportunities. Significant experience in cyber security Strong Cloud knowledge and demonstrable experience - (Azure) Relevant cyber security qualification(s), for example Certified Information Systems Security Professional (CISSP), Certified … lifecycles, application architectures, key attack vectors, and corresponding compensating controls. Cloud Security (Microsoft): Demonstrated experience and proficiency in securing cloud environments. CyberThreat Intelligence: Ability to analyse and respond to emerging cyberthreats and how this can be used to update secure architecture principles. About More ❯
Join a Leading Cyber Defence Operations Team and help safeguard against global cyber risks! Salary: £70,000 + Benefits Location: Reading - 2 Days a week on site Employment Type: Permanent The Cyber Defence Operations team is responsible for protecting customers against cyber … Handle escalated security incidents that L1 and L2 analysts cannot resolve, such as sophisticated malware infections, APTs, and complex intrusions. Lead forensic analysis and threat hunting efforts to ensure rapid containment and recovery. Security Analysis and Root Cause Analysis: Conduct detailed analysis of security events to address current cyber … tasks and enhance the incident response process. Collaboration: Work closely with onshore teams to fine-tune alert volumes and contribute ideas for operational improvement. Threat Response: Engage in threat hunting from a blue team perspective, identifying potential threat group activity. Mentorship & Leadership: Mentor and encourage team members More ❯
systems, frameworks, and processes to support the organisation in achieving multiple industry accreditations within defined industry standards (e.g., ISO 27001/27101, NIST, Cyber Essentials, GDPR, GXP, etc.). Key Responsibilities: Leadership & Strategy Build, mentor, and lead a high-performing, professional cybersecurity team. Develop and execute a comprehensive … enterprise-wide security operations to detect, prevent, and respond to cyber threats. Lead and enhance Security Information and Event Management (SIEM) and Threat Intelligence capabilities. Lead security incident response and forensic investigations, ensuring robust incident handling and mitigation. Report on cybersecurity KPIs and manage significant IS risks … DLP, and IAM solutions. Working knowledge of security frameworks: ISO 27001, NIST, CIS, SOC 2, GDPR, GXP, etc. Experience in cloud security Proficient in threat modeling, penetration testing, vulnerability management, and security incident response. Demonstrated ability to build security teams and drive cybersecurity initiatives from scratch. Experience in supporting More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
Avatar International
on advanced security challenges within an award-winning MSSP? This is your opportunity to integrate, optimise, and innovate within Microsoft Sentinel, ensuring top-tier threat detection and security solutions for clients. As a Microsoft Security Engineer, you'll play a crucial role in securing critical infrastructure, enhancing log integrations … optimising data ingestion, enhancing detection capabilities, and proactively refining security processes to strengthen client defenses. Key Responsibilities Integrate log sources into Sentinel, ensuring seamless threat detection. Develop, troubleshoot & optimise data connectors, deploying Function Apps and refining code for efficiency. Validate log parsing, enhance existing parsers, and develop custom ingestion … and cybersecurity teams, refining detection strategies and reducing false positives. Analyse security logs from diverse sources, including cloud platforms, firewalls, EDR, IAM, VPN, and threat intelligence tools. What We're Looking For Experience & Qualifications 5+ years of cybersecurity experience. 3+ years of Microsoft Sentinel design, implementation, and Linux administration. More ❯
is pivotal in ensuring the secure delivery of technology across BFS. The Information Security Engineer will safeguard our colleagues, clients, and partners from cyberthreats by proactively managing cybersecurity measures. This role requires balancing the need to protect BFS with the need to conduct business effectively, ensuring we … Designing and implementing secure infrastructures, ensuring robust protection against potential threats in BSF cloud platforms – for example: Azure, AWS and Microsoft 365 environments. Utilise threat intelligence to stay informed about emerging threats and vulnerabilities, and integrate this information into security strategies Designing and implementing network set-up and control More ❯
is pivotal in ensuring the secure delivery of technology across BFS. The Information Security Engineer will safeguard our colleagues, clients, and partners from cyberthreats by proactively managing cybersecurity measures. This role requires balancing the need to protect BFS with the need to conduct business effectively, ensuring we … Designing and implementing secure infrastructures, ensuring robust protection against potential threats in BSF cloud platforms – for example: Azure, AWS and Microsoft 365 environments. Utilise threat intelligence to stay informed about emerging threats and vulnerabilities, and integrate this information into security strategies Designing and implementing network set-up and control More ❯
Play a Critical Role in Global Cyber Defence – Join a Leading Cyber Operations Team! Salary: £70,000 + Benefits Location: Newbury – 2 Days On-Site Type: Permanent Are you an experienced SOC Analyst looking to make a real impact in defending against high-severity cyber … and reporting on risks with precision. Key Responsibilities Lead Incident Investigations – Take ownership of high-severity security incidents, ensuring complete and accurate triage Advanced Threat Analysis – Perform deep-dive analysis to uncover root causes, residual risks, and stealthy attack vectors Mentor and Guide – Support junior analysts with expertise and … source) to detect and analyse modern threats Fine-Tuning & Reporting – Tune SIEM and SOAR systems for accuracy, and deliver clear, actionable incident reports Technical Threat Intelligence – Stay ahead of emerging attack vectors, especially those identified via EDR; apply this insight to investigations and tuning efforts What You’ll Bring More ❯
Play a Critical Role in Global Cyber Defence – Join a Leading Cyber Operations Team! Salary: £70,000 + Benefits Location: Newbury – 2 Days On-Site Type: Permanent Are you an experienced SOC Analyst looking to make a real impact in defending against high-severity cyber … and reporting on risks with precision. Key Responsibilities Lead Incident Investigations – Take ownership of high-severity security incidents, ensuring complete and accurate triage Advanced Threat Analysis – Perform deep-dive analysis to uncover root causes, residual risks, and stealthy attack vectors Mentor and Guide – Support junior analysts with expertise and … source) to detect and analyse modern threats Fine-Tuning & Reporting – Tune SIEM and SOAR systems for accuracy, and deliver clear, actionable incident reports Technical Threat Intelligence – Stay ahead of emerging attack vectors, especially those identified via EDR; apply this insight to investigations and tuning efforts What You’ll Bring More ❯
reading, south east england, United Kingdom Hybrid / WFH Options
Context Recruitment
and strengthen security operations at scale. A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation … for enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security analysts, engineers … contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
Context Recruitment
and strengthen security operations at scale. A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation … for enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security analysts, engineers … contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security More ❯
high wycombe, south east england, United Kingdom Hybrid / WFH Options
Context Recruitment
and strengthen security operations at scale. A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation … for enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security analysts, engineers … contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security More ❯
milton keynes, south east england, United Kingdom Hybrid / WFH Options
Context Recruitment
and strengthen security operations at scale. A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation … for enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security analysts, engineers … contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security More ❯
oxford district, south east england, United Kingdom Hybrid / WFH Options
Context Recruitment
and strengthen security operations at scale. A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation … for enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security analysts, engineers … contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
RSM
their strategic goals and empower our people to make an impact and develop their own unique career path. We are seeking an enthusiastic Cyber Security Consultant to join our team. Working alongside our experienced team of specialists, you'll be delivering offensive security services including digital footprint reconnaissance … all industries. The purpose of this role is to deliver our offensive security services including digital footprint reconnaissance, social engineering, vulnerability assessments, penetration testing, threat modelling, cyber-attack simulation exercises, and more to high profile clients across all industries. You'll benefit from ongoing coaching, career mentoring … part of client assignments. Responsible for delivering fieldwork and assignment reporting. Prioritising and managing tasks through to completion. Staying current with the latest cyber-attacks and technology trends. What we are looking for: Are you someone who thrives on variety, loves learning new things, and enjoys connecting with More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
ECS Resource Group
Head of Cyber Security Salary: £63k - £75k Location: London (hybrid working) Job Purpose The role holder will be responsible for leading and managing a team of 2 Cybersecurity Analysts, guiding the team’s operational execution of Cyber protection strategies for detection, response and recovery. The role … best practices and evolving technology trends. Through this leadership, the manager will ensure that Cybersecurity measures are robust, effective, and ahead of evolving cyberthreats Responsibilities To manage varying staff resources and budget assigned to the Cybersecurity Team Develop and direct implementation of security standards, policies, processes and … of IT systems and processes is in place, ensuring that threats are identified and tracked to remediation or accepted mitigation. Maintain an effective cyber incident management response plan. Coordinate the response to Cybersecurity incidents and investigations, managing them in a professional manner including computer forensics for evidence gathering More ❯