Analyst, Threat Intelligence Analyst page is loaded Analyst, Threat Intelligence Analyst Apply locations London time type Full time posted on Posted Yesterday job requisition id -WD Do you want your voice heard and your actions to count? Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world's leading financial groups. Across the globe, we … Security, Information Security, IT Audit, IT Risks, IT Controls, Access Management and the portfolio for change for all these areas. MAIN PURPOSE OF THE ROLE To ensure latest cyber threat information is monitored and raise awareness across MUFG EMEA by disseminating reports and interacting with the stakeholders to sort out the issues. The role will involve liaising and coordinating … external and internal threats is defined and being implemented. To support the relationship and associated reporting requirements between Technology and internal and external bodies e.g. Tokyo head office, global Threat Intelligence Teams. KEY RESPONSIBILITIES In this role, you will be responsible for information/cyber security across MUFG's banking and securities business under a dual-hat arrangement. Under More ❯
Security Research Engineer - Threat Protection The Role As a Security Research Engineer at Mimecast, you will be a pivotal technical expert dedicated to researching, analyzing, and developing detections for both malware and phishing threats. Your work will involve dissecting real-world file and web threats, building and optimizing detection signatures, and driving improvements to our advanced detection systems. This … role combines in-depth threat investigation with a focus on enhancing our capabilities to block evolving attacks and provide actionable insights to our customers and internal teams. Why Join Our Team? At Mimecast, you will be at the forefront of neutralizing diverse phishing and malware threats through comprehensive file analysis and research across web vectors. You will dissect … optimizing detection signatures using industry-standard tools like Yara and ClamAV, as well as Mimecast's advanced proprietary detection technologies. This is an opportunity to leverage vast real-world threat data and transform your technical expertise into tangible protection for millions of users globally. If you're driven to understand and dismantle sophisticated attacks, Mimecast offers a dynamic environment More ❯
Click OK to reset the timer to 0 minutes. You have been signed out. This service is set to sign out after 0 minutes of inactivity. Job Description - Security Threat Awareness Manager (Edgewing) () Job Description Security Threat Awareness Manager (Edgewing) - Description Job title: Security Threat and Awareness Manager (Edgewing) Location: Reading area. The role could be contracted … 000+ Dependent of skills and experience What you'll be doing: Build trusted stakeholder relationships internationally, sharing information to support the identification of potential threats Develop a robust threatanalysis environment by: Identifying anomalies in available information sources and analysing events to detect possible information security incidents Investigating security incidents in collaboration with all relevant stakeholders Assessing the … impact of security events on the confidentiality, integrity, and availability of information Conducting specialised analysis of files and data to extract technical information that supports incident management and the creation of effective detection indicators Performing threatanalysis through scenario evaluation and risk assessment Your skills and experiences: Influences business decisions and contributes significantly to the development of More ❯
Threat Intelligence Lead £55000-65000 GBP Onsite WORKING Location: Leeds, Yorkshire and the Humber - United Kingdom Type: Permanent Threat Intelligence Lead Leeds - 5 days on-site Up to £65,000 + DV Cleared Bonus We are currently recruiting for a Threat Intelligence Lead to join one of the UK's most critical national defence programmes. This is … an opportunity to lead a high-performance team operating at the forefront of cyber threat intelligence, helping to protect sensitive cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly … inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: Lead the development and delivery of threat intelligence and vulnerability products. Select and profile key threat actors posing the greatest risk to the client's estate. Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. Ensure timely delivery of More ❯
bradford, yorkshire and the humber, united kingdom
Anson Mccade
Threat Intelligence Lead £55000-65000 GBP Onsite WORKING Location: Leeds, Yorkshire and the Humber - United Kingdom Type: Permanent Threat Intelligence Lead Leeds - 5 days on-site Up to £65,000 + DV Cleared Bonus We are currently recruiting for a Threat Intelligence Lead to join one of the UK's most critical national defence programmes. This is … an opportunity to lead a high-performance team operating at the forefront of cyber threat intelligence, helping to protect sensitive cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly … inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: Lead the development and delivery of threat intelligence and vulnerability products. Select and profile key threat actors posing the greatest risk to the client's estate. Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. Ensure timely delivery of More ❯
to learn more about this opportunity, feel free to reach out and apply today! Responsibilities: Monitor and analyse security events within the SOC, ensuring timely detection and response. Perform threatanalysis, vulnerability assessments, and implement mitigation strategies. Develop and refine incident response playbooks and procedures. Conduct root cause analysis (RCA) for high-priority incidents to prevent recurrence. … Must Have: Minimum of two years' experience in a SOC or managed security environment. Strong knowledge of network security (firewalls, IDS/IPS, VPNs). Proficiency in incident response, threatanalysis, and vulnerability management. Experience working with SIEM tools for monitoring and event analysis. Understanding of malware analysis, forensic investigations, and endpoint security. Strong analytical and problem More ❯
PPS) are fully integrated in the design process and adhere to the minimum standards expected in delivering an inherently secure power plant. This is benchmarked against the Design Basis Threat (DBT) and regulatory expectations. You will work closely with stakeholders across the business, including engineers, safety professionals and other technical experts, to influence the design and convey proportionate and … with NPSA protective security principles of Deter, Detect, Delay, Mitigate and Respond. Analytical skills collating complex data from across the stakeholder space to determine credible conclusions around risk assessments, threat capability and adversarial pathways. Demonstrable ability to convey the principles of secure by design (ideally in a nuclear context) and the graded approach. Complemented by the ability to practice … people with transferable skills. Key Selection Criteria Demonstratable understanding of the principles behind secure-by-design and the graded approach Knowledgeable in the practice and principles of requirements identification, analysis, and synthesis, to create substantiation of security claims, arguments, and evidence. Experience in the delivery of physical security solutions in a highly regulated environment Ideally able to demonstratable capability More ❯
PPS) are fully integrated in the design process and adhere to the minimum standards expected in delivering an inherently secure power plant. This is benchmarked against the Design Basis Threat (DBT) and regulatory expectations. You will work closely with stakeholders across the business, including engineers, safety professionals and other technical experts, to influence the design and convey proportionate and … with NPSA protective security principles of Deter, Detect, Delay, Mitigate and Respond. Analytical skills collating complex data from across the stakeholder space to determine credible conclusions around risk assessments, threat capability and adversarial pathways. Demonstrable ability to convey the principles of secure by design (ideally in a nuclear context) and the graded approach. Complemented by the ability to practice … people with transferable skills. Key Selection Criteria Demonstratable understanding of the principles behind secure-by-design and the graded approach Knowledgeable in the practice and principles of requirements identification, analysis, and synthesis, to create substantiation of security claims, arguments, and evidence. Experience in the delivery of physical security solutions in a highly regulated environment Ideally able to demonstratable capability More ❯
PPS) are fully integrated in the design process and adhere to the minimum standards expected in delivering an inherently secure power plant. This is benchmarked against the Design Basis Threat (DBT) and regulatory expectations. You will work closely with stakeholders across the business, including engineers, safety professionals and other technical experts, to influence the design and convey proportionate and … with NPSA protective security principles of Deter, Detect, Delay, Mitigate and Respond. Analytical skills collating complex data from across the stakeholder space to determine credible conclusions around risk assessments, threat capability and adversarial pathways. Demonstrable ability to convey the principles of secure by design (ideally in a nuclear context) and the graded approach. Complemented by the ability to practice … people with transferable skills. Key Selection Criteria Demonstratable understanding of the principles behind secure-by-design and the graded approach Knowledgeable in the practice and principles of requirements identification, analysis, and synthesis, to create substantiation of security claims, arguments, and evidence. Experience in the delivery of physical security solutions in a highly regulated environment Ideally able to demonstratable capability More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom Hybrid / WFH Options
Fynity
Cyber Threat Intelligence Analyst Hemel Hempstead | Hybrid: 3 Days WFH/2 Days On-SiteUp to £60,000 + Excellent Benefits Security Clearance: SC Cleared + Eligible for DV ClearanceA great opportunity to take your cyber threat intelligence skills to the next level? This is an exciting opportunity to join a fast-growing, mission-driven cyber team working … at the forefront of Defence and National Security.The Cyber Threat Intelligence Analyst will play a key role in identifying and neutralising emerging threats that could impact our most critical national infrastructure. This is a hands-on, high-impact role where you’ll shape the threat intel capability and directly support security operations in a cutting-edge SOC environment.As … a Cyber threat Analyst, you will: Managing and automating threat intel feeds from multiple open and closed sources Monitoring OSINT, dark web forums, and internal telemetry for threat indicators Translating raw technical data into actionable insights for security teams Collaborating with SOC and Incident Response teams to support real-time threat mitigation Creating detailed intelligence reports More ❯
Hemel Hempstead, England, United Kingdom Hybrid / WFH Options
Fynity
Cyber Threat Intelligence Analyst Hemel Hempstead | Hybrid: 3 Days WFH/2 Days On-Site Up to £60,000 + Excellent Benefits Security Clearance: SC Cleared + Eligible for DV Clearance A great opportunity to take your cyber threat intelligence skills to the next level? This is an exciting opportunity to join a fast-growing, mission-driven cyber … team working at the forefront of Defence and National Security. The Cyber Threat Intelligence Analyst will play a key role in identifying and neutralising emerging threats that could impact our most critical national infrastructure. This is a hands-on, high-impact role where you’ll shape the threat intel capability and directly support security operations in a cutting … edge SOC environment. As a Cyber threat Analyst, you will: Managing and automating threat intel feeds from multiple open and closed sources Monitoring OSINT, dark web forums, and internal telemetry for threat indicators Translating raw technical data into actionable insights for security teams Collaborating with SOC and Incident Response teams to support real-time threat mitigation More ❯
advanced, and largest, intelligence company! As an entry-level analyst on Recorded Future's Managed Services team, you'll directly support our global clientele through critical triage, escalation, and threatanalysis activities. In collaboration with our Triage and Senior Research teams, you'll validate alerts, identify platform-level issues, and fine-tune detection mechanisms-all while helping to … strengthen the consistency and quality of our threat response offerings. What Makes This Role Unique? Recorded Future's Managed Services team blends tactical analysis with platform-level insights. You're not just triaging-you're actively shaping how alerts evolve, how SOPs scale, and how we partner with Triage Analysts. It's a launchpad for developing deep threat expertise at scale. What you'll do as an Associate Threat Intelligence Response Analyst: 1) Triage & Analysis Independently triage green/amber alerts and Swimlane cases for assigned accounts Conduct threat research escalated by senior analysts-covering phishing, credential harvesting, fraudulent domains, data leakage, social media monitoring, and malicious infrastructure Identify and report alerting rule issues More ❯
SOC Analysts while performing advanced investigations and, when required, first-line triage to maintain queue health and SLA compliance. You are responsible for high-quality service delivery through detailed analysis, evidence-led response actions, and operational leadership. In addition to handling escalated alerts, you provide line management, oversee ticket quality, contribute to training and onboarding, and drive continual improvement. … Customer Communications - You provide timely incident updates and lead bridging calls with customers during high-priority incidents, ensuring that communications are clear, evidence-led, and aligned to customer expectations. • Threat Hunting Oversight - You lead and coordinate proactive threat hunting across customer environments, using hypothesis-based approaches to identify undetected threats and validate detection coverage. Essential Duties • Advanced Investigation … all available tooling. o Reconstruct attack chains and identify root causes using MITRE ATT&CK. o Recommend and coordinate response actions to mitigate impact during active incidents. • IOC and ThreatAnalysis o Investigate indicators of compromise using commercial and open-source threat intelligence. o Validate alerts and determine their relevance to customer environments, providing context on adversary More ❯
management, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threatanalysis and act as a subject matter expert for mitigating cyber risks. This is an outstanding opportunity for an accomplished Information Security Engineer to join a market leading More ❯
West Malling, Kent, United Kingdom Hybrid / WFH Options
Lumina Energy
threats are evolving, and our team is at the heart of protecting critical infrastructure and data. As a Cyber Security Engineer, you'll help lead our proactive efforts in threat detection, response, and mitigation. This role is vital to safeguarding the confidentiality, integrity, and availability of systems and services. What you'll be doing Act on security alerts, incidents … ensure timely responses. Diagnose and investigate security incidents following agreed procedures. Escalate and document unresolved incidents and support recovery efforts. Operate within our enterprise-level SOC and collaborate on threat intelligence. Utilise tools like Microsoft E5, Sentinel, and Darktrace to monitor and prevent threats. Analyse malware and respond to high-priority incidents. Support vulnerability management and threatanalysis … equivalent function. Proficiency with Microsoft Security Suite (including Sentinel) and Darktrace or similar. Must have an understanding of cyber threats including malware, ransomware, DDoS, insider threats. Strong knowledge of threat modelling, security monitoring, and cloud environments. Familiarity with GDPR, data protection, and privacy impact assessments. Excellent communication and collaboration skills with a proactive mindset. Industry certifications (e.g., CISSP, CEH More ❯
management, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threatanalysis and act as a subject matter expert for mitigating cyber risks. This is an outstanding opportunity for an accomplished Cyber Security Engineer to join a market leading More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Ashdown Group
management, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threatanalysis and act as a subject matter expert for mitigating cyber risks. This is an outstanding opportunity for an accomplished Cyber Security Engineer to join a market leading More ❯
ideal candidate will play a critical role in designing and implementing cybersecurity frameworks to align with the business objectives and mitigate potential threats. Main Responsibilities: Perform Security Risk and Threatanalysis during the initial design and the Software Development Life Cycle planning, analysis, and design phases. Providing recommendations and requirements for mitigating any security weaknesses identified while … architecture Knowledge of the SAFe Agile method would be an asset Understanding of security testing in the software pipeline (SAST, DAST, SCA, RASP) Knowledge of STRIDE, DICE and other threat and risk frameworks Knowledge of AWS tools Proven experience managing multiple projects simultaneously Practical interpersonal skills; adaptable to all levels of the organization Ability to contribute in a collaborative More ❯
test protocols to identify vulnerabilities. Collaborate with engineering teams to propose remediation strategies. Cross-Functional Collaboration Partner with engineering teams to interpret test results and implement effective security measures. Threat Assessment & Response Lead efforts to evaluate vulnerabilities against emerging threats, determine root causes, and develop mitigation plans. Communicate findings to internal teams and external stakeholders. Process Standardization Support and … frameworks (e.g., NIST 800-53, NIST CSF, NIST 800-171, IEC 62443, ISO 27001) Proficiency in network, application, and database security architecture Hands-on experience with vulnerability testing and threatanalysis In-depth knowledge of OS and network security (including virtual and cloud-based environments such as AWS) Familiarity with security systems: endpoint protection, firewalls, IDS/IPS More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
Previous people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threatanalysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/IP, WAN, LAN … SMTP, HTTP, FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malware analysis and reverse engineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity with additional SIEM technologies, especially QRadar Role & Responsibilities As a SOC Shift Lead , you will … protecting client systems and guiding the team through sophisticated cyber defence challenges. Your responsibilities will include: Monitoring, triaging, and investigating alerts across host and network security systems Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities Providing line management to SOC Analysts developing capability and supporting career progression Enhancing team knowledge across SOC tooling More ❯
The team you'll be working with: Consultant - Offensive Security Testing Role Overview: We are seeking a highly skilled and experienced Offensive Security Consultant with a strong focus on threat intelligence and attack methods. The ideal candidate will manage and conduct advanced penetration testing engagements, leveraging threat intelligence to simulate real-world attacks across various environments, including OT … provide strategic, actionable recommendations to enhance our clients' security posture. What you'll be doing: Responsibilities: Lead and manage the full lifecycle of complex penetration testing engagements, applying a threat intelligence-led approach. Execute advanced penetration tests across environments such as applications, infrastructure, web, APIs, O365, Azure, AWS, and OT, using current threat landscape knowledge and attacker TTPs. … Develop and maintain detailed test plans and use cases informed by threat intelligence analysis. Identify and prioritize critical OT and IT assets based on potential threats and exposure. Plan and schedule testing engagements based on threat assessments and client needs. Produce clear, detailed reports with technical findings, business impact, and strategic remediation recommendations for diverse audiences. Communicate complex More ❯
Drive the integration of security into every stage of the Software Development Lifecycle (SDLC). Design, implement, and manage security controls to ensure secure product design, development, and deployment. ThreatAnalysis and Mitigation : Collaborate with cross-functional teams to perform threat modelling, identify security risks, and implement effective countermeasures. Proactively assess the security posture of applications through … vulnerability scanning solutions. Strong grasp of secure coding practices and proficiency in integrating security into the Software Development Lifecycle (SDLC). Technical Knowledge and Implementation experience: Direct experience with threat modelling, security reviews, and penetration testing. Proven ability to secure cloud-native architectures, containerization technologies, and Infrastructure as Code (IaC) environments. Familiarity with industry standards and frameworks such as More ❯
findings and intelligence to inform the firm's risk posture and regulatory reporting. Another key aspect of your role will be to manage the intelligence cycle-from collection and analysis to dissemination-ensuring that actionable intelligence is delivered to key stakeholders.Your leadership will ensure the FCIU not only resolves complex cases but also anticipates future threats, safeguarding Checkout. You … ll Make An Impact Lead and develop the strategic direction for the Financial Crime Intelligence Unit (FCIU), establishing it as a centre of excellence for complex investigations and proactive threat intelligence. Serve as a key partner to the MLROs, providing critical insights and comprehensive investigative reports to support SAR/STR decisions and responses to regulatory inquiries. Oversee and … terrorist financing, potential sanctions violations, and proliferation financing, ensuring thorough and timely resolution. Take ownership of the end-to-end investigation process for escalated cases, including evidence gathering, detailed analysis, and the documentation of findings for regulatory and internal purposes. Develop a proactive threatanalysis capability to identify emerging financial crime typologies and vulnerabilities across our platform More ❯
Cyber Threat Intelligence and Vulnerability Lead £55,000- 65,000 GBP Onsite WORKING Location: Leeds, Yorkshire and the Humber - United Kingdom Type: Permanent Cyber Threat Intelligence and Vulnerability Lead Location: Leeds - on site Clearance Required: DV (Developed Vetting) Salary: £55,000- 65,000 Grade: GG10 - GG11 A major UK Critical National Infrastructure (CNI) programme is seeking a highly … skilled Cyber Threat Intelligence and Vulnerability Lead to join a dedicated Security Operations Centre (SOC). This role is central to protecting hundreds of cloud-hosted systems from advanced cyber threats and ensuring the continuous improvement of threat intelligence and vulnerability management capabilities. Key Responsibilities: Lead the detection, triage, and reporting of cyber threats and vulnerabilities on a … daily basis. Oversee the timely delivery of all threat intelligence and vulnerability reports, ensuring high quality and relevance. Select and monitor key threat actors posing the greatest risk to the organisation. Develop and maintain Priority Intelligence Requirements (PIRs) and a tailored collection plan. Provide clear, well-reasoned analysis and predictive insights to support decision-making. Continuously assess More ❯
bradford, yorkshire and the humber, united kingdom
Anson Mccade
Cyber Threat Intelligence and Vulnerability Lead £55,000- 65,000 GBP Onsite WORKING Location: Leeds, Yorkshire and the Humber - United Kingdom Type: Permanent Cyber Threat Intelligence and Vulnerability Lead Location: Leeds - on site Clearance Required: DV (Developed Vetting) Salary: £55,000- 65,000 Grade: GG10 - GG11 A major UK Critical National Infrastructure (CNI) programme is seeking a highly … skilled Cyber Threat Intelligence and Vulnerability Lead to join a dedicated Security Operations Centre (SOC). This role is central to protecting hundreds of cloud-hosted systems from advanced cyber threats and ensuring the continuous improvement of threat intelligence and vulnerability management capabilities. Key Responsibilities: Lead the detection, triage, and reporting of cyber threats and vulnerabilities on a … daily basis. Oversee the timely delivery of all threat intelligence and vulnerability reports, ensuring high quality and relevance. Select and monitor key threat actors posing the greatest risk to the organisation. Develop and maintain Priority Intelligence Requirements (PIRs) and a tailored collection plan. Provide clear, well-reasoned analysis and predictive insights to support decision-making. Continuously assess More ❯