Threat Detection Jobs in Gloucestershire

18 of 18 Threat Detection Jobs in Gloucestershire

Cyber Security Analyst

Gloucester, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
insider threats, DDoS attacks, and phishing. Your responsibilities include detecting, responding to, and mitigating security incidents, analyzing alerts, logs, network traffic, and endpoint data using tools like Splunk, developing detection content, and leveraging threat intelligence. Opportunities to engage in Digital Forensics and operational security are also available. The role offers a unique experience due to the specialized nature … in-house, on-the-job, and external training, including industry-recognized certifications from SANS and OFFSEC. You will be paired with a mentor and gain hands-on experience in threat detection, incident response, and operational strategies. Opportunities for travel, conferences, and staying current with cybersecurity innovations are also available. Rewards and Benefits Starting salary of £36,408 plus More ❯
Posted:

Cyber Security Analyst

Cinderford, England, United Kingdom
Hybrid / WFH Options
TieTalent
coordinate ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur, you’ll take swift, decisive action to … be paired with a buddy to help you settle in and provide ongoing mentorship as you grow in your role. You’ll gain hands-on experience in cyber security, threat detection and incident response and gain a deeper understanding of operational and defensive strategies. This will support you with any opportunities for professional development and growth. We’ll More ❯
Posted:

Cyber Security Analyst

Stroud, England, United Kingdom
Hybrid / WFH Options
TieTalent
coordinate ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur, you’ll take swift, decisive action to … be paired with a buddy to help you settle in and provide ongoing mentorship as you grow in your role. You’ll gain hands on experience in cyber security, threat detection and incident response and gain a deeper understanding of operational and defensive strategies. This will support you with any opportunities for professional development and growth. We’ll More ❯
Posted:

Cyber Security Analyst

Fairford, England, United Kingdom
Hybrid / WFH Options
TieTalent
coordinate ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur, you’ll take swift, decisive action to … be paired with a buddy to help you settle in and provide ongoing mentorship as you grow in your role. You’ll gain hands on experience in cyber security, threat detection and incident response and gain a deeper understanding of operational and defensive strategies. This will support you with any opportunities for professional development and growth. We’ll More ❯
Posted:

Cyber Security Analyst

Chipping Campden, England, United Kingdom
Hybrid / WFH Options
TieTalent
coordinate ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur, you’ll take swift, decisive action to … be paired with a buddy to help you settle in and provide ongoing mentorship as you grow in your role. You’ll gain hands on experience in cyber security, threat detection and incident response and gain a deeper understanding of operational and defensive strategies. This will support you with any opportunities for professional development and growth. We’ll More ❯
Posted:

Cyber Security Analyst

Gloucester, England, United Kingdom
Hybrid / WFH Options
TieTalent
coordinate ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur, you’ll take swift, decisive action to … be paired with a buddy to help you settle in and provide ongoing mentorship as you grow in your role. You’ll gain hands on experience in cyber security, threat detection and incident response and gain a deeper understanding of operational and defensive strategies. This will support you with any opportunities for professional development and growth. We’ll More ❯
Posted:

Cyber Security Analyst

Tetbury, England, United Kingdom
Hybrid / WFH Options
TieTalent
coordinate ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur, you’ll take swift, decisive action to … be paired with a buddy to help you settle in and provide ongoing mentorship as you grow in your role. You’ll gain hands on experience in cyber security, threat detection and incident response and gain a deeper understanding of operational and defensive strategies. This will support you with any opportunities for professional development and growth. We’ll More ❯
Posted:

SOC Analyst

Cheltenham, England, United Kingdom
NCC Group
analysts and leveraging emerging technologies, the R2 Analyst helps maintain a vigilant and proactive defence against evolving cyber threats, enabling the organisation to operate securely and with confidence. Summary Threat Detection and Monitoring: Monitor the SOAR platform for EDR Logs, SIEM Logs, IDS Logs and Managed Intelligence sources. Identify potential threats, vulnerabilities, and indicators of compromise. Initiate escalation … procedures to counteract potential threats and vulnerabilities. Ability to analyze and interpret threat intelligence feeds and implement protective measures accordingly. Incident Remediation and Documentation: Provide incident remediation and prevention recommendations to customers using established procedures and analyst experience. Document and adhere to security monitoring processes. Apply preventative measures by implementing domain blocking, host isolation and file hash blacklisting. Customer … Compile and review service-focused reports for effective communication. Contribute to the creation and maintenance of security documentation, including incident response playbooks, standard operating procedures, and knowledge base articles. Threat Analysis and Collaboration: Contribute practical insights to the analysis of common security incidents. Maintain working relationships with the Analytic Development and Security Engineering teams. Collaborate with shift partners to More ❯
Posted:

Senior SOC Analyst - Shift Lead

Gloucester, England, United Kingdom
Hybrid / WFH Options
55 Exec Search
on your shift, while also delivering advanced security operations services to clients across a range of industries. As a Senior SOC Analyst , you will be central to incident response, threat hunting , and real-time defence management , guiding and mentoring two junior SOC analysts. The SOC team is deeply committed to leveraging the latest in automation and artificial intelligence, including … and investigating incidents, fostering a culture of collaboration and continuous learning. Client Relationship Management: Act as a point of contact, managing ongoing communications and ensuring technical needs are met Threat Detection & Analysis: Triage and analyse alerts across multiple SIEM platforms (e.g., Microsoft Sentinel, custom ELK stacks). Log & Threat Intelligence Analysis: Perform detailed log analysis and threat intelligence research to uncover root causes and bolster security defences. Technical Reporting: Deliver clear, client-focused reports on incidents, alerts, and threat activity. Escalation Handling: Manage critical escalations with precision and provide comprehensive, well-documented resolutions. SOC Innovation: Work with leadership to enhance operational efficiency and integrate emerging technologies. Incident Management: Lead security incident investigations and responses, offering More ❯
Posted:

Senior SOC Analyst - Shift Lead

Cheltenham, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
on your shift, while also delivering advanced security operations services to clients across a range of industries. As a Senior SOC Analyst , you will be central to incident response, threat hunting , and real-time defence management , guiding and mentoring two junior SOC analysts. The SOC team is deeply committed to leveraging the latest in automation and artificial intelligence, including … and investigating incidents, fostering a culture of collaboration and continuous learning. Client Relationship Management: Act as a point of contact, managing ongoing communications and ensuring technical needs are met Threat Detection & Analysis: Triage and analyse alerts across multiple SIEM platforms (e.g., Microsoft Sentinel, custom ELK stacks). Log & Threat Intelligence Analysis: Perform detailed log analysis and threat intelligence research to uncover root causes and bolster security defences. Technical Reporting: Deliver clear, client-focused reports on incidents, alerts, and threat activity. Escalation Handling: Manage critical escalations with precision and provide comprehensive, well-documented resolutions. SOC Innovation: Work with leadership to enhance operational efficiency and integrate emerging technologies. Incident Management: Lead security incident investigations and responses, offering More ❯
Posted:

Senior SOC Analyst - Shift Lead

Gloucester, England, United Kingdom
Hybrid / WFH Options
55 Exec Search
on your shift, while also delivering advanced security operations services to clients across a range of industries. As a Senior SOC Analyst , you will be central to incident response, threat hunting , and real-time defence management , guiding and mentoring two junior SOC analysts. The SOC team is deeply committed to leveraging the latest in automation and artificial intelligence, including … and investigating incidents, fostering a culture of collaboration and continuous learning. Client Relationship Management: Act as a point of contact, managing ongoing communications and ensuring technical needs are met Threat Detection & Analysis: Triage and analyse alerts across multiple SIEM platforms (e.g., Microsoft Sentinel, custom ELK stacks). Log & Threat Intelligence Analysis: Perform detailed log analysis and threat intelligence research to uncover root causes and bolster security defences. Technical Reporting: Deliver clear, client-focused reports on incidents, alerts, and threat activity. Escalation Handling: Manage critical escalations with precision and provide comprehensive, well-documented resolutions. SOC Innovation: Work with leadership to enhance operational efficiency and integrate emerging technologies. Incident Management: Lead security incident investigations and responses, offering More ❯
Posted:

Threat Hunter

Cheltenham, England, United Kingdom
NCC Group
Threat Hunter UK (Manchester, Cheltenham or London) We are seeking a highly capable and hands-on Threat Hunter to design and lead a professional threat hunting capability focused on identifying sophisticated adversaries through hypothesis-driven analysis and automation. You will be responsible for proactively detecting and analysing advanced threats across the customers environment. Ensuring our threat models and threat hunts are tightly aligned to industry risks to the customer. This is a high-impact role with significant autonomy. You’ll need to think critically, and hunt methodically. As a Threat Hunter, you will actively search for cyber threats that evade traditional security solutions. Your role will involve conducting in-depth analysis, identifying indicators … of compromise (IOCs), and working cross-functionally with the Security Operations Centre Analysts, Detection Engineers, Privacy Team and Engineering Team to mitigate risks. Summary Threat Detection and Monitoring: Design, build, and own a formal threat hunting program with a strong emphasis on hypothesis-based hunting methodologies. Use threat intelligence, MITRE ATT&CK, and risk models More ❯
Posted:

Senior Microsoft Sentinel / SIEM Engineer

Cheltenham, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
access to Microsoft’s security product roadmap, security previews, and frontline support. You'll work at the sharp end of cyber defence, directly contributing to investigations involving nation-state threat actors (including IR, CH, and NK based campaigns) while refining your craft across enterprise-scale log ingestion and customised Sentinel integration engineering that will stretch your skills, give you … ll own and optimise enterprise-wide log onboarding into Microsoft Sentinel – deploying standard and custom connectors, Function Apps, and parsers to build tailored SIEM solutions that drive real-world threat detection and response. Log ingestion at scale across numerous hybrid and multi-cloud environments Enhance custom Function Apps and ingestion pipelines Parse, normalise, and optimise log telemetry to … ensure precision and cost control Partner with IR teams on real attacks – tuning rules against live threat actor activity Sync closely with Microsoft teams to build cutting-edge detection capabilities Contribute to internal knowledge base and help shape engineering standards What's needed? Experience building and integrating complex Microsoft Sentinel at SMC and enterprise Understanding of security telemetry More ❯
Posted:

CS&IA Risk and Governance Consultants (Junior to Principal levels)

Cheltenham, England, United Kingdom
Hybrid / WFH Options
Bailie Group
a multi-disciplined organisation. Ability to coordinate and manage multi-disciplined CS&IA resources including technical specialists, while providing coherent reporting to non-technical business stakeholders. Ability to provide threat detection and monitoring technologies and services. Ability to produce CS&IA incident response plans and coordinating desktop incident response exercises. Broad knowledge and application of common CS&IA More ❯
Posted:

Palo Alto XSOAR / XSIAM Engineer

Gloucester, Gloucestershire, UK
83zero
technologies, ideally coming from an XSOAR background, and possessing strong experience across XDR and SIEM environments. This is a key role within our security operations function, focused on enhancing detection, automation, and response capabilities. *For this role you must be eligible for SC Clearance* Key Responsibilities Implement and configure Palo Alto Networks XSIAM to improve SOC efficiency and visibility … Design and manage security automation workflows, drawing from previous XSOAR experience Integrate and optimize XDR capabilities to support proactive threat detection Set up and maintain SIEM-style log ingestion, correlation rules, and enrichment pipelines Build custom dashboards and reporting tools for real-time security insights Troubleshoot complex issues related to XSIAM, XSOAR, and related integrations Ensure seamless integration … Clearance Desirable Qualifications Palo Alto certifications (PCNSE, XSIAM/XSOAR certifications highly preferred) Experience with cloud security platforms (AWS, Azure, GCP) Previous work in a SOC environment Exposure to threat hunting methodologies and tools This is a fantastic opportunity to work on the biggest XSIAM project in the UK working with cutting edge technology. My client are happy to More ❯
Employment Type: Full-time
Posted:

eDV Data Scientist – Contract

Cheltenham, England, United Kingdom
Babcock
analytical techniques, machine learning, and statistical modelling to solve complex operational challenges. Working within a secure, multidisciplinary environment, you'll help deliver data-driven insights to support decision-making, threat detection, intelligence analysis, and national defence strategies. Key Responsibilities Develop and deploy data models, machine learning algorithms, and statistical analyses to support defence and national security operations. Work … with structured and unstructured data from diverse sources such as sensors, ISR feeds, satellite imagery, communications, cyber threat logs, and intelligence reports. Collaborate with domain experts, analysts, and engineers to understand mission needs and translate them into actionable data science problems. Design and build data pipelines and processes for data collection, cleansing, transformation, and validation. Support real-time analytics … sensitive or classified data in secure environments. Desirable: Experience in applying data science to one or more of the following: cyber defence, ISR (Intelligence, Surveillance & Reconnaissance), geospatial intelligence (GEOINT), threat modelling, logistics optimisation, or predictive maintenance. Knowledge of NLP, computer vision, or reinforcement learning in defence applications. Experience with edge analytics, secure computing environments, or Federated Learning. Relevant certifications More ❯
Posted:

Security Engineer

Gloucester, England, United Kingdom
Hybrid / WFH Options
IMT Resourcing Solutions
who understands how security fits into enterprise infrastructure at scale. You'll be part of a growing security function, working closely with architecture, operations and compliance teams to improve detection, response, and prevention. What you'll be doing: Supporting enterprise security tooling and controls across Microsoft environments Monitoring, responding to, and improving threat detection capabilities Reviewing and More ❯
Posted:

Cyber Architect - Security Operations Centre

Bristol, Gloucestershire, United Kingdom
Hybrid / WFH Options
Summer Browning Associates
and experience: - Experience designing a Security Operations Centre (SOC) within a secure environment Experience implementing a target operating model for a Security Operations Centre Expertise in security monitoring design, threat detection, and incident response Experience in selecting tools for Security Information and Event Management (SIEM) Proficiency in IT security documentation, including policies, standards, processes, procedures, and patterns Experience … in risk and threat modelling within a high-threat government environment To apply, please submit your latest CV for review More ❯
Employment Type: Contract
Rate: GBP 1 Daily
Posted: