Cyber Threat Intelligence Analyst – AVP Location: Manchester or Glasgow Do you have over 2 years of hands-on experience working in a dedicated Cyber Threat Intelligence (CTI) team? (This is essential) A Global, Tier 1 Financial institution is looking to strengthen and grow their Threat intelligence team. … They are looking for a Cyber Threat Intelligence Analyst to join their global security teams supporting critical detection and response operations. This is a hands on role requiring strong technical skills and the ability to execute in highly regulated/high pressure environments. Key Responsibilities: Monitor and manage … threatdetection tools (SIEM, IDS/IPS, DLP, etc.) Investigate, triage, and respond to security incidents Analyse emerging cyber threats and assess relevance to the business Collaborate with teams to improve incident response processes and security controls Contribute to threat intelligence reporting and recommendations What We’re More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom
Vanquis Bank Limited
and mitigate cyber threats that pose risks to Vanquis Banking Groups cybersecurity posture. This involves monitoring security events, conducting incident response activities, enhancing our threatdetection capabilities, and ensuring compliance with policy, standards, and regulation. Your contributions will directly impact our ability to protect sensitive data, maintain business … a Cyber Intelligence Specialist, you will: Actively participate the delivery of services provided by the Cyber Intelligence Centre including by not limited to Cyber Threat Intelligence, Security Posture Management, Cyber Security Incident Response, Threat Hunting, Penetration Testing & Red Team Testing, and Cyber Risk Mitigation. Incorporate threat intelligence … Stay updated on the latest cyber threats, attack vectors, and trends in the cybersecurity landscape. Continuously enhance skills in areas such as incident response, threat hunting, and the utilisation of threat intelligence. Support VBGs compliance with Audit, Data Protection, PCI and other security standards. What Were Looking For More ❯
proficiency in writing KQL and SPL; log sources, ingestion patterns, and correlation rules). DevOps knowledge (Git/BitBucket/GitLab). Security Fundamentals (threatdetection, incident response, threat intelligence; knowledge of the MITRE ATT&CK framework and security operations). Some other highly valued skills may More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Action For Humanity
ensuring Data Loss Prevention (DLP) and encryption. Implement Microsoft Defender Suite (Defender for Office 365, Defender for Endpoint, Defender for Cloud Apps) for advanced threat protection. Strengthen cloud security posture by managing security configurations across Microsoft Azure environments. 3. Security Automation & Incident Response Automate security workflows with Power Automate … Power Apps, and Microsoft Defender XDR. Deploy Microsoft Sentinel (SIEM) for threatdetection, log analysis, and incident response. Establish incident response playbooks and conduct forensic investigations when needed. 4. Compliance & Risk Management Ensure adherence to ISO 27001, NIST, GDPR, and CIS Benchmarks. Conduct risk assessments, vulnerability scans, and More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
and technical operations, ensuring resilient and secure environments. Cloud Security Operations : Securely manage Azure, M365 & AWS security operations, implementing comprehensive security policies and initiatives. ThreatDetection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design … and training to stakeholders, promoting security best practices and risk mitigation strategies. Security Automation & Optimization : Develop, implement, and optimize security automation processes to improve detection, response, and mitigation efforts. What we're looking for Experience : 3+ years in information security with a focus on cloud security, security architecture, and … Architecture: Proven track record in designing and implementing security architectures in complex environments. Risk Management: Ability to identify and mitigate security risks; knowledge of threat modelling and frameworks such as MITRE ATT&CK, CIS, and OWASP. Analytical Skills: Strong problem-solving abilities to translate business requirements into technical solutions. More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Awaze
operations, ensuring resilient and secure environments. 🏡 Key Responsibilities: Cloud Security Operations : Securely manage Azure, M365 & AWS security operations, implementing comprehensive security policies and initiatives. ThreatDetection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design … and training to stakeholders, promoting security best practices and risk mitigation strategies. Security Automation & Optimization : Develop, implement, and optimize security automation processes to improve detection, response, and mitigation efforts. 🏡 What we’re looking for Solid background in information security with a focus on cloud security, security architecture, and EUC … in languages such as Powershell & Python. Proven track record in designing and implementing security architectures in complex environments. Experience with security engineering, incident response, threat hunting, or digital forensics. Preferred Qualifications: Relevant cybersecurity certifications such as CISSP, CISM, CEH, Microsoft Security Certifications, AWS Security Specialty. Knowledge of ITIL. 🏡 What More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
Intaso
of SOC operations. Create and maintain SOC documentation, including runbooks, incident reports, and workflows. Contribute to continuous improvement initiatives within the SOC, including tuning detection rules and optimizing tools. Key Requirements Proven experience as a SOC Analyst or similar role, preferably within a Microsoft-focused environment. Strong knowledge and … hands-on experience with Microsoft Sentinel, Defender for Endpoint, Defender for Identity, and Azure Security features. Familiarity with threatdetection, hunting, and analysis in cloud environments. Understanding of common attack frameworks (e.g., MITRE ATT&CK) and incident response methodologies. Excellent analytical and problem-solving skills with attention to More ❯
improve incident response. Key Requirements Strong experience with ManageEngine security tools. Hands-on expertise in SIEM, endpoint security, and IAM solutions. Knowledge of cyber threatdetection, incident response, and compliance frameworks. Ability to analyze security logs and troubleshoot security incidents. Relevant certifications (e.g., CompTIA Security+, CISSP, CEH) are More ❯
resilience. Design, Deliver and Implement High Availability & Resilience: Develop disaster recovery solutions, resilient architectures, and governance controls, including Security Hub, Audit Manager, and proactive threat detection. Implement, Maintain & Optimise AWS Best Practices & Governance: Enforce compliance through IAM, encryption, Control Tower, Security Hub, and cost-optimisation tools like AWS Cost More ❯
I am hiring a SOC Manager on behalf of a dynamic cybersecurity firm specializing in advanced threatdetection, incident response, and security operations. Leveraging cutting-edge technologies, the company safeguards critical infrastructures and digital assets for clients across diverse industries. Their Security Operations Center (SOC) team is at More ❯
Newcastle Upon Tyne, England, United Kingdom Hybrid / WFH Options
Pope Marshall
that incorporate data recovery site to site. Knowledge of cloud Well Architected Framework and security best practices, including identity and access management, encryption, and threat detection. Experience with CI/CD pipelines and Agile methodologies. Excellent problem-solving, analytical, and troubleshooting skills. Strong communication skills with the ability to More ❯
Skelmersdale, Lancashire, North West, United Kingdom Hybrid / WFH Options
Police Digital Services
of Police Digital Service and provides visibility and control of information risks for policing. It supports the 24x7x365 nature of police operations, providing a threatdetection and response capability for digital services before, during and after cyber-attacks, enabling stakeholders to understand and proactively manage risk across the More ❯
preston, lancashire, north west england, united kingdom Hybrid / WFH Options
Police Digital Services
of Police Digital Service and provides visibility and control of information risks for policing. It supports the 24x7x365 nature of police operations, providing a threatdetection and response capability for digital services before, during and after cyber-attacks, enabling stakeholders to understand and proactively manage risk across the More ❯
engineering pipelines. Utilize big data technologies (Databricks, Spark). Develop custom security applications, APIs, AI/ML models, and advanced analytic technologies. Experience with threatdetection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly …/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and analytics in Databricks, Synapse Analytics, and large-scale data warehouses (Snowflake, Redshift, Presto). Proficiency in data visualization tools (Databricks, PowerBI) and the Python data science ecosystem (Jupyter More ❯
and implement cloud security architectures across AWS, Azure, or Google Cloud. Develop and enforce cloud security controls , including IAM policies, encryption, and network security. Threat Monitoring & Incident Response Monitor cloud environments for security threats, vulnerabilities, and misconfigurations . Lead incident response efforts related to cloud security breaches and misconfigurations. … Implement SIEM and security monitoring tools for real-time threat detection. Cloud Security Assessments & Compliance Conduct cloud security assessments, penetration testing, and risk analysis . Ensure compliance with ISO 27001, NIST, CIS Benchmarks, GDPR , and other security standards. Collaborate with DevOps teams to integrate security into CI/CD More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Maxwell Bond
cybersecurity and strong hands-on expertise with Splunk . Key Responsibilities: Monitor and respond to security incidents using Splunk and other SIEM tools Conduct threatdetection, analysis, and incident response Support the design, implementation, and maintenance of security measures across infrastructure Work with internal teams to assess vulnerabilities More ❯
aberdeen, north east scotland, united kingdom Hybrid / WFH Options
ESK Recruitment LTD
initiatives. Organise internal audits and lead training on cybersecurity awareness and best practices. Coordinate responses to incidents and ensure timely resolution and documentation. Oversee threatdetection and vulnerability remediation processes. What We're Looking For: Previous experience in an Information Security Management or similar leadership role. Familiarity with More ❯
acquired businesses are swiftly onboarded into Ipsum's existing IT landscape. Ensure cybersecurity compliance by aligning newly acquired systems with Ipsum's security policies, threatdetection, and endpoint protection measures. Act as the primary technical liaison between the acquisition team and IT leadership, providing expertise on infrastructure scalability More ❯
Stockport, Cheshire, United Kingdom Hybrid / WFH Options
zyncgroup.io
to secure Kubernetes clusters, enforce security best practices, automate processes with Terraform and GitOps, and ensure compliance with ISO27001 and NIS2. Your role includes threatdetection, incident response, and continuous security improvement. Requirements: Experience as a DevSecOps Engineer or Security Lead Hands-on software development team collaboration Expertise More ❯
incidents, conduct forensic investigations, and implement remediation actions to contain and mitigate risks. Maintain and optimise security monitoring tools and technologies to ensure effective detection and response capabilities. Collaborate with IT and engineering teams to implement security best practices and ensure compliance with security policies and standards. Review existing … best practices. SKILLS, KNOWLEDGE & EXPERIENCE Proven experience in a SOC or security operations role, with hands-on experience in security monitoring, incident response, and threat detection. Strong understanding of network security principles, protocols, and technologies (firewalls, IDS/IPS, SIEM, etc.). Experience with security tools such as SIEM …/SOAR platforms, endpoint detection and response (EDR) solutions, vulnerability management, detection and response/remediation (VMDR) solutions and threat intelligence platforms. Knowledge of security standards and frameworks (e.g., NIST, CIS Controls, ISO 27001) and regulatory requirements (e.g., GDPR, HIPAA). Proficiency in scripting and automation (e.g. More ❯