ThreatHunter UK (Manchester, Cheltenham or London) We are seeking a highly capable and hands-on ThreatHunter to design and lead a professional threat hunting capability focused on identifying sophisticated adversaries through hypothesis-driven analysis and automation. You will be responsible for proactively detecting and analysing advanced threats across the customers environment. Ensuring our … threat models and threat hunts are tightly aligned to industry risks to the customer. This is a high-impact role with significant autonomy. You'll need to think critically, and hunt methodically. As a ThreatHunter, you will actively search for cyber threats that evade traditional security solutions. Your role will involve conducting in-depth analysis … identifying indicators of compromise (IOCs), and working cross-functionally with the Security Operations Centre Analysts, Detection Engineers, Privacy Team and Engineering Team to mitigate risks. Summary Threat Detection and Monitoring: Design, build, and own a formal threat hunting program with a strong emphasis on hypothesis-based hunting methodologies. Use threat intelligence, MITRE ATT&CK, and risk models More ❯
L2&L3 SOC/Cyber Security Engineer - ThreatHunter/SIEM Sentinel - £45-65K + 25% Shift - Home/Office 2x per month My client is one of the most recognisable names in IT and has some of the best professionals in the industry. They are top partners with leading Vendors, which means you will work with … career pathway in cybersecurity. Work with the latest, cutting-edge technology. You will be part of a 24/7 SOC team involved in high-level Incident Response, proactive threat hunting, and developing detection and use-case capabilities. You'll work alongside the engineering team to optimize tuning opportunities. Candidates MUST have or be eligible to obtain SC clearance … tools such as MS Sentinel, AlienVault, or Splunk. Cybersecurity qualifications, certifications, or degrees e.g., CySA+, CompTIA SEC+, or similar experience. Microsoft SC-200 certifications are desirable. Strong knowledge of threat actor methodologies, incident response, and forensic investigations. This company has a clear vision, excellent leadership, and top tech talent. They offer impressive clients, flexible working, and a supportive environment. More ❯
intelligence experts. We work across 10 countries to collect, connect, and analyze complex data, enabling governments, armed forces, and businesses to achieve digital advantages in demanding environments. Job Title: ThreatHunter Requisition ID: 121789 Location: Leeds - hybrid and flexible working arrangements available. Please consult your recruiter for details. Grade: GG10 - GG11 Referral Bonus: £5,000 Job Description Serve … members and share knowledge proactively. Contribute to the SOC Knowledge Repository by creating and updating documentation independently. Build relationships externally with other SOCs and cybersecurity researchers to identify analytics, threat intelligence, and tradecraft that benefit the Blue Team. Communicate funding and prioritization suggestions and lead implementation when needed. Develop complex, anomaly-based KQL analytics and playbooks for detection in … vulnerabilities, produce proof-of-concept exploits, and emulate adversary TTPs for training and detection evaluation. Review red team and pentest findings to improve detection rules. Provide forensic support and threat emulation to improve alert triage and accuracy. Identify gaps in SOC processes, data collection, and analysis, demonstrating the need for improvements through scenarios and red teaming. Perform complex threatMore ❯