Location(s): UK, Europe & Africa : UK : Leeds BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Cyber ThreatIntelligence and Vulnerability Lead Job Title: Cyber ThreatIntelligence and Vulnerability Lead Requisition ID: 121483 Location: Leeds (this is a 100% office based role due to the nature of the project) Grade: GG10 - GG11 Referral Bonus: £5,000 Role Description BAE Systems have been contracted to undertake the day to day operation of (and incremental improvement of) a … environments that must be protected. The customer is committed to development of this improved SOC to be a benchmark of best practice and excellence in reflection of the significant threat that the protected systems are subject to. This role requires a minimum of DV clearance. This role reports to the Service Delivery Manager. The Role You will be: Accountable More ❯
Warwick, Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
MYO Talent
Cyber ThreatIntelligenceAnalyst/CTI Analyst/Cyber Security/Information Security/Threat/Threats/Vulnerabilities/TTPs/Tactics, Techniques, and Procedures/Threat Hunting Remote/Warwickshire (in office a couple of times per month) - £60,000 70,000. One of our leading clients is looking to recruit a … Cyber ThreatIntelligence Analyst. Location Remote/Warwickshire in the office approx. 2 times per month Salary - £60,000 70,000 Experience: Subject matter expert in technical threat intelligence. Knowledge of tactics, techniques and procedures (TTPs) that involve cloud technology. Proficiency in relevant cyber threatintelligence tools and technologies. Consuming new threat reports, extracting … relevant and actionable intelligence including TTPs and behavioural indicators. A strong attention to detail including being able to find new and emerging threats/malware that impact systems and technology Conduct in-depth analysis of threat groups, their capabilities, motivations, and tactics Excellent written and verbal communication ability Working closely with our detection engineers and threat hunters More ❯
I am looking for a highly skilled Security Operations & ThreatIntelligenceAnalyst to join a cybersecurity provider dedicated to protecting organizations from cyber threats. With global reach and deep technical expertise, the company delivers advanced threat detection, response, and intelligence services. Its mission is to build a safer digital society by helping businesses stay resilient … through proactive security solutions and trusted partnerships. Responsibilities: As a Security Operations & ThreatIntelligenceAnalyst, you will monitor and investigate security alerts using SIEM tools, conduct threat hunting, and analyze suspicious activity. You ll gather and report threatintelligence, update detection rules and response playbooks, and collaborate across teams to improve security. You ll … also track threat actor tactics using MITRE ATT&CK and assist with incident response and reviews. Key skills required: • 3+ years of experience in Security Operations, ThreatIntelligence, or Incident Response roles • Proficient in analyzing logs, network traffic, malware behavior, and attack vectors • Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel) and EDR solutions • Familiar More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Maxwell Bond
ThreatAnalyst/SOC/Microsoft Sentinel/KQL/SIEM ThreatAnalyst/SOC/Microsoft Sentinel/KQL/SIEM ThreatAnalyst – Manchester/Hybrid - £30K Maxwell Bond have engaged with an MSSP in the Manchester area that’re looking for a ThreatAnalyst to join their team. We’re … rules, creating workbooks and queries to enhance visibility and reduce false positives Working with clients across different sectors, helping them understand threats and improve their security posture Collaborating with ThreatIntelligence and Engineering teams to strengthen detection and response capabilities What we’re looking for: Solid experience working with Microsoft Sentinel in a live SOC environment Strong knowledge … on ability with KQL (Kusto Query Language) Understanding of attack techniques (MITRE ATT&CK, etc.) and incident response workflows Comfortable working across different client environments and adapting to varied threat landscapes Previous experience in an MSSP or managed services environment is an advantage Job details: Salary up to £30,000 Hybrid working – once a week in the office Clear More ❯