Threat Intelligence Analyst Jobs in the North West

2 of 2 Threat Intelligence Analyst Jobs in the North West

Security Operations & Threat Intelligence Analyst

Stockport, Lancashire, United Kingdom
zyncgroup.io
I am looking for a highly skilled Security Operations & Threat Intelligence Analyst to join a cybersecurity provider dedicated to protecting organizations from cyber threats. With global reach and deep technical expertise, the company delivers advanced threat detection, response, and intelligence services. Its mission is to build a safer digital society by helping businesses stay resilient … through proactive security solutions and trusted partnerships. Responsibilities: As a Security Operations & Threat Intelligence Analyst, you will monitor and investigate security alerts using SIEM tools, conduct threat hunting, and analyze suspicious activity. You ll gather and report threat intelligence, update detection rules and response playbooks, and collaborate across teams to improve security. You ll … also track threat actor tactics using MITRE ATT&CK and assist with incident response and reviews. Key skills required: • 3+ years of experience in Security Operations, Threat Intelligence, or Incident Response roles • Proficient in analyzing logs, network traffic, malware behavior, and attack vectors • Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel) and EDR solutions • Familiar More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Threat Intelligence Analyst

Manchester Area, United Kingdom
Hybrid / WFH Options
Maxwell Bond
Threat Analyst/SOC/Microsoft Sentinel/KQL/SIEM Threat Analyst/SOC/Microsoft Sentinel/KQL/SIEM Threat Analyst – Manchester/Hybrid - £30K Maxwell Bond have engaged with an MSSP in the Manchester area that’re looking for a Threat Analyst to join their team. We’re … rules, creating workbooks and queries to enhance visibility and reduce false positives Working with clients across different sectors, helping them understand threats and improve their security posture Collaborating with Threat Intelligence and Engineering teams to strengthen detection and response capabilities What we’re looking for: Solid experience working with Microsoft Sentinel in a live SOC environment Strong knowledge … on ability with KQL (Kusto Query Language) Understanding of attack techniques (MITRE ATT&CK, etc.) and incident response workflows Comfortable working across different client environments and adapting to varied threat landscapes Previous experience in an MSSP or managed services environment is an advantage Job details: Salary up to £30,000 Hybrid working – once a week in the office Clear More ❯
Posted: