Threat Intelligence Analyst Jobs in the North of England

3 of 3 Threat Intelligence Analyst Jobs in the North of England

Threat Intelligence Analyst

Leeds, United Kingdom
BAE Systems (New)
Location(s): UK, Europe & Africa : UK : Leeds BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Cyber Threat Intelligence and Vulnerability Lead Job Title: Cyber Threat Intelligence and Vulnerability Lead Requisition ID: 121483 Location: Leeds (this is a 100% office based role due to the nature of the project) Grade: GG10 - GG11 Referral Bonus: £5,000 Role Description BAE Systems have been contracted to undertake the day to day operation of (and incremental improvement of) a … environments that must be protected. The customer is committed to development of this improved SOC to be a benchmark of best practice and excellence in reflection of the significant threat that the protected systems are subject to. This role requires a minimum of DV clearance. This role reports to the Service Delivery Manager. The Role You will be: Accountable More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations & Threat Intelligence Analyst

Stockport, Lancashire, United Kingdom
zyncgroup.io
I am looking for a highly skilled Security Operations & Threat Intelligence Analyst to join a cybersecurity provider dedicated to protecting organizations from cyber threats. With global reach and deep technical expertise, the company delivers advanced threat detection, response, and intelligence services. Its mission is to build a safer digital society by helping businesses stay resilient … through proactive security solutions and trusted partnerships. Responsibilities: As a Security Operations & Threat Intelligence Analyst, you will monitor and investigate security alerts using SIEM tools, conduct threat hunting, and analyze suspicious activity. You ll gather and report threat intelligence, update detection rules and response playbooks, and collaborate across teams to improve security. You ll … also track threat actor tactics using MITRE ATT&CK and assist with incident response and reviews. Key skills required: • 3+ years of experience in Security Operations, Threat Intelligence, or Incident Response roles • Proficient in analyzing logs, network traffic, malware behavior, and attack vectors • Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel) and EDR solutions • Familiar More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Threat Intelligence Analyst

Manchester Area, United Kingdom
Hybrid / WFH Options
Maxwell Bond
Threat Analyst/SOC/Microsoft Sentinel/KQL/SIEM Threat Analyst/SOC/Microsoft Sentinel/KQL/SIEM Threat Analyst – Manchester/Hybrid - £30K Maxwell Bond have engaged with an MSSP in the Manchester area that’re looking for a Threat Analyst to join their team. We’re … rules, creating workbooks and queries to enhance visibility and reduce false positives Working with clients across different sectors, helping them understand threats and improve their security posture Collaborating with Threat Intelligence and Engineering teams to strengthen detection and response capabilities What we’re looking for: Solid experience working with Microsoft Sentinel in a live SOC environment Strong knowledge … on ability with KQL (Kusto Query Language) Understanding of attack techniques (MITRE ATT&CK, etc.) and incident response workflows Comfortable working across different client environments and adapting to varied threat landscapes Previous experience in an MSSP or managed services environment is an advantage Job details: Salary up to £30,000 Hybrid working – once a week in the office Clear More ❯
Posted: