Threat Intelligence Jobs in the South East

1 to 25 of 51 Threat Intelligence Jobs in the South East

Threat Intelligence Analyst - OSINT

london, south east england, united kingdom
NCC Group
Threat Intelligence Analyst - OSINT London, Cheltenham or Manchester Thanks for checking out our job opening; we are excited that YOU are interested in learning more about NCC Group. We are on a mission to make society a safer and more secure place. Our people are the ones who make that possible; a global community of talented individuals working … to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity As a Threat Intelligence Analyst - OSINT, you will play a pivotal role within our global threat intelligence team. Working alongside colleagues across multiple time zones, you will help make … our clients safer by identifying relevant threat actors, understanding their motivations, targets, and methods, and assessing client exposure. The Global Threat Intelligence team has built a strong reputation in collecting its own data and combining it with open and commercial sources. In this role, you will analyse cyber threats, develop actionable intelligence, and collaborate with internal More ❯
Posted:

Threat Intelligence Analyst - OSINT

london (city of london), south east england, united kingdom
NCC Group
Threat Intelligence Analyst - OSINT London, Cheltenham or Manchester Thanks for checking out our job opening; we are excited that YOU are interested in learning more about NCC Group. We are on a mission to make society a safer and more secure place. Our people are the ones who make that possible; a global community of talented individuals working … to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity As a Threat Intelligence Analyst - OSINT, you will play a pivotal role within our global threat intelligence team. Working alongside colleagues across multiple time zones, you will help make … our clients safer by identifying relevant threat actors, understanding their motivations, targets, and methods, and assessing client exposure. The Global Threat Intelligence team has built a strong reputation in collecting its own data and combining it with open and commercial sources. In this role, you will analyse cyber threats, develop actionable intelligence, and collaborate with internal More ❯
Posted:

Threat Intelligence Analyst - OSINT

slough, south east england, united kingdom
NCC Group
Threat Intelligence Analyst - OSINT London, Cheltenham or Manchester Thanks for checking out our job opening; we are excited that YOU are interested in learning more about NCC Group. We are on a mission to make society a safer and more secure place. Our people are the ones who make that possible; a global community of talented individuals working … to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity As a Threat Intelligence Analyst - OSINT, you will play a pivotal role within our global threat intelligence team. Working alongside colleagues across multiple time zones, you will help make … our clients safer by identifying relevant threat actors, understanding their motivations, targets, and methods, and assessing client exposure. The Global Threat Intelligence team has built a strong reputation in collecting its own data and combining it with open and commercial sources. In this role, you will analyse cyber threats, develop actionable intelligence, and collaborate with internal More ❯
Posted:

Threat Intelligence Analyst

London, South East, England, United Kingdom
Deerfoot Recruitment Solutions Ltd
Threat Intelligence AnalystFully Onsite in London Inside IR35 Contract Deerfoot Recruitment has been engaged to identify an experienced Threat Intelligence Analyst for a leading global banking organisation with an advanced cyber defence function in London. This is a fantastic opportunity to shape threat intelligence, work alongside Red/Blue Teams, and operationalise intelligence using the latest cybersecurity, penetration testing, and Breach & Attack Simulation (BAS) platforms. Key Responsibilities: Monitor and analyse global cyber threat landscapes, identifying threats, adversary tactics, and emerging risks Collaborate with Red Team, Blue Team, and Penetration Testing specialists to integrate intelligence into Breach & Attack Simulation (BAS) scenarios Act as a point of contact between threat intelligence, Red/Blue, and SOC teams to align threat modelling and adversary simulation Support threat hunting activities and provide tactical, contextual intelligence to stakeholders Model and assess threat actors, including motivations, capabilities, attack vectors, and impacts Leverage the MITRE ATT&CK framework for mapping adversary behaviours and detection Develop and update threat profiles, attack More ❯
Employment Type: Contractor
Rate: Competitive salary
Posted:

Threat Intelligence Project Manager

London, South East, England, United Kingdom
Deerfoot Recruitment Solutions Ltd
Threat Intelligence Project ManagerBanking - CybersecurityFully Onsite in London Inside IR35 Contract Deerfoot Recruitment has been engaged to find a contract Cybersecurity Project Manager to help shape and deliver cyber threat intelligence initiatives for a global financial institution's Threat Intelligence Centre. This is an exciting opportunity to drive international projects, support executive-level decision … making, and collaborate with high-performing cybersecurity teams across multiple regions. Key Responsibilities Lead and manage end-to-end projects within a global Threat Intelligence Centre, aligning activities with strategic cybersecurity objectives. Develop and monitor project plans, timelines, budgets, and resource allocation. Coordinate with global stakeholders in EMEA, Americas, APAC, Japan, and India to align requirements and ensure … drive cost optimisation and meet strategic goals. Facilitate recurring international meetings by setting agendas, tracking actions, managing time zone/holiday scheduling, and maximising participation. Drive the standardisation of threat intelligence processes, governance, and tooling. Prepare and deliver high-quality executive reports and presentations. Ensure alignment with compliance, risk, and regulatory requirements across multiple jurisdictions. Track progress, identify More ❯
Employment Type: Contractor
Rate: Competitive salary
Posted:

SOC Tier 2 Analyst

Reading, Berkshire, South East, United Kingdom
Hybrid / WFH Options
Infoplus Technologies UK Ltd
clients. The ideal candidate will have advanced expertise in monitoring, analyzing, and mitigating cybersecurity threats, as well as managing security tools and mentoring junior analysts. This role involves proactive threat hunting, incident response, and collaboration with cross-functional teams to enhance the organization s security posture. Your responsibilities: (Up to 10, Avoid repetition) Incident Detection and Response: Lead investigations … and remediation of complex security incidents, including malware infections, data breaches, and advanced persistent threats (APTs). Utilize advanced SIEM (Security Information and Event Management) tools, threat intelligence platforms, and other security technologies to analyze and correlate security alerts. Take ownership of Tier 2-level escalations from Tier 1 analysts and guide them through complex incident response procedures. … Threat Hunting & Analysis: Proactively search for threats across the environment using behavioral analysis and threat intelligence data. Analyze data from logs, network traffic, endpoint activities, and threat intelligence feeds to detect unusual or malicious activity. Collaborate with other security teams to uncover hidden threats and vulnerabilities. Incident Forensics: Perform in-depth forensic analysis to determine More ❯
Employment Type: Contract, Work From Home
Rate: From £400 to £450 per day
Posted:

Threat Intelligence Specialist

London, South East, England, United Kingdom
QBE Management Services (UK) Limited
Primary Details Time Type: Full time Worker Type: Employee Threat Intelligence Specialist London Permanent (Hybrid) At QBE, our purpose is to enable a more resilient future. We are an international insurer and reinsurer with a local presence in 27 countries. The Opportunity We’re excited to be hiring a Threat Intelligence Specialist to join our Advanced … Threat Services (ATS) Teamon a full-time, permanent basis! You’ll be part of a supportive team that thrives on teamwork and innovation, where your expertise will be valued as we work together to tackle the ever-evolving cyber threat landscape. We’re looking to welcome our new team member from early January 2026 , so if you’re … ready to make an impact in the new year, we’d love to hear from you! Your New Role Reporting to the Technical Threat Manager , you’llbe responsible for researching, analysing, and reporting on cyber threats targeting QBE’s global operations and technology environment. This role has a strong technical focus, centred on the collection, enrichment, automation, and analysis More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

Cyber Threat Intelligence Specialist

Hatfield, Hertfordshire, South East, United Kingdom
Hybrid / WFH Options
Synergize Consulting Limited
Cyber Threat Intelligence Specialist - Contract role We are supporting our client, a leading IT services and solutions company, in their search for a Cyber Threat Intelligence Specialist in Hertfordshire. In this role, you'll be responsible for gathering, correlating, and interpreting data from multiple sources to deliver actionable threat intelligence. You'll assess how a … to key stakeholders. *Candidates must hold valid SC clearance* Contract Details Initial Term: 3 months (with strong potential for extension) Location: Hertfordshire Work Model: Hybrid Key Responsibilities Work with Threat Intelligence Platforms (TIPs), taking ownership of these platforms. Analyse and assess cyber threats, identifying patterns and trends. Apply the intelligence life cycle, from collection through to reporting. … Ensure the Threat Intelligence Programme meets organisational aims. Influence and advise stakeholders on security-focused decisions. Work closely alongside other Security Operations teams such as SOC. Identify intelligence of concern across various sources and tools, and conduct analysis and assessment of such threats and their potential impact on the business. What We're Looking For Experience in More ❯
Employment Type: Contract
Posted:

Security Analyst (Network & Endpoint)

London, South East, England, United Kingdom
Atrium Workforce Solutions Ltd
Initial We are looking for a highly capable and technically skilled Security Analyst (Network & Endpoint) to join our cybersecurity team. This role focuses on network and endpoint security operations, threat intelligence, and incident response within a Security Operations Centre (SOC) environment. The successful candidate will have hands-on experience with leading security platforms and demonstrate the ability to … Network & Endpoint) Location: England/Remote Contract Type: Contract Duration: Contract till 31st Mar 26 Sector: Healthcare . Key Responsibilities: Network Detection & Response: Administer and optimise Darktrace for network threat detection, model tuning, and behavioural analysis. Investigate anomalies and escalate incidents based on network telemetry. Endpoint Protection: Deploy and manage CrowdStrike Falcon agents across enterprise endpoints. Maintain and update … detection rules, ensuring alignment with threat intelligence. Security Operations Centre (SOC): Act as a Level 2 SOC Analyst and Incident Handler. Triage, investigate, and respond to security alerts and incidents. Collaborate with other SOC team members to ensure timely resolution and documentation. Threat Intelligence & Insider Threat Monitoring: Monitor threat feeds and manage Indicators of Compromise More ❯
Employment Type: Contractor
Rate: £371 per day
Posted:

Cyber Defense Analyst

london, south east england, united kingdom
Kyndryl
that the world depends on every day. As a Cybersecurity Defense professional at Kyndryl, you will encompass cybersecurity, incident response, security operations, vulnerability management, and the world of cyber threat hunting and security intelligence analysis all to protect the very heartbeat of organizations – their infrastructure. In this role, you won't just monitor; you'll actively engage in … will be used as you respond and manage to cybersecurity incidents. Cybersecurity Defense is all about information. You'll gather, analyze, and interpret data applying your own and external threat intelligence to uncover potential security threats and risks. These insights and your ability to analyze complex attack scenarios will be the foundation of our security strategy – helping Kyndryl … of a team that safeguards the digital assets of a cutting-edge organization? Look no further – Kyndryl is seeking a Cybersecurity Specialist to join our team of talented Security Intelligence Analysts . The Kyndryl CSIRT (Cybersecurity Incident Response Team) is looking for a Security Intelligence Analyst to join an advanced team that drives proactive identification of threats within More ❯
Posted:

Threat Response Analyst

london, south east england, united kingdom
Cloudflare
on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us Available Locations: London, UK About The Department Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state sponsored advanced persistent threats (APTs). Cloudforce One works … in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever-growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of leveraging an incredibly vast and varied set of data points that only one of the world's largest global … networks can provide. The team is able to analyze these unique data points, at massive scale and efficiency, synthesizing findings into actionable threat intelligence to better protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the internet better, safer, and more powerful everyday. To help fulfill this mission, we More ❯
Posted:

Account Executive

london, south east england, united kingdom
Hybrid / WFH Options
Space Executive
Account Executive – Cybersecurity SaaS (Hybrid, London) Location: London (Hybrid – 2–3 days/week in office) Industry: Cybersecurity/Threat Intelligence About the Company A fast-growing cybersecurity vendor backed by top-tier investors, this company delivers cutting-edge threat intelligence solutions to help organisations stay ahead of evolving threats. Trusted by global pharma leaders and … decision-makers Consistently meet and exceed revenue targets Requirements 3+ years of experience in SaaS or cybersecurity sales Proven track record of closing complex enterprise deals Strong understanding of threat intelligence or willingness to learn Excellent communication and consultative selling skills Based in London or able to commute to the office 2–3 days/week Why Join More ❯
Posted:

Account Executive

slough, south east england, united kingdom
Hybrid / WFH Options
Space Executive
Account Executive – Cybersecurity SaaS (Hybrid, London) Location: London (Hybrid – 2–3 days/week in office) Industry: Cybersecurity/Threat Intelligence About the Company A fast-growing cybersecurity vendor backed by top-tier investors, this company delivers cutting-edge threat intelligence solutions to help organisations stay ahead of evolving threats. Trusted by global pharma leaders and … decision-makers Consistently meet and exceed revenue targets Requirements 3+ years of experience in SaaS or cybersecurity sales Proven track record of closing complex enterprise deals Strong understanding of threat intelligence or willingness to learn Excellent communication and consultative selling skills Based in London or able to commute to the office 2–3 days/week Why Join More ❯
Posted:

Account Executive

london (city of london), south east england, united kingdom
Hybrid / WFH Options
Space Executive
Account Executive – Cybersecurity SaaS (Hybrid, London) Location: London (Hybrid – 2–3 days/week in office) Industry: Cybersecurity/Threat Intelligence About the Company A fast-growing cybersecurity vendor backed by top-tier investors, this company delivers cutting-edge threat intelligence solutions to help organisations stay ahead of evolving threats. Trusted by global pharma leaders and … decision-makers Consistently meet and exceed revenue targets Requirements 3+ years of experience in SaaS or cybersecurity sales Proven track record of closing complex enterprise deals Strong understanding of threat intelligence or willingness to learn Excellent communication and consultative selling skills Based in London or able to commute to the office 2–3 days/week Why Join More ❯
Posted:

SOC Detection Engineer

Farnborough, England, United Kingdom
Talent Locker
clearance Summary Are you a SOC Detection Engineer looking to support national Cyber Defence capabilities? This role offers the opportunity to contribute to the development and optimisation of advanced threat detection systems within a highly secure environment. You will work within a Security Operations Centre (SOC), designing and maintaining detection logic across SIEM (Security Information and Event Management) and … Engineer, you will be part of a specialist cyber operations team responsible for implementing and maintaining high-fidelity detection capabilities. You will contribute to the development of detection rules, threat hunting activities, and automation workflows to support incident response and continuous improvement. Key responsibilities include: Designing and tuning detection rules and use cases in SIEM and EDR platforms Monitoring … and investigating security alerts to identify potential threats Conducting proactive threat hunting using MITRE ATT&CK and threat intelligence sources Collaborating with incident response teams to support investigations and containment Enhancing detection coverage across network, endpoint, cloud, and identity sources Developing automation scripts and playbooks to streamline triage and response Documenting detection processes and providing knowledge transfer More ❯
Posted:

SOC Detection Engineer

southampton, south east england, united kingdom
Talent Locker
clearance Summary Are you a SOC Detection Engineer looking to support national Cyber Defence capabilities? This role offers the opportunity to contribute to the development and optimisation of advanced threat detection systems within a highly secure environment. You will work within a Security Operations Centre (SOC), designing and maintaining detection logic across SIEM (Security Information and Event Management) and … Engineer, you will be part of a specialist cyber operations team responsible for implementing and maintaining high-fidelity detection capabilities. You will contribute to the development of detection rules, threat hunting activities, and automation workflows to support incident response and continuous improvement. Key responsibilities include: Designing and tuning detection rules and use cases in SIEM and EDR platforms Monitoring … and investigating security alerts to identify potential threats Conducting proactive threat hunting using MITRE ATT&CK and threat intelligence sources Collaborating with incident response teams to support investigations and containment Enhancing detection coverage across network, endpoint, cloud, and identity sources Developing automation scripts and playbooks to streamline triage and response Documenting detection processes and providing knowledge transfer More ❯
Posted:

Cyber Security Analyst

London, South East, England, United Kingdom
Accenture
maintained and augmented and that the team members have every opportunity to grow and learn with the organisation. As part of our Blue Team, you’ll use the latest intelligence and tooling to analyse information systems to ensure effective incident detection and response. Job Description If you are looking to make your mark on a rapidly growing SecOps team … join our Blue Team. The ideal candidate will be a self-starter with an inquisitive nature and a keen interest when it comes to technical cybersecurity topics such as threat hunting, attacker tactics and techniques, monitoring and alerting, threat intelligence, and incident readiness and response. Key responsibilities of the role are summarised below: · Security monitoring and incident … the Splunk SIEM, to enable the detection of threats across diverse platforms (e.g. cloud, endpoints, and networks) · Use frameworks like MITRE ATT&CK to map detection rules and maximise threat coverage · Use analytical platforms to query high volume datasets to identify trends and spot unusual behaviours, indicative of malicious activity · Proactive threat hunting using available client data · Collection More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

Detection Engineer - Threat Intelligence

Guildford, England, United Kingdom
Electronic Arts (EA)
and production environments and will directly impact our ability to detect, respond to, and prevent cyber threats at scale. As a senior individual contributor reporting to the Director of Threat Intelligence and Detections, you will play a central role in the technical leadership of the Detection Engineering team. You’ll mentor junior engineers, help define engineering direction, and … lead the development of scalable, innovative threat detection solutions—including those leveraging AI and cloud-native technologies. This is a hybrid role and you must live within commutable distance to our Guildford office where you will need to work in the office 3 days per week. Key Responsibilities Design, develop, and operationalize advanced detections across cloud, container, and on … metrics. Lead development of AI-driven detection proof-of-concepts Guide peers in building scalable, maintainable detection infrastructure and tuning detection content. Support strategic priorities like product detection assessments, threat-led risk prioritization, and production telemetry uplift. Minimum Qualifications Experience in detection engineering, security engineering, or software development with a focus on cybersecurity. Proven experience developing detections and integrations More ❯
Posted:

Detection Engineer - Threat Intelligence

woking, south east england, united kingdom
Electronic Arts (EA)
and production environments and will directly impact our ability to detect, respond to, and prevent cyber threats at scale. As a senior individual contributor reporting to the Director of Threat Intelligence and Detections, you will play a central role in the technical leadership of the Detection Engineering team. You’ll mentor junior engineers, help define engineering direction, and … lead the development of scalable, innovative threat detection solutions—including those leveraging AI and cloud-native technologies. This is a hybrid role and you must live within commutable distance to our Guildford office where you will need to work in the office 3 days per week. Key Responsibilities Design, develop, and operationalize advanced detections across cloud, container, and on … metrics. Lead development of AI-driven detection proof-of-concepts Guide peers in building scalable, maintainable detection infrastructure and tuning detection content. Support strategic priorities like product detection assessments, threat-led risk prioritization, and production telemetry uplift. Minimum Qualifications Experience in detection engineering, security engineering, or software development with a focus on cybersecurity. Proven experience developing detections and integrations More ❯
Posted:

Senior Incident Responder SOC Analyst (L3)

South East, United Kingdom
Hybrid / WFH Options
Anson Mccade
are followed, and directly engage with clients and delivery managers to provide expert guidance on incident handling. This is a hands-on technical leadership role that combines investigation, response, threat intelligence, and collaboration with stakeholders. You'll also support service improvement, tool optimisation, and the development of new SOC capabilities. Key Responsibilities Lead investigations into escalated incidents, providing … detailed analysis and containment strategies. Perform malware analysis, reverse engineering, and develop detection signatures. Integrate threat intelligence into SOC operations, staying ahead of emerging attack techniques. Manage and optimise SIEM tools (Splunk, QRadar, Microsoft Sentinel). Develop SOC use cases, runbooks, and playbooks to improve response capability. Collaborate with IT, legal, and management teams during incident response. Support More ❯
Employment Type: Permanent, Work From Home
Posted:

Senior Consultant, Proactive Services (Unit 42)

london, south east england, united kingdom
Palo Alto Networks
Consultant in Unit 42 you will have the opportunity to work across a number of proactive cyber security domains including Cloud Security, Security Operations, Cyber Risk Management and Artificial Intelligence in cyber security. We are seeking an individual who is passionate about cyber security, curious with a demonstrated track record of continuous learning, and has the technical acumen to … embrace data, technological and innovative approaches to deliver the best consulting outcomes for clients, as they work to address the challenges associated with today’s cyber threat landscape. Your Impact SOC Advisory: 4+ years of consulting experience in SOC, security engineering, SIEM administration, and incident management and demonstrated success with serving large, multinational organisations in designing and implementing an … Security Incident and Event Management (SIEM) platforms, Security Orchestration and Response (SOAR) technologies, Endpoint Protection and Response/Next Gen Protection and Response (EDR/XDR) tools, Next GenFirewalls, Threat Intelligence and Hunting platforms Defensive Security Skills (desired) : Experience in security operations design, engineering and/or analysis and investigations, ideally in complex environments, with security event correlations More ❯
Posted:

Senior Consultant, Proactive Services (Unit 42)

slough, south east england, united kingdom
Palo Alto Networks
Consultant in Unit 42 you will have the opportunity to work across a number of proactive cyber security domains including Cloud Security, Security Operations, Cyber Risk Management and Artificial Intelligence in cyber security. We are seeking an individual who is passionate about cyber security, curious with a demonstrated track record of continuous learning, and has the technical acumen to … embrace data, technological and innovative approaches to deliver the best consulting outcomes for clients, as they work to address the challenges associated with today’s cyber threat landscape. Your Impact SOC Advisory: 4+ years of consulting experience in SOC, security engineering, SIEM administration, and incident management and demonstrated success with serving large, multinational organisations in designing and implementing an … Security Incident and Event Management (SIEM) platforms, Security Orchestration and Response (SOAR) technologies, Endpoint Protection and Response/Next Gen Protection and Response (EDR/XDR) tools, Next GenFirewalls, Threat Intelligence and Hunting platforms Defensive Security Skills (desired) : Experience in security operations design, engineering and/or analysis and investigations, ideally in complex environments, with security event correlations More ❯
Posted:

CREST Penetration Tester SC Clearance

London, South East, England, United Kingdom
Robert Walters
consulting leader delivering secure, innovative solutions across industries. We foster collaboration, inclusion, and continuous growth, with networks supporting diversity, equity, and belonging. What You'll do: Lead and manage threat intelligence-led penetration tests across applications, infrastructure, cloud (AWS/Azure/O365), APIs, and OT Develop advanced test plans, identify critical assets, and deliver detailed, actionable reports … attack techniques to strengthen proactive security What You'll Bring: CREST CRT (or higher) certification - essential 5+ years' experience in penetration testing with strong understanding of adversarial tactics and threat intelligence Expertise across network, cryptography, vulnerabilities, and attack vectors Strong communication and reporting skills Experience with Breach Attack Simulation, vulnerability management, cloud security reviews (AWS/Azure/ More ❯
Employment Type: Full-Time
Salary: £50,000 - £55,000 per annum
Posted:

Associate Cybersecurity Analyst

London, South East, England, United Kingdom
How to Job Ltd
About Our Client Join Our Client , a fast-growing fintech innovator securing next-gen payment platforms for leading banks and startups. With a focus on AI-driven threat detection and zero-trust architecture, Our Client has been named one of Europe’s Top 50 Cybersecurity Scale-ups. Role Snapshot As an Associate Cybersecurity Analyst , you’ll be the eye … alongside world-class security engineers, hone your skills on cutting-edge tools, and shape the future of digital payments security. Your Day-to-Day Alert Triage: Analyze SIEM and threat-intelligence feeds to spot anomalies. Threat Hunting: Use forensic tools to track indicators of compromise across networks. Vulnerability Management: Run scans, prioritize remediation tasks, and validate fixes. … and DevOps teams to contain breaches. Report & Recommend: Draft concise, actionable incident summaries for executive stakeholders. Continuous Learning: Attend weekly knowledge-shares, capture insights, and contribute to our internal threat library. What You Bring Must-Haves Bachelor’s degree in Cybersecurity, Computer Science, or related field. Practical experience with at least one SIEM platform (e.g., Splunk, QRadar). Understanding More ❯
Employment Type: Full-Time
Salary: £36,000 - £43,000 per annum, Negotiable, OTE
Posted:

L2 SOC Analyst

London, South East, England, United Kingdom
ice recruitment
and Defender XDR. The role requires strong analytical skills, attention to detail, The ability to execute response actions such as endpoint isolation, IOC blocking, malware scans, and user containment Threat monitoring and detection Threat intelligence and hunting SOAR and automation Skills MS Sentinel/Defender for Endpoint Understanding Mitre Att&ck framework Required 2+ years exp in More ❯
Employment Type: Full-Time
Salary: £40,000 - £45,000 per annum
Posted:
Threat Intelligence
the South East
25th Percentile
£43,000
Median
£48,924
75th Percentile
£72,500
90th Percentile
£74,000