ThreatIntelligence Analyst - OSINT London, Cheltenham or Manchester Thanks for checking out our job opening; we are excited that YOU are interested in learning more about NCC Group. We are on a mission to make society a safer and more secure place. Our people are the ones who make that possible; a global community of talented individuals working … to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity As a ThreatIntelligence Analyst - OSINT, you will play a pivotal role within our global threatintelligence team. Working alongside colleagues across multiple time zones, you will help make … our clients safer by identifying relevant threat actors, understanding their motivations, targets, and methods, and assessing client exposure. The Global ThreatIntelligence team has built a strong reputation in collecting its own data and combining it with open and commercial sources. In this role, you will analyse cyber threats, develop actionable intelligence, and collaborate with internal More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
clients. The ideal candidate will have advanced expertise in monitoring, analyzing, and mitigating cybersecurity threats, as well as managing security tools and mentoring junior analysts. This role involves proactive threat hunting, incident response, and collaboration with cross-functional teams to enhance the organization s security posture. Your responsibilities: (Up to 10, Avoid repetition) Incident Detection and Response: Lead investigations … and remediation of complex security incidents, including malware infections, data breaches, and advanced persistent threats (APTs). Utilize advanced SIEM (Security Information and Event Management) tools, threatintelligence platforms, and other security technologies to analyze and correlate security alerts. Take ownership of Tier 2-level escalations from Tier 1 analysts and guide them through complex incident response procedures. … Threat Hunting & Analysis: Proactively search for threats across the environment using behavioral analysis and threatintelligence data. Analyze data from logs, network traffic, endpoint activities, and threatintelligence feeds to detect unusual or malicious activity. Collaborate with other security teams to uncover hidden threats and vulnerabilities. Incident Forensics: Perform in-depth forensic analysis to determine More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Space Executive
Account Executive – Cybersecurity SaaS (Hybrid, London) Location: London (Hybrid – 2–3 days/week in office) Industry: Cybersecurity/ThreatIntelligence About the Company A fast-growing cybersecurity vendor backed by top-tier investors, this company delivers cutting-edge threatintelligence solutions to help organisations stay ahead of evolving threats. Trusted by global pharma leaders and … decision-makers Consistently meet and exceed revenue targets Requirements 3+ years of experience in SaaS or cybersecurity sales Proven track record of closing complex enterprise deals Strong understanding of threatintelligence or willingness to learn Excellent communication and consultative selling skills Based in London or able to commute to the office 2–3 days/week Why Join More ❯
Consultant in Unit 42 you will have the opportunity to work across a number of proactive cyber security domains including Cloud Security, Security Operations, Cyber Risk Management and Artificial Intelligence in cyber security. We are seeking an individual who is passionate about cyber security, curious with a demonstrated track record of continuous learning, and has the technical acumen to … embrace data, technological and innovative approaches to deliver the best consulting outcomes for clients, as they work to address the challenges associated with today’s cyber threat landscape. Your Impact SOC Advisory: 4+ years of consulting experience in SOC, security engineering, SIEM administration, and incident management and demonstrated success with serving large, multinational organisations in designing and implementing an … Security Incident and Event Management (SIEM) platforms, Security Orchestration and Response (SOAR) technologies, Endpoint Protection and Response/Next Gen Protection and Response (EDR/XDR) tools, Next GenFirewalls, ThreatIntelligence and Hunting platforms Defensive Security Skills (desired) : Experience in security operations design, engineering and/or analysis and investigations, ideally in complex environments, with security event correlations More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Sophos Group
leading endpoint, network, email, and cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs … worldwide, defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threatintelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at . Role … worldwide cybersecurity regulations Evaluate and report enterprise security incidents in all jurisdictions as required under new and existing worldwide cybersecurity regulations Review and understand worldwide data protection and artificial intelligence laws and regulations, its impact on cybersecurity, to support regulatory advice to the business Contribute to AI use case and legal guidance arising from AI regulatory requirements Work cross More ❯
Be Doing Perform SIEM-based event analysis and triage potential threats, including recognising successful and unsuccessful intrusion attempts. Investigate phishing emails, suspicious domains, and IP addresses using OSINT and threatintelligence sources. Proactively monitor, analyse, and escalate security events and incidents in collaboration with other SOC team members. Assist in the configuration, administration and enhancement of security tools More ❯
expert in delivery of the DomainTools Engage training program with a view towards enabling our customers to more effectively derive value from DomainTools products. Utilise your expertise in Cyber ThreatIntelligence to learn where DomainTools data intersects, as well as the competitive landscape. Collaborate with the DomainTools product and engineering teams to define and test new features across More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Maxwell Bond
business targets, landing deals typically in the £20k–£40k range . Cybersecurity Services You’ll Sell Penetration Testing & Red Teaming Managed Detection & Response (MDR) Security Operations Centre (SOC) services ThreatIntelligence & Risk Advisory Incident Response & Crisis Management Cloud & Endpoint Security Solutions What You Bring Proven track record in new business cybersecurity sales , ideally across enterprise or upper mid More ❯
Account Executives and support them with background research and context. Collaborate with marketing to provide feedback on campaign performance and market signals. Stay up to date on cybersecurity trends, threatintelligence, and The clients products and value proposition. You’ll need: 1–2 years’ experience in a sales or business development role, ideally in B2B SaaS or cybersecurity. More ❯
SOC Specialist | London based 2-3x a week | £85,000 + Benefits Role Brief Join a global Security Operations Center team providing 24/7 threat detection and incident response. As a SOC Specialist, you’ll act as a frontline defender—monitoring alerts, leading investigations, and conducting proactive threat hunts. You'll work with a range of … documentation of technical findings Desired Skills Basic scripting (e.g., Python, Bash, PowerShell) Experience creating SIEM rules or detection logic Exposure to cloud environments and related attack vectors Knowledge of threat hunting methods and MITRE ATT&CK Interest or experience in cross-functional collaboration (e.g., Threat Intel, Red Teams More ❯