Join a leading defense organization committed to protecting the United Kingdom against cyber threats. We are seeking a highly skilled and experienced ThreatIntelligence Manager to join our team in Leeds. This is an exciting opportunity to lead our threatintelligence efforts and play a crucial … role in enhancing our cyber defense capabilities. Position Overview: As the ThreatIntelligence Manager, you will be responsible for leading and managing our threatintelligence program, providing strategic insights and actionable intelligence to inform decision-making and enhance our cybersecurity posture. The successful candidate will … have a strong background in defense and intelligence, with expertise in threat analysis, intelligence gathering, and cyber threat hunting. Key Responsibilities: Lead the development and implementation of a comprehensive threatintelligence program to identify, assess, and mitigate cyber threats targeting our organization. Establish and more »
Lead ThreatIntelligence Analyst – SC Cleared Location: Leeds, UK - Onsite Working Salary: Up to £72,000 per annum plus a 10% bonus. Are you passionate about defending against cyber threats and safeguarding critical assets? Join one of the UK's largest defence companies, dedicated to protecting the nation … against cyber threats worldwide. We are currently seeking a Lead ThreatIntelligence Analyst to join our team based in Leeds. In this role, you will play a pivotal role in identifying, analyzing, and mitigating cyber threats to ensure the security and resilience of our systems and infrastructure. Responsibilities … Lead a team of threatintelligence analysts in gathering, analyzing, and disseminating intelligence on cyber threats and adversaries. Monitor and analyze various sources of threatintelligence to identify emerging threats, vulnerabilities, and attack trends. Develop and maintain comprehensive threatintelligence profiles and assessments more »
Leeds, England, United Kingdom Hybrid / WFH Options
Anson McCade
ThreatIntelligence Lead Location: London - Hybrid Travel: Max 2 days consulting travel Employment : Full-Time Role Overview : We are seeking a skilled ThreatIntelligence Lead to join our team, focusing on supporting the defence of a major UK Critical National Infrastructure (CNI) organization. In this role … you will oversee the collation and analysis of ThreatIntelligence (TI), ensuring the SOC (Security Operations Centre) is equipped with the necessary insights to proactively defend against cyber threats. The ideal candidate will have a strong technical background, exceptional analytical skills, and the ability to effectively communicate complex … concepts to technical and non-technical audiences. Responsibilities: • Produce and maintain threat assessments to provide a comprehensive understanding of the customer threat landscape. • Maintain and update the Indicator of Compromise (IoC) database tailored to the monitored environment and threats. • Oversee threat profiles and threat modelling, detailing more »
ThreatIntelligence Analyst Our client stands as a cornerstone in the realm of digital security solutions, offering state-of-the-art services to safeguard clients against ever-morphing cyber threats. With a dedication to pioneering innovations and unwavering excellence, the company empowers governments and organizations to fortify their … digital assets and infrastructure. They are in search of a proficient ThreatIntelligence Analyst to complement its esteemed team of cybersecurity specialists. As a ThreatIntelligence Analyst you will wield significant influence in identifying, dissecting, and neutralizing cyber threats, thereby ensuring the unshakeable security and resilience … of our clients' operations. Key Responsibilities: Employ advanced intelligence tools and methodologies to monitor and analyze cyber threats across various channels, including open-source intelligence and dark web monitoring. Conduct exhaustive research and analysis to discern emerging threats, dissect attack patterns, and decipher threat actor behaviors. Craft more »
Doncaster, England, United Kingdom Hybrid / WFH Options
Lorien
the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber ThreatIntelligence (CTI) and Threat Mining (TM). Role Responsibilities You will work alongside the SOC team to ensure the effective delivery of … the following: Provide around the clock protective monitoring through the use of industry leading SIEM, IDS and threatIntelligence Technologies. Provide advice and guidance to client targets of cyber attacks and malicious activity to a high standard. Provide incident reporting capabilities ensuring that all information is provided in … a timely, accurate and effective manner. Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and Vulnerability Management tools Serve as a technical point of escalation and provide mentoring for L1 Security Operations Center (SOC more »
Doncaster, South Yorkshire, Yorkshire, United Kingdom
Forward Role
the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber ThreatIntelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the use of industry leading SIEM … IDS and threatIntelligence Technologies. Provide advice and guidance to client targets of cyber-attacks and malicious activity to a high standard. Provide incident reporting capabilities ensuring that all information is provided in a timely, accurate and effective manner. Provide analytical support to other SOC team members during … security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and Vulnerability Management tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable in a client facing role. A keen interest in cyber more »
Doncaster, England, United Kingdom Hybrid / WFH Options
Lorien
the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber ThreatIntelligence (CTI) and Threat Mining (TM). Role Responsibilities You will work alongside the SOC team to ensure the effective delivery of … the following: Provide around the clock protective monitoring through the use of industry leading SIEM, IDS and threatIntelligence Technologies. Provide advice and guidance to client targets of cyber attacks and malicious activity to a high standard. Provide incident reporting capabilities ensuring that all information is provided in … a timely, accurate and effective manner. Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and Vulnerability Management tools Assistance with active directory administration. Assistance with firewall management. Key Skills The successful candidate will exhibit more »
incident response. Mentor junior SOC analysts and provide technical guidance on complex security issues. Continuously assess and improve SOC processes and technologies to enhance threat detection and response capabilities. Participate in incident response exercises and cybersecurity drills to ensure readiness and effectiveness. Qualifications and Skills: Bachelor's degree in … experience). Proven experience working in a Security Operations Center, with a focus on incident detection, analysis, and response. Strong understanding of cybersecurity principles, threatintelligence, and attack vectors. Proficiency in using SIEM tools, such as Splunk, ArcSight, or ELK Stack, for log analysis and correlation. Experience with more »
roadmap to ensure that the SOC sets the standard for SOCs in the UK and remains performant in line with customer’s requirements and threat profiles. The SDM drives continuous improvement of the SOC services to increase performance and reduce costs. This includes supporting the project teams with delivering … with the authority teams and tenant owners. The SDM is a leader with a deep knowledge of technical and cyber security technologies and cyber threat tools, tactics, techniques and procedures who is experienced in planning and managing development activities in accordance with industry standard project and engineering methodologies. Requirements … security controls as well as detection tools to protect large cloud estates; Utilise SIEM tools to detect security breaches and recognise the importance of threat led Use Cases. Knowledge of SIEM/SOAR tools (Splunk and Sentinel at a minimum) and other appropriate tooling e.g. SOAR, ThreatIntelligencemore »
in security testing, vulnerability scanning, and risk management. Ability to create formal documents such as reports or procedures. Detailed knowledge of Microsoft O365 environment, ThreatIntelligence analysis, Security Incident Response, and Disaster Recovery principles. Strong interpersonal skills, analytical mindset, and ability to communicate in non-technical language. Good more »
scanning, risk identification, resolution, and reporting. * Demonstrated expertise in formal document creation, including report and procedure development. Essential Skills: * Microsoft O365 platform expertise. * Advanced ThreatIntelligence analysis and best practices implementation. * Proficient in managing Security Incident Response processes. * Knowledgeable about Disaster Recovery and Business Continuity principles. * Experienced in more »
Hybrid x2 days p/w *Sponsorship not provided Are you a SOC Analyst with more than two years of experience delivering front-line threat hunting support? Do you want to work for an organisation that are leaders in the delivery of Microsoft Sentinel SOC services in a fast … and respond to security incidents Remediate serious attacks escalated from Tier 1 SOC Analysts Assess the scope of attacks and the affected systems Use threatintelligence to pinpoint scale of the attack, the type of attack and systems affected Conduct incident response activities Use IOC’s to research more »
Leeds, Horsforth, West Yorkshire, United Kingdom Hybrid / WFH Options
Headway Recruitment
in enterprise information security standards, including Cyber Essentials, ISO 27001, 27002, Data Protection Act, and GDPR. In-depth knowledge of the Microsoft O365 environment, threatintelligence analysis, Security Incident Response processes, disaster recovery, and business continuity principles. Familiarity with security testing principles, vulnerability scanning, risk identification, resolution, and more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »