Threat Intelligence Jobs in the East of England

21 of 21 Threat Intelligence Jobs in the East of England

Cyber Threat Intelligence Analyst

Hemel Hempstead, England, United Kingdom
Hybrid / WFH Options
Fynity
Cyber Threat Intelligence Analyst Hemel Hempstead | Hybrid: 2 Days WFH/3 Days On-Site Up to £60,000 + Excellent Benefits Security Clearance: SC Cleared + Eligible for DV Clearance A great opportunity to take your cyber threat intelligence skills to the next level? This … is an exciting opportunity to join a fast-growing, mission-driven cyber team working at the forefront of Defence and National Security. The Cyber Threat Intelligence Analyst will play a key role in identifying and neutralising emerging threats that could impact our most critical national infrastructure. This is … a hands-on, high-impact role where you’ll shape the threat intel capability and directly support security operations in a cutting-edge SOC environment. As a Cyber threat Analyst, you will: Managing and automating threat intel feeds from multiple open and closed sources Monitoring OSINT, dark More ❯
Posted:

Cyber Threat Intelligence Analyst

hemel hempstead, east anglia, United Kingdom
Hybrid / WFH Options
Fynity
Cyber Threat Intelligence Analyst Hemel Hempstead | Hybrid: 2 Days WFH/3 Days On-Site Up to £60,000 + Excellent Benefits Security Clearance: SC Cleared + Eligible for DV Clearance A great opportunity to take your cyber threat intelligence skills to the next level? This … is an exciting opportunity to join a fast-growing, mission-driven cyber team working at the forefront of Defence and National Security. The Cyber Threat Intelligence Analyst will play a key role in identifying and neutralising emerging threats that could impact our most critical national infrastructure. This is … a hands-on, high-impact role where you’ll shape the threat intel capability and directly support security operations in a cutting-edge SOC environment. As a Cyber threat Analyst, you will: Managing and automating threat intel feeds from multiple open and closed sources Monitoring OSINT, dark More ❯
Posted:

Threat Intelligence Analyst

Hemel Hempstead, England, United Kingdom
Hybrid / WFH Options
Hamilton Barnes 🌳
Job Title: Cyber Threat Intelligence Analyst Role: Join a rapidly growing cybersecurity team as a critical member responsible for managing a Malware Information Sharing Platform (MISP) instance and delivering operational and tactical threat intelligence. You’ll play a key role in enhancing the security posture of a … environment. Professional growth through hands-on work with cutting-edge cyber technologies. Flexible work arrangements supporting work-life balance. Responsibilities: Develop and integrate automated threat intelligence feeds and enrichment sources. Provide training and documentation for SOC staff on effective MISP usage. Monitor threat feeds, OSINT, dark web … Produce monthly situational reports highlighting operational threats and actionable recommendations. Collaborate with SOC and incident response teams during active security incidents, providing real-time threat intelligence. Contribute to threat hunting initiatives with intelligence-led hypotheses. Study and evaluate threat actors’ tactics, techniques, and procedures (TTPs) using More ❯
Posted:

Threat Intelligence Analyst

hemel hempstead, east anglia, United Kingdom
Hybrid / WFH Options
Hamilton Barnes 🌳
Job Title: Cyber Threat Intelligence Analyst Role: Join a rapidly growing cybersecurity team as a critical member responsible for managing a Malware Information Sharing Platform (MISP) instance and delivering operational and tactical threat intelligence. You’ll play a key role in enhancing the security posture of a … environment. Professional growth through hands-on work with cutting-edge cyber technologies. Flexible work arrangements supporting work-life balance. Responsibilities: Develop and integrate automated threat intelligence feeds and enrichment sources. Provide training and documentation for SOC staff on effective MISP usage. Monitor threat feeds, OSINT, dark web … Produce monthly situational reports highlighting operational threats and actionable recommendations. Collaborate with SOC and incident response teams during active security incidents, providing real-time threat intelligence. Contribute to threat hunting initiatives with intelligence-led hypotheses. Study and evaluate threat actors’ tactics, techniques, and procedures (TTPs) using More ❯
Posted:

Cyber Threat Intelligence Analyst

Hemel Hempstead, Hertfordshire, South East, United Kingdom
Hybrid / WFH Options
Sopra Steria Limited
We are building a Cyber Threat team. It's a great time to join us in our expansion, and work with a portfolio of high profile clients, with the opportunity to work on a large client base. Our Cyber Threat |Intelligence Analyst will be a critical member … of the dedicated SOC team and run our Malware Information Sharing Platform (MISP) instance, to deliver actionable operational and tactical threat intelligence. This involves monitoring, analysis, and dissemination of threat information to support our customer security posture. We need strong analytical skills, deep knowledge of threat intelligence … Develop and integrate automated feeds and enrichment sources. Provide training sessions and documentation for SOC staff on effective usage of MISP. Supervise various sources (threat feeds, OSINT, dark web, internal logs) for emerging threats; and facilitate threat intelligence. Analyse collected data to identify patterns, indicators of compromise, and More ❯
Employment Type: Permanent, Work From Home
Salary: £60,000
Posted:

Cyber Threat Intelligence Analyst

Hemel Hempstead, England, United Kingdom
Hybrid / WFH Options
Fynity
Job Description Cyber Threat Intelligence Analyst Hemel Hempstead | Hybrid: 2 Days WFH/3 Days On-Site Up to £60,000 + Excellent Benefits Security Clearance: SC Cleared + Eligible for DV Clearance A great opportunity to take your cyber threat intelligence skills to the next … is an exciting opportunity to join a fast-growing, mission-driven cyber team working at the forefront of Defence and National Security. The Cyber Threat Intelligence Analyst will play a key role in identifying and neutralising emerging threats that could impact our most critical national infrastructure. This is … a hands-on, high-impact role where you’ll shape the threat intel capability and directly support security operations in a cutting-edge SOC environment. As a Cyber threat Analyst, you will: Managing and automating threat intel feeds from multiple open and closed sources Monitoring OSINT, dark More ❯
Posted:

Threat Intelligence Analyst

Hemel Hempstead, England, United Kingdom
Hamilton Barnes
Job Description Job Title: Cyber Threat Intelligence Analyst Role: Join a rapidly growing cybersecurity team as a critical member responsible for managing a Malware Information Sharing Platform (MISP) instance and delivering operational and tactical threat intelligence. You’ll play a key role in enhancing the security posture … environment. Professional growth through hands-on work with cutting-edge cyber technologies. Flexible work arrangements supporting work-life balance. Responsibilities: Develop and integrate automated threat intelligence feeds and enrichment sources. Provide training and documentation for SOC staff on effective MISP usage. Monitor threat feeds, OSINT, dark web More ❯
Posted:

Senior Security Automation and Detection Engineer

Cambridge, Cambridgeshire, United Kingdom
Hybrid / WFH Options
Arm Limited
the CDO's efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with CDO analysts to identify repetitive tasks and automate them to improve operational efficiency. … Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary. Collaborate with third-party vendors and service providers to leverage automation More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Microsoft Security (Sentinel) Automation & Detection Engineer

cambridge, east anglia, United Kingdom
Hays
Defence Operation’s efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve … operational efficiency. Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary. Collaborate with third-party vendors and service providers to More ❯
Posted:

Microsoft Security (Sentinel) Automation & Detection Engineer

Cambridge, south west england, United Kingdom
Hays
Defence Operation’s efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve … operational efficiency. Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary. Collaborate with third-party vendors and service providers to More ❯
Posted:

Microsoft Security (Sentinel) Automation & Detection Engineer

Cambridge, Cambridgeshire, United Kingdom
Hays Technology
Defence Operation's efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve … operational efficiency. Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary. Collaborate with third-party vendors and service providers to More ❯
Employment Type: Contract
Rate: £500 - £800/day Competitive Day Rate
Posted:

Senior Technical Program Manager

Cambridge, Cambridgeshire, United Kingdom
Microsoft
development, or equivalent experience. - Experience managing cross-functional and/or cross-team projects. - Experience with network, identity, or identity technologies, digital forensics and threat hunting, threat intelligence, and/or managed security services. - Strong technical program management and organizational skills, including the ability to manage multiple More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Incident Response Threat Hunter

Peterborough, Cambridgeshire, United Kingdom
Booz Allen Hamilton
fulfilling life. YOUR CANDIDATE JOURNEY Discover what to expect during your journey as a candidate with us. The Opportunity: Are you looking for a threat hunter role, detecting cyber threats in support of active forensic investigations? Cyber threats are evolving, and when perimeter security and automated protection aren't … enough, networks are compromised, information is accessed, data is exfiltrated, backups are wiped, and ransomware is deployed, locking up an entire organization. Join our threat detection and response team to perform active threat hunting and assist organizations in recovering from cyber incidents. We're seeking CND and CNO … SentinelOne, CrowdStrike, or Defender for Endpoint Experience with network- and host-based intrusion analysis, digital forensics, or malware handling Experience with hunt teams, cyber threat intelligence, incident response, or security operations teams Knowledge of security principles, including MITRE ATT&CK framework, threat landscapes, or attacker TTPs Knowledge More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SOC Analyst

Hemel Hempstead, Hertfordshire, United Kingdom
TieTalent
logs, network traffic, and endpoint telemetry Supporting containment and recovery efforts during active security incidents Continuously enhancing SOC capabilities, tooling, and detection rules using threat-informed approaches like MITRE ATT&CK Producing detailed incident reports and documentation for both technical and non-technical stakeholders Assisting with threat intelligence … a Security Operations Centre (SOC) Solid knowledge of SIEM tools such as Microsoft Sentinel or Splunk Familiarity with the MITRE ATT&CK framework and threat detection methodologies Strong analytical skills with a keen eye for detail in log analysis and network monitoring Basic understanding of enterprise security architecture including More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Defence Operations Director

Cambridge, Cambridgeshire, United Kingdom
Arm Limited
Job overview: This is an opportunity to lead global Security Operations focused on safeguarding Arm's digital environment through exemplary threat detection, incident response, and vulnerability management capabilities. This senior role, reporting directly into the CISO, is accountable for driving the strategic direction of Arm's Detect & Response function … delivering outstanding performance and ensuring we are resilient against an evolving threat landscape! In addition to operations, you will lead cyber crisis management, C-Suite level stress testing, team development, and top-level cybersecurity thought leadership. Responsibilities: Own and deliver the strategic roadmap for cyber incident and vulnerability detection … response in line with Arm's threat profile and business objectives. You will guide and develop a high-performing team, driven with context of emerging threats and strategic objectives. Ensure Threat Intelligence, Proactive Security Testing, and Security Analytics functions develop under your leadership to deliver maximum context More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Specialist | Logrhythm

Hatfield, Hertfordshire, United Kingdom
Jarvis King
Skills Required Solid knowledge and extensive experience in supporting and designing SIEM/XDR platforms A deep interest and passion for Cyber Security and threat intelligence. Good knowledge and understanding of the following Key technologies/products supported to perform in-depth troubleshooting and cybersecurity investigations: Linux/Unix … weekly shop and discounts on gift/shopping vouchers. World-class training and development Keywords: 44768, LogRhythm, SIEM, EDR, SOC, NOC, Cyber Security, Cyber Threat Intelligence, Log Management, protective monitoring, Network Security. More ❯
Employment Type: Permanent
Salary: £50000 - £65000/annum Up to 20% bonus, 10% pension
Posted:

SOC Analyst

Hemel Hempstead, England, United Kingdom
Fynity
recovery • Developing smarter detection rules (think MITRE ATT&CK) • Creating incident reports for both technical & non-technical audiences • Staying ahead of evolving attack techniques & threat intel We need: • Hands-on SOC experience • Strong SIEM knowledge – Sentinel, Splunk, etc. • Solid grasp of network protocols and security architecture • DV clearance eligibility More ❯
Posted:

SOC Analyst

hemel hempstead, east anglia, United Kingdom
Fynity
recovery • Developing smarter detection rules (think MITRE ATT&CK) • Creating incident reports for both technical & non-technical audiences • Staying ahead of evolving attack techniques & threat intel We need: • Hands-on SOC experience • Strong SIEM knowledge – Sentinel, Splunk, etc. • Solid grasp of network protocols and security architecture • DV clearance eligibility More ❯
Posted:

DevSecOps Engineer

Loughton, Essex, South East, United Kingdom
Hybrid / WFH Options
Profile 29
part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure … with security embedded at every stage. Cloud Security Implementation: Leverage Azure Security Centre, Microsoft Defender for Cloud, and Microsoft Sentinel for advanced security monitoring. Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion … Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured action More ❯
Employment Type: Contract, Work From Home
Rate: From £500 to £700 per day (direct contract with the client)
Posted:

DevSecOps Engineer

Loughton, Essex, South East, United Kingdom
Hybrid / WFH Options
Profile 29
part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure … with security embedded at every stage. Cloud Security Implementation: Leverage Azure Security Centre, Microsoft Defender for Cloud, and Microsoft Sentinel for advanced security monitoring. Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion … Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured action More ❯
Employment Type: Permanent, Work From Home
Posted:

Cloud security engineer

Cambridge, Cambridgeshire, United Kingdom
Hybrid / WFH Options
TieTalent
This makes this a unique role where you will be able to utilize a broad skill set. Role Requirements Experience in cybersecurity matters (e.g., threat detection, malware intelligence, cloud security posture management, or identity and access management systems). Understanding of the following functions: TCP/IP stack More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Threat Intelligence
the East of England
25th Percentile
£41,280
Median
£43,542
75th Percentile
£50,313
90th Percentile
£55,000