Hemel Hempstead, England, United Kingdom Hybrid / WFH Options
Fynity
Cyber ThreatIntelligence Analyst Hemel Hempstead | Hybrid: 2 Days WFH/3 Days On-Site Up to £60,000 + Excellent Benefits Security Clearance: SC Cleared + Eligible for DV Clearance A great opportunity to take your cyber threatintelligence skills to the next level? This … is an exciting opportunity to join a fast-growing, mission-driven cyber team working at the forefront of Defence and National Security. The Cyber ThreatIntelligence Analyst will play a key role in identifying and neutralising emerging threats that could impact our most critical national infrastructure. This is … a hands-on, high-impact role where you’ll shape the threat intel capability and directly support security operations in a cutting-edge SOC environment. As a Cyber threat Analyst, you will: Managing and automating threat intel feeds from multiple open and closed sources Monitoring OSINT, dark More ❯
hemel hempstead, east anglia, United Kingdom Hybrid / WFH Options
Fynity
Cyber ThreatIntelligence Analyst Hemel Hempstead | Hybrid: 2 Days WFH/3 Days On-Site Up to £60,000 + Excellent Benefits Security Clearance: SC Cleared + Eligible for DV Clearance A great opportunity to take your cyber threatintelligence skills to the next level? This … is an exciting opportunity to join a fast-growing, mission-driven cyber team working at the forefront of Defence and National Security. The Cyber ThreatIntelligence Analyst will play a key role in identifying and neutralising emerging threats that could impact our most critical national infrastructure. This is … a hands-on, high-impact role where you’ll shape the threat intel capability and directly support security operations in a cutting-edge SOC environment. As a Cyber threat Analyst, you will: Managing and automating threat intel feeds from multiple open and closed sources Monitoring OSINT, dark More ❯
Hemel Hempstead, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
Job Title: Cyber ThreatIntelligence Analyst Role: Join a rapidly growing cybersecurity team as a critical member responsible for managing a Malware Information Sharing Platform (MISP) instance and delivering operational and tactical threat intelligence. You’ll play a key role in enhancing the security posture of a … environment. Professional growth through hands-on work with cutting-edge cyber technologies. Flexible work arrangements supporting work-life balance. Responsibilities: Develop and integrate automated threatintelligence feeds and enrichment sources. Provide training and documentation for SOC staff on effective MISP usage. Monitor threat feeds, OSINT, dark web … Produce monthly situational reports highlighting operational threats and actionable recommendations. Collaborate with SOC and incident response teams during active security incidents, providing real-time threat intelligence. Contribute to threat hunting initiatives with intelligence-led hypotheses. Study and evaluate threat actors’ tactics, techniques, and procedures (TTPs) using More ❯
hemel hempstead, east anglia, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
Job Title: Cyber ThreatIntelligence Analyst Role: Join a rapidly growing cybersecurity team as a critical member responsible for managing a Malware Information Sharing Platform (MISP) instance and delivering operational and tactical threat intelligence. You’ll play a key role in enhancing the security posture of a … environment. Professional growth through hands-on work with cutting-edge cyber technologies. Flexible work arrangements supporting work-life balance. Responsibilities: Develop and integrate automated threatintelligence feeds and enrichment sources. Provide training and documentation for SOC staff on effective MISP usage. Monitor threat feeds, OSINT, dark web … Produce monthly situational reports highlighting operational threats and actionable recommendations. Collaborate with SOC and incident response teams during active security incidents, providing real-time threat intelligence. Contribute to threat hunting initiatives with intelligence-led hypotheses. Study and evaluate threat actors’ tactics, techniques, and procedures (TTPs) using More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Sopra Steria Limited
We are building a Cyber Threat team. It's a great time to join us in our expansion, and work with a portfolio of high profile clients, with the opportunity to work on a large client base. Our Cyber Threat |Intelligence Analyst will be a critical member … of the dedicated SOC team and run our Malware Information Sharing Platform (MISP) instance, to deliver actionable operational and tactical threat intelligence. This involves monitoring, analysis, and dissemination of threat information to support our customer security posture. We need strong analytical skills, deep knowledge of threatintelligence … Develop and integrate automated feeds and enrichment sources. Provide training sessions and documentation for SOC staff on effective usage of MISP. Supervise various sources (threat feeds, OSINT, dark web, internal logs) for emerging threats; and facilitate threat intelligence. Analyse collected data to identify patterns, indicators of compromise, and More ❯
Hemel Hempstead, England, United Kingdom Hybrid / WFH Options
Fynity
Job Description Cyber ThreatIntelligence Analyst Hemel Hempstead | Hybrid: 2 Days WFH/3 Days On-Site Up to £60,000 + Excellent Benefits Security Clearance: SC Cleared + Eligible for DV Clearance A great opportunity to take your cyber threatintelligence skills to the next … is an exciting opportunity to join a fast-growing, mission-driven cyber team working at the forefront of Defence and National Security. The Cyber ThreatIntelligence Analyst will play a key role in identifying and neutralising emerging threats that could impact our most critical national infrastructure. This is … a hands-on, high-impact role where you’ll shape the threat intel capability and directly support security operations in a cutting-edge SOC environment. As a Cyber threat Analyst, you will: Managing and automating threat intel feeds from multiple open and closed sources Monitoring OSINT, dark More ❯
Job Description Job Title: Cyber ThreatIntelligence Analyst Role: Join a rapidly growing cybersecurity team as a critical member responsible for managing a Malware Information Sharing Platform (MISP) instance and delivering operational and tactical threat intelligence. You’ll play a key role in enhancing the security posture … environment. Professional growth through hands-on work with cutting-edge cyber technologies. Flexible work arrangements supporting work-life balance. Responsibilities: Develop and integrate automated threatintelligence feeds and enrichment sources. Provide training and documentation for SOC staff on effective MISP usage. Monitor threat feeds, OSINT, dark web More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
the CDO's efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threatintelligence and vulnerability management. Collaborate with CDO analysts to identify repetitive tasks and automate them to improve operational efficiency. … Collaborate with ThreatIntelligence, Incident Response, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary. Collaborate with third-party vendors and service providers to leverage automation More ❯
Defence Operation’s efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threatintelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve … operational efficiency. Collaborate with ThreatIntelligence, Incident Response, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary. Collaborate with third-party vendors and service providers to More ❯
Defence Operation’s efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threatintelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve … operational efficiency. Collaborate with ThreatIntelligence, Incident Response, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary. Collaborate with third-party vendors and service providers to More ❯
Defence Operation's efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threatintelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve … operational efficiency. Collaborate with ThreatIntelligence, Incident Response, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary. Collaborate with third-party vendors and service providers to More ❯
development, or equivalent experience. - Experience managing cross-functional and/or cross-team projects. - Experience with network, identity, or identity technologies, digital forensics and threat hunting, threatintelligence, and/or managed security services. - Strong technical program management and organizational skills, including the ability to manage multiple More ❯
fulfilling life. YOUR CANDIDATE JOURNEY Discover what to expect during your journey as a candidate with us. The Opportunity: Are you looking for a threat hunter role, detecting cyber threats in support of active forensic investigations? Cyber threats are evolving, and when perimeter security and automated protection aren't … enough, networks are compromised, information is accessed, data is exfiltrated, backups are wiped, and ransomware is deployed, locking up an entire organization. Join our threat detection and response team to perform active threat hunting and assist organizations in recovering from cyber incidents. We're seeking CND and CNO … SentinelOne, CrowdStrike, or Defender for Endpoint Experience with network- and host-based intrusion analysis, digital forensics, or malware handling Experience with hunt teams, cyber threatintelligence, incident response, or security operations teams Knowledge of security principles, including MITRE ATT&CK framework, threat landscapes, or attacker TTPs Knowledge More ❯
logs, network traffic, and endpoint telemetry Supporting containment and recovery efforts during active security incidents Continuously enhancing SOC capabilities, tooling, and detection rules using threat-informed approaches like MITRE ATT&CK Producing detailed incident reports and documentation for both technical and non-technical stakeholders Assisting with threatintelligence … a Security Operations Centre (SOC) Solid knowledge of SIEM tools such as Microsoft Sentinel or Splunk Familiarity with the MITRE ATT&CK framework and threat detection methodologies Strong analytical skills with a keen eye for detail in log analysis and network monitoring Basic understanding of enterprise security architecture including More ❯
Job overview: This is an opportunity to lead global Security Operations focused on safeguarding Arm's digital environment through exemplary threat detection, incident response, and vulnerability management capabilities. This senior role, reporting directly into the CISO, is accountable for driving the strategic direction of Arm's Detect & Response function … delivering outstanding performance and ensuring we are resilient against an evolving threat landscape! In addition to operations, you will lead cyber crisis management, C-Suite level stress testing, team development, and top-level cybersecurity thought leadership. Responsibilities: Own and deliver the strategic roadmap for cyber incident and vulnerability detection … response in line with Arm's threat profile and business objectives. You will guide and develop a high-performing team, driven with context of emerging threats and strategic objectives. Ensure ThreatIntelligence, Proactive Security Testing, and Security Analytics functions develop under your leadership to deliver maximum context More ❯
Skills Required Solid knowledge and extensive experience in supporting and designing SIEM/XDR platforms A deep interest and passion for Cyber Security and threat intelligence. Good knowledge and understanding of the following Key technologies/products supported to perform in-depth troubleshooting and cybersecurity investigations: Linux/Unix … weekly shop and discounts on gift/shopping vouchers. World-class training and development Keywords: 44768, LogRhythm, SIEM, EDR, SOC, NOC, Cyber Security, Cyber ThreatIntelligence, Log Management, protective monitoring, Network Security. More ❯
Employment Type: Permanent
Salary: £50000 - £65000/annum Up to 20% bonus, 10% pension
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure … with security embedded at every stage. Cloud Security Implementation: Leverage Azure Security Centre, Microsoft Defender for Cloud, and Microsoft Sentinel for advanced security monitoring. Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion … Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured action More ❯
Employment Type: Contract, Work From Home
Rate: From £500 to £700 per day (direct contract with the client)
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure … with security embedded at every stage. Cloud Security Implementation: Leverage Azure Security Centre, Microsoft Defender for Cloud, and Microsoft Sentinel for advanced security monitoring. Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion … Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured action More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
TieTalent
This makes this a unique role where you will be able to utilize a broad skill set. Role Requirements Experience in cybersecurity matters (e.g., threat detection, malware intelligence, cloud security posture management, or identity and access management systems). Understanding of the following functions: TCP/IP stack More ❯