Corsham, Wiltshire, South West, United Kingdom Hybrid / WFH Options
Connexa
A public sector digital transformation consultancy is seeking a highly capable and motivated ThreatIntelligence Manager to play a critical role in a high-profile, strategically vital defence space programme. This role is ideal for a candidate with experience in MOD environments, with a firm grasp of space … Nationals only) Salary/Rate: Competitive, depending on experience As a key part of our systems engineering team, you'll be responsible for maintaining threat coherence across programme layers, managing threatintelligence inputs, and ensuring requirements remain traceable and integrated from URD through to system delivery. You … ll work closely with military stakeholders, intelligence SMEs, and engineering teams to provide clarity, direction, and foresight on emerging threat landscapes. Key Responsibilities Maintain and evolve the programme Threat Annex to reflect current and emerging space-based threats (including SATCOM vulnerabilities). Drive coherence and traceability of More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Connexa
A public sector digital transformation consultancy is seeking a highly capable and motivated ThreatIntelligence Manager to play a critical role in a high-profile, strategically vital defence space programme. This role is ideal for a candidate with experience in MOD environments, with a firm grasp of space … Nationals only) Salary/Rate: Competitive, depending on experience As a key part of our systems engineering team, you'll be responsible for maintaining threat coherence across programme layers, managing threatintelligence inputs, and ensuring requirements remain traceable and integrated from URD through to system delivery. You … ll work closely with military stakeholders, intelligence SMEs, and engineering teams to provide clarity, direction, and foresight on emerging threat landscapes. Key Responsibilities Maintain and evolve the programme Threat Annex to reflect current and emerging space-based threats (including SATCOM vulnerabilities). Drive coherence and traceability of More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Connexa
A public sector digital transformation consultancy is seeking a highly capable and motivated ThreatIntelligence Manager to play a critical role in a high-profile, strategically vital defence space programme. This role is ideal for a candidate with experience in MOD environments, with a firm grasp of space … Nationals only) Salary/Rate: Competitive, depending on experience As a key part of our systems engineering team, you'll be responsible for maintaining threat coherence across programme layers, managing threatintelligence inputs, and ensuring requirements remain traceable and integrated from URD through to system delivery. You … ll work closely with military stakeholders, intelligence SMEs, and engineering teams to provide clarity, direction, and foresight on emerging threat landscapes. Key Responsibilities Maintain and evolve the programme Threat Annex to reflect current and emerging space-based threats (including SATCOM vulnerabilities). Drive coherence and traceability of More ❯
A leading Financial Services firm seeks a ThreatIntelligence Lead to spearhead their Global threatintelligence initiatives and enhance their Cyber Defence strategy. This is a hands-on, technical role focused on Threat hunting, Malware analysis, and tracking changes made by Threat Actors. This … position plays a key role in shaping the Cyber Defence strategy, driving deliverables, and focusing on Threat-led and Threat detection activities. The organisation is investing in new tooling, including the procurement of a new TIP solution. The individual in this role will be responsible for building and More ❯
work alongside passionate professionals who thrive on solving complex problems, staying ahead of adversaries, and continuously improving our security posture. Whether it's analysing threatintelligence, responding to incidents, or hardening our infrastructure, your work will have a direct impact on the safety and success of our organisation. … teams to harden systems and networks Support compliance efforts (e.g., ISO 27001, NIST, GDPR) Contribute to threatintelligence and detection rule tuning Participate in red/blue team exercises and tabletop simulations We'll assess you against these technical skills during the selection process: Intrusion detection and analysis Threatintelligence and threat assessment Cyber Security operations Government Security Profession career framework
Corsham, England, United Kingdom Hybrid / WFH Options
Connexa
A public sector digital transformation consultancy is seeking a highly capable and motivated ThreatIntelligence Manager to play a critical role in a high-profile, strategically vital defence space programme. This role is ideal for a candidate with experience in MOD environments, with a firm grasp of space … Nationals only)Salary/Rate: Competitive, depending on experience As a key part of our systems engineering team, you'll be responsible for maintaining threat coherence across programme layers, managing threatintelligence inputs, and ensuring requirements remain traceable and integrated from URD through to system delivery. You … ll work closely with military stakeholders, intelligence SMEs, and engineering teams to provide clarity, direction, and foresight on emerging threat landscapes. Key Responsibilities Maintain and evolve the programme Threat Annex to reflect current and emerging space-based threats (including SATCOM vulnerabilities). Drive coherence and traceability of More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Connexa
A public sector digital transformation consultancy is seeking a highly capable and motivated ThreatIntelligence Manager to play a critical role in a high-profile, strategically vital defence space programme. This role is ideal for a candidate with experience in MOD environments, with a firm grasp of space … Nationals only)Salary/Rate: Competitive, depending on experience As a key part of our systems engineering team, you'll be responsible for maintaining threat coherence across programme layers, managing threatintelligence inputs, and ensuring requirements remain traceable and integrated from URD through to system delivery. You … ll work closely with military stakeholders, intelligence SMEs, and engineering teams to provide clarity, direction, and foresight on emerging threat landscapes. Key Responsibilities Maintain and evolve the programme Threat Annex to reflect current and emerging space-based threats (including SATCOM vulnerabilities). Drive coherence and traceability of More ❯
Defence Operation’s efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threatintelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve … operational efficiency. Collaborate with ThreatIntelligence, Incident Response, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary. Collaborate with third-party vendors and service providers to More ❯
this could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands on experience: - Threat Detection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct … forensic investigations, and support remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threatintelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication – Work closely and collaborate with senior analysts and clients … and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threatintelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration More ❯
this could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands on experience: - Threat Detection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct … forensic investigations, and support remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threatintelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication – Work closely and collaborate with senior analysts and clients … and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threatintelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration More ❯
this could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands on experience: - Threat Detection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct … forensic investigations, and support remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threatintelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication – Work closely and collaborate with senior analysts and clients … and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threatintelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration More ❯
this could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands on experience: - Threat Detection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct … forensic investigations, and support remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threatintelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication – Work closely and collaborate with senior analysts and clients … and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threatintelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration More ❯
this could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands on experience: - Threat Detection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct … forensic investigations, and support remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threatintelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication – Work closely and collaborate with senior analysts and clients … and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threatintelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration More ❯
this could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands on experience: - Threat Detection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct … forensic investigations, and support remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threatintelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication – Work closely and collaborate with senior analysts and clients … and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threatintelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration More ❯
this could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands on experience: - Threat Detection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct … forensic investigations, and support remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threatintelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication – Work closely and collaborate with senior analysts and clients … and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threatintelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration More ❯
swindon, wiltshire, south west england, United Kingdom
Network IT Recruitment Limited
this could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands on experience: - Threat Detection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct … forensic investigations, and support remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threatintelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication – Work closely and collaborate with senior analysts and clients … and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threatintelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration More ❯
south west london, south east england, United Kingdom
Network IT Recruitment Limited
this could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands on experience: - Threat Detection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct … forensic investigations, and support remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threatintelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication – Work closely and collaborate with senior analysts and clients … and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threatintelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration More ❯
testing merges the benefits of consultant-led penetration testing with ongoing vulnerability assurance through our advanced SecurePortal. This provides clients with a continuous, living threat management system throughout the duration of the contract, rather than a single point-in-time assessment. We’re expanding our Incident Response team and … responsibilities include: Conducting initial incident assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threatintelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis … the ability to manage and coordinate various incidents whilst remaining calm under pressure. Ability to align client deliverables with industry best practices. Experience in threatintelligence and analysis to support proactive IR. Capable of taking ownership of tasks, ensuring quality delivery and supporting the IR's team growth. More ❯
testing merges the benefits of consultant-led penetration testing with ongoing vulnerability assurance through our advanced SecurePortal. This provides clients with a continuous, living threat management system throughout the duration of the contract, rather than a single point-in-time assessment. We’re expanding our Incident Response team and … responsibilities include: Conducting initial incident assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threatintelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis … the ability to manage and coordinate various incidents whilst remaining calm under pressure. Ability to align client deliverables with industry best practices. Experience in threatintelligence and analysis to support proactive IR. Capable of taking ownership of tasks, ensuring quality delivery and supporting the IR's team growth. More ❯
testing merges the benefits of consultant-led penetration testing with ongoing vulnerability assurance through our advanced SecurePortal. This provides clients with a continuous, living threat management system throughout the duration of the contract, rather than a single point-in-time assessment. We’re expanding our Incident Response team and … responsibilities include: Conducting initial incident assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threatintelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis … the ability to manage and coordinate various incidents whilst remaining calm under pressure. Ability to align client deliverables with industry best practices. Experience in threatintelligence and analysis to support proactive IR. Capable of taking ownership of tasks, ensuring quality delivery and supporting the IR's team growth. More ❯
testing merges the benefits of consultant-led penetration testing with ongoing vulnerability assurance through our advanced SecurePortal. This provides clients with a continuous, living threat management system throughout the duration of the contract, rather than a single point-in-time assessment. We’re expanding our Incident Response team and … responsibilities include: Conducting initial incident assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threatintelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis … the ability to manage and coordinate various incidents whilst remaining calm under pressure. Ability to align client deliverables with industry best practices. Experience in threatintelligence and analysis to support proactive IR. Capable of taking ownership of tasks, ensuring quality delivery and supporting the IR's team growth. More ❯
testing merges the benefits of consultant-led penetration testing with ongoing vulnerability assurance through our advanced SecurePortal. This provides clients with a continuous, living threat management system throughout the duration of the contract, rather than a single point-in-time assessment. We’re expanding our Incident Response team and … responsibilities include: Conducting initial incident assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threatintelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis … the ability to manage and coordinate various incidents whilst remaining calm under pressure. Ability to align client deliverables with industry best practices. Experience in threatintelligence and analysis to support proactive IR. Capable of taking ownership of tasks, ensuring quality delivery and supporting the IR's team growth. More ❯
testing merges the benefits of consultant-led penetration testing with ongoing vulnerability assurance through our advanced SecurePortal. This provides clients with a continuous, living threat management system throughout the duration of the contract, rather than a single point-in-time assessment. We’re expanding our Incident Response team and … responsibilities include: Conducting initial incident assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threatintelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis … the ability to manage and coordinate various incidents whilst remaining calm under pressure. Ability to align client deliverables with industry best practices. Experience in threatintelligence and analysis to support proactive IR. Capable of taking ownership of tasks, ensuring quality delivery and supporting the IR's team growth. More ❯
testing merges the benefits of consultant-led penetration testing with ongoing vulnerability assurance through our advanced SecurePortal. This provides clients with a continuous, living threat management system throughout the duration of the contract, rather than a single point-in-time assessment. We’re expanding our Incident Response team and … responsibilities include: Conducting initial incident assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threatintelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis … the ability to manage and coordinate various incidents whilst remaining calm under pressure. Ability to align client deliverables with industry best practices. Experience in threatintelligence and analysis to support proactive IR. Capable of taking ownership of tasks, ensuring quality delivery and supporting the IR's team growth. More ❯
south west london, south east england, United Kingdom
Pentest People
testing merges the benefits of consultant-led penetration testing with ongoing vulnerability assurance through our advanced SecurePortal. This provides clients with a continuous, living threat management system throughout the duration of the contract, rather than a single point-in-time assessment. We’re expanding our Incident Response team and … responsibilities include: Conducting initial incident assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threatintelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis … the ability to manage and coordinate various incidents whilst remaining calm under pressure. Ability to align client deliverables with industry best practices. Experience in threatintelligence and analysis to support proactive IR. Capable of taking ownership of tasks, ensuring quality delivery and supporting the IR's team growth. More ❯