North London, London, United Kingdom Hybrid/Remote Options
Secure Recruitment Ltd
SENIOR THREATINTELLIGENCE ANALYST Fully Remote Up to £100,000 + Excellent Staff Bens + Share Scheme SECURE has Strategically Partnered with a Multi-Award-Winning, Software-Based Organisation at the Forefront of Pre-Emptive Exposure Management. As a market leader backed by significant Venture Funding, they combine proactive ThreatIntelligence, Real Attacker Telemetry & Automated Red … Teaming to Continuously Identify & Validate Real Exposure. Success in this position will enable the business to Transform Raw Intelligence into Actionable Insights that Protect Fortune 500 Companies & Critical Infrastructure Providers, helping them outrun Real-World Threats in Real-Time. Role Overview: We're looking to speak with ambitious Senior ThreatIntelligence Analyst to Expand Offensive Security Capabilities … around Honeypot Data Analysis. You'll Design & Deploy Detections for N-Day & 0-Day Exploits using a Global Network, Develop CTI Platforms for Real-Time Threat Analysis, Drive Rapid Reaction Efforts & Author ThreatIntelligence Reports. Ideally based in the UK, you don't need to tick every box - if you're motivated to make an impact, read More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Vanquish Technologies Limited
through implementation and ongoing support, our commitment is to provide clients with the assurance that they are valued by a company that is both attentive and impactful. Role Title: ThreatIntelligence Analyst Reporting Line Manager: Head of ThreatIntelligence Onsite Requirements (e.g. number of days per week onsite): 5 days Hybrid/Remote Working Policy: onsite … months Extension likelihood: Yes Maximum Daily Rate or Budget Range: 500 IR35 Status (inside/Outside/To Be Determined) Inside Experience Requirements Technology & Vendor Skillsets Required: Familiarity with threatintelligence platforms (TIPs), SIEMs, and threat data enrichment tools. Experience using Breach and Attack Simulation (BAS) platforms to build and validate threat scenarios. Strong understanding of … adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modeling. Hands-on experience with penetration testing tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera. Experience producing threat reports and briefings. Certifications Required or Preferred: Years of relevant experience: 8+ years of experience in threatintelligence, cybersecurity operations, or penetration testing. More ❯
IT Cyber Security Analyst Ref: YC46941 A highly successful IT and telecommunications services company is currently recruiting an IT Cyber Security Analyst (ThreatIntelligence Analyst) to work at their clients site in London. In this role, you will be responsible for identifying, analysing, and communicating cyber threats to support proactive defence strategies. The ideal candidate should have expertise … in threatintelligence analysis, collaboration across teams, familiarity with security tools, and strong analytical skills. ELIGIBLE APPLICANTS: (O) Eligible visa: Permanent residence, Spouse, Partner, Working holiday, Graduate (X) NOT eligible: Student visa, Requiring visa sponsorship, WORK TYPE: office-based VISA SUPPORT: No TYPE: 6 months rolling contract, full-time WORKING HOURS: Mon-Fri 9:00-17:00 SALARY … up to £54k, depending on experience START: Nov-Dec 2025 LOCATION: London (office-based) Cyber Security Analyst Main Responsibilities: Monitor and analyse the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organization's business and technology environment Collaborate with Red Team, Blue Team, and Penetration Testing teams to integrate threatintelligenceMore ❯
on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations: London, UK About the Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state sponsored advanced persistent threats (APTs). Cloudforce One works … in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever-growing sources of threatintelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of leveraging an incredibly vast and varied set of data points that only one of the world's largest global … networks can provide. The team is able to analyze these unique data points, at massive scale and efficiency, synthesizing findings into actionable threatintelligence to better protect our customers.The team's core disciplines are data engineering, data science, devops, and security. We use data science and machine learning to process large volumes of data and build threatMore ❯
Primary Details Time Type: Full time Worker Type: Employee ThreatIntelligence Specialist London Permanent (Hybrid) At QBE, our purpose is to enable a more resilient future. We are an international insurer and reinsurer with a local presence in 27 countries. The Opportunity We’re excited to be hiring a ThreatIntelligence Specialist to join our Advanced … Threat Services (ATS) Teamon a full-time, permanent basis! You’ll be part of a supportive team that thrives on teamwork and innovation, where your expertise will be valued as we work together to tackle the ever-evolving cyber threat landscape. We’re looking to welcome our new team member from early January 2026 , so if you’re … ready to make an impact in the new year, we’d love to hear from you! Your New Role Reporting to the Technical Threat Manager , you’llbe responsible for researching, analysing, and reporting on cyber threats targeting QBE’s global operations and technology environment. This role has a strong technical focus, centred on the collection, enrichment, automation, and analysis More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid/Remote Options
Circle Group
ThreatIntelligence Engineer/Honeypot Analyst £100,000 + benefits | Fully remote (including overseas work) Are you ready to push the limits of ThreatIntelligence and offensive security? We're looking for a highly skilled Senior ThreatIntelligence Engineer to help us enhance our ability to understand and detect how organisations could be compromised … datasets to uncover patterns, behaviours, and real-world attack techniques. Design and deploy detections for both known and emerging exploits, translating raw telemetry into actionable intelligence. Develop and maintain intelligence platforms capable of ingesting, analysing, and alerting on threats in real time. Build scenarios and simulations based on live adversary data to support detection engineering, research, and reporting. Collaborate … across teams to ensure intelligence findings are rapidly operationalised and communicated to key stakeholders. Produce clear, insightful intelligence reports that inform strategy, response, and prevention efforts. What we're looking for 8+ years' experience in cybersecurity, with a focus on large-scale data analysis, threatintelligence, or offensive security. Deep experience with honeypot data - analysing, correlating More ❯
The department Covers Cybersecurity, Information Security, IT Audit, IT Risks, IT Controls,Access Management, Security Operation and Threat Management.This is a rolling fixed term contract, initially 6 months - on site. The Business administrator will play a key role in overseeing our ThreatIntelligence Centreefforts and ensuring alignment with strategic planning objectives. You will beresponsible for the end … to-end management of major projects that enhance ourglobal cyber threatintelligence capabilities. This role requiresstrong project management expertise, a solid understanding of cybersecurityoperations, and the ability to effectively collaborate across global teams. Lead … the end-to-endmanagement of the threatintelligence activities while ensuring alignment withour global cybersecurity strategy. Develop and maintaindetailed activity plans, timelines, budgets, and resource allocations. Manage ThreatIntelligence Centre accounting, financial operations, and budget forecasts toensure cost optimisation and alignment with strategic objectives. Facilitatecommunication and coordination with global stakeholders across multiple regionsto ensure alignment of requirements and deliverables. More ❯
The department Covers Cybersecurity, Information Security, IT Audit, IT Risks, IT Controls,Access Management, Security Operation and Threat Management. This is a rolling fixed term contract, initially 6 months - on site. The Business administrator will play a key role in overseeing our ThreatIntelligence Centreefforts and ensuring alignment with strategic planning objectives. You will beresponsible for the … end-to-end management of major projects that enhance ourglobal cyber threatintelligence capabilities. This role requiresstrong project management expertise, a solid understanding of cybersecurityoperations, and the ability to effectively collaborate across global teams. Lead … the end-to-endmanagement of the threatintelligence activities while ensuring alignment withour global cybersecurity strategy. Develop and maintaindetailed activity plans, timelines, budgets, and resource allocations. Manage ThreatIntelligence Centre accounting, financial operations, and budget forecasts toensure cost optimisation and alignment with strategic objectives. Facilitatecommunication and coordination with global stakeholders across multiple regionsto ensure alignment of requirements and deliverables. More ❯
The departmentCovers Cybersecurity, Information Security, IT Audit, IT Risks, IT Controls,Access Management, Security Operation, Threat Management and the portfolio forChange for all these areas.This is a rolling fixed term contract, initially 6 months. You will play a key role in overseeing our ThreatIntelligence Centreefforts and ensuring alignment with strategic planning objectives. You will beresponsible for … the end-to-end management of major projects that enhance ourglobal cyber threatintelligence capabilities. This role requiresstrong project management expertise, a solid understanding of cybersecurityoperations, and the ability to effectively collaborate across global teams. Lead … the end-to-endmanagement of the threatintelligence activities while ensuring alignment withour global cybersecurity strategy. Develop and maintaindetailed activity plans, timelines, budgets, and resource allocations. Manage ThreatIntelligence Centre accounting, financial operations, and budget forecasts toensure cost optimisation and alignment with strategic objectives. Facilitatecommunication and coordination with global stakeholders across multiple regionsto ensure alignment of requirements and deliverables. More ❯
The departmentCovers Cybersecurity, Information Security, IT Audit, IT Risks, IT Controls,Access Management, Security Operation, Threat Management and the portfolio forChange for all these areas. This is a rolling fixed term contract, initially 6 months. You will play a key role in overseeing our ThreatIntelligence Centreefforts and ensuring alignment with strategic planning objectives. You will beresponsible … for the end-to-end management of major projects that enhance ourglobal cyber threatintelligence capabilities. This role requiresstrong project management expertise, a solid understanding of cybersecurityoperations, and the ability to effectively collaborate across global teams. Lead … the end-to-endmanagement of the threatintelligence activities while ensuring alignment withour global cybersecurity strategy. Develop and maintaindetailed activity plans, timelines, budgets, and resource allocations. Manage ThreatIntelligence Centre accounting, financial operations, and budget forecasts toensure cost optimisation and alignment with strategic objectives. Facilitatecommunication and coordination with global stakeholders across multiple regionsto ensure alignment of requirements and deliverables. More ❯
Senior Strategic Cyber ThreatIntelligence Analyst About us We are SecAlliance, part of CSIS Security Group and the Allurity family of cybersecurity companies Together, we form one of Europe's most trusted networks of cybersecurity experts. At SecAlliance, we deliver world-class cyber and conventional intelligence solutions across the UK and Europe. Our clients include financial institutions … governments, and critical national infrastructure organisations. We're a small but fast-growing team with a strong sense of purpose - to provide the highest quality intelligence while keeping the human touch at the heart of what we do. We make Intelligence Human! Why SecAlliance We offer more than just a job - we offer the chance to shape the … operational experience as a CTI analyst who is familiar with the process of researching, writing and editing CTI reporting for a broad range of audiences. Experience mapping and tracking threat actor campaigns, and/or deploying structured analytical techniques would be highly advantageous. Your responsibilities Collecting and processing cyber threatintelligence relevant to our client base. Producing More ❯
internal teams. Collective success - wins are celebrated as a community. Humility & curiosity - staying open, learning continuously. Open feedback - role-modeling growth through candid, constructive input. POSITION SUMMARY The Senior Intelligence Analyst (IA) is a senior position reporting to the EMEA Intelligence Officer. The Senior Intelligence Analyst will be part of FS-ISAC's Global Intelligence Office … GIO). GIO is responsible for formal threat-sharing, analysis, and analytical reporting for its members. This is a diverse, global team in a fast-paced environment. Senior IAs deliver insight and greater understanding of cybersecurity, geopolitical, socio-economic, and cyber-enabled threats faced by the global financial system. Senior IAs must understand and communicate effectively about threat actors' capabilities, intent, and drivers, connecting these insights to the broader strategic landscape. This position involves conducting high-level strategic analysis and producing intelligence deliverables for FS-ISAC members worldwide. It requires strong expertise in intelligence tradecraft, a comprehensive technical understanding of the Tactics, Techniques, and Procedures (TTPs) used by threat actors, strong written and verbal More ❯
Cybersecurity Project Manager Ref: YC46940 A highly successful IT and telecommunications services company is currently recruiting a Cybersecurity Project Manager/ThreatIntelligence Centre CoE Support. In this role, you will be responsible for overseeing the ThreatIntelligence Centre (TIC) efforts and ensuring alignment with strategic planning objectives, managing major projects that enhance global cyber threatintelligence capabilities. The ideal candidate should have strong project management experience, excellent communication skills, a deep understanding of cybersecurity operations, and the ability to collaborate effectively with global teams. ELIGIBLE APPLICANTS: (O) Eligible visa: Permanent residence, Spouse, Partner, Working holiday, Graduate, Freelance (X) NOT eligible: Student visa, Requiring visa sponsorship WORK TYPE: office-based VISA SUPPORT: No TYPE … EMEA, Americas, Asia Pacific, India) to ensure alignment of requirements and deliverables Track activity progress, manage risks, and implement risk mitigation strategies to ensure successful outcomes Drive standardisation of threatintelligence protocols, tools, and governance across the region Partner with technology, compliance, and risk management teams to ensure compliance with regulatory and legal requirements in each jurisdiction Host More ❯
experience in enterprise network topology and common security controls. Experience working in at least one of the following areas: Security Operations Center, Security consulting, Incident Response, risk management, cyber threatintelligence, vulnerability and patch management, security controls audit, incident management or cyber security management. Preferred qualifications: Experience in one or more of the following information security domains: Incident … Response, Security Operations, ThreatIntelligence, Cloud Security, Enterprise Architecture. Experience working with national government departments, military or intelligence services. Experience communicating technical details (both written and verbal) in a clear and concise manner to technical, non-technical, and executive audiences. Knowledge of NIS2, DORA, and NIST frameworks. Understanding of the cyber threat landscape, including prominent nation … state, criminal threat actors and cyber attacks, operational technology (OT) security issues and information technology (IT). Successful candidates must be eligible and will be required to obtain UK security clearance. About the job As a Cybersecurity Consultant, you will span operational, tactical levels and address the difficult problems that organizations are facing. You will have communication skills, consulting More ❯
agility. This means investing in talent, technologies, and tools that empower you to own your career.Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.The Threat and Vulnerability Management Team Lead is responsible for defining, developing, and leading the strategic direction for safeguarding the organisation's infrastructure and applications. This is achieved by proactively identifying … DES) department, which encompasses Infrastructure and Service Management across EMEA Bank, International Securities, and the 15+ countries in which these entities operate. The position is responsible for leading the Threat and Vulnerability Management function, including oversight of an outsourced offshore third-party service.This function integrates secure practices into the development lifecycle and aligns with service transition processes to ensure … by protecting against external threats and potential security vulnerabilities.NUMBER OF DIRECT REPORTSCirca 5 KEY RESPONSIBILITIES Strategic Leadership & Vision Lead the design, development, operation and management of the department's Threat and Vulnerability Management (TVM) strategy and roadmaps, ensuring alignment with business requirements, services, strategic goals, and IT risk appetite. Develop short, medium, and long-term strategic goals and objectives More ❯
on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations: London, UK About the Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state sponsored advanced persistent threats (APTs). Cloudforce One works … in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever-growing sources of threatintelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of leveraging an incredibly vast and varied set of data points that only one of the world's largest global … networks can provide. The team is able to analyze these unique data points, at massive scale and efficiency, synthesizing findings into actionable threatintelligence to better protect our customers.The team's core disciplines are data engineering, data science, devops, and security. We use data science and machine learning to process large volumes of data and build threatMore ❯
Bristol, Avon, South West, United Kingdom Hybrid/Remote Options
ITS Recruitment
Cyber SecOps and ThreatIntelligence Specialist, Law Firm, Bristol We are seeking a Cyber Security and ThreatIntelligence Specialist to join an expanding team in this 3,000 user international Law Firm, strengthening its ability to detect, respond to, and prevent cyber threats. Location: Bristol Reports to: Head of Cyber Security Hybrid Role: 3-4 days … work from home The Role Play a key role in maturing incident response and threatintelligence functions Evolve and mature the firm's capability for detecting and responding to cyber incidents Help develop strategies and roadmaps for cyber security technology Assist in the research, selection and deployment of new technical security controls for use by the firm Provide … a point of technical authority and governance for the effective use of technical security controls across the firm Act as an escalation point for threat hunting and security incidents Investigate alerts from Azure/Defender, IT monitoring systems, and 3rd-party SOC, helping to ensure critical assets remain secure Manage supplier relationships, report on control effectiveness, and support compliance More ❯
Senior Cyber Security Engineer/ThreatIntelligence Specialist Bristol (Hybrid) | Up to £81,000 + Excellent Benefits Join a leading UK law firm shaping the future of cyber resilience. About the Role My client are seekinga Senior Cyber Security Engineer/ThreatIntelligence Specialist to strengthen and mature our firms cyber defence and incident response capabilities. … you thrive in a fast-paced environment, love to hunt for threats, and enjoy taking ownership of complex challenges this role is for you. What Youll Do Lead on threat detection, hunting, and incident response, working with Azure/Defender, Sentinel, and third-party SOCs. Investigate alerts and coordinate responses with internal IT teams and external managed SOCs. Continuously … monitor, enhance, and report on security controls across cloud and infrastructure environments. Stay ahead of the latest vulnerabilities, attacker techniques, and threat trends. Collaborate with IT Operations to safeguard key business assets. Contribute to the development of new cyber technologies, strategies, and roadmaps aligned to firm-wide IT goals. Manage vendor relationships and support supplier selection. Ensure compliance with More ❯
Detection & Threat Hunt Lead Analyst Engage at our Cheltenham office. Secure employment is subject to satisfactory BPSS and SC security clearance, requiring five years continuous UK address history (no 30+ consecutive days outside the UK), and declaration of being a British passport holder with no dual nationality at the point of application. As a member of the SOC Content … Team, you will be responsible for contributing to the creation, deployment, and tuning of threat detection content and delivery of proactive threat hunting. You will work in close partnership with client Lead Analysts, threatintelligence teams, and other SOC functions to help ensure that detection strategies are tailored to each client's threat profile and … security objectives. This role offers a balance of technical hands on work, collaboration, and knowledge sharing, with a strong emphasis on continual learning and process improvement. Key Responsibilities Threat Detection Use Case Development: Design and implement detection logic aligned to specific threat scenarios, using industry frameworks such as MITRE ATT&CK. Maintain detection content throughout its lifecycle - from More ❯
SENIOR THREATINTELLIGENCE ANALYST Fully Remote Up to £100,000 + Excellent Staff Bens + Share Scheme SECURE has Strategically Partnered with a Multi-Award-Winning, Software-Based Organisation at the Forefront of Pre-Emptive Exposure Management. As a market leader backed by significant Venture Funding, they combine proactive ThreatIntelligence, Real Attacker Telemetry & Automated Red More ❯
Senior Cyber Security Engineer/ThreatIntelligence Specialist Bristol (Hybrid) Up to £81,000 + Excellent Benefits Join a leading UK law firm shaping the future of cyber resilience. About the Role My client are seekinga Senior Cyber Security Engineer/ThreatIntelligence Specialist to strengthen and mature our firms cyber defence and incident response capabilities More ❯
As a Principal Cyber Security Specialist, you will play a key role in architecting, deploying, and maintaining security-driven automation, integrations, and platform engineering efforts that support security operations, threatintelligence, and incident response working under Zero trust principles. Reporting into the Cyber Security Manager, you will work closely with the security engineering, threat intel, software engineering … implement Infrastructure-as-Code solutions using Terraform, Ansible, or similar technologies to deploy and manage security tooling. Design, build, and maintain security tooling and integrations that enhance security operations, threatintelligence, and detection capability. Collaborate with security teams to develop and optimize security workflows, automation playbooks, and integrations between security tools, SIEMs, SOAR platforms, EDR/XDR, and … Ansible, etc. Strong understanding of DevOps principles and experience securing CI/CD pipelines. Experience with container security (Docker, Kubernetes) and implementing security controls for microservices architectures. Familiarity with threatintelligence platforms (TIPs) and their integration with security tools. Strong problem-solving skills and ability to work in a fast-paced, collaborative environment. Qualifications: Certifications such as AWS More ❯
Cyber Intelligence Analyst page is loaded Cyber Intelligence Analystremote type: This position is a hybrid of office/remote workinglocations: United Kingdom - Sunburytime type: Full timeposted on: Posted Todaytime left to apply: End Date: November 21, 2025 (14 days left to apply)job requisition id: RQ102674 Entity: Technology Job Family Group: IT&S Group Job Description: About bp … building our future! You will work withThis team is responsible for safeguarding the company's digital assets and ensuring robust cyber resilience. They cover various aspects of cybersecurity, including threat and exposure management, security engineering, cyber incident response, security DevOps, and insider threat. Each team has specific responsibilities and areas of focus, collaborating closely with other digital security teams … and business units to ensure a cohesive approach to cybersecurity. Let me tell you about the roleThis role works within and supports bp's cyber intelligence (CI) function under the threat and exposure management team. The CI function is essential to bp's mission to protect our company, customers, brand, and shareholder value by strengthening cyber intelligenceMore ❯
maintained and augmented and that the team members have every opportunity to grow and learn with the organisation. As part of our Blue Team, you’ll use the latest intelligence and tooling to analyse information systems to ensure effective incident detection and response. Job Description If you are looking to make your mark on a rapidly growing SecOps team … join our Blue Team. The ideal candidate will be a self-starter with an inquisitive nature and a keen interest when it comes to technical cybersecurity topics such as threat hunting, attacker tactics and techniques, monitoring and alerting, threatintelligence, and incident readiness and response. Key responsibilities of the role are summarised below: · Security monitoring and incident … the Splunk SIEM, to enable the detection of threats across diverse platforms (e.g. cloud, endpoints, and networks) · Use frameworks like MITRE ATT&CK to map detection rules and maximise threat coverage · Use analytical platforms to query high volume datasets to identify trends and spot unusual behaviours, indicative of malicious activity · Proactive threat hunting using available client data · Collection More ❯
Services We are looking for a skilled Security Operations Centre Analyst to join our Security Operations team. This role focuses on responding to cyber security incidents while supporting proactive threatintelligence efforts. You will play a key part in detecting, investigating, and mitigating threats, as well as improving our security posture through continuous monitoring and analysis. Key Responsibilities … response capabilities through process improvements and automation. Monitor alerts from SOC tools and perform root cause analysis. Collaborate with IT and security teams to remediate vulnerabilities. Gather and analyse threatintelligence to inform detection strategies. Maintain detailed incident records and conduct post-incident reviews. Technical Skills Hands-on experience with SIEM, EDR, IDS/IPS, and SOAR platforms. … of frameworks such as NIST and MITRE ATT&CK. Qualifications Bachelor’s degree in Cyber Security, IT, or related field. 3–5 years in SOC operations, incident response, or threat intelligence. Practical experience with forensic investigations and security monitoring tools. Excellent written and verbal communication skills. Preferred Certifications such as CISSP, GIAC (GCIH, GCIA, GCTI). Experience with malware More ❯