Alexandria, Virginia, United States Hybrid / WFH Options
Agile Defense, Inc
minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests. Requisition Job Title: CyberThreatIntelligence Analyst IV Exempt Location: Hybrid 2x week onsite - 600 Dulany Street Alexandria, Virginia 22314 Clearance Level: Active DoD - Top Secret … Required Certification(s): • N/A SUMMARY The United States Patent and Trademark Office (USPTO), Cybersecurity Division, has a requirement to support a CyberThreatIntelligence (CTI) capability within USPTO. This support includes monitoring activities, developing cyberthreat analysis, identifying mitigation and remediation courses of … action, sharing actionable cyberthreatintelligence used in organizational IT asset protection, trending strategic cyber threats and situational awareness. A successful candidate will enable our government operational counterparts to promote the rapid analysis of national level cyber threats and incidents. The hours for the position More ❯
Tactical CyberThreatIntelligence Analyst (Analyst I) About the role Location: Office (London) or Home based Duration: Permanent, Full time The primary role of the Tactical CyberThreatIntelligence Analyst is to support the production of accurate, high quality and timely intelligence products. … This will include support to management, peers and members of staff and clients, both in-house and clients. Tactical CyberThreatIntelligence Analysts will: Create Open Source summaries concerning cyberthreat incidents Create and update threat actor profiles detailing salient information about cyberthreat actors. Assist in the production of strategic reporting concerning technical themes of interest (malware, IOCs, actor TTPs/campaigns and other developments which have the potential to impact the cyberthreat landscape). Respond to Requests for Intelligence (RFIs) from clients. Contribute to other More ❯
We are seeking a Threat Analyst to join our rapidly growing Information Security team. This is a unique opportunity for an aspiring and motivated professional to be at the forefront of our cyber defence strategy, protecting our brand from existing and emerging threats. You will combine the expertise … of a Threat Hunter and CyberThreatIntelligence Analyst, and will work alongside our Senior Threat Analyst to build our threatintelligence and hunting capabilities from the ground up. You'll have a major input on what new tooling and services we use … and communication skills, and an appetite for complex problem solving. Seize the opportunity to join a dynamic security team, reporting to the Head of Cyber Defence, and lead the development of advanced CTI and threat hunting strategies, seamlessly integrating into our security processes and driving continuous improvements. What More ❯
a first-class service which is safe and secure. To support this, our Security Operations team is currently looking for an ambitious and experienced CyberThreatIntelligence professional. You'll excel when working in fast paced environments where you are responsible for maintaining high standards of operational … output. You’ll also be an advocate of threatintelligence and be passionate about it having a positive impact on operations, driving the development of our CTI function to effectively meet business demand. You'll take ownership for the production and dissemination of high quality intelligence products … to meet customer requirements, alongside supporting the Security Operations team in Cyber Incident Response. Working within our Cyber Security function, the CyberThreatIntelligence (CTI) Consultant role will be a major part of day-to-day collection, analysis, and dissemination of threatintelligenceMore ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
WeAreTechWomen
a first-class service which is safe and secure. To support this, our Security Operations team is currently looking for an ambitious and experienced CyberThreatIntelligence professional. You'll excel when working in fast paced environments where you are responsible for maintaining high standards of operational … output. You'll also be an advocate of threatintelligence and be passionate about it having a positive impact on operations, driving the development of our CTI function to effectively meet business demand. You'll take ownership for the production and dissemination of high quality intelligence products … to meet customer requirements, alongside supporting the Security Operations team in Cyber Incident Response. Working within our Cyber Security function, the CyberThreatIntelligence (CTI) Consultant role will be a major part of day-to-day collection, analysis, and dissemination of threatintelligenceMore ❯
New role: Cyber Services Advisor Location: London (Central flexible/hybrid working) Salary: £50,000 - £65,000 Exciting opportunity to join a leading global Insurtech organisation as a key member of the ThreatIntelligence and Proactive Services capabilities. This role sits within the Cyber Insights & Analytics … function, part of the Cyber Underwriting division, supporting cyber underwriting operations across London, U.S., and global offices. The team and business has developed rapidly, and with a projected growth of 35% this year. In this role, you will work in diverse areas such as insurance, cybersecurity, and consulting … strong communication skills, an interest in cybersecurity, with an ambition to be a front-facing expert. You will work closely with the Head of Cyber Insights & Analytics, the Cyber Services Manager, and the cyber underwriters to deliver the proactive cybersecurity services, engage with internal and external stakeholders More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
CyberThreatIntelligence Analyst Location: Huntsville, AL Work Type: Onsite Remote Work: No Job Description Work as a member of a threatintelligence team responsible for understanding how emerging cyber threats impact the client organization while conducting highly detail-oriented security threat analysis … strategies and remediation guidance. Form accurate and precise analysis and escalate it to appropriate teammates or internal teams for additional assistance or review. Provide intelligence context to support the fine-tuning of signatures. Qualifications 8+ years of experience with cybersecurity 4+ years of experience with conducting threat research … focused on nation-state, criminal, or malicious Cyber activities Experience with translating complex technical cyber events into a narrative format for technical and executive audiences Experience with the technical capabilities and limitations of the internet and online technologies, including collaborative internet tools, such as social networking sites, blogs More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Lockheed Martin
Job Number 689178BR Description: Introduction to a Career-Defining Opportunity in Cybersecurity In an era where cyber threats evolve at lightning speed and the security landscape is constantly shifting, Lockheed Martin is committed to defending against these challenges and making a significant difference for our customers. As a leader … in the field, we are seeking a highly skilled and experienced Senior Manager of Classified CyberThreat Mitigation to join our team and play a critical role in shaping the future of cybersecurity for our organization. What you'll be doing: • Lead and manage the Classified Cyber … Strategize and implement technology best practices for risk mitigation associated with analysis of security operations center alerts and cases. • Engage with internal teams and cyber/technology industry partners to ensure threats from external actors are evaluated and mitigated where appropriate. • Collaborate with engineering and other teams to drive More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Jisc
annum negotiable depending on experience + fantastic benefits! Jisc grade: TCY3 (internal use only) Hours: 35 hours per week Contract: Permanent Reports into: Senior ThreatIntelligence Engineer Location: Hybrid - A blend of working from home and your nominated hub office. We have hubs in London, Bristol, Manchester, and … software, and networking solutions. About the team: The security team, part of Group CTO, protects UK Education and Research against a wide range of cyber security threats, supporting our members and customers in improving their digital resilience. We have recently launched our nationwide security operation centre (SOC), including a … education community. Your focus will be on managing and enhancing our SIEM (Security Information and Event Management), SOAR (Security Orchestration, Automation, and Response), and threatintelligence platforms. You will also collaborate with our threatintelligence teams to develop effective methods for integrating and automating our SIEM More ❯
Plymouth, Devon, South West, United Kingdom Hybrid / WFH Options
Inspire People
leadership for the Security Operations Centre team providing technical oversight and direction. You will engage with various teams across DDaT to maintain security monitoring, threatintelligence and vulnerability management controls to detect and alert across all HM Land Registry technical assets. Salary of £46,058 - £57,400 dependent … with the Technology and Business Strategies. Working closely with the Lead Infrastructure Engineers and subject matter experts, you will develop and maintain security monitoring, threatintelligence and vulnerability management controls, to detect and alert across all HMLR technical assets. You will work with technical teams to develop SOC … you have led technical investigations and developed response frameworks. You are proficient with Security Information and Event Management (SIEM) systems and adept at utilising CyberThreatIntelligence within this context. You have a strong capability to manage technical risks and lead the implementation of mitigations. Additionally, you More ❯
San Diego, California, United States Hybrid / WFH Options
Avidity Biosciences
is a key leadership role responsible for overseeing and enhancing Avidity's information security strategy, governance, risk, and compliance, with a strong emphasis on cyber operations and identity & access management (IAM). This role ensures that Avidity's security framework aligns with industry best practices, regulatory requirements (FDA, HIPAA … GxP), and business objectives. You will lead efforts in threat detection, incident response, identity and access management (IAM), and third-party risk management (TPRM), collaborating across IT, research, and compliance teams to protect Avidity's assets. This position requires a technical leader with hands-on experience in security operations … overseeing the department budget, and managing vendor relationships to ensure security policies and solutions are effectively implemented. This role will oversee cybersecurity engineers managing threat and vulnerability management, threatintelligence and hunting, insider threat, and the MSSP-managed Security Operations Center (SOC). The individual must More ❯
Falls Church, Virginia, United States Hybrid / WFH Options
Epsilon Inc
foster secure CI/CD development pipelines. Support the evaluation and deployment of security tools, including endpoint protection, intrusion detection/prevention systems, and threatintelligence platforms. Maintain awareness of the latest security trends, vulnerabilities, and threatintelligence to proactively protect the organization. Assist in developing … and awareness programs for technical and non-technical teams. Document all security-related activities and maintain detailed records for audit and compliance purposes. Enhance ThreatIntelligence Capabilities - Research emerging threats, analyze attack patterns, and integrate threatintelligence feeds to strengthen the organization's proactive security posture. More ❯
UK Government programme, supporting the Security Operations function. This is not a SOC role – instead, the position blends delivery management with some aspects of cyberthreatintelligence , security incident support , and security communications . The role is ideal for someone with strong delivery and task management experience … who thrives in fast-paced environments, and who can coordinate cross-functional workstreams. While cyber security experience is a plus, it’s not essential – the client is open to someone with the right delivery skills and the appetite to grow into the security space. You must have active SC … and delivery schedules Support day-to-day incident management and coordination of actions/responses Contribute to handling and triaging security threats and associated intelligence Create and manage security-related communications , reports, and status updates Use Agile and Scrum methodologies to manage delivery and team cadences Required Skills & Experience More ❯
london, south east england, united kingdom Hybrid / WFH Options
Eames Consulting
UK Government programme, supporting the Security Operations function. This is not a SOC role – instead, the position blends delivery management with some aspects of cyberthreatintelligence , security incident support , and security communications . The role is ideal for someone with strong delivery and task management experience … who thrives in fast-paced environments, and who can coordinate cross-functional workstreams. While cyber security experience is a plus, it’s not essential – the client is open to someone with the right delivery skills and the appetite to grow into the security space. You must have active SC … and delivery schedules Support day-to-day incident management and coordination of actions/responses Contribute to handling and triaging security threats and associated intelligence Create and manage security-related communications , reports, and status updates Use Agile and Scrum methodologies to manage delivery and team cadences Required Skills & Experience More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
further. Job Title: SOC Lead Location: Hybrid (3 days in office ) About the Role We are seeking a highly skilled SOC Lead to oversee cyber incident response, threatintelligence, and vulnerability management for a leading organization. This role will act as a trusted advisor to senior leadership … ensuring a structured and effective response to cyber incidents while driving improvements in incident management processes. Key Responsibilities Lead and coordinate responses to significant cyber incidents, ensuring effective and timely resolution. Act as a subject matter expert, advising senior leadership on business impacts and risk mitigation strategies. Develop … and implement cyber incident containment plans and remediation strategies. Oversee incident investigations, reporting, and documentation to drive continuous improvement. Collaborate with ThreatIntelligence and Incident Response teams to monitor and respond to emerging threats. Ensure effective vulnerability management, prioritizing risks and coordinating remediation efforts. Provide regular technical More ❯
an active responder as part of the Cybersecurity Incident Response Team during declared incidents Contribute to automation and orchestration playbooks to streamline detection engineering, threat hunting and incident response activities Participate in threat hunts to proactively identify threats in our corporate and market environments Regularly review current use … remove gaps in coverage Who You Are 5+ years of hands-on, in-depth knowledge and technical experience in security operations, including detection engineering, threat hunting, incident response, digital forensics, and/or threatintelligence Strong technical foundation and understanding of security concepts, solutions and technologies; experience … as MITRE ATT&CK and how to utilise them in the assessment of detection capabilities and coverage Skilled in identifying opportunities for developing new threat detection use cases based on security telemetry, environment baselining, actionable threatintelligence and Incident Response lessons learned Ability to identify gaps in More ❯
Reston, Virginia, United States Hybrid / WFH Options
Google, Inc
practical experience. 10 years of experience with Security Operations (SecOps) toolset including Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), ThreatIntelligence and Endpoint Detection and Response (EDR) tools. Experience engaging with, and presenting to, technical stakeholders and executive leaders. Ability to travel up … qualifications: Master's degree in Computer Science, Engineering, Mathematics, or a technical field. Certification in Cloud or Security Industry. Experience working in a defensive cyber operations or threatintelligence role. Knowledge of product and solution market trends in the cybersecurity industry (e.g., ransomware, attack frameworks, zero trust … also be familiar with technologies such as Security Operations (SecOps) toolset including Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), ThreatIntelligence and Endpoint Detection and Response (EDR) tools. You will present to customer and channel executives in business and technical management. Must be More ❯
Content - maintain the availability of the underlying infrastructure, develop new alerts, field parsers, models and automated playbooks, and integrate new log sources where appropriate. ThreatIntelligence & Threat Hunting - provide, develop and integrate external threatintelligence data into the team's detection capabilities; perform proactive threat … test the team's detection capabilities, develop scenario-based training, and organise purple team exercises, both in-house and with third-party providers. Insider Threat - maintain and develop the Data Loss Prevention policies in line with the company's data classification requirements, and implement exceptions for business-approved procedures … with vulnerability scanning and penetration testing tools and techniques. Qualifications: A university degree in one of the following fields is preferred (but not required): Cyber/Information Security, Digital Forensics, Ethical Hacking Computer Science, Software Development, Network Engineering Mathematics, Physics and other STEM subjects Other desirable certifications include : CISSP More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Lockheed Martin
hired, you'll receive a payment! code-extrefer Power BI Specialist - Clearance Required WHAT WE'RE DOING • Join Lockheed Martin Rotary and Mission Systems, Cyber & Intelligence, where we foster innovation and integrity. • As an Power BI Specialist, you'll be empowered to create "new realities" and pioneer solutions … of aerospace, defense, and security solutions. THE WORK TKO provides systems engineering, software development, data science and cloud development and engineering services to the Cyber Infrastructure Solutions customer. The services enable the Data Transformation, Malware Analysis, and CyberThreatIntelligence processing and sharing capabilities for the … customer, fulfilling mission objectives and offering actionable information to detect and mitigate cyber threats. The contract has several locations in Maryland and a small contingent in Texas. WHO WE ARE • Lockheed Martin is a global leader in aerospace, defense, and security solutions, committed to excellence and integrity. WHO YOU More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Lockheed Martin
you'll receive a payment! code-extrefer Senior Systems Network Administrator - Clearance Required WHAT WE'RE DOING • Join Lockheed Martin Rotary and Mission Systems, Cyber & Intelligence, where we foster innovation and integrity. • As a Senior Systems Network Administrator, you'll be empowered to create "new realities" and pioneer … of aerospace, defense, and security solutions. THE WORK TKO provides systems engineering, software development, data science and cloud development and engineering services to the Cyber Infrastructure Solutions customer. The services enable the Data Transformation, Malware Analysis, and CyberThreatIntelligence processing and sharing capabilities for the … customer, fulfilling mission objectives and offering actionable information to detect and mitigate cyber threats. The contract has several locations in Maryland and a small contingent in Texas. WHO WE ARE • Lockheed Martin is a global leader in aerospace, defense, and security solutions, committed to excellence and integrity. WHO YOU More ❯
Immingham, Lincolnshire, North East, United Kingdom Hybrid / WFH Options
Rullion Limited
Cyber Risk Management Lead Location: Immingham or London Contract Type: Permanent Salary: £70,000 - £75,000 About the Role An established power generation company is seeking a Cyber Risk Management Lead to enhance and oversee its cyber risk management framework across Operational Technology (OT) and Information Technology … role can be based in Immingham or London , with travel to other sites as required ( 3 days in the office ). Key Responsibilities Lead cyber risk assessment activities across IT and OT environments, correlating outputs into strategic risk tracking. Manage the cyber security risk toolkit , including threat modelling, attack trees, and scenario-based exercises. Develop and implement cyber security policies, processes, and staff training aligned with Secure by Design principles. Oversee first-line security operations , including outsourced 24/7 SOC management . Define and manage cyberthreatintelligence requirements . Provide More ❯
Reston, Virginia, United States Hybrid / WFH Options
Google, Inc
or equivalent practical experience. 6 years of experience assessing and developing cybersecurity solutions and programs across security domains. 6 years of experience in delivering cyber outcomes, identifying mission risks, and devising solutions. Ability to travel up to 30%. Active Top Secret/Sensitive Compartmented Information security clearance (TS … the platform, and long-term operational use of the solution. You will be working in large-scale and fast-moving operational environments focusing on cyber defense. Must be a US Citizen to meet customer and compliance requirements, including potential access to classified information. This position requires onsite client-facing … work 5 days a week in Fort Meade, Maryland. Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threatintelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique More ❯
Cheltenham, Gloucestershire, United Kingdom Hybrid / WFH Options
Accenture
and latest tech so they can help our clients build resilience as we create integrated, customized turnkey solutions. We blend risk strategy, digital identity, cyber defense, application security and managed service solutions to rethink the entire security lifecycle. The Accenture Security practice is a unique group of people passionate … service. This role is responsible to drive the day-to-day delivery in defence of corporate networks from advanced and targeted attacks by providing threat monitoring and cyber defence services as the service owner. The Technical Delivery Associate Manager will work with the SOC Operations team with a … focus on threat identification, incident response, cyberthreatintelligence infusion, and mitigations-to ensure defensive resiliency. This is a new project within the existing team and will require the candidate to own the service management across internal and external stakeholders, support a team of 5 analysts More ❯
Gosport, Hampshire, South East, United Kingdom Hybrid / WFH Options
Walsh Employment
and a generous flexible benefits fund Key Requirements We are seeking an experienced Senior SOC Analyst who brings a strong background in security operations , threat detection, and incident response. This is a critical role that supports the defence of national infrastructure through proactive monitoring, analysis, and improvement of cybersecurity … such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threatintelligence analysis Familiarity with Mitre Att&ck framework and advanced threat detection techniques Excellent analytical and problem-solving capabilities Able to provide … using advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with colleagues to enhance the overall capability and resilience of the Security Operations Centre Staying abreast of cyberMore ❯
Gosport, Hampshire, South East, United Kingdom Hybrid / WFH Options
Walsh Employment
generous flexible benefits fund Key Requirements We are seeking an experienced Senior Security Operations Centre Analyst who brings a strong background in security operations , threat detection, and incident response. This is a critical role that supports the defence of national infrastructure through proactive monitoring, analysis, and improvement of cybersecurity … such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threatintelligence analysis Familiarity with Mitre Att&ck framework and advanced threat detection techniques Excellent analytical and problem-solving capabilities Able to provide … using advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with colleagues to enhance the overall capability and resilience of the Security Operations Centre Staying abreast of cyberMore ❯