Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Pertemps
As a Senior Cyber ThreatIntelligence Analyst , you will play a key role in protecting Thames Water's digital infrastructure by researching, analysing, and communicating the latest cyber threats facing the organisation. You'll evaluate global risks, provide actionable intelligence to stakeholders, and support the development of … a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threatintelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threatintelligence … to address evolving cyber threats while contributing to the organisation's long-term security maturity. What you'll be doing as a Senior Cyber ThreatIntelligence Analyst: Cyber Threat Assessment: Support and lead cyber threat assessments and provide recommendations to technical, managerial, and executive stakeholders. Incident More ❯
We are seeking a Threat Analyst to join our rapidly growing Information Security team. This is a unique opportunity for an aspiring and motivated professional to be at the forefront of our cyber defence strategy, protecting our brand from existing and emerging threats. You will combine the expertise of … a Threat Hunter and Cyber ThreatIntelligence Analyst, and will work alongside our Senior Threat Analyst to build our threatintelligence and hunting capabilities from the ground up. You'll have a major input on what new tooling and services we use and the … Seize the opportunity to join a dynamic security team, reporting to the Head of Cyber Defence, and lead the development of advanced CTI and threat hunting strategies, seamlessly integrating into our security processes and driving continuous improvements. What you'll be doing In this role, your key responsibilities will More ❯
Alexandria, Virginia, United States Hybrid / WFH Options
Agile Defense, Inc
and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests. Requisition Job Title: Cyber ThreatIntelligence Analyst IV Exempt Location: Hybrid 2x week onsite - 600 Dulany Street Alexandria, Virginia 22314 Clearance Level: Active DoD - Top Secret Required Certification … s): • N/A SUMMARY The United States Patent and Trademark Office (USPTO), Cybersecurity Division, has a requirement to support a Cyber ThreatIntelligence (CTI) capability within USPTO. This support includes monitoring activities, developing cyber threat analysis, identifying mitigation and remediation courses of action, sharing actionable cyber … threatintelligence used in organizational IT asset protection, trending strategic cyber threats and situational awareness. A successful candidate will enable our government operational counterparts to promote the rapid analysis of national level cyber threats and incidents. The hours for the position are Monday through Friday core hours but More ❯
Tactical Cyber ThreatIntelligence Analyst (Analyst I) About the role Location: Office (London) or Home based Duration: Permanent, Full time The primary role of the Tactical Cyber ThreatIntelligence Analyst is to support the production of accurate, high quality and timely intelligence products. This will … include support to management, peers and members of staff and clients, both in-house and clients. Tactical Cyber ThreatIntelligence Analysts will: Create Open Source summaries concerning cyber threat incidents Create and update threat actor profiles detailing salient information about cyber threat actors. Assist in … strategic reporting concerning technical themes of interest (malware, IOCs, actor TTPs/campaigns and other developments which have the potential to impact the cyber threat landscape). Respond to Requests for Intelligence (RFIs) from clients. Contribute to other tasks, including (but not limited to) marketing, client engagement, relationship More ❯
first-class service which is safe and secure. To support this, our Security Operations team is currently looking for an ambitious and experienced Cyber ThreatIntelligence professional. You'll excel when working in fast paced environments where you are responsible for maintaining high standards of operational output. You … ll also be an advocate of threatintelligence and be passionate about it having a positive impact on operations, driving the development of our CTI function to effectively meet business demand. You'll take ownership for the production and dissemination of high quality intelligence products to meet … customer requirements, alongside supporting the Security Operations team in Cyber Incident Response. Working within our Cyber Security function, the Cyber ThreatIntelligence (CTI) Consultant role will be a major part of day-to-day collection, analysis, and dissemination of threatintelligence across the organisation. This role More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
WeAreTechWomen
first-class service which is safe and secure. To support this, our Security Operations team is currently looking for an ambitious and experienced Cyber ThreatIntelligence professional. You'll excel when working in fast paced environments where you are responsible for maintaining high standards of operational output. You … ll also be an advocate of threatintelligence and be passionate about it having a positive impact on operations, driving the development of our CTI function to effectively meet business demand. You'll take ownership for the production and dissemination of high quality intelligence products to meet … customer requirements, alongside supporting the Security Operations team in Cyber Incident Response. Working within our Cyber Security function, the Cyber ThreatIntelligence (CTI) Consultant role will be a major part of day-to-day collection, analysis, and dissemination of threatintelligence across the organisation. This role More ❯
flexible/hybrid working) Salary: £50,000 - £65,000 Exciting opportunity to join a leading global Insurtech organisation as a key member of the ThreatIntelligence and Proactive Services capabilities. This role sits within the Cyber Insights & Analytics function, part of the Cyber Underwriting division, supporting cyber underwriting … the cyber underwriters to deliver the proactive cybersecurity services, engage with internal and external stakeholders, and help insureds and stakeholders navigate the evolving cyber threat landscape. Responsibilities will include: Deliver Cybersecurity Services: You will help deliver our proactive services such as cyber tabletop exercises, security awareness and training sessions … development of cyber policies and procedures, and threat report briefings. ThreatIntelligence Reporting: You will transform complex threatintelligence data into actionable insights by crafting detailed, quarterly reports that spotlight industry trends and emerging risks. Your analysis will empower policyholders with the knowledge they need More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
Cyber ThreatIntelligence Analyst Location: Huntsville, AL Work Type: Onsite Remote Work: No Job Description Work as a member of a threatintelligence team responsible for understanding how emerging cyber threats impact the client organization while conducting highly detail-oriented security threat analysis and working … strategies and remediation guidance. Form accurate and precise analysis and escalate it to appropriate teammates or internal teams for additional assistance or review. Provide intelligence context to support the fine-tuning of signatures. Qualifications 8+ years of experience with cybersecurity 4+ years of experience with conducting threat research … and microblogs, and internet mapping tools Experience with computer network protocols and operations Knowledge of Cyber intrusion vectors, malware, networking, and monitoring Knowledge of threatintelligence tradecraft, including structured analytic, contrarian, and imaginative analytic techniques Ability to write concise analytical products and assessments Top Secret clearance Bachelor's More ❯
Head of Vulnerability and ThreatIntelligence Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey … in our attractions. The Head of Vulnerability and ThreatIntelligence is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerability management programme, conducting … threat assessments, and coordinating remediation efforts. The role involves close collaboration with IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead ThreatIntelligence and Threat Modelling. Oversee More ❯
london, south east england, united kingdom Hybrid / WFH Options
Merlin Entertainments
Head of Vulnerability and ThreatIntelligence Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey … in our attractions. The Head of Vulnerability and ThreatIntelligence is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerability management programme, conducting … threat assessments, and coordinating remediation efforts. The role involves close collaboration with IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead ThreatIntelligence and Threat Modelling. Oversee More ❯
San Diego, California, United States Hybrid / WFH Options
Avidity Biosciences
ensures that Avidity's security framework aligns with industry best practices, regulatory requirements (FDA, HIPAA, GxP), and business objectives. You will lead efforts in threat detection, incident response, identity and access management (IAM), and third-party risk management (TPRM), collaborating across IT, research, and compliance teams to protect Avidity … overseeing the department budget, and managing vendor relationships to ensure security policies and solutions are effectively implemented. This role will oversee cybersecurity engineers managing threat and vulnerability management, threatintelligence and hunting, insider threat, and the MSSP-managed Security Operations Center (SOC). The individual must … cybersecurity policies, ensuring alignment with FDA, HIPAA, and GxP compliance while also driving cybersecurity maturity improvements to support IT infrastructure and commercial readiness. Lead threatintelligence, risk assessment, and security monitoring initiatives to detect and mitigate risks that impact infrastructure, IT, and business operations. Oversee Security Operations Center More ❯
Falls Church, Virginia, United States Hybrid / WFH Options
Epsilon Inc
foster secure CI/CD development pipelines. Support the evaluation and deployment of security tools, including endpoint protection, intrusion detection/prevention systems, and threatintelligence platforms. Maintain awareness of the latest security trends, vulnerabilities, and threatintelligence to proactively protect the organization. Assist in developing … and awareness programs for technical and non-technical teams. Document all security-related activities and maintain detailed records for audit and compliance purposes. Enhance ThreatIntelligence Capabilities - Research emerging threats, analyze attack patterns, and integrate threatintelligence feeds to strengthen the organization's proactive security posture. More ❯
Plymouth, Devon, South West, United Kingdom Hybrid / WFH Options
Inspire People
leadership for the Security Operations Centre team providing technical oversight and direction. You will engage with various teams across DDaT to maintain security monitoring, threatintelligence and vulnerability management controls to detect and alert across all HM Land Registry technical assets. Salary of £46,058 - £57,400 dependent … with the Technology and Business Strategies. Working closely with the Lead Infrastructure Engineers and subject matter experts, you will develop and maintain security monitoring, threatintelligence and vulnerability management controls, to detect and alert across all HMLR technical assets. You will work with technical teams to develop SOC … have led technical investigations and developed response frameworks. You are proficient with Security Information and Event Management (SIEM) systems and adept at utilising Cyber ThreatIntelligence within this context. You have a strong capability to manage technical risks and lead the implementation of mitigations. Additionally, you are experienced More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Lockheed Martin
significant difference for our customers. As a leader in the field, we are seeking a highly skilled and experienced Senior Manager of Classified Cyber Threat Mitigation to join our team and play a critical role in shaping the future of cybersecurity for our organization. What you'll be doing … analysis efficiency, containment, and remediation activities. • Establishing SOC performance goals and priorities. • Serve as the technical advisor for the Senior Director. • Conduct thorough cyber threat assessments in conjunction with other business functions related to supply chain, software, and hardware, providing actionable insights to key stakeholders for our classified environments. … Collaborate with cross-functional teams (e.g. CIS, SOCI, etc.) to integrate threatintelligence into business processes and risk management strategies for our classified environments. • Develop and implement threat hunting strategies and incident response plans to proactively identify and mitigate threats for our classified environments. • Oversee the investigation More ❯
an active responder as part of the Cybersecurity Incident Response Team during declared incidents Contribute to automation and orchestration playbooks to streamline detection engineering, threat hunting and incident response activities Participate in threat hunts to proactively identify threats in our corporate and market environments Regularly review current use … remove gaps in coverage Who You Are 5+ years of hands-on, in-depth knowledge and technical experience in security operations, including detection engineering, threat hunting, incident response, digital forensics, and/or threatintelligence Strong technical foundation and understanding of security concepts, solutions and technologies; experience … as MITRE ATT&CK and how to utilise them in the assessment of detection capabilities and coverage Skilled in identifying opportunities for developing new threat detection use cases based on security telemetry, environment baselining, actionable threatintelligence and Incident Response lessons learned Ability to identify gaps in More ❯
Content - maintain the availability of the underlying infrastructure, develop new alerts, field parsers, models and automated playbooks, and integrate new log sources where appropriate. ThreatIntelligence & Threat Hunting - provide, develop and integrate external threatintelligence data into the team's detection capabilities; perform proactive threat … test the team's detection capabilities, develop scenario-based training, and organise purple team exercises, both in-house and with third-party providers. Insider Threat - maintain and develop the Data Loss Prevention policies in line with the company's data classification requirements, and implement exceptions for business-approved procedures More ❯
Reston, Virginia, United States Hybrid / WFH Options
Google, Inc
practical experience. 10 years of experience with Security Operations (SecOps) toolset including Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), ThreatIntelligence and Endpoint Detection and Response (EDR) tools. Experience engaging with, and presenting to, technical stakeholders and executive leaders. Ability to travel up … degree in Computer Science, Engineering, Mathematics, or a technical field. Certification in Cloud or Security Industry. Experience working in a defensive cyber operations or threatintelligence role. Knowledge of product and solution market trends in the cybersecurity industry (e.g., ransomware, attack frameworks, zero trust, etc.). Active US … also be familiar with technologies such as Security Operations (SecOps) toolset including Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), ThreatIntelligence and Endpoint Detection and Response (EDR) tools. You will present to customer and channel executives in business and technical management. Must be More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
SOC Lead Location: Hybrid (3 days in office ) About the Role We are seeking a highly skilled SOC Lead to oversee cyber incident response, threatintelligence, and vulnerability management for a leading organization. This role will act as a trusted advisor to senior leadership, ensuring a structured and … mitigation strategies. Develop and implement cyber incident containment plans and remediation strategies. Oversee incident investigations, reporting, and documentation to drive continuous improvement. Collaborate with ThreatIntelligence and Incident Response teams to monitor and respond to emerging threats. Ensure effective vulnerability management, prioritizing risks and coordinating remediation efforts. Provide … attack techniques and security threats. Experience with SIEM architecture, XDR, and incident response tooling. Strong knowledge of vulnerability management processes and tools. Proficiency in threatintelligence analysis and its integration into response strategies. Ability to manage multiple high-priority incidents in a fast-paced environment. Certifications such as More ❯
Reston, Virginia, United States Hybrid / WFH Options
Google, Inc
client-facing work 5 days a week in Fort Meade, Maryland. Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threatintelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our … unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threatintelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone. The US base salary range for this More ❯
Government programme, supporting the Security Operations function. This is not a SOC role – instead, the position blends delivery management with some aspects of cyber threatintelligence , security incident support , and security communications . The role is ideal for someone with strong delivery and task management experience, who thrives … and delivery schedules Support day-to-day incident management and coordination of actions/responses Contribute to handling and triaging security threats and associated intelligence Create and manage security-related communications , reports, and status updates Use Agile and Scrum methodologies to manage delivery and team cadences Required Skills & Experience … oversight Demonstrable experience in task management , prioritisation, and stakeholder engagement Comfortable working in Agile/Scrum team Desirable Skills (not essential): Exposure to cyber threatintelligence or incident response processes Awareness of government security protocols and standards Experience working within or supporting security operations functions More ❯
london, south east england, united kingdom Hybrid / WFH Options
Eames Consulting
Government programme, supporting the Security Operations function. This is not a SOC role – instead, the position blends delivery management with some aspects of cyber threatintelligence , security incident support , and security communications . The role is ideal for someone with strong delivery and task management experience, who thrives … and delivery schedules Support day-to-day incident management and coordination of actions/responses Contribute to handling and triaging security threats and associated intelligence Create and manage security-related communications , reports, and status updates Use Agile and Scrum methodologies to manage delivery and team cadences Required Skills & Experience … oversight Demonstrable experience in task management , prioritisation, and stakeholder engagement Comfortable working in Agile/Scrum team Desirable Skills (not essential): Exposure to cyber threatintelligence or incident response processes Awareness of government security protocols and standards Experience working within or supporting security operations functions More ❯
Quantico, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
is seeking an All-Source Analyst (Cyber Systems). Responsibilities Conduct all-source analysis to evaluate foreign military systems and technologies. Conduct research, create intelligence products, create intelligence estimate assessments, and conduct intelligence briefings on request based on MCIA's Program of Analysis (POA) and customer-driven … requests for information (RFIs). Collect, analyze, interpret, evaluate and research using tools, techniques, methodology and software. Produce and deliver written intelligence assessments and briefings to support consumers at the tactical, operational, and strategic level as assigned. Written products will meet Intelligence Community Standards (e.g., ICD … sources to assess the relevance and significance of developments in his/her assigned subject matter and geographic area(s). Identify and assess intelligence gaps, recommend and submit collection requirements to fill gaps. Develops collection strategies and composes collection requirements. Correlate technically derived data using multiple intelligenceMore ❯
Herndon, Virginia, United States Hybrid / WFH Options
Optiv+ClearShark
and business colleagues to ensure proper security controls are included in new solutions. Research and evaluate the impact of new vulnerabilities, security alerts and threatintelligence bulletins. Participate in threat hunting and incident response events. Lead third-party risk management tasks such as conducting risk assessments for More ❯
Glasgow, Renfrewshire, United Kingdom Hybrid / WFH Options
Cisco Systems, Inc
Area of Interest Job Type Professional AI or Artificial Intelligence Job Id Who we are: The Cisco Talos Security Intelligence and Research Group is at the forefront of detecting and correlating threats in real-time, using the world's largest threat detection network. We collaborate extensively across … Cisco's security ecosystem, driving innovation in threat detection technologies to safeguard the Internet from known and emerging cybersecurity threats. Who you are: We are seeking a Machine Learning Engineer to join our growing team. If you have a passion for stopping bad actors and excel in working with … and ideas, and define and implement a plan to make them real. Analyze large datasets to extract complex data patterns. Monitor changes in the threat landscape via automation and visualization techniques and develop models to identify new threats. You will have the opportunity to build or enhance machine-learning More ❯
Gosport, Hampshire, South East, United Kingdom Hybrid / WFH Options
Walsh Employment
and a generous flexible benefits fund Key Requirements We are seeking an experienced Senior SOC Analyst who brings a strong background in security operations , threat detection, and incident response. This is a critical role that supports the defence of national infrastructure through proactive monitoring, analysis, and improvement of cybersecurity … such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threatintelligence analysis Familiarity with Mitre Att&ck framework and advanced threat detection techniques Excellent analytical and problem-solving capabilities Able to provide … using advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with colleagues to enhance the overall capability and resilience of the Security Operations Centre Staying abreast of cyber More ❯