Role: ThreatIntelligence Specialist Location: Reading, UK Inside IR35 Contract Position The Role: As part of the Global Security ThreatIntelligence Specialist & Vulnerability Management team the Cyber ThreatIntelligence team collect, process and analyze data to produce information an organization can use to understand the threats that have, will, or are currently targeting our … organization. ThreatIntelligence Specialist also provides expertise in supporting the resolution of advanced or complex security threats against the company as well as advising on best practice countermeasures and detection's. The ThreatIntelligence Specialist Analyst role will strengthen the ThreatIntelligence program by collecting, processing, analysing and disseminating actionable intelligence. Your responsibilities: Collection … of information to address the most important intelligence requirements. Analysis of information into intelligence that allows partners to make informed decisions Creation and sharing of threatintelligence focusing on these key areas: o Incident Response o Security Operations o Vulnerability Management o Customer Internet Security o Security Leadership o Fraud Prevention Capture feedback from the main More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Hamilton Barnes
Cyber ThreatIntelligence Specialist - Hybrid in Reading - Inside IR35 We are seeking a Cyber ThreatIntelligence Specialist to join our Global Security team on a 6 month contract. You will collect, analyse, and deliver actionable intelligence to support incident response, security operations, and vulnerability management, helping the business stay ahead of evolving threats. Key Responsibilities … Collect, analyse, and disseminate actionable intelligence to address key requirements across incident response, security operations, vulnerability management, and fraud prevention. Lead the initial analysis of intelligence correlations, proactively identifying both external and insider threats, including through dark web and OSINT investigations. Manage and enhance the use of a threatintelligence platform to structure and standardise data … from diverse sources, creating clear, impactful reporting for stakeholders. Build partnerships with government and industry security teams, representing the organisation in external meetings and conferences to strengthen intelligence sharing capabilities. What You Will Ideally Bring: Background in technical investigations, OSINT, deep/dark web operations, and account takeover prevention. Minimum of 5 years' security experience with exposure to ThreatMore ❯
Job summary As a Security Officer, you will rotate around the CSOC into 4 main areas: Protective Monitoring, Incident Management, ThreatIntelligence and Threat Hunting. As part of Protective Monitoring, you will join the analyst pool team responsible for triaging cyber alerts ranging from identity & access alerts, networking alerts and XDR. Within Threat Hunting, you will … conduct daily hunting investigations using prewritten queries across a range of multi-tenant hunting platforms, including but not limited to M365D XDR, Microsoft Sentinel and Splunk. The ThreatIntelligence team perform the collection, aggregation, analysis and contextualisation of healthcare and security information to produce actionable cyber threat intelligence. The Incident Management team provide end-to-end management … role. Main duties of the job The main duties you would be involved with are as follows: Work within the Cyber Security Operations Centre (CSOC) with exposure to the ThreatIntelligence, Threat Hunting, Protective Monitoring or Incident Management teams. Work as part of the Protective Monitoring team to investigate detections of potential Cyber Security incidents and to More ❯
Role Title: ThreatIntelligence Business Analyst (Financial Services) Start Date: September End Date: 31st Mar 2026 Rate: £(Apply online only) per day Location: South of Manchester - x3 days onsite per week ***Candidate MUST be a ThreatIntelligence specialist - not a generalist BA*** Or submission will not be considered. The ThreatIntelligence Business Analyst plays … a critical role in identifying and translating business problems and intelligence requirements into actionable solutions that support the strategic objectives of the Chief Security Office (CSO). The analyst acts as a bridge between business stakeholders, intelligence analysts, and technical teams, ensuring that solutions are viable, scalable, and embedded effectively across the organisation. Key Accountabilities Identify and analyse … business problems and intelligence requirements that require change or enhancement Collaborate with stakeholders to obtain, document, and validate business requirements for DataWalk Identify and assess the potential impact of proposed deliverables for example, improving existing processes and/or providing new intelligence capabilities. Translate stakeholder needs into structured deliverables that guide solution design and implementation Support feasibility assessments More ❯
ThreatIntelligence Specialist - Reading | 6-Month Contract | £470/day Inside IR35 We are seeking a ThreatIntelligence Specialist to join a global security team in Reading on a contract basis. This hybrid role (4 days on-site) focuses on strengthening cyber resilience through intelligence collection, analysis, and actionable insights. Key Responsibilities: Collect, process, and … analyse data to identify threats and vulnerabilities. Deliver actionable intelligence to support incident response, security operations, and fraud prevention. Conduct OSINT and dark web investigations. Develop and share threat reports, identifying trends and behaviours. Collaborate with government, industry, and security partners to exchange intelligence. Your Profile: 2+ years' experience in cyber threatintelligence or incident response. … Strong analytical and technical investigation skills. Background in OSINT, dark web monitoring, and threat life cycle methodology. Excellent written and verbal communication skills. Eligibility: Must be PAYE via Umbrella. More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
ThreatIntelligence Specialist - Reading | 6-Month Contract | £470/day Inside IR35 We are seeking a ThreatIntelligence Specialist to join a global security team in Reading on a contract basis. This hybrid role (4 days on-site) focuses on strengthening cyber resilience through intelligence collection, analysis, and actionable insights. Key Responsibilities: Collect, process, and … analyse data to identify threats and vulnerabilities. Deliver actionable intelligence to support incident response, security operations, and fraud prevention. Conduct OSINT and dark web investigations. Develop and share threat reports, identifying trends and behaviours. Collaborate with government, industry, and security partners to exchange intelligence. Your Profile: 2+ years' experience in cyber threatintelligence or incident response. … Strong analytical and technical investigation skills. Background in OSINT, dark web monitoring, and threat lifecycle methodology. Excellent written and verbal communication skills. Eligibility: Must be PAYE via Umbrella. More ❯
Role Title: ThreatIntelligence Business Analyst Start Date: ASAP End Date: 31st Mar 2026 Rate: £400 Location: 3 days on site in Manchester The ThreatIntelligence Business Analyst plays a critical role in identifying and translating business problems and intelligence requirements into actionable solutions that support the strategic objectives of the Chief Security Office (CSO … supports the development and delivery of capabilities within the DataWalk platform by gathering requirements, shaping operational designs, and ensuring stakeholder alignment. Key Accountabilities Identify and analyse business problems and intelligence requirements that require change or enhancement Collaborate with stakeholders to obtain, document, and validate business requirements for DataWalk Identify and assess the potential impact of proposed deliverables for example … improving existing processes and/or providing new intelligence capabilities. Translate stakeholder needs into structured deliverables that guide solution design and implementation Support feasibility assessments and contribute to business cases that justify investment in proposed solutions Ensure proposed solutions are aligned with operational design and process expectations Monitor project progress and support reporting to ensure timely and budget-conscious More ❯
Tasking Coordinator - Cyber ThreatIntelligence Contract | Inside IR35 | London We're seeking a proactive Tasking Coordinator to support a government client in coordinating responses to cyber threats across departments. This isn't a traditional SOC role - it's about enabling defenders to act as one and sharing intelligence that drives action. Key Responsibilities: Triage and escalate reports … as part of the Watch Officer rota. Support incident response during high-alert periods. Monitor and assess emerging cyber threats. Share actionable threatintelligence via reports and briefings. Manage tooling (e.g. malware sandboxes, TIPs) and collaborate across teams. Represent the organisation in wider cyber intelligence communities. What You'll Bring: Cyber security experience, ideally in a SOC … or threatintelligence setting. Strong IT foundations and stakeholder engagement skills. Clear, concise communication - written and verbal. Familiarity with adversary TTPs and threatintelligence platforms. If you're a hands-on operator who thrives in fast-paced environments and enjoys working across teams, apply now to make an impact. Carbon60, Lorien & SRG - The Impellam Group STEM More ❯
directorate consists of 4 operational areas: Cyber Security Operations Unit (CSOU) Cyber Delivery Unit (CDU). Cyber Improvement Programme. Chief Information Security Office Function (CISO) The Cyber Security Lead - Threat Hunting will be responsible for leading a dedicated threat hunting team and the outputs from function within the Cyber Security Operations Centre (CSOC). The Threat Hunting … per annum.Please be aware that RRP is non contractual and subject to review. Main duties of the job The Post Holder will: Act as the specialist for the threat hunting team and act as an escalation point for all threat hunting activities in the topic. Generate reports for technical and non-technical stakeholders, creating documentation or detailed reports … subjects to board level/senior management. Act as a technical specialist in advanced forensic investigations in support of Security Operations function. Responsible for the management and delivery of threat use cases and content, Ideation, production of bespoke detections to identify malicious activity across NHS tooling and telemetry. Prioritise workload and hunts carried out by the team. Interface and More ❯
Guildford, Surrey, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
ISO 27001, and other security standards. Risk Management: Maintain risk frameworks and produce assurance documentation. Secure by Design: Partner with project teams to integrate security requirements early in development. ThreatIntelligence: Research emerging threats and mitigation strategies. Testing & Audits: Oversee penetration tests and security audits. Policy Development: Keep security policies and staff training programs up to date. Requirements More ❯
using Splunk, including data onboarding, creating correlation rules, and developing dashboards and reports to improve security visibility. Develop and maintain detection use cases, alerts, and response playbooks based on threatintelligence and compliance requirements. Monitor, tune, and optimise Splunk performance to ensure availability, scalability, and accuracy of security event logging and analysis. Work closely with SOC analysts, incident … response, and threat hunting teams to enhance threat detection, investigation capabilities, and response effectiveness. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Crone Corkill
an ad-hoc basis until the move has been completed Maintain Nessus vulnerability management, update systems, run scans and provide reports Cover email security using Mimecast Enterprise Real world threat modelling and incident response (mainly L3/L4 when required) Make suggestions and influence various areas of the business/group from a security perspective Automate tasks and processes … ideal) Microsoft Defender for EDR/XDR/MDR Nessus for vulnerability management Mimecast for email security SCCM/Intune for patch management L3/L4 Incident Response experience ThreatIntelligence/modelling experience Automating tasks using PowerShell, Python etc What’s in it for you? In return you’ll be joining a well established organisation at an More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Lorien
This role would be based on a hybrid working basis in Central London Experience Experience of working in Cyber Security, ideally within SOC Excellent stakeholder management skills Experience with threatintelligence platforms Active SC clearance would be required If you are an SC cleared Cyber Security Analyst looking for a new role, please apply now! Carbon60, Lorien & SRG More ❯
Welwyn Garden City, Hertfordshire, United Kingdom Hybrid / WFH Options
Pontoon
What We're Looking For: To thrive in this role, you should possess the following technical skills and experience: Cyber Security Tools : Hands-on experience with SOAR platforms and ThreatIntelligence Platforms. Programming Expertise : Proficiency in Python script with a solid experience of REST APIs to develop and interact with them effectively. Framework Knowledge : Familiarity with the MITRE … ATT&CK framework or equivalent, including knowledge of emerging threat actor tactics, techniques, and procedures. Operating Systems : Experience and working knowledge of both Linux and Windows platforms. Public Cloud Experience: Familiarity with working in public cloud environments is a plus! Adecco is a disability-confident employer. It is important to us that we run an inclusive and accessible recruitment More ❯