City of London, London, United Kingdom Hybrid / WFH Options
Vanquish Technologies Limited
through implementation and ongoing support, our commitment is to provide clients with the assurance that they are valued by a company that is both attentive and impactful. Role Title: ThreatIntelligence Analyst Reporting Line Manager: Head of ThreatIntelligence Onsite Requirements (e.g. number of days per week onsite): 5 days Hybrid/Remote Working Policy: onsite … months Extension likelihood: Yes Maximum Daily Rate or Budget Range: 500 IR35 Status (inside/Outside/To Be Determined) Inside Experience Requirements Technology & Vendor Skillsets Required: Familiarity with threatintelligence platforms (TIPs), SIEMs, and threat data enrichment tools. Experience using Breach and Attack Simulation (BAS) platforms to build and validate threat scenarios. Strong understanding of … adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modeling. Hands-on experience with penetration testing tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera. Experience producing threat reports and briefings. Certifications Required or Preferred: Years of relevant experience: 8+ years of experience in threatintelligence, cybersecurity operations, or penetration testing. More ❯
operational areas: Cyber Security Operations Unit (CSOU) - SIO Cyber Delivery Unit (CDU). Cyber Improvement Programme. Chief Information Security Office Function (CISO) The role sits within the CSOCs ThreatIntelligence team within NHS England CSOC comprised of four primary functions: Intelligence Collection & Analysis - Perform collection, aggregation, analysis and contextualisation of healthcare and security information to produce actionable … CTI. Cybersecurity Threat & Risk Assessment - Perform high-level risk assessments of current and emerging threats to the health & social care estate. Intelligence Dissemination & Reporting - Produce stakeholder-specific intelligence reporting for stakeholders. Specialist CTI Support - Provides specialist CTI support to CSOC during high complexity incidents. Main duties of the job The Cyber Security Threatintelligence Analyst … represents acts as a threatintelligence specialist within the CSOC aimed at analysing and identify potential security threats facing NHS England as identified by the CSOCs threatintelligence collection and analyses capabilities. You will be a threatintelligence analyst reporting to the threatintelligence senior analyst your core responsibilities will be to More ❯
ThreatIntelligence AnalystFully Onsite in London Inside IR35 Contract Deerfoot Recruitment has been engaged to identify an experienced ThreatIntelligence Analyst for a leading global banking organisation with an advanced cyber defence function in London. This is a fantastic opportunity to shape threatintelligence, work alongside Red/Blue Teams, and operationalise intelligence using the latest cybersecurity, penetration testing, and Breach & Attack Simulation (BAS) platforms. Key Responsibilities: Monitor and analyse global cyber threat landscapes, identifying threats, adversary tactics, and emerging risks Collaborate with Red Team, Blue Team, and Penetration Testing specialists to integrate intelligence into Breach & Attack Simulation (BAS) scenarios Act as a point of contact between threatintelligence, Red/Blue, and SOC teams to align threat modelling and adversary simulation Support threat hunting activities and provide tactical, contextual intelligence to stakeholders Model and assess threat actors, including motivations, capabilities, attack vectors, and impacts Leverage the MITRE ATT&CK framework for mapping adversary behaviours and detection Develop and update threat profiles, attack More ❯
ThreatIntelligence Analyst Fully Onsite in London Inside IR35 Contract Deerfoot Recruitment has been engaged to identify an experienced ThreatIntelligence Analyst for a leading global banking organisation with an advanced cyber defence function in London. This is a fantastic opportunity to shape threatintelligence, work alongside Red/Blue Teams, and operationalise intelligence using the latest cybersecurity, penetration testing, and Breach & Attack Simulation (BAS) platforms. Key Responsibilities: Monitor and analyse global cyber threat landscapes, identifying threats, adversary tactics, and emerging risks Collaborate with Red Team, Blue Team, and Penetration Testing specialists to integrate intelligence into Breach & Attack Simulation (BAS) scenarios Act as a point of contact between threatintelligence, Red/Blue, and SOC teams to align threat modelling and adversary simulation Support threat hunting activities and provide tactical, contextual intelligence to stakeholders Model and assess threat actors, including motivations, capabilities, attack vectors, and impacts Leverage the MITRE ATT&CK framework for mapping adversary behaviours and detection Develop and update threat profiles, attack More ❯
ThreatIntelligence Project ManagerBanking - CybersecurityFully Onsite in London Inside IR35 Contract Deerfoot Recruitment has been engaged to find a contract Cybersecurity Project Manager to help shape and deliver cyber threatintelligence initiatives for a global financial institution's ThreatIntelligence Centre. This is an exciting opportunity to drive international projects, support executive-level decision … making, and collaborate with high-performing cybersecurity teams across multiple regions. Key Responsibilities Lead and manage end-to-end projects within a global ThreatIntelligence Centre, aligning activities with strategic cybersecurity objectives. Develop and monitor project plans, timelines, budgets, and resource allocation. Coordinate with global stakeholders in EMEA, Americas, APAC, Japan, and India to align requirements and ensure … drive cost optimisation and meet strategic goals. Facilitate recurring international meetings by setting agendas, tracking actions, managing time zone/holiday scheduling, and maximising participation. Drive the standardisation of threatintelligence processes, governance, and tooling. Prepare and deliver high-quality executive reports and presentations. Ensure alignment with compliance, risk, and regulatory requirements across multiple jurisdictions. Track progress, identify More ❯
ThreatIntelligence Project Manager Banking - Cybersecurity Fully Onsite in London Inside IR35 Contract Deerfoot Recruitment has been engaged to find a contract Cybersecurity Project Manager to help shape and deliver cyber threatintelligence initiatives for a global financial institution's ThreatIntelligence Centre. This is an exciting opportunity to drive international projects, support executive … level decision-making, and collaborate with high-performing cybersecurity teams across multiple regions. Key Responsibilities Lead and manage end-to-end projects within a global ThreatIntelligence Centre, aligning activities with strategic cybersecurity objectives. Develop and monitor project plans, timelines, budgets, and resource allocation. Coordinate with global stakeholders in EMEA, Americas, APAC, Japan, and India to align requirements … drive cost optimisation and meet strategic goals. Facilitate recurring international meetings by setting agendas, tracking actions, managing time zone/holiday scheduling, and maximising participation. Drive the standardisation of threatintelligence processes, governance, and tooling. Prepare and deliver high-quality executive reports and presentations. Ensure alignment with compliance, risk, and regulatory requirements across multiple jurisdictions. Track progress, identify More ❯
City of London, London, Coleman Street, United Kingdom
Deerfoot Recruitment Solutions Limited
ThreatIntelligence Project Manager Banking - Cybersecurity Fully Onsite in London Inside IR35 Contract Deerfoot Recruitment has been engaged to find a contract Cybersecurity Project Manager to help shape and deliver cyber threatintelligence initiatives for a global financial institution's ThreatIntelligence Centre. This is an exciting opportunity to drive international projects, support executive … level decision-making, and collaborate with high-performing cybersecurity teams across multiple regions. Key Responsibilities Lead and manage end-to-end projects within a global ThreatIntelligence Centre, aligning activities with strategic cybersecurity objectives. Develop and monitor project plans, timelines, budgets, and resource allocation. Coordinate with global stakeholders in EMEA, Americas, APAC, Japan, and India to align requirements … drive cost optimisation and meet strategic goals. Facilitate recurring international meetings by setting agendas, tracking actions, managing time zone/holiday scheduling, and maximising participation. Drive the standardisation of threatintelligence processes, governance, and tooling. Prepare and deliver high-quality executive reports and presentations. Ensure alignment with compliance, risk, and regulatory requirements across multiple jurisdictions. Track progress, identify More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
clients. The ideal candidate will have advanced expertise in monitoring, analyzing, and mitigating cybersecurity threats, as well as managing security tools and mentoring junior analysts. This role involves proactive threat hunting, incident response, and collaboration with cross-functional teams to enhance the organization s security posture. Your responsibilities: (Up to 10, Avoid repetition) Incident Detection and Response: Lead investigations … and remediation of complex security incidents, including malware infections, data breaches, and advanced persistent threats (APTs). Utilize advanced SIEM (Security Information and Event Management) tools, threatintelligence platforms, and other security technologies to analyze and correlate security alerts. Take ownership of Tier 2-level escalations from Tier 1 analysts and guide them through complex incident response procedures. … Threat Hunting & Analysis: Proactively search for threats across the environment using behavioral analysis and threatintelligence data. Analyze data from logs, network traffic, endpoint activities, and threatintelligence feeds to detect unusual or malicious activity. Collaborate with other security teams to uncover hidden threats and vulnerabilities. Incident Forensics: Perform in-depth forensic analysis to determine More ❯
consists of 4 operational areas: Cyber Security Operations Unit (CSOU) Cyber Delivery Unit (CDU). Cyber Improvement Programme. Chief Information Security Office Function (CISO) The role leads the CSOCs ThreatIntelligence team within NHS England CSOC comprised of four primary functions: Intelligence Collection & Analysis - Perform collection, aggregation, analysis and contextualisation of healthcare and security information to produce … actionable CTI. Cybersecurity Threat & Risk Assessment - Perform high-level risk assessments of current and emerging threats to the health & social care estate. Intelligence Dissemination & Reporting - Produce stakeholder-specific intelligence reporting for stakeholders. Specialist CTI Support - Provides specialist CTI support to CSOC during high complexity incidents. The post of Cyber Security Lead Analyst - ThreatIntelligence has … payment equal to 30% per annum. Please be aware that RRP is none contractual and subject to review. Main duties of the job As a Cyber Security Lead Analyst (ThreatIntelligence) you will: Ensure the objectives and activities of the ThreatIntelligence teams and Assessments are aligned with overarching CSOC strategy. Represent the function at operational More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Vanquish Technologies Limited
and ongoing support, our commitment is to provide clients with the assurance that they are valued by a company that is both attentive and impactful. Role Overview Role Title: ThreatIntelligence Project Manager Reporting Line Manager: Head of ThreatIntelligence Onsite Requirements (e.g. number of days per week onsite): 5 days Hybrid/Remote Working Policy … regional public holidays, and negotiating suitable schedules to ensure global participation. Proven ability to deliver complex, multi-region projects on time and within budget. Strong understanding of cybersecurity operations, threatintelligence, or security monitoring. Proficiency in project management methodologies. Industry Experience Required or Preferred: Key Soft Skills (e.g Communication, leadership, stakeholder management): Analytical and detail-oriented with a … stakeholders across regions (Japan, EMEA, Americas, APAC, India) to align requirements and deliverables. Track activity progress, manage risks, and implement mitigation strategies to ensure successful delivery. Drive standardization of threatintelligence protocols, tools, and governance across regions. Collaborate with technology, compliance, and risk management teams to ensure adherence to regulatory and legal requirements in each jurisdiction. Host and More ❯
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Synergize Consulting Limited
Cyber ThreatIntelligence Specialist - Contract role We are supporting our client, a leading IT services and solutions company, in their search for a Cyber ThreatIntelligence Specialist in Hertfordshire. In this role, you'll be responsible for gathering, correlating, and interpreting data from multiple sources to deliver actionable threat intelligence. You'll assess how a … to key stakeholders. *Candidates must hold valid SC clearance* Contract Details Initial Term: 3 months (with strong potential for extension) Location: Hertfordshire Work Model: Hybrid Key Responsibilities Work with ThreatIntelligence Platforms (TIPs), taking ownership of these platforms. Analyse and assess cyber threats, identifying patterns and trends. Apply the intelligence life cycle, from collection through to reporting. … Ensure the ThreatIntelligence Programme meets organisational aims. Influence and advise stakeholders on security-focused decisions. Work closely alongside other Security Operations teams such as SOC. Identify intelligence of concern across various sources and tools, and conduct analysis and assessment of such threats and their potential impact on the business. What We're Looking For Experience in More ❯
ThreatIntelligence Project Manager Banking - Cybersecurity Fully Onsite in London Inside IR35 Contract Deerfoot Recruitment has been engaged to find a contract Cybersecurity Project Manager to help shape and deliver cyber threatintelligence initiatives for a global financial institution's ThreatIntelligence Centre click apply for full job details More ❯
Initial We are looking for a highly capable and technically skilled Security Analyst (Network & Endpoint) to join our cybersecurity team. This role focuses on network and endpoint security operations, threatintelligence, and incident response within a Security Operations Centre (SOC) environment. The successful candidate will have hands-on experience with leading security platforms and demonstrate the ability to … Network & Endpoint) Location: England/Remote Contract Type: Contract Duration: Contract till 31st Mar 26 Sector: Healthcare . Key Responsibilities: Network Detection & Response: Administer and optimise Darktrace for network threat detection, model tuning, and behavioural analysis. Investigate anomalies and escalate incidents based on network telemetry. Endpoint Protection: Deploy and manage CrowdStrike Falcon agents across enterprise endpoints. Maintain and update … detection rules, ensuring alignment with threat intelligence. Security Operations Centre (SOC): Act as a Level 2 SOC Analyst and Incident Handler. Triage, investigate, and respond to security alerts and incidents. Collaborate with other SOC team members to ensure timely resolution and documentation. ThreatIntelligence & Insider Threat Monitoring: Monitor threat feeds and manage Indicators of Compromise More ❯
Senior Threat Modeler 12 months initially Remote (with occasional visits to Preston or Frimley) £41.94 per hour Role Description • Supports the overall delivery of the threat modelling function and wider UK SOC by evaluating the clients estate and its capability. • Proactively protects the client through continual testing of security controls. • Understands Cyber ThreatIntelligence and Active … Defence techniques and best practices. • Good knowledge of cyber threat landscape, current affairs and geopolitics, including threat groups and how to apply this knowledge within an operational environment. • Understands the MITRE ATT&CK Framework, ThreatIntelligence Platforms and the coordination of Advanced Threat Protection (ATP) and tactics, techniques and procedures (TTPs) to support Cyber Operations. … areas, manage own development including participating in on the job training and attending training programmes as appropriate, and support/provide mentorship to others in the team. • Supports the Threat Modelling Lead when required, particularly on forecasting future team operations. • Is a subject matter expert (SME) on emerging threats and will work on complex issues as a fully contributory More ❯
The Role Supports the overall delivery of the threat modelling function and wider UK SOC by evaluating the BAE Systems' estate and its capability. Proactively protects BAE Systems through continual testing of security controls. Understands Cyber ThreatIntelligence and Active Defence techniques and best practices. Role Responsibilities: Note limited to Building and implementing processes and procedures for … continuous and effective threat modelling capability. Maintains an in-depth understanding of the external and internal security environment and how the organisation reacts to security threats. Performs continuous evaluation of the organisation's estate, assessing function capability, and suggesting improvements where necessary. Identifying security gaps, and building attack simulations to support Purple Team engagements by illustrating potential attack patterns … risk reduction in the long term. Contributes to, plans and delivers activities in support of organisational and security development needs in accordance with regulatory requirements and changes in the threat landscape. The assessment, validation and reporting of information on current and potential cyber threats to maintain an organisation's situational awareness. The verification that systems and processes meet the More ❯
programme, supporting cyber assurance and compliance activities. This is a hands-on role suited to someone with experience in public sector or defence environments, particularly around information assurance and threat reporting. Key Responsibilities: Deliver internal security audits aligned to ISO 27001 standards Provide support and guidance as part of the programme’s IT security function Monitor and respond to … cyber threatintelligence and WARP notifications Maintain documentation and contribute to risk assessments and mitigation plans Collaborate with stakeholders to ensure alignment with government security frameworks Required Skills & Experience: Valid SC Clearance Practical experience with ISO 27001 auditing Background in a DITSO or similar IT security role within Defence or OGD Familiarity with WARP processes and incident response More ❯