5 of 5 Contract Threat Intelligence Jobs in the South East

Cyber Threat Intelligence Analyst

Hiring Organisation
Constant Recruitment Ltd
Location
ME19, Kings Hill, Kent, United Kingdom
Employment Type
Contract
Contract Rate
£45000 - £55000/annum
Cyber Threat Intelligence Analyst 3-Month Fixed-Term Contract £45,000 – £55,000 pro rata (3-month fixed-term contract) Fully remote – Must be UK based UK-Based Immediate Start Preferred Are you a Cyber Threat Intelligence Analyst who thrives on staying ahead of emerging threats … enjoy analysing complex threat data and turning it into clear, actionable insight for security teams? Are you available for a 3-month contract where you can make an immediate impact within a threat-informed security function? We are recruiting for a Cyber Threat Intelligence Analyst ...

SC Cleared - Senior SOC Analyst (x3) - Inside IR35

Hiring Organisation
Sanderson Government and Defence
Location
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Employment Type
Contract
Contract Rate
£450 - £550 per day
technical audiences and continuously improve their content and presentation. Analyse and improve detection rules and use cases in line with Mitre Att&ck and threat-informed defence. Work as part of a team to ensure that corporate data and technology platform components are safeguarded from known threats. Maintain … update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. Input into threat intelligence activities when required. Represent the SOC within Stakeholders meetings on occasion. Engage with the Cyber Security Community of Expertise Essential Skills Proven experience in Security Operations Centre. Demonstrable experience of using ...

Security Engineer - SIEM, KQL

Hiring Organisation
Harvey Nash
Location
London, South East, England, United Kingdom
Employment Type
Contractor
Contract Rate
£350 - £400 per day
site** Key Responsibilities SIEM Management & Optimization: Design, implement, and maintain Microsoft Sentinel workspaces, connectors, analytics rules, and playbooks Develop advanced KQL queries for threat hunting and reporting Optimize SIEM performance, cost, and data retention policies Troubleshoot log ingestion and parsing issues Log Source Integration: Onboard and configure critical … sources (AD, firewalls, servers, cloud infrastructure) Manage event collection and forwarding infrastructure Implement data filtering and custom log parsing Threat Detection & Use Case Development: Develop and refine detection rules based on threat intelligence and attack patterns Continuously improve detection efficacy and reduce false positives Security Monitoring & Incident ...

Principal Cyber Security Lead

Hiring Organisation
Morgan Hunt Recruitment
Location
London, South East, England, United Kingdom
Employment Type
Contractor
Contract Rate
£76,400 per annum
Improvement Training & Awareness Secure Architecture Support Compliance and Framework Alignment Essential Skills: Experience with Microsoft Sentinel, Microsoft Defender for Endpoint/Cloud SIEM tools, threat intelligence platforms, and vulnerability management Technical experience securing Microsoft Azure and Amazon Web Services cloud environments as well as on-premise/virtual ...

Cyber Incident Response Consultant

Hiring Organisation
Experis
Location
Basingstoke, Hampshire, South East, United Kingdom
Employment Type
Contract, Work From Home
clear and consistent internal and external incident communication workflows. * Develop detailed incident response playbooks, such as ransomware, business email compromise (BEC), data breach, insider threat, malware outbreak, DDoS attack, cloud service compromise. (Final scenarios to be agreed during discovery.) Strengthen Organisational Incident Preparedness * Conduct discovery sessions with technical … organisation. Collaborate Across the Business * Work closely with SOC staff, IT teams, legal, risk, compliance, communications, and senior leadership. * Convert technical details and threat intelligence into clear, actionable steps appropriate for operational use. Required Experience & Skills * Proven experience (typically 5+ years) in incident response, SOC operations, cybersecurity consulting ...