Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
Our client, a leading global organization, is partnering with a prestigious end client based in Reading. Were excited to offer an outstanding opportunity for askilled ThreatIntelligence Specialist to join a dynamic IT team . If you are interested and have the relevant skills and experience, please apply promptly to discuss further. Job Title: ThreatIntelligence Specialist Location: Reading, UK (Hybrid 4 days onsite) Duration: 6 months Rate: £465 per day Inside IR35 We are seeking a ThreatIntelligence Specialist to join a global security team on a 6-month contract. This is a hands-on role where youll play a key part in strengthening the organisations cyber defence posture by collecting, analysing … disseminating actionable intelligence. Youll work closely with incident response, security operations, vulnerability management, and leadership teams to anticipate threats, mitigate risks, and improve resilience. Key Responsibilities: Collect and analyse intelligence to address high-priority security requirements. Produce and share actionable threatintelligence with stakeholders across security operations, incident response, and fraud prevention. Conduct dark web investigations and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
Initial 6 months IR Status: Inside, Market Rates New contract opportunities across the Public Sectors. The Roles Involve: Incident Response : Enhance coordination, assess impact, inform guidance, and develop playbooks. ThreatIntelligence : Deliver tailored intelligence, monitorTTPs, and manage tooling (OpenCTI, MISP, sandboxes). Vulnerability Management : Identify and triage vulnerabilities, support remediation, and improve disclosure schemes. Requirements : Proven experience … in SOC environments and incident response. Deep understanding of threat actors and intelligence platforms. Expertise in vulnerability scanning and remediation. Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome applications from people of all backgrounds and perspectives. Our success is driven by More ❯
to translate technical threats into business terms. Tools & Technologies - You will work with a modern SOC technology stack, including: SIEM: Microsoft Sentinel EDR/XDR: Microsoft Defender for Endpoint Threat Intel: Recorded Future Network Analysis: Wireshark/tcpdump SOAR & Automation: Palo Alto Cortex XSOAR, ServiceNow SecOps Vulnerability Management: Tenable Nessus/Tenable.io Other nice to have tools: Shodan, Censys More ❯
London, Old Bailey, United Kingdom Hybrid / WFH Options
Morson Talent
to translate technical threats into business terms. Tools & Technologies - You will work with a modern SOC technology stack, including: SIEM: Microsoft Sentinel EDR/XDR: Microsoft Defender for Endpoint Threat Intel: Recorded Future Network Analysis: Wireshark/tcpdump SOAR & Automation: Palo Alto Cortex XSOAR, ServiceNow SecOps Vulnerability Management: Tenable Nessus/Tenable.io Other nice to have tools: Shodan, Censys More ❯
West Midlands, United Kingdom Hybrid / WFH Options
Anson Mccade
We are seeking an experienced SOC Engineer to support a high-profile critical national infrastructure project. This role is ideal for professionals with a strong background in security operations, threat detection, and incident response, who thrive in fast-paced environments and understand the importance of protecting sensitive systems. This is a remote-first opportunity, with occasional travel to the … the security and resilience of vital infrastructure systems. Key Responsibilities Monitor and analyse security events from various sources including SIEM, firewalls, IDS/IPS, and endpoint protection tools. Perform threat hunting and forensic investigations to identify and mitigate risks. Develop and maintain SIEM use cases, dashboards, and alerting mechanisms. Respond to security incidents, conduct root cause analysis, and provide … vulnerabilities, and security technologies. Required Skills & Experience Proven experience in a SOC or similar security operations role. Strong knowledge of SIEM platforms (e.g., Splunk, Sentinel, QRadar). Familiarity with threatintelligence, malware analysis, and incident response frameworks. Understanding of network protocols, Windows/Linux systems, and cloud environments. Excellent analytical, communication, and problem-solving skills. Active SC Clearance More ❯
Azure administration and governance * Deep knowledge of Microsoft Defender for Cloud and Cloud Security remediation * Experience of designing and implementing network segmentation and segregation * Knowledge of vulnerability management and threatintelligence tooling * Practical experience and understanding of cyber security frameworks (NCSC CAF, Cyber Essentials, ISO27001) * Excellent cloud and on-premise troubleshooting environments * Relevant Azure security certifications (e.g. AZ More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Hays
Security technical assurance program. Testing and verifying the effectiveness of security controls and mitigating threats. Document outcomes of testing and assurance activity and discuss findings with key stakeholders. Undertake threatintelligence and data leakage. Reviewing, writing and updating the organisation's policies, standards and procedures. What you need to do now If you're interested in this role More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
Reed
of technical talent acquisition, capability building, and organisational change within a security context. Day-to-day of the role: Partner with cyber security leadership to define workforce needs across threatintelligence, governance, engineering, and operations. Develop and implement talent strategies to attract, retain, and grow cyber professionals. Support skills gap analysis and capability mapping across the cyber function. More ❯
Welwyn Garden City, Hertfordshire, United Kingdom Hybrid / WFH Options
Pontoon
What We're Looking For: To thrive in this role, you should possess the following technical skills and experience: Cyber Security Tools : Hands-on experience with SOAR platforms and ThreatIntelligence Platforms. Programming Expertise : Proficiency in Python script with a solid experience of REST APIs to develop and interact with them effectively. Framework Knowledge : Familiarity with the MITRE … ATT&CK framework or equivalent, including knowledge of emerging threat actor tactics, techniques, and procedures. Operating Systems : Experience and working knowledge of both Linux and Windows platforms. Public Cloud Experience: Familiarity with working in public cloud environments is a plus! Adecco is a disability-confident employer. It is important to us that we run an inclusive and accessible recruitment More ❯