3 of 3 Permanent Cyber Threat Intelligence Jobs in the North East

Threat intelligence analyst

Hiring Organisation
Razorblue Group Ltd
Location
Teesside, North East, United Kingdom
Employment Type
Permanent, Work From Home
Salary
£45,000
looking for a Threat Intelligence Analyst to join our growing team of like-minded tech people. Should you choose to accept, your responsibilities will encompass: Delivering strategic and operational threat intelligence to strengthen razorblue and client security. Monitoring threat feeds, OSINT, and internal telemetry … emerging risks and relevant threat actor activity. Analysing tactics, techniques, and procedures (TTPs) and correlating external threat data with internal indicators. Producing clear, actionable intelligence briefings for technical and non-technical audiences. Advising on threat assessments, supporting incident response, and contributing to internal knowledge bases ...

SOC Operations Engineer - EDR & NDR Platforms

Hiring Organisation
Beazley Security
Location
Newcastle upon Tyne, UK
Employment Type
Full-time
Beazley Security is a global cybersecurity firm committed to helping clients enable advanced cyber defenses that reduce risk with quantifiable results. We're comprised of top talent from private industry, government, intelligence, and law enforcement who are specialists in threat detection, incident response, digital forensics, offensive security … risk management, and cyber resilience. As a subsidiary of specialty insurance giant, Beazley, we've been at the forefront of cyber insurance management and breach response activities for business clients in the US, UK, and Europe since 2017. As Beazley Security, the company will have an expanded scope ...

Principal SOC Transformation Consultant - Professional Services (Security Clearance Eligibility Required)

Hiring Organisation
Palo Alto Networks
Location
Newcastle upon Tyne, UK
Employment Type
Full-time
8+ years of experience with Security Operations Center (SOC) tooling, processes, and workflows Hands-on technical mastery across SIEM, SOAR, EDR, cloud security, and threat intelligence Ability to conceive, architect, and develop effective correlation and detection rules Familiarity with a range of SIEM technologies, such as Splunk ...