3 of 3 Permanent Threat Intelligence Jobs in Scotland

Cyber Threat Intelligence Analyst

Hiring Organisation
Euro Projects Recruitment
Location
Edinburgh, Midlothian, Scotland, United Kingdom
Employment Type
Permanent, Work From Home
Salary
£60,000
Cyber Threat Intelligence Analyst Salary £50,000 - £60,000 - Hybrid - WFH Euro Projects Recruitment is working with a leading Microsoft Partner in Scotland to recruit a permanent Cyber Threat Intelligence Analyst . This is a genuine Cyber Threat Intelligence Analyst role with a strong … focus on proactive threat hunting, intelligence-led investigations and client engagement. The successful Cyber Threat Intelligence Analyst will work closely with SOC analysts, incident responders and engineering teams, using the Microsoft security stack to identify, analyse and mitigate cyber threats. The Role Cyber Threat Intelligence ...

Cyber Threat Intelligence Analyst

Hiring Organisation
Euro Projects Recruitment
Location
Edinburgh, Midlothian, United Kingdom
Employment Type
Permanent
Salary
GBP 60,000 Annual
Cyber Threat Intelligence Analyst Salary £50,000 - £60,000 - Hybrid - WFH Euro Projects Recruitment is working with a leading Microsoft Partner in Scotland to recruit a permanent Cyber Threat Intelligence Analyst . This is a genuine Cyber Threat Intelligence Analyst role with a strong … focus on proactive threat hunting, intelligence-led investigations and client engagement click apply for full job details ...

Vulnerability Management Specialist

Hiring Organisation
Virgin Money
Location
Glasgow, Lanarkshire, Scotland, United Kingdom
Employment Type
Full-Time
Salary
£40,800 - £51,000 per annum
misconfigurations across our estate, shining a light on hidden risks before they can impact our customers or operations. We deliver clear, actionable, and intelligence-led reporting that empowers teams to remediate effectively, strengthens security controls, and ensures we stay ahead of evolving threats. Through continuous monitoring, transparent communication … misconfigurations across infrastructure, applications, assets, and code whilst categorising and prioritising vulnerabilities based on severity, business impact, and criticality. Continually monitoring vulnerability data, threat intelligence, and scanning outputs to detect emerging risks. Proactively recording, managing, and escalating risks and produce clear, actionable vulnerability reports for technical and business ...