4 of 4 Permanent Threat Intelligence Jobs in Scotland

Cyber Security Manager ( SC)

Hiring Organisation
Sanderson Recruitment
Location
Glasgow, Lanarkshire, Scotland, United Kingdom
Employment Type
Permanent, Work From Home
cryptography) Solid understanding of IAM concepts (RBAC, ABAC, PAM, SSO) Strong analytical skills with the ability to interpret complex technical information Good understanding of threat modelling and threat intelligence methodologies (OWASP, STRIDE, MITRE) For more details, please reach out to . Reasonable Adjustments: Respect and equality ...

Security Operations Centre / SOC Team Lead

Hiring Organisation
Hays
Location
Edinburgh, Midlothian, Scotland, United Kingdom
Employment Type
Permanent
Salary
£65,000
their internal Security Operations Centre. This role will have you leading a team of analysts and working alongside security engineers to develop and automate threat detection and response playbooks, as well as security architects and the wider IT function. The ideal candidate will have the technical expertise to work … management, coaching, and development of SOC analysts and engineers. Lead the configuration, tuning, and maintenance of core SOC capabilities including log aggregation, alerting, correlation, threat detection, and response tooling. Define, track, and report SOC performance metrics and KPIs, ensuring operational efficiency and alignment with organisation objectives. Manage and mentor ...

Account Executive

Hiring Organisation
Intaso
Location
Aberdeen, UK
Employment Type
Full-time
revenue growth within Manufacturing and Retail clients Manage full sales cycle: prospecting → solution selling → closing deals Sell managed security services (SOC, MDR, cloud security, threat intelligence) Build long-term relationships with IT, security, and business stakeholders Requirements: Proven experience selling security services or MSP solutions Strong track record ...

24/7 SOC Analyst

Hiring Organisation
IP PEOPLE LTD
Location
Edinburgh, UK
Employment Type
Full-time
behaviour & building incident timelines Escalating incidents with clear technical context Using tools such as Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike, SentinelOne Contributing to threat hunting, detection improvements & SOC evolution What we're looking for 1+ year SOC experience or 3+ years infra/networking with security exposure Experience … Flexibility required during major incidents Clearance SC clearance eligibility required (DV advantageous) Why join? Fully remote role (UK-based) Clear progression into Senior SOC, Threat Intel, SOC Engineering & IR Structured training, cyber ranges & real investigation exposure Collaborative, technical SOC culture Competitive salary + strong benefits Interested? Apply ...