incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or malicious activity. • Use OSINT (Open-SourceIntelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats. • Monitor the threat landscape and document … as basic XDR platforms. • Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search and filter logs effectively. • Familiar with open-sourceintelligence (OSINT) techniques to aid in identifying potential threats and gathering information. • Able to communicate clearly and efficiently with team members and stakeholders More ❯
incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or malicious activity. Use OSINT (Open-SourceIntelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats. Monitor the threat landscape and document … as basic XDR platforms. Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search and filter logs effectively. Familiar with open-sourceintelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate clearly and efficiently with team members and stakeholders More ❯
incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or malicious activity. • Use OSINT (Open-SourceIntelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats. • Monitor the threat landscape and document … as basic XDR platforms. • Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search and filter logs effectively. • Familiar with open-sourceintelligence (OSINT) techniques to aid in identifying potential threats and gathering information. • Able to communicate clearly and efficiently with team members and stakeholders More ❯
security incidents by conducting deeper analysis on correlated events & identifying patterns or anomalies that may indicate suspicious or malicious activity. Using OSINT (Open-SourceIntelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats. Monitoring the threat landscape & documenting findings … such as basic XDR platforms. Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search & filter logs effectively. Familiar with open-sourceintelligence (OSINT) techniques to aid in identifying potential threats & gathering information. Able to communicate clearly & efficiently with team members and stakeholders, both internally More ❯
incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or malicious activity. Use OSINT (Open-SourceIntelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats. Monitor the threat landscape and document … as basic XDR platforms. Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search and filter logs effectively. Familiar with open-sourceintelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate clearly and efficiently with team members and stakeholders More ❯
Hemel Hempstead, England, United Kingdom Hybrid / WFH Options
Fynity
edge SOC environment. As a Cyber threat Analyst, you will: Managing and automating threat intel feeds from multiple open and closed sources Monitoring OSINT, dark web forums, and internal telemetry for threat indicators Translating raw technical data into actionable insights for security teams Collaborating with SOC and Incident Response More ❯
hemel hempstead, east anglia, United Kingdom Hybrid / WFH Options
Fynity
edge SOC environment. As a Cyber threat Analyst, you will: Managing and automating threat intel feeds from multiple open and closed sources Monitoring OSINT, dark web forums, and internal telemetry for threat indicators Translating raw technical data into actionable insights for security teams Collaborating with SOC and Incident Response More ❯
watford, hertfordshire, east anglia, United Kingdom Hybrid / WFH Options
Fynity
edge SOC environment. As a Cyber threat Analyst, you will: Managing and automating threat intel feeds from multiple open and closed sources Monitoring OSINT, dark web forums, and internal telemetry for threat indicators Translating raw technical data into actionable insights for security teams Collaborating with SOC and Incident Response More ❯
monitoring and log analysis Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search and filter logs effectively. Familiar with open-sourceintelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate clearly and efficiently with team members and stakeholders More ❯
watford, hertfordshire, east anglia, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
and integrate automated threat intelligence feeds and enrichment sources. Provide training and documentation for SOC staff on effective MISP usage. Monitor threat feeds, OSINT, dark web, and internal logs for emerging threats. Analyse data to identify patterns, indicators of compromise (IOCs), and emerging adversary behaviours. Produce monthly situational reports More ❯
hemel hempstead, east anglia, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
and integrate automated threat intelligence feeds and enrichment sources. Provide training and documentation for SOC staff on effective MISP usage. Monitor threat feeds, OSINT, dark web, and internal logs for emerging threats. Analyse data to identify patterns, indicators of compromise (IOCs), and emerging adversary behaviours. Produce monthly situational reports More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
GCS
senior stakeholders Essential Technical Skills & Qualifications: Cyber security certification(s) such as Certified Threat Intelligence Analyst (CTIA) Hands-on experience with threat modelling, OSINT tools, and vulnerability assessment Deep understanding of adversary behaviours and threat landscape trends Strong communication skills with the ability to convey technical risk clearly to More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
GCS
senior stakeholders Essential Technical Skills & Qualifications: Cyber security certification(s) such as Certified Threat Intelligence Analyst (CTIA) Hands-on experience with threat modelling, OSINT tools, and vulnerability assessment Deep understanding of adversary behaviours and threat landscape trends Strong communication skills with the ability to convey technical risk clearly to More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Sopra Steria Limited
integrate automated feeds and enrichment sources. Provide training sessions and documentation for SOC staff on effective usage of MISP. Supervise various sources (threat feeds, OSINT, dark web, internal logs) for emerging threats; and facilitate threat intelligence. Analyse collected data to identify patterns, indicators of compromise, and emerging adversary behaviours. Produce More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
senior stakeholders Essential Technical Skills & Qualifications: Cyber security certification(s) such as Certified Threat Intelligence Analyst (CTIA) Hands-on experience with threat modelling, OSINT tools, and vulnerability assessment Deep understanding of adversary behaviours and threat landscape trends Strong communication skills with the ability to convey technical risk clearly to More ❯
assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threat intelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis and getting access to relevant logs More ❯
assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threat intelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis and getting access to relevant logs More ❯
assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threat intelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis and getting access to relevant logs More ❯
assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threat intelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis and getting access to relevant logs More ❯
assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threat intelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis and getting access to relevant logs More ❯
assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threat intelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis and getting access to relevant logs More ❯
assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threat intelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis and getting access to relevant logs More ❯
assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threat intelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis and getting access to relevant logs More ❯
assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threat intelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis and getting access to relevant logs More ❯
assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threat intelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis and getting access to relevant logs More ❯