ThreatIntelligence Analyst - OSINT London, Cheltenham or Manchester Thanks for checking out our job opening; we are excited that YOU are interested in learning more about NCC Group. We are on a mission to make society a safer and more secure place. Our people are the ones who make that possible; a global community of talented individuals working … to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity As a ThreatIntelligence Analyst - OSINT, you will play a pivotal role within our global threatintelligence team. Working alongside colleagues across multiple time zones, you will help make … our clients safer by identifying relevant threat actors, understanding their motivations, targets, and methods, and assessing client exposure. The Global ThreatIntelligence team has built a strong reputation in collecting its own data and combining it with open and commercial sources. In this role, you will analyse cyber threats, develop actionable intelligence, and collaborate with internal More ❯
london (city of london), south east england, united kingdom
NCC Group
ThreatIntelligence Analyst - OSINT London, Cheltenham or Manchester Thanks for checking out our job opening; we are excited that YOU are interested in learning more about NCC Group. We are on a mission to make society a safer and more secure place. Our people are the ones who make that possible; a global community of talented individuals working … to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity As a ThreatIntelligence Analyst - OSINT, you will play a pivotal role within our global threatintelligence team. Working alongside colleagues across multiple time zones, you will help make … our clients safer by identifying relevant threat actors, understanding their motivations, targets, and methods, and assessing client exposure. The Global ThreatIntelligence team has built a strong reputation in collecting its own data and combining it with open and commercial sources. In this role, you will analyse cyber threats, develop actionable intelligence, and collaborate with internal More ❯
ThreatIntelligence Analyst - OSINT London, Cheltenham or Manchester Thanks for checking out our job opening; we are excited that YOU are interested in learning more about NCC Group. We are on a mission to make society a safer and more secure place. Our people are the ones who make that possible; a global community of talented individuals working … to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity As a ThreatIntelligence Analyst - OSINT, you will play a pivotal role within our global threatintelligence team. Working alongside colleagues across multiple time zones, you will help make … our clients safer by identifying relevant threat actors, understanding their motivations, targets, and methods, and assessing client exposure. The Global ThreatIntelligence team has built a strong reputation in collecting its own data and combining it with open and commercial sources. In this role, you will analyse cyber threats, develop actionable intelligence, and collaborate with internal More ❯
Primary Details Time Type: Full time Worker Type: Employee ThreatIntelligence Specialist London Permanent (Hybrid) At QBE, our purpose is to enable a more resilient future. We are an international insurer and reinsurer with a local presence in 27 countries. The Opportunity We’re excited to be hiring a ThreatIntelligence Specialist to join our Advanced … Threat Services (ATS) Teamon a full-time, permanent basis! You’ll be part of a supportive team that thrives on teamwork and innovation, where your expertise will be valued as we work together to tackle the ever-evolving cyber threat landscape. We’re looking to welcome our new team member from early January 2026 , so if you’re … ready to make an impact in the new year, we’d love to hear from you! Your New Role Reporting to the Technical Threat Manager , you’llbe responsible for researching, analysing, and reporting on cyber threats targeting QBE’s global operations and technology environment. This role has a strong technical focus, centred on the collection, enrichment, automation, and analysis More ❯
wigan, north west england, united kingdom Hybrid / WFH Options
Police Digital Services
Join Police Digital Service an NMC Cyber ThreatIntelligence Specialist. Permanent FT. Starting salary £45,000 per annum. About Police Digital Service This is an opportunity to play your part and protect our company, our customers and our communities from cyber attack. Be part of a dedicated team and get ready to be challenged every day to make … your contribution is always valued. The National Management Centre provide visibility and control of information risks for Policing. It supports the 24x7x365 nature of the police operations, providing a threat detection and response capability for digital services before, during and after cyber attacks, enabling stakeholders to understand and proactively manage risk across the technology estate at both the national … and force level. As a member of the ThreatIntelligence team, you'll be involved with: Developing awareness for the policing community of the cyber risks to critical services by continually assessing the threat landscape and informing stakeholders. Reporting cyber risks to service, executive, and operational stakeholders for mitigation decisions. Limiting the impact of known cyber risks More ❯
manchester, north west england, united kingdom Hybrid / WFH Options
Police Digital Services
Join Police Digital Service an NMC Cyber ThreatIntelligence Specialist. Permanent FT. Starting salary £45,000 per annum. About Police Digital Service This is an opportunity to play your part and protect our company, our customers and our communities from cyber attack. Be part of a dedicated team and get ready to be challenged every day to make … your contribution is always valued. The National Management Centre provide visibility and control of information risks for Policing. It supports the 24x7x365 nature of the police operations, providing a threat detection and response capability for digital services before, during and after cyber attacks, enabling stakeholders to understand and proactively manage risk across the technology estate at both the national … and force level. As a member of the ThreatIntelligence team, you'll be involved with: Developing awareness for the policing community of the cyber risks to critical services by continually assessing the threat landscape and informing stakeholders. Reporting cyber risks to service, executive, and operational stakeholders for mitigation decisions. Limiting the impact of known cyber risks More ❯
that the world depends on every day. As a Cybersecurity Defense professional at Kyndryl, you will encompass cybersecurity, incident response, security operations, vulnerability management, and the world of cyber threat hunting and security intelligence analysis all to protect the very heartbeat of organizations – their infrastructure. In this role, you won't just monitor; you'll actively engage in … will be used as you respond and manage to cybersecurity incidents. Cybersecurity Defense is all about information. You'll gather, analyze, and interpret data applying your own and external threatintelligence to uncover potential security threats and risks. These insights and your ability to analyze complex attack scenarios will be the foundation of our security strategy – helping Kyndryl … of a team that safeguards the digital assets of a cutting-edge organization? Look no further – Kyndryl is seeking a Cybersecurity Specialist to join our team of talented Security Intelligence Analysts . The Kyndryl CSIRT (Cybersecurity Incident Response Team) is looking for a Security Intelligence Analyst to join an advanced team that drives proactive identification of threats within More ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Bristol/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter … you will be responsible for proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITRE ATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and … as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, ThreatIntelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding of network protocols, operating systems (Windows, Linux More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Edinburgh/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter … you will be responsible for proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITRE ATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and … as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, ThreatIntelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding of network protocols, operating systems (Windows, Linux More ❯
Peterborough, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Peterborough/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter … you will be responsible for proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITRE ATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and … as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, ThreatIntelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding of network protocols, operating systems (Windows, Linux More ❯
Keyworth, Nottinghamshire, United Kingdom Hybrid / WFH Options
UK Research and Innovation (UKRI)
professionals to deliver impact across the organisation and the wider UK research and innovation system. Join us for this rare opportunity to apply your experience in offensive security and threatintelligence in a dynamic, fast-paced security operational and strategic role in an organisation at the heart of research and innovation in the UK. Leading the Red Team … and providing proactive advice to teams on the most effective remediation strategies. The role encompasses the full scope and delivery of penetration testing, including Black Box network assessments, insider threat evaluations, credentialed application exploitation, and rigorous testing of human and physical security controls across the UKRI estate. In addition to these offensive security responsibilities, the specialist manages the external … check Key Responsibilities: Execute targeted penetration tests and red team exercises to identify exploitable vulnerabilities. Develop and maintain offensive tooling to simulate adversary tactics and techniques. Monitor and analyse threatintelligence feeds to identify emerging threats and relevant TTPs. Produce technical threat reports and briefings to inform security posture and decision-making. Conduct proactive threat hunting More ❯
on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us Available Locations: London, UK About The Department Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state sponsored advanced persistent threats (APTs). Cloudforce One works … in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever-growing sources of threatintelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of leveraging an incredibly vast and varied set of data points that only one of the world's largest global … networks can provide. The team is able to analyze these unique data points, at massive scale and efficiency, synthesizing findings into actionable threatintelligence to better protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the internet better, safer, and more powerful everyday. To help fulfill this mission, we More ❯
london, south east england, united kingdom Hybrid / WFH Options
Space Executive
Account Executive – Cybersecurity SaaS (Hybrid, London) Location: London (Hybrid – 2–3 days/week in office) Industry: Cybersecurity/ThreatIntelligence About the Company A fast-growing cybersecurity vendor backed by top-tier investors, this company delivers cutting-edge threatintelligence solutions to help organisations stay ahead of evolving threats. Trusted by global pharma leaders and … decision-makers Consistently meet and exceed revenue targets Requirements 3+ years of experience in SaaS or cybersecurity sales Proven track record of closing complex enterprise deals Strong understanding of threatintelligence or willingness to learn Excellent communication and consultative selling skills Based in London or able to commute to the office 2–3 days/week Why Join More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Space Executive
Account Executive – Cybersecurity SaaS (Hybrid, London) Location: London (Hybrid – 2–3 days/week in office) Industry: Cybersecurity/ThreatIntelligence About the Company A fast-growing cybersecurity vendor backed by top-tier investors, this company delivers cutting-edge threatintelligence solutions to help organisations stay ahead of evolving threats. Trusted by global pharma leaders and … decision-makers Consistently meet and exceed revenue targets Requirements 3+ years of experience in SaaS or cybersecurity sales Proven track record of closing complex enterprise deals Strong understanding of threatintelligence or willingness to learn Excellent communication and consultative selling skills Based in London or able to commute to the office 2–3 days/week Why Join More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Space Executive
Account Executive – Cybersecurity SaaS (Hybrid, London) Location: London (Hybrid – 2–3 days/week in office) Industry: Cybersecurity/ThreatIntelligence About the Company A fast-growing cybersecurity vendor backed by top-tier investors, this company delivers cutting-edge threatintelligence solutions to help organisations stay ahead of evolving threats. Trusted by global pharma leaders and … decision-makers Consistently meet and exceed revenue targets Requirements 3+ years of experience in SaaS or cybersecurity sales Proven track record of closing complex enterprise deals Strong understanding of threatintelligence or willingness to learn Excellent communication and consultative selling skills Based in London or able to commute to the office 2–3 days/week Why Join More ❯
clearance Summary Are you a SOC Detection Engineer looking to support national Cyber Defence capabilities? This role offers the opportunity to contribute to the development and optimisation of advanced threat detection systems within a highly secure environment. You will work within a Security Operations Centre (SOC), designing and maintaining detection logic across SIEM (Security Information and Event Management) and … Engineer, you will be part of a specialist cyber operations team responsible for implementing and maintaining high-fidelity detection capabilities. You will contribute to the development of detection rules, threat hunting activities, and automation workflows to support incident response and continuous improvement. Key responsibilities include: Designing and tuning detection rules and use cases in SIEM and EDR platforms Monitoring … and investigating security alerts to identify potential threats Conducting proactive threat hunting using MITRE ATT&CK and threatintelligence sources Collaborating with incident response teams to support investigations and containment Enhancing detection coverage across network, endpoint, cloud, and identity sources Developing automation scripts and playbooks to streamline triage and response Documenting detection processes and providing knowledge transfer More ❯
clearance Summary Are you a SOC Detection Engineer looking to support national Cyber Defence capabilities? This role offers the opportunity to contribute to the development and optimisation of advanced threat detection systems within a highly secure environment. You will work within a Security Operations Centre (SOC), designing and maintaining detection logic across SIEM (Security Information and Event Management) and … Engineer, you will be part of a specialist cyber operations team responsible for implementing and maintaining high-fidelity detection capabilities. You will contribute to the development of detection rules, threat hunting activities, and automation workflows to support incident response and continuous improvement. Key responsibilities include: Designing and tuning detection rules and use cases in SIEM and EDR platforms Monitoring … and investigating security alerts to identify potential threats Conducting proactive threat hunting using MITRE ATT&CK and threatintelligence sources Collaborating with incident response teams to support investigations and containment Enhancing detection coverage across network, endpoint, cloud, and identity sources Developing automation scripts and playbooks to streamline triage and response Documenting detection processes and providing knowledge transfer More ❯
maintained and augmented and that the team members have every opportunity to grow and learn with the organisation. As part of our Blue Team, you’ll use the latest intelligence and tooling to analyse information systems to ensure effective incident detection and response. Job Description If you are looking to make your mark on a rapidly growing SecOps team … join our Blue Team. The ideal candidate will be a self-starter with an inquisitive nature and a keen interest when it comes to technical cybersecurity topics such as threat hunting, attacker tactics and techniques, monitoring and alerting, threatintelligence, and incident readiness and response. Key responsibilities of the role are summarised below: · Security monitoring and incident … the Splunk SIEM, to enable the detection of threats across diverse platforms (e.g. cloud, endpoints, and networks) · Use frameworks like MITRE ATT&CK to map detection rules and maximise threat coverage · Use analytical platforms to query high volume datasets to identify trends and spot unusual behaviours, indicative of malicious activity · Proactive threat hunting using available client data · Collection More ❯
West Midlands, United Kingdom Hybrid / WFH Options
Stackstudio Digital Ltd
site travel The Role As SOC Manager, you will: Establish goals and priorities with your team, focusing on: Improving incident response times Reducing false positives and extraneous alerts Enhancing threat detection capabilities Oversee staff activities to ensure focus on the right priorities Review team performance metrics, incident reports, and other key indicators Lead incident response efforts with clear procedures … Operations informed, preparing clear and concise reports Key Responsibilities Manage SOC service and process improvements, auditing incidents, identifying new use cases and automations Act as POC for SOC engineering, threatintelligence, and threat exposure management Provide guidance to Level-2 SOC security analysts during investigations and incident resolution Lead coordination of individual information security incidents Mentor security … analysts on risk management, security controls, incident analysis, SIEM monitoring, and operational tasks Document incidents from detection to resolution Ensure threat management, threat modelling, and identification of threat vectors Develop use cases for security monitoring Create reports, dashboards, and metrics for SOC operations; present to senior management Act as focal point for security investigations, preparing reports and More ❯
and production environments and will directly impact our ability to detect, respond to, and prevent cyber threats at scale. As a senior individual contributor reporting to the Director of ThreatIntelligence and Detections, you will play a central role in the technical leadership of the Detection Engineering team. You’ll mentor junior engineers, help define engineering direction, and … lead the development of scalable, innovative threat detection solutions—including those leveraging AI and cloud-native technologies. This is a hybrid role and you must live within commutable distance to our Guildford office where you will need to work in the office 3 days per week. Key Responsibilities Design, develop, and operationalize advanced detections across cloud, container, and on … metrics. Lead development of AI-driven detection proof-of-concepts Guide peers in building scalable, maintainable detection infrastructure and tuning detection content. Support strategic priorities like product detection assessments, threat-led risk prioritization, and production telemetry uplift. Minimum Qualifications Experience in detection engineering, security engineering, or software development with a focus on cybersecurity. Proven experience developing detections and integrations More ❯
and production environments and will directly impact our ability to detect, respond to, and prevent cyber threats at scale. As a senior individual contributor reporting to the Director of ThreatIntelligence and Detections, you will play a central role in the technical leadership of the Detection Engineering team. You’ll mentor junior engineers, help define engineering direction, and … lead the development of scalable, innovative threat detection solutions—including those leveraging AI and cloud-native technologies. This is a hybrid role and you must live within commutable distance to our Guildford office where you will need to work in the office 3 days per week. Key Responsibilities Design, develop, and operationalize advanced detections across cloud, container, and on … metrics. Lead development of AI-driven detection proof-of-concepts Guide peers in building scalable, maintainable detection infrastructure and tuning detection content. Support strategic priorities like product detection assessments, threat-led risk prioritization, and production telemetry uplift. Minimum Qualifications Experience in detection engineering, security engineering, or software development with a focus on cybersecurity. Proven experience developing detections and integrations More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
and interpret evidence to provide a holistic view of the organisation's security posture. Present findings and recommendations to senior leadership and governance forums. Collaborate with internal teams (e.g., threatintelligence, compliance, audit) to ensure assurance activities reflect current threat landscapes. Act as a primary interface for business units, ensuring alignment between assurance activities and operational priorities. … talent. Ability to interpret complex technical and business information to assess risk. Experience in supply chain security assurance. Knowledge of secure by design principles and accreditation processes. Understanding of threatintelligence and its application in assurance. Experience working in regulated or high-assurance environments (e.g., government, finance, defence). Familiarity with risk management tools and methodologies. What's More ❯
are followed, and directly engage with clients and delivery managers to provide expert guidance on incident handling. This is a hands-on technical leadership role that combines investigation, response, threatintelligence, and collaboration with stakeholders. You'll also support service improvement, tool optimisation, and the development of new SOC capabilities. Key Responsibilities Lead investigations into escalated incidents, providing … detailed analysis and containment strategies. Perform malware analysis, reverse engineering, and develop detection signatures. Integrate threatintelligence into SOC operations, staying ahead of emerging attack techniques. Manage and optimise SIEM tools (Splunk, QRadar, Microsoft Sentinel). Develop SOC use cases, runbooks, and playbooks to improve response capability. Collaborate with IT, legal, and management teams during incident response. Support More ❯
Join Police Digital Service an NMC Cyber ThreatIntelligence Specialist. Permanent FT. Starting salary £45,000 per annum. About Police Digital Service This is an opportunity to play your part and protect our company, our customers and our communities from cyber attack. Be part of a dedicated team and get ready to be challenged every day to make More ❯
Join Police Digital Service an NMC Cyber ThreatIntelligence Specialist. Permanent FT. Starting salary £45,000 per annum. About Police Digital Service This is an opportunity to play your part and protect our company, our customers and our communities from cyber attack. Be part of a dedicated team and get ready to be challenged every day to make More ❯