North London, London, United Kingdom Hybrid / WFH Options
Secure Recruitment Ltd
SENIOR THREATINTELLIGENCE ANALYST Fully Remote Up to £100,000 + Excellent Staff Bens + Share Scheme SECURE has Strategically Partnered with a Multi-Award-Winning, Software-Based Organisation at the Forefront of Pre-Emptive Exposure Management. As a market leader backed by significant Venture Funding, they combine proactive ThreatIntelligence, Real Attacker Telemetry & Automated Red … Teaming to Continuously Identify & Validate Real Exposure. Success in this position will enable the business to Transform Raw Intelligence into Actionable Insights that Protect Fortune 500 Companies & Critical Infrastructure Providers, helping them outrun Real-World Threats in Real-Time. Role Overview: We're looking to speak with ambitious Senior ThreatIntelligence Analyst to Expand Offensive Security Capabilities … around Honeypot Data Analysis. You'll Design & Deploy Detections for N-Day & 0-Day Exploits using a Global Network, Develop CTI Platforms for Real-Time Threat Analysis, Drive Rapid Reaction Efforts & Author ThreatIntelligence Reports. Ideally based in the UK, you don't need to tick every box - if you're motivated to make an impact, read More ❯
Houston, Texas, United States Hybrid / WFH Options
K.L. McKinney
Key Responsibilities: ThreatIntelligence Collection & Analysis Gather and analyze threatintelligence from open sources (OSINT), dark web, threat feeds, and industry reports. Identify Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) used by threat actors. Track Advanced Persistent Threats (APTs) and emerging cyber threats relevant to the organization. Threat Detection & Response … Support Collaborate with SOC analysts, incident responders, and security engineers to enhance cyber defenses. Provide real-time intelligence during security incidents to assist in rapid response. Develop YARA rules, Sigma rules, and threat hunting queries to detect malicious activity. Malware Analysis & Forensics Analyze malware samples, phishing campaigns, and exploit techniques used in attacks. Reverse-engineer malware to extract … IOCs and behavioral patterns. Contribute to the development of security detections, playbooks, and automated threat response. ThreatIntelligence Reporting & Communication Create intelligence reports, dashboards, and risk assessments for stakeholders. Provide threat briefings and recommendations to security teams and leadership. Maintain documentation of threat actor profiles, attack campaigns, and evolving threats. Security Strategy & Continuous Improvement More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Advanced Resource Managers
days office based Must have CHECK CTL and certified Role Overview: We are seeking a highly skilled and experienced Offensive Security Consultant with a strong focus understanding on threatintelligence and attack methods. The ideal candidate will be responsible for managing and conducting advanced penetration testing engagements, leveraging threatintelligence to simulate real-world attacks across … ability to provide strategic and actionable recommendations to significantly enhance our clients' security posture. Responsibilities: Lead and manage the full lifecycle of complex penetration testing engagements, applying a strong threatintelligence-led approach. Execute advanced penetration tests across a broad range of environments (applications, infrastructure, web, APIs, O365, Azure, AWS, OT), directly applying your knowledge of current threat landscapes and attacker TTPs. Develop and maintain sophisticated test plans, execution plans, and targeted use cases directly informed by in-depth threatintelligence analysis. Identify and prioritize OT and IT assets, services, and systems based on their criticality and potential exposure to identified threats. Strategically prioritize, plan, and schedule penetration testing engagements based on comprehensive threatMore ❯
days office based Must have CHECK CTL and certified Role Overview: We are seeking a highly skilled and experienced Offensive Security Consultant with a strong focus understanding on threatintelligence and attack methods. The ideal candidate will be responsible for managing and conducting advanced penetration testing engagements, leveraging threatintelligence to simulate real-world attacks across … ability to provide strategic and actionable recommendations to significantly enhance our clients' security posture. Responsibilities: Lead and manage the full lifecycle of complex penetration testing engagements, applying a strong threatintelligence-led approach. Execute advanced penetration tests across a broad range of environments (applications, infrastructure, web, APIs, O365, Azure, AWS, OT), directly applying your knowledge of current threat landscapes and attacker TTPs. Develop and maintain sophisticated test plans, execution plans, and targeted use cases directly informed by in-depth threatintelligence analysis. Identify and prioritize OT and IT assets, services, and systems based on their criticality and potential exposure to identified threats. Strategically prioritize, plan, and schedule penetration testing engagements based on comprehensive threatMore ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
ITS Recruitment
Cyber SecOps and ThreatIntelligence Specialist, Law Firm, Bristol We are seeking a Cyber Security and ThreatIntelligence Specialist to join an expanding team in this 3,000 user international Law Firm, strengthening its ability to detect, respond to, and prevent cyber threats. Location: Bristol Reports to: Head of Cyber Security Hybrid Role: 3-4 days … work from home The Role Play a key role in maturing incident response and threatintelligence functions Evolve and mature the firm's capability for detecting and responding to cyber incidents Help develop strategies and roadmaps for cyber security technology Assist in the research, selection and deployment of new technical security controls for use by the firm Provide … a point of technical authority and governance for the effective use of technical security controls across the firm Act as an escalation point for threat hunting and security incidents Investigate alerts from Azure/Defender, IT monitoring systems, and 3rd-party SOC, helping to ensure critical assets remain secure Manage supplier relationships, report on control effectiveness, and support compliance More ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Bristol/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter … you will be responsible for proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITRE ATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and … as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, ThreatIntelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding of network protocols, operating systems (Windows, Linux More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Edinburgh/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter … you will be responsible for proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITRE ATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and … as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, ThreatIntelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding of network protocols, operating systems (Windows, Linux More ❯
Peterborough, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Peterborough/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter … you will be responsible for proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITRE ATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and … as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, ThreatIntelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding of network protocols, operating systems (Windows, Linux More ❯
Coventry, England, United Kingdom Hybrid / WFH Options
NLB Services
Hybrid - 3 days/week) Type of employment - Contract (Initially 6 months) Job Description: Role: 10+ years of experience in Cyber security Designing & implementation on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration Configure … Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and minimal false positives. ThreatIntelligence Integration Integrate threatintelligence feeds into Sentinel to enhance detection capabilities and contextualize alerts … landscape. Incident Response Automation Design and implement playbooks using Logic Apps to automate incident response workflows for common OT security events. Execution of the use cases on SIEM, SOAR & ThreatIntelligence Build custom workbooks and dashboards to visualize OT security posture, threat trends, and SOC performance metrics. More ❯
a team at the heart of the global economy! The Department for International Trade (DIT) and Inspire People are partnering together to bring you an exciting opportunity for a Threat and Vulnerability Manager to protect DIT and the wider UK government from cyber threats in a fast paced and exciting role, responsible for the Vulnerability Management and Threat … wider UK government from cyber threats in a fast paced and exciting role. Reporting to the Head of Cyber Security Operations, you will manage and be responsible for the Threat and Vulnerability Management function within the SOC, by providing leadership on identification and improvement opportunities, and ensuring service owners are aware of weaknesses in their security posture and are … day-to-day role will involve the need to: Working with the Security Leadership team to develop a strategic road map for an effective vulnerability detection, assessment, remediation, and threatintelligence program. Line management of the threat and vulnerability management team. Building sustainable relationships to champion the adoption of vulnerability and threat management, compliance, and penetration More ❯
SENIOR THREATINTELLIGENCE ANALYST Fully Remote Up to £100,000 + Excellent Staff Bens + Share Scheme SECURE has Strategically Partnered with a Multi-Award-Winning, Software-Based Organisation at the Forefront of Pre-Emptive Exposure Management. As a market leader backed by significant Venture Funding, they combine proactive ThreatIntelligence, Real Attacker Telemetry & Automated Red More ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
Cloud People
and managed services to customers across enterprise, public sector and fast growing scale ups. Its Security Practice protects clients through a powerful mix of Managed Detection and Response (MDR), Threat Hunting, Vulnerability Management, Penetration Testing and Incident Response, supported by a world class Security Advisory function. As a Senior SOC Analyst, you will take a leading role in identifying … detection and response capabilities. This is an opportunity to make a genuine impact, with the freedom to innovate and the support to grow into roles such as SOC Lead, Threat Hunter, Security Engineer or Incident Responder. Why This Role Stands Out Join a $1B global IT and Cyber Defence provider that invests heavily in people and technology Work with … remediation Providing technical guidance and mentoring to junior analysts within the SOC Developing and tuning detection use cases, correlation rules and playbooks in SIEM and EDR tools Conducting proactive threat hunting across diverse customer environments Working with engineering teams to enhance visibility, automation and telemetry Supporting incident response and coordinating remediation across teams Producing detailed incident reports and contributing More ❯
SOC Incident Response & Threat Hunting Manager Fully Remote (UK-based) | Up to £85,000 + 10–15% Bonus + £6k Car Allowance + Excellent Benefits (Occasional travel to Warrington, approx. once per quarter) Our client is expanding their virtual Security Operations Centre (vSOC) and looking for an experienced SOC Incident Response & Threat Hunting Manager to lead and develop … a hands-on leadership role, ideal for someone who’s equally comfortable managing people and tackling complex security incidents directly. You’ll guide analysts through live investigations, lead advanced threat hunting operations, and help shape the strategy for the Cyber ThreatIntelligence (CTI) capability. The focus is on leadership through technical excellence — combining deep expertise in DFIR … threat hunting, and detection engineering with a proactive approach to strengthening security posture across diverse customer environments. The Role Lead and mentor Tier 3 SOC and Incident Response Analysts. Act as the technical lead on high-severity security incidents from initial detection through to post-incident review. Design and execute advanced threat hunting exercises, integrating intelligence from More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Love2shop
critical assets, and driving the integration of automation and AI to enhance our security operations. Security Analysis Monitor and analyse security alerts to detect threats, using behavioural analytics and threatintelligence to uncover anomalies. You’ll also conduct proactive threat hunting and maintain detailed risk profiles for users, systems, and applications to support a strong security posture. … and compliance, performing daily health checks and resolving any issues that arise. Working closely with Infrastructure teams, you’ll ensure endpoint configurations meet organisational standards. You’ll also enhance threat-hunting capabilities by integrating threatintelligence and correlating EDR data with SIEM and XDR platforms for deeper insights. Data Loss Prevention (DLP) In this part of the … response lifecycle from containment to recovery. You’ll document incidents thoroughly, follow established playbooks, and help improve them over time. Automation will be key to streamlining investigations and enriching threat intelligence. Testing and Validation You’ll take part in cyber crisis simulations, penetration testing, and table-top exercises to ensure our defences are robust and response plans are effective. More ❯
Welwyn Garden City, England, United Kingdom Hybrid / WFH Options
PayPoint plc
critical assets, and driving the integration of automation and AI to enhance our security operations. Security Analysis Monitor and analyse security alerts to detect threats, using behavioural analytics and threatintelligence to uncover anomalies. You’ll also conduct proactive threat hunting and maintain detailed risk profiles for users, systems, and applications to support a strong security posture. … and compliance, performing daily health checks and resolving any issues that arise. Working closely with Infrastructure teams, you’ll ensure endpoint configurations meet organisational standards. You’ll also enhance threat-hunting capabilities by integrating threatintelligence and correlating EDR data with SIEM and XDR platforms for deeper insights. Data Loss Prevention (DLP) In this part of the … response lifecycle from containment to recovery. You’ll document incidents thoroughly, follow established playbooks, and help improve them over time. Automation will be key to streamlining investigations and enriching threat intelligence. Testing and Validation You’ll take part in cyber crisis simulations, penetration testing, and table-top exercises to ensure our defences are robust and response plans are effective. More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Cyber SecOps and ThreatIntelligence Specialist, Law Firm, Bristol We are seeking a Cyber Security and ThreatIntelligence Specialist to join an expanding team in this 3,000 user international Law Firm, strengthening its ability to detect, respond to, and prevent cyber threats. Location: Bristol Reports to: Head of Cyber Security Hybrid Role: 3-4 days More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
and interpret evidence to provide a holistic view of the organisation's security posture. Present findings and recommendations to senior leadership and governance forums. Collaborate with internal teams (e.g., threatintelligence, compliance, audit) to ensure assurance activities reflect current threat landscapes. Act as a primary interface for business units, ensuring alignment between assurance activities and operational priorities. … talent. Ability to interpret complex technical and business information to assess risk. Experience in supply chain security assurance. Knowledge of secure by design principles and accreditation processes. Understanding of threatintelligence and its application in assurance. Experience working in regulated or high-assurance environments (e.g., government, finance, defence). Familiarity with risk management tools and methodologies. What's More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
and interpret evidence to provide a holistic view of the organisation's security posture. Present findings and recommendations to senior leadership and governance forums. Collaborate with internal teams (e.g., threatintelligence, compliance, audit) to ensure assurance activities reflect current threat landscapes. Act as a primary interface for business units, ensuring alignment between assurance activities and operational priorities. … talent. Ability to interpret complex technical and business information to assess risk. Experience in supply chain security assurance. Knowledge of secure by design principles and accreditation processes. Understanding of threatintelligence and its application in assurance. Experience working in regulated or high-assurance environments (e.g., government, finance, defence). Familiarity with risk management tools and methodologies. What's More ❯
attacks, phishing attempts, and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and … networks, in alignment with best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. Lead and coordinate incident response efforts, including root cause analysis, threat containment and post-incident reporting for clients. Collaborate with the Project and Service Desk teams to embed security into deployments, migrations, upgrades, and automation workflows, ensuring systems remain secure by design. Maintain … is shared across the team for rapid incident handling. Provide mentorship and cybersecurity guidance to junior engineers and Service Desk staff, fostering a culture of security awareness and proactive threat management. Perform ongoing threatintelligence monitoring and security trend analysis to anticipate risks and protect client environments. Support clients in security reporting, compliance reviews, and continuous improvement More ❯
City of London, London, United Kingdom Hybrid / WFH Options
MFK Recruitment
attacks, phishing attempts, and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and … networks, in alignment with best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. Lead and coordinate incident response efforts, including root cause analysis, threat containment and post-incident reporting for clients. Collaborate with the Project and Service Desk teams to embed security into deployments, migrations, upgrades, and automation workflows, ensuring systems remain secure by design. Maintain … is shared across the team for rapid incident handling. Provide mentorship and cybersecurity guidance to junior engineers and Service Desk staff, fostering a culture of security awareness and proactive threat management. Perform ongoing threatintelligence monitoring and security trend analysis to anticipate risks and protect client environments. Support clients in security reporting, compliance reviews, and continuous improvement More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
MFK Recruitment
attacks, phishing attempts, and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and … networks, in alignment with best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. Lead and coordinate incident response efforts, including root cause analysis, threat containment and post-incident reporting for clients. Collaborate with the Project and Service Desk teams to embed security into deployments, migrations, upgrades, and automation workflows, ensuring systems remain secure by design. Maintain … is shared across the team for rapid incident handling. Provide mentorship and cybersecurity guidance to junior engineers and Service Desk staff, fostering a culture of security awareness and proactive threat management. Perform ongoing threatintelligence monitoring and security trend analysis to anticipate risks and protect client environments. Support clients in security reporting, compliance reviews, and continuous improvement More ❯
incidents within KPMG’s Global Information Security Services (ISS) function. ISS delivers and oversees critical cybersecurity capabilities—including Security Monitoring & Response (SMR), Vulnerability Assessment & Secure Development (VASD), and Cyber ThreatIntelligence (CTI)—across Global, Global Functions, and the broader KPMG network of member firms. This position offers an exciting opportunity to join a progressive and innovation-driven security More ❯
Crawley, England, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
within a dedicated Security Operations Centre, working at the forefront of protecting high-value national assets. The successful candidate will act as a technical authority for advanced incident response, threat hunting, and security engineering, with a strong focus on the Microsoft security stack. Key Responsibilities Serve as the primary escalation point for complex incidents and lead on incident response. … Conduct in-depth threat hunting, forensic investigations, and root cause analysis. Develop, test, and optimise detection use cases, rules, and playbooks within Microsoft Sentinel and Defender. Provide mentorship and guidance to junior SOC analysts, enhancing team capability. Collaborate with IT and OT teams to address unique security requirements across CNI environments. Drive improvements in SOC operations, automation, and incident … response processes. Monitor evolving threats and integrate threatintelligence into daily operations. Ensure adherence to industry standards and compliance frameworks (NIS2, CAF, ISO 27001). Skills & Experience Required Extensive background in SOC operations, incident response, and threat hunting. Expertise with the Microsoft security stack, including: Microsoft Sentinel (SIEM/SOAR) Microsoft Defender for Endpoint, Identity, Cloud Apps More ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
Cloud People
IT outsourcing and managed services to customers across enterprise, public sector and fast growing scale ups. Its Security Practice protects clients through capabilities including Managed Detection and Response (MDR), Threat Hunting, Vulnerability Management, Penetration Testing and Incident Response, supported by a consulting led Security Advisory practice. As a Senior Security Engineer, you will be responsible for designing, implementing and … inclusion • Paid training and certification pathways with clear routes into consultancy or leadership What You’ll Be Doing • Designing, deploying and maintaining core SOC technologies including SIEM, EDR, SOAR, threatintelligence and logging infrastructure • Developing and refining detection use cases, correlation rules and analytics content • Building automation workflows and integrations through scripting or automation platforms • Collaborating with SOC … Engineering secure log ingestion pipelines across hybrid cloud and on prem environments • Supporting onboarding of new clients into the SOC to ensure correct configuration and data flow • Contributing to threat hunting and detection engineering initiatives • Maintaining documentation, diagrams and configuration standards • Mentoring junior engineers and analysts and sharing best practice What You’ll Bring • 3 to 5 years of More ❯
london, south east england, united kingdom Hybrid / WFH Options
myGwork - LGBTQ+ Business Community
security tools, with a focus on Data Loss Prevention (DLP) technologies. You will assist in configuring, tuning, and maintaining these tools to prevent sensitive data from leaving our organization. Threat Analysis: Contribute to threatintelligence and risk analysis efforts by researching new vulnerabilities and attack vectors. You will help us stay one step ahead of potential threats. More ❯