Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
ITS Recruitment
Cyber SecOps and ThreatIntelligence Specialist, Law Firm, Bristol We are seeking a Cyber Security and ThreatIntelligence Specialist to join an expanding team in this 3,000 user international Law Firm, strengthening its ability to detect, respond to, and prevent cyber threats. Location: Bristol Reports to: Head of Cyber Security Hybrid Role: 3-4 days … work from home The Role Play a key role in maturing incident response and threatintelligence functions Evolve and mature the firm's capability for detecting and responding to cyber incidents Help develop strategies and roadmaps for cyber security technology Assist in the research, selection and deployment of new technical security controls for use by the firm Provide … a point of technical authority and governance for the effective use of technical security controls across the firm Act as an escalation point for threat hunting and security incidents Investigate alerts from Azure/Defender, IT monitoring systems, and 3rd-party SOC, helping to ensure critical assets remain secure Manage supplier relationships, report on control effectiveness, and support compliance More ❯
Senior Cyber Security Engineer/ThreatIntelligence Specialist Bristol (Hybrid) | Up to £81,000 + Excellent Benefits Join a leading UK law firm shaping the future of cyber resilience. About the Role My client are seekinga Senior Cyber Security Engineer/ThreatIntelligence Specialist to strengthen and mature our firms cyber defence and incident response capabilities. … you thrive in a fast-paced environment, love to hunt for threats, and enjoy taking ownership of complex challenges this role is for you. What Youll Do Lead on threat detection, hunting, and incident response, working with Azure/Defender, Sentinel, and third-party SOCs. Investigate alerts and coordinate responses with internal IT teams and external managed SOCs. Continuously … monitor, enhance, and report on security controls across cloud and infrastructure environments. Stay ahead of the latest vulnerabilities, attacker techniques, and threat trends. Collaborate with IT Operations to safeguard key business assets. Contribute to the development of new cyber technologies, strategies, and roadmaps aligned to firm-wide IT goals. Manage vendor relationships and support supplier selection. Ensure compliance with More ❯
SOC Security Specialist We are looking for a highly capable and technically skilled Security Analyst to join our cybersecurity team. This role focuses on network and endpoint security operations, threatintelligence, and incident response within a Security Operations Centre (SOC) environment. The successful candidate will have hands-on experience with leading security platforms and demonstrate the ability to … operate at a team lead level. Key Responsibilities: Network Detection & Response: Administer and optimise Darktrace for network threat detection, model tuning, and behavioural analysis. Investigate anomalies and escalate incidents based on network telemetry. Endpoint Protection: Deploy and manage CrowdStrike Falcon agents across enterprise endpoints. Maintain and update detection rules, ensuring alignment with threat intelligence. Security Operations Centre (SOC … a Level 2 SOC Analyst and Incident Handler. Triage, investigate, and respond to security alerts and incidents. Collaborate with other SOC team members to ensure timely resolution and documentation. ThreatIntelligence & Insider Threat Monitoring: Monitor threat feeds and manage Indicators of Compromise (IOCs). Conduct insider threat analysis and support investigations. Cloud & Identity Security: Use More ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Bristol/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter … you will be responsible for proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITRE ATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and … as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, ThreatIntelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding of network protocols, operating systems (Windows, Linux More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Edinburgh/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter … you will be responsible for proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITRE ATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and … as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, ThreatIntelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding of network protocols, operating systems (Windows, Linux More ❯
Peterborough, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Peterborough/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter … you will be responsible for proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITRE ATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and … as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, ThreatIntelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding of network protocols, operating systems (Windows, Linux More ❯
Coventry, England, United Kingdom Hybrid / WFH Options
NLB Services
Hybrid - 3 days/week) Type of employment - Contract (Initially 6 months) Job Description: Role: 10+ years of experience in Cyber security Designing & implementation on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration Configure … Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and minimal false positives. ThreatIntelligence Integration Integrate threatintelligence feeds into Sentinel to enhance detection capabilities and contextualize alerts … landscape. Incident Response Automation Design and implement playbooks using Logic Apps to automate incident response workflows for common OT security events. Execution of the use cases on SIEM, SOAR & ThreatIntelligence Build custom workbooks and dashboards to visualize OT security posture, threat trends, and SOC performance metrics. More ❯
a team at the heart of the global economy! The Department for International Trade (DIT) and Inspire People are partnering together to bring you an exciting opportunity for a Threat and Vulnerability Manager to protect DIT and the wider UK government from cyber threats in a fast paced and exciting role, responsible for the Vulnerability Management and Threat … wider UK government from cyber threats in a fast paced and exciting role. Reporting to the Head of Cyber Security Operations, you will manage and be responsible for the Threat and Vulnerability Management function within the SOC, by providing leadership on identification and improvement opportunities, and ensuring service owners are aware of weaknesses in their security posture and are … day-to-day role will involve the need to: Working with the Security Leadership team to develop a strategic road map for an effective vulnerability detection, assessment, remediation, and threatintelligence program. Line management of the threat and vulnerability management team. Building sustainable relationships to champion the adoption of vulnerability and threat management, compliance, and penetration More ❯
SENIOR THREATINTELLIGENCE ANALYST Fully Remote Up to £100,000 + Excellent Staff Bens + Share Scheme SECURE has Strategically Partnered with a Multi-Award-Winning, Software-Based Organisation at the Forefront of Pre-Emptive Exposure Management. As a market leader backed by significant Venture Funding, they combine proactive ThreatIntelligence, Real Attacker Telemetry & Automated Red More ❯
Senior Cyber Security Engineer/ThreatIntelligence Specialist Bristol (Hybrid) Up to £81,000 + Excellent Benefits Join a leading UK law firm shaping the future of cyber resilience. About the Role My client are seekinga Senior Cyber Security Engineer/ThreatIntelligence Specialist to strengthen and mature our firms cyber defence and incident response capabilities More ❯
to make our clients safer and more secure against cyber threats by helping them understand the motivations of relevant actors, identifying their targets and how they operate. The Global ThreatIntelligence Team has built a very strong reputation when it comes to collecting our own data and combining this with open and commercial sources. This role involves analysis … of cyber threats, the development of actionable intelligence, and collaboration with various teams. Your support to the wider organisation will be critical in the development of NCC Group’s ThreatIntelligence capabilities and the broader service we offer. Key Accountabilities: Malware Analysis and Response: Conduct in-depth static and dynamic analysis of new and emerging malware threats … Collaborate with external partners, information-sharing communities, and industry forums to stay updated on new malware threats and to share intelligence. Technical Skills: Proven experience as a Malware Analyst, ThreatIntelligence Analyst, or similar role with a focus on malware research and response. Strong knowledge of reverse engineering tools and techniques for malware analysis, including tools like IDA More ❯
to make our clients safer and more secure against cyber threats by helping them understand the motivations of relevant actors, identifying their targets and how they operate. The Global ThreatIntelligence Team has built a very strong reputation when it comes to collecting our own data and combining this with open and commercial sources. This role involves analysis … of cyber threats, the development of actionable intelligence, and collaboration with various teams. Your support to the wider organisation will be critical in the development of NCC Group’s ThreatIntelligence capabilities and the broader service we offer. Key Accountabilities: Malware Analysis and Response: Conduct in-depth static and dynamic analysis of new and emerging malware threats … Collaborate with external partners, information-sharing communities, and industry forums to stay updated on new malware threats and to share intelligence. Technical Skills: Proven experience as a Malware Analyst, ThreatIntelligence Analyst, or similar role with a focus on malware research and response. Strong knowledge of reverse engineering tools and techniques for malware analysis, including tools like IDA More ❯
An exciting opportunity has arisen for an accomplished SOC Incident Response & Threat Hunting Manager to lead a high-performing team within a dynamic and evolving Security Operations Centre (SOC) environment. This critical role is ideal for a technically proficient cybersecurity professional with a passion for proactive defence, threatintelligence, and strategic leadership. The successful candidate will oversee … a team of Tier 3 Security and Incident Response Analysts, driving advanced incident response, digital forensics, and threat hunting operations across a diverse customer base. Acting as a technical authority, the role will play a pivotal part in enhancing cyber resilience, refining detection capabilities, and leading complex investigations from detection through to remediation and review. Key Responsibilities Lead, mentor … and develop a team of senior SOC analysts, ensuring the delivery of effective and efficient incident response and threat hunting operations. Oversee and coordinate high-severity incident response engagements, acting as incident lead when required, and guiding cross-functional teams through time-critical decision-making. Provide expert oversight on complex security incidents, ensuring technical accuracy, rapid containment, and detailed More ❯
We are seeking a highly skilled and experienced SOC Incident Response & Threat Hunting Manager to join our growing Security Operations Centre. This pivotal role will be responsible for leading our Tier 3 Security and Incident Response Analysts, overseeing advanced incident response activities, driving proactive threat hunting initiatives, and providing strategic direction for the Cyber ThreatIntelligence … incident response (DFIR), and a proactive mindset to anticipate and neutralise sophisticated and evolving cyber threats. Key Responsibilities: Provide expert guidance and technical oversight on complex security incidents and threat hunting operations. Lead and coordinate high-severity incident response engagements, acting as the primary incident lead when required. This includes managing cross-functional teams, communications, and critical decision-making … under pressure. Ensure all incident response and threat hunting activities are thoroughly documented, with comprehensive reporting delivered to stakeholders. Drive the strategic development and maturity of the CTI team, enhancing their capabilities, visibility, and the actionable insights derived from their research—both internally and for customers. Collaborate closely with CTI and Detection Engineering teams to translate raw intelligenceMore ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
Cloud People
and managed services to customers across enterprise, public sector and fast growing scale ups. Its Security Practice protects clients through a powerful mix of Managed Detection and Response (MDR), Threat Hunting, Vulnerability Management, Penetration Testing and Incident Response, supported by a world class Security Advisory function. As a Senior SOC Analyst, you will take a leading role in identifying … detection and response capabilities. This is an opportunity to make a genuine impact, with the freedom to innovate and the support to grow into roles such as SOC Lead, Threat Hunter, Security Engineer or Incident Responder. Why This Role Stands Out Join a $1B global IT and Cyber Defence provider that invests heavily in people and technology Work with … remediation Providing technical guidance and mentoring to junior analysts within the SOC Developing and tuning detection use cases, correlation rules and playbooks in SIEM and EDR tools Conducting proactive threat hunting across diverse customer environments Working with engineering teams to enhance visibility, automation and telemetry Supporting incident response and coordinating remediation across teams Producing detailed incident reports and contributing More ❯
SOC Incident Response & Threat Hunting Manager Fully Remote (UK-based) | Up to £85,000 + 10–15% Bonus + £6k Car Allowance + Excellent Benefits (Occasional travel to Warrington, approx. once per quarter) Our client is expanding their virtual Security Operations Centre (vSOC) and looking for an experienced SOC Incident Response & Threat Hunting Manager to lead and develop … a hands-on leadership role, ideal for someone who’s equally comfortable managing people and tackling complex security incidents directly. You’ll guide analysts through live investigations, lead advanced threat hunting operations, and help shape the strategy for the Cyber ThreatIntelligence (CTI) capability. The focus is on leadership through technical excellence — combining deep expertise in DFIR … threat hunting, and detection engineering with a proactive approach to strengthening security posture across diverse customer environments. The Role Lead and mentor Tier 3 SOC and Incident Response Analysts. Act as the technical lead on high-severity security incidents from initial detection through to post-incident review. Design and execute advanced threat hunting exercises, integrating intelligence from More ❯
Tier 3 Security and Incident Response team within a dynamic Security Operations Centre (SOC). This critical, technical leadership role drives advanced incident response (IR), digital forensics (DFIR), and threat hunting operations across a diverse customer base. The SOC manager will act as the technical authority for complex investigations, dramatically enhancing cyber resilience and refining detection capabilities. Key Responsibilities … Lead & Develop: Mentor and lead senior SOC analysts in effective IR and threat hunting. Incident Ownership: Oversee and coordinate as a SOC Manager & Lead on high-severity IR, acting as incident lead and guiding cross-functional teams. Technical Expertise: Provide expert oversight, ensuring rapid containment and detailed documentation for complex security incidents. ThreatIntelligence: Drive the maturity … of the Cyber ThreatIntelligence (CTI) capability, making intelligence actionable. Proactive Defence: Design and lead advanced threat hunting exercises leveraging deep knowledge of adversary TTPs (Tactics, Techniques, and Procedures). Stakeholder Reporting: Deliver comprehensive incident reports and recommendations. Training: Develop and deliver in-house training, including tabletop exercises and forensic challenges as the SOC Manager. Essential More ❯
Do you want to be at the forefront of intelligence-driven cybersecurity? We at Centripetal are innovators of disruptive cybersecurity solutions. Our CleanINTERNET managed service operationalizes billions of threat indicators in real-time to prevent over 90% of known threats against enterprise networks. Our customers love us for reducing their cybersecurity risks and enabling their security operations to … be more proactive, focused and efficient. Our Intelligence Services is a group within Centripetal that analyzes cyber threatintelligence to envision and create new technologies that power our managed service offerings. We focus on bold ideas around how to leverage data in cyber defense and pursue strategic initiatives that aim to paradigm-shift the cybersecurity landscape. This … position has an impactful role in helping visualize and operationalize the findings of Intelligence Services to create and deliver a cutting edge user experience with actionable insights for our customers. Position: Senior Software Engineer, Intelligence Services Location: Galway, Ireland (in person/Hybrid) What you would do: Be a member of a high performing product development team. Be More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Love2shop
critical assets, and driving the integration of automation and AI to enhance our security operations. Security Analysis Monitor and analyse security alerts to detect threats, using behavioural analytics and threatintelligence to uncover anomalies. You’ll also conduct proactive threat hunting and maintain detailed risk profiles for users, systems, and applications to support a strong security posture. … and compliance, performing daily health checks and resolving any issues that arise. Working closely with Infrastructure teams, you’ll ensure endpoint configurations meet organisational standards. You’ll also enhance threat-hunting capabilities by integrating threatintelligence and correlating EDR data with SIEM and XDR platforms for deeper insights. Data Loss Prevention (DLP) In this part of the … response lifecycle from containment to recovery. You’ll document incidents thoroughly, follow established playbooks, and help improve them over time. Automation will be key to streamlining investigations and enriching threat intelligence. Testing and Validation You’ll take part in cyber crisis simulations, penetration testing, and table-top exercises to ensure our defences are robust and response plans are effective. More ❯
Welwyn Garden City, England, United Kingdom Hybrid / WFH Options
PayPoint plc
critical assets, and driving the integration of automation and AI to enhance our security operations. Security Analysis Monitor and analyse security alerts to detect threats, using behavioural analytics and threatintelligence to uncover anomalies. You’ll also conduct proactive threat hunting and maintain detailed risk profiles for users, systems, and applications to support a strong security posture. … and compliance, performing daily health checks and resolving any issues that arise. Working closely with Infrastructure teams, you’ll ensure endpoint configurations meet organisational standards. You’ll also enhance threat-hunting capabilities by integrating threatintelligence and correlating EDR data with SIEM and XDR platforms for deeper insights. Data Loss Prevention (DLP) In this part of the … response lifecycle from containment to recovery. You’ll document incidents thoroughly, follow established playbooks, and help improve them over time. Automation will be key to streamlining investigations and enriching threat intelligence. Testing and Validation You’ll take part in cyber crisis simulations, penetration testing, and table-top exercises to ensure our defences are robust and response plans are effective. More ❯
maintained and augmented and that the team members have every opportunity to grow and learn with the organisation. As part of our Blue Team, you’ll use the latest intelligence and tooling to analyse information systems to ensure effective incident detection and response. Job Description If you are looking to make your mark on a rapidly growing SecOps team … join our Blue Team. The ideal candidate will be a self-starter with an inquisitive nature and a keen interest when it comes to technical cybersecurity topics such as threat hunting, attacker tactics and techniques, monitoring and alerting, threatintelligence, and incident readiness and response. Key responsibilities of the role are summarised below: · Security monitoring and incident … the Splunk SIEM, to enable the detection of threats across diverse platforms (e.g. cloud, endpoints, and networks) · Use frameworks like MITRE ATT&CK to map detection rules and maximise threat coverage · Use analytical platforms to query high volume datasets to identify trends and spot unusual behaviours, indicative of malicious activity · Proactive threat hunting using available client data · Collection More ❯
CYSA+, SEC+, BLT1, SC-900 etc... This could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands on experience: - Threat Detection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct forensic investigations, and support … remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threatintelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication – Work closely and collaborate with senior analysts and clients to keep security operations running smoothly. The Ideal Profile: - Experience in an IT-focused … cybersecurity and SOC operations. Proactive and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threatintelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration drive success. Ready to elevate More ❯
problem-solving capabilities. English is a must Desirable Skills & Experience: Certifications such as CompTIA Security+, CySA+, CEH, or equivalent. Experience with GRC (Governance, Risk, and Compliance) platforms. Knowledge of threatintelligence platforms and their application (e.g., Mandiant ThreatIntelligence, MISP). Splunk certifications such as Splunk Core Certified User, Power User, or Admin. Proficiency in scripting More ❯
renewable energy assets, and millions of customers. Your Responsibilities (Up to 10, avoid repetition) Design and own the architecture for ServiceNow SecOps modules - including Security Incident Response , Vulnerability Response , ThreatIntelligence , and Configuration Compliance . Lead integration of ServiceNow with key cybersecurity tools - SIEM , SOAR , EDR , CMDB , ThreatIntelligence platforms , and OT/ICS systems . … native security practices and experience integrating security controls into CI/CD pipelines , supporting digital transformation and automation initiatives. AI/ML in Security Operations: Exposure to leveraging artificial intelligence or machine learning techniques to improve threat detection , incident analysis , or automated response capabilities within SecOps. More ❯
powerful modules such as Extended Detection & Response (XDR), Security Information and Event Management (SIEM), a 24/7 operational Security Operations Center (SOC) , as well as specialized solutions for ThreatIntelligence, Incident Response, and Behavioral Security Training. Leveraging artificial intelligence, automated playbooks, and real-time data analysis , Decanos helps companies detect security incidents early and respond effectively. … secure coding, performance optimization, and database design . Process and analyze security data , working with SIEMs, EDRs, and real-time event processing. Work closely with security analysts to translate threatintelligence into automated detection and response features. Own and drive system architecture decisions , ensuring scalability and maintainability. Foster a collaborative team environment , helping junior developers grow their expertise. More ❯