incidents in real-time. The ideal candidate will be responsible for detecting, investigating, and responding to security incidents across networks, endpoints, and cloud environments. This role requires expertise in threatintelligence, forensic analysis, and incident handling to minimize the impact of security breaches and strengthen the organizations cybersecurity posture. Key Responsibilities: Incident Detection & Response Monitor security alerts from … malware, phishing attacks, insider threats, and unauthorized access attempts. Respond to security incidents using established playbooks and frameworks. Conduct root cause analysis and implement containment, eradication, and recovery measures. Threat Analysis & Forensic Investigations Perform digital forensics and malware analysis to determine the nature and scope of attacks. Identify and extract indicators of compromise (IOCs) and tactics, techniques, and procedures … TTPs) used by attackers. Collaborate with threatintelligence teams to track adversary behavior and emerging threats. Security Operations & Reporting Document incident reports, timelines, and remediation actions. Develop and update incident response playbooks and standard operating procedures (SOPs). Participate in post-incident reviews to improve security controls and response strategies. Collaboration & Continuous Improvement Work closely with SOC analysts More ❯
findings clearly in reports and client presentations, tailoring communication for both technical and executive audiences. Work closely with clients to define forensic requirements and develop incident response playbooks. Conduct threat hunting and compromise assessments, correlating findings with threatintelligence (MITRE ATT&CK, TTPs, IOCs). Support cloud forensics in AWS and Azure, ensuring proper collection and handling … analytical, problem-solving, and documentation skills. Ability to translate complex forensic data into clear, client-friendly reports. Knowledge of chain of custody, evidential procedures, and forensic readiness. Familiarity with threatintelligence frameworks such as MITRE ATT&CK. Relevant certifications (desirable): GCFA, GCIH, CISSP, AWS Security Specialty, Azure Security Engineer. As an industry leading, nationwide Marketing, Digital, Analytics, IT More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Cyber SecOps and ThreatIntelligence Specialist, Law Firm, Bristol We are seeking a Cyber Security and ThreatIntelligence Specialist to join an expanding team in this 3,000 user international Law Firm, strengthening its ability to detect, respond to, and prevent cyber threats. Location: Bristol Reports to: Head of Cyber Security Hybrid Role: 3-4 days More ❯
Triage: Identify, analyse, and prioritize security incidents, escalating them as necessary within the team. Alert Management: Respond to security alerts, perform initial investigations, and document findings. Log Analysis/Threat Hunting: Review and analyse logs from various security tools and devices to identify potential security incidents within customer environments. Collaboration: Work closely with other team members and departments to … address security issues and improve the security posture. Reporting: Create and maintain detailed incident reports, periodic customer reports and documentation for future reference. ThreatIntelligence: Stay updated with the latest security threats, vulnerabilities, and technology trends. Assist in the development and maintenance of a comprehensive ThreatIntelligence Database and apply this data to assist in the More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
and interpret evidence to provide a holistic view of the organisation's security posture. Present findings and recommendations to senior leadership and governance forums. Collaborate with internal teams (e.g., threatintelligence, compliance, audit) to ensure assurance activities reflect current threat landscapes. Act as a primary interface for business units, ensuring alignment between assurance activities and operational priorities. … talent. Ability to interpret complex technical and business information to assess risk. Experience in supply chain security assurance. Knowledge of secure by design principles and accreditation processes. Understanding of threatintelligence and its application in assurance. Experience working in regulated or high-assurance environments (e.g., government, finance, defence). Familiarity with risk management tools and methodologies. What's More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
and interpret evidence to provide a holistic view of the organisation's security posture. Present findings and recommendations to senior leadership and governance forums. Collaborate with internal teams (e.g., threatintelligence, compliance, audit) to ensure assurance activities reflect current threat landscapes. Act as a primary interface for business units, ensuring alignment between assurance activities and operational priorities. … talent. Ability to interpret complex technical and business information to assess risk. Experience in supply chain security assurance. Knowledge of secure by design principles and accreditation processes. Understanding of threatintelligence and its application in assurance. Experience working in regulated or high-assurance environments (e.g., government, finance, defence). Familiarity with risk management tools and methodologies. What's More ❯
is designed for seasoned offensive security professionals with deep technical expertise and a passion for mentoring and developing junior talent. You will drive complex Red Team operations, collaborate across threatintelligence and detection engineering teams, and influence strategic improvements in detection and response capabilities across the enterprise. To ensure effective management and control of information security, IT and … and persistence operations in diverse environments Reverse engineer proof-of-concept exploits and assess their relevance and impact within MUFG's infrastructure Partner with Blue Team, Detection Engineering, and ThreatIntelligence to validate findings and enhance detection logic and response workflows Deliver clear, actionable reporting of findings, attack paths, and remediation strategies to both technical and executive stakeholders … languages (e.g., Python, PowerShell, Bash, C/C++) Expert-level understanding of Windows and Linux internals, Active Directory, and enterprise network architecture Experience with vulnerability research, exploit development, and threat emulation Strong knowledge of security frameworks such as MITRE ATT&CK, NIST-CSF, and OWASP Strong ability to analyse and distil complex issues and present succinct updates to management More ❯
is designed for seasoned offensive security professionals with deep technical expertise and a passion for mentoring and developing junior talent. You will drive complex Red Team operations, collaborate across threatintelligence and detection engineering teams, and influence strategic improvements in detection and response capabilities across the enterprise. To ensure effective management and control of information security, IT and … and persistence operations in diverse environments Reverse engineer proof-of-concept exploits and assess their relevance and impact within MUFG's infrastructure Partner with Blue Team, Detection Engineering, and ThreatIntelligence to validate findings and enhance detection logic and response workflows Deliver clear, actionable reporting of findings, attack paths, and remediation strategies to both technical and executive stakeholders More ❯
law, technology, and crisis management.This is not another practice group in a traditional firm - it's a high-performing business within a business, combining legal expertise with digital forensics, threatintelligence, and cyber risk engineering.If you want meaningful responsibility, the chance to grow something, and a clear path toward partnership or leadership, this is that moment.What You'll … crises — providing clear, strategic legal guidance under pressure. Supervise and mentor junior lawyers while helping shape the direction of the team. Work alongside leading experts in digital forensics and threatintelligence to deliver fully integrated incident response. Contribute to new products, knowledge, and thought leadership in a rapidly evolving field. Support business development and client-relationship initiatives that More ❯
Role: Cyber Threat Analyst Location: Any UK Salary: Competitive salary and package dependent on experience Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or more spent outside of the UK) and declaration of being a British … have a Cyber Security background, will perform as a client-facing role, and will be willing to contribute to our internal Digital Transformation strategy and expertise. As a Cyber Threat Analyst you will: As part of our Blue Team, you’ll use the latest intelligence and tooling to analyse information systems to ensure effective incident detection and response. … If you’re excited about the role and think you could make a difference, please get in touch. The following skills and experience are essential for this role: Proactive threat hunting using available client data and developing improvements to threat hunting capabilities Collection and interpretation of different sources of threatintelligence Actively researching emerging threats and More ❯
Consultant in Unit 42 you will have the opportunity to work across a number of proactive cyber security domains including Cloud Security, Security Operations, Cyber Risk Management and Artificial Intelligence in cyber security. We are seeking an individual who is passionate about cyber security, curious with a demonstrated track record of continuous learning, and has the technical acumen to … embrace data, technological and innovative approaches to deliver the best consulting outcomes for clients, as they work to address the challenges associated with today’s cyber threat landscape. Your Impact SOC Advisory: 4+ years of consulting experience in SOC, security engineering, SIEM administration, and incident management and demonstrated success with serving large, multinational organisations in designing and implementing an … Security Incident and Event Management (SIEM) platforms, Security Orchestration and Response (SOAR) technologies, Endpoint Protection and Response/Next Gen Protection and Response (EDR/XDR) tools, Next GenFirewalls, ThreatIntelligence and Hunting platforms Defensive Security Skills (desired) : Experience in security operations design, engineering and/or analysis and investigations, ideally in complex environments, with security event correlations More ❯
attacks, phishing attempts, and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and … networks, in alignment with best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. Lead and coordinate incident response efforts, including root cause analysis, threat containment and post-incident reporting for clients. Collaborate with the Project and Service Desk teams to embed security into deployments, migrations, upgrades, and automation workflows, ensuring systems remain secure by design. Maintain … is shared across the team for rapid incident handling. Provide mentorship and cybersecurity guidance to junior engineers and Service Desk staff, fostering a culture of security awareness and proactive threat management. Perform ongoing threatintelligence monitoring and security trend analysis to anticipate risks and protect client environments. Support clients in security reporting, compliance reviews, and continuous improvement More ❯
City of London, London, United Kingdom Hybrid / WFH Options
MFK Recruitment
attacks, phishing attempts, and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and … networks, in alignment with best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. Lead and coordinate incident response efforts, including root cause analysis, threat containment and post-incident reporting for clients. Collaborate with the Project and Service Desk teams to embed security into deployments, migrations, upgrades, and automation workflows, ensuring systems remain secure by design. Maintain … is shared across the team for rapid incident handling. Provide mentorship and cybersecurity guidance to junior engineers and Service Desk staff, fostering a culture of security awareness and proactive threat management. Perform ongoing threatintelligence monitoring and security trend analysis to anticipate risks and protect client environments. Support clients in security reporting, compliance reviews, and continuous improvement More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
MFK Recruitment
attacks, phishing attempts, and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and … networks, in alignment with best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. Lead and coordinate incident response efforts, including root cause analysis, threat containment and post-incident reporting for clients. Collaborate with the Project and Service Desk teams to embed security into deployments, migrations, upgrades, and automation workflows, ensuring systems remain secure by design. Maintain … is shared across the team for rapid incident handling. Provide mentorship and cybersecurity guidance to junior engineers and Service Desk staff, fostering a culture of security awareness and proactive threat management. Perform ongoing threatintelligence monitoring and security trend analysis to anticipate risks and protect client environments. Support clients in security reporting, compliance reviews, and continuous improvement More ❯
Job Title: SOC Incident Response & Threat Hunting Manager Location: Warrington, UK (Travel may be required) Flexible Working: "Work Your Way" available from day one Im working with a gold-standard IT Managed Service Provider renowned for delivering secure, enterprise-grade solutions across cloud, infrastructure, and cyber domains. Theyre expanding their Security Operations Centre and hiring a hands-on SOC … Incident Response & Threat Hunting Manager to lead Tier 3 analysts and drive proactive defence strategies. This is a strategic and technical leadership role, ideal for someone with deep DFIR expertise, strong mentoring capabilities, and a passion for threat hunting and CTI development. Key Responsibilities: Lead and coordinate high-severity incident response engagements Provide technical oversight and guidance on … threat hunting operations Translate threatintelligence into actionable hypotheses and use cases Design and execute advanced threat hunting exercises across varied environments Develop in-house training programmes for SOC analysts Drive CTI maturity and visibility across internal and customer-facing functions Ensure comprehensive documentation and stakeholder reporting Participate in the on-call rotation for critical incidents More ❯
consulting leader delivering secure, innovative solutions across industries. We foster collaboration, inclusion, and continuous growth, with networks supporting diversity, equity, and belonging. What You'll do: Lead and manage threatintelligence-led penetration tests across applications, infrastructure, cloud (AWS/Azure/O365), APIs, and OT Develop advanced test plans, identify critical assets, and deliver detailed, actionable reports … attack techniques to strengthen proactive security What You'll Bring: CREST CRT (or higher) certification - essential 5+ years' experience in penetration testing with strong understanding of adversarial tactics and threatintelligence Expertise across network, cryptography, vulnerabilities, and attack vectors Strong communication and reporting skills Experience with Breach Attack Simulation, vulnerability management, cloud security reviews (AWS/Azure/ More ❯
Network Threat & Vulnerability Analyst - Hybrid - Lancashire £60k to 68k 10.5% bonus 14% pension healthcare plus additional benefits. Network Threat & Vulnerability Analyst needed as part of a brand new team build in an extremely well funded growing cyber security team for this North West based enterprise level critical national infrastructure organisation. As a threat and vulnerability analyst in … this team the primary purpose of the role is to perform, threat analysis, security monitoring and some incident response to business processes comply with cyber security policy frameworks. You must have an investigative proactive mindset and be willing to grow and develop your skills. You will assist in responding to network-based incidents such as DDoS attacks, lateral movement … and collaborate with network teams to implement fixes. You will need as much of the following as possible: 2 to 3 years of experience in cybersecurity operations Experience in Threat Identification. Proficiency in using SIEM tools. Experience in analysing security events and alerts to identify potential threats and incidents. Understanding of network protocols, operating systems, and cybersecurity principles. Ability More ❯
Network Threat & Vulnerability Analyst - Hybrid - Lancashire £60k to 68k 10.5% bonus 14% pension healthcare plus additional benefits. Network Threat & Vulnerability Analyst needed as part of a brand new team build in an extremely well funded growing cyber security team for this North West based enterprise level critical national infrastructure organisation. As a threat and vulnerability analyst in … this team the primary purpose of the role is to perform, threat analysis, security monitoring and some incident response to business processes comply with cyber security policy frameworks. You must have an investigative proactive mindset and be willing to grow and develop your skills. You will assist in responding to network-based incidents such as DDoS attacks, lateral movement … and collaborate with network teams to implement fixes. You will need as much of the following as possible: 2 to 3 years of experience in cybersecurity operations Experience in Threat Identification. Proficiency in using SIEM tools. Experience in analysing security events and alerts to identify potential threats and incidents. Understanding of network protocols, operating systems, and cybersecurity principles. Ability More ❯
Job Title: SOC Incident Response & Threat Hunting Manager Location: Remote Salary: £75k - £85k plus 10% bonus and £6k car allowance Mon - Fri as well as an on-call rota - 1 week in 4. Candidates must be willing and eligible to go through SC security clearance for this role Job Description: We are seeking a highly skilled and experienced SOC … Incident Response & Threat Hunting Manager to join our growing Security Operations Centre. This pivotal role will be responsible for leading our Tier 3 Security and Incident Response Analysts, overseeing advanced incident response activities, driving proactive threat hunting initiatives, and providing strategic direction for the Cyber ThreatIntelligence (CTI) capability. This is a hands-on leadership position … incident response (DFIR), and a proactive mindset to anticipate and neutralise sophisticated and evolving cyber threats. Key Responsibilities: Provide expert guidance and technical oversight on complex security incidents and threat hunting operations. Lead and coordinate high-severity incident response engagements, acting as the primary incident lead when required. This includes managing cross-functional teams, communications, and critical decision-making More ❯
and Extended Detection and Response (XDR) Prompt analysis and triage of alerts and security events. Support the Incident Response (IR) team to report potential or actual incidents Conduct proactive Threat Hunting across the estate and help develop the ThreatIntelligence capability Work closely with the Incident Response (IR) team and report potential or actual incidents. Support the … technical findings to a non-technical audience. Thorough understanding of the latest security principles, techniques, and trends. Exposure to cyber security, including knowledge and experience of the breadth of threat actors and depth of threat vectors available Knowledge of using digital forensic and malware analysis tools, whether that be commercial products or open source Experience Needed to Fulfil … the Role Comprehensive experience of operating within a Security Operations Centre as an L3 analyst. Experience as a threat hunter preferable Experience in operating successfully within a large complex/federated enterprise environment Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Experience of security incident management and an understanding of More ❯
A global IT MSP is looking for an experienced SOC Incident Response & Threat Hunting Manager to join its expanding Security Operations Centre. This is a pivotal leadership role, overseeing Tier 3 Security and Incident Response Analysts while driving proactive threat hunting and cyber threatintelligence initiatives. This hands-on position combines technical depth, strategic leadership, and … Benefits Pack 10% Company Pension £6k Vehicle allowance Excellent skill up and career progression Flexible working from Day 1 Plus more Skills & Experience Proven experience leading incident response and threat hunting teams within a SOC or similar environment. Deep technical expertise in Digital Forensics and Incident Response (DFIR), with strong analytical and problem-solving skills. Skilled at translating complex More ❯
Head of IT Security Incident and Threat Management Package to £117k DOE + 15% Bonus + Benefits Based Birmingham This is an exciting opportunity to take a strategic leadership role at the forefront of cybersecurity. As Head of IT Security Incident and Threat Management, you will shape and lead the organization s global response to cyber threats ensuring … they stay one step ahead of emerging risks. You will have the scope to define and deliver a world-class threatintelligence and incident response strategy, working with innovative cutting-edge tools, partners, and experts. The successful candidate will lead and develop a talented in-house team, while managing the external Security Operations Centre (SOC) to ensure proactive … defence and rapid response to incidents. Key Responsibilities Develop and execute incident response and threat management strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust security practices. Manage More ❯
Birmingham, Chelmsley Wood, West Midlands (County), United Kingdom
SSR General & Management
Head of IT Security Incident and Threat Management Package to £117k DOE + 15% Bonus + Benefits Based Birmingham This is an exciting opportunity to take a strategic leadership role at the forefront of cybersecurity. As Head of IT Security Incident and Threat Management, you will shape and lead the organization’s global response to cyber threats — ensuring … they stay one step ahead of emerging risks. You will have the scope to define and deliver a world-class threatintelligence and incident response strategy, working with innovative cutting-edge tools, partners, and experts. The successful candidate will lead and develop a talented in-house team, while managing the external Security Operations Centre (SOC) to ensure proactive … defence and rapid response to incidents. Key Responsibilities Develop and execute incident response and threat management strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust security practices. Manage More ❯
incidents within KPMG’s Global Information Security Services (ISS) function. ISS delivers and oversees critical cybersecurity capabilities—including Security Monitoring & Response (SMR), Vulnerability Assessment & Secure Development (VASD), and Cyber ThreatIntelligence (CTI)—across Global, Global Functions, and the broader KPMG network of member firms. This position offers an exciting opportunity to join a progressive and innovation-driven security More ❯
Cheltenham, Gloucestershire, England, United Kingdom
Accenture
Detection & Threat Hunt Lead Analyst Cheltenham Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or more spent outside of the UK) and declaration of being a British passport holder with no dual nationalism at the point … us.” – Julie Sweet, Accenture CEO As a team As a member of the SOC Content Team, you will be responsible for contributing to the creation, deployment, and tuning of threat detection content and delivery of proactive threat hunting. You will work in close partnership with client Lead Analysts, threatintelligence teams, and other SOC functions to … help ensure that detection strategies are tailored to each client’s threat profile and security objectives. This role offers a balance of technical hands-on work, collaboration, and knowledge sharing, with a strong emphasis on continual learning and process improvement. More ❯