North London, London, United Kingdom Hybrid / WFH Options
Secure Recruitment Ltd
SENIOR THREATINTELLIGENCEANALYST Fully Remote Up to £100,000 + Excellent Staff Bens + Share Scheme SECURE has Strategically Partnered with a Multi-Award-Winning, Software-Based Organisation at the Forefront of Pre-Emptive Exposure Management. As a market leader backed by significant Venture Funding, they combine proactive ThreatIntelligence, Real Attacker Telemetry & Automated … Red Teaming to Continuously Identify & Validate Real Exposure. Success in this position will enable the business to Transform Raw Intelligence into Actionable Insights that Protect Fortune 500 Companies & Critical Infrastructure Providers, helping them outrun Real-World Threats in Real-Time. Role Overview: We're looking to speak with ambitious Senior ThreatIntelligenceAnalyst to Expand Offensive … Security Capabilities around Honeypot Data Analysis. You'll Design & Deploy Detections for N-Day & 0-Day Exploits using a Global Network, Develop CTI Platforms for Real-Time Threat Analysis, Drive Rapid Reaction Efforts & Author ThreatIntelligence Reports. Ideally based in the UK, you don't need to tick every box - if you're motivated to make an More ❯
ThreatIntelligenceAnalyst - OSINT London, Cheltenham or Manchester Thanks for checking out our job opening; we are excited that YOU are interested in learning more about NCC Group. We are on a mission to make society a safer and more secure place. Our people are the ones who make that possible; a global community of talented individuals … to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity As a ThreatIntelligenceAnalyst - OSINT, you will play a pivotal role within our global threatintelligence team. Working alongside colleagues across multiple time zones, you will help … make our clients safer by identifying relevant threat actors, understanding their motivations, targets, and methods, and assessing client exposure. The Global ThreatIntelligence team has built a strong reputation in collecting its own data and combining it with open and commercial sources. In this role, you will analyse cyber threats, develop actionable intelligence, and collaborate with More ❯
ThreatIntelligenceAnalyst - OSINT London, Cheltenham or Manchester Thanks for checking out our job opening; we are excited that YOU are interested in learning more about NCC Group. We are on a mission to make society a safer and more secure place. Our people are the ones who make that possible; a global community of talented individuals … to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity As a ThreatIntelligenceAnalyst - OSINT, you will play a pivotal role within our global threatintelligence team. Working alongside colleagues across multiple time zones, you will help … make our clients safer by identifying relevant threat actors, understanding their motivations, targets, and methods, and assessing client exposure. The Global ThreatIntelligence team has built a strong reputation in collecting its own data and combining it with open and commercial sources. In this role, you will analyse cyber threats, develop actionable intelligence, and collaborate with More ❯
Houston, Texas, United States Hybrid / WFH Options
K.L. McKinney
Key Responsibilities: ThreatIntelligence Collection & Analysis Gather and analyze threatintelligence from open sources (OSINT), dark web, threat feeds, and industry reports. Identify Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) used by threat actors. Track Advanced Persistent Threats (APTs) and emerging cyber threats relevant to the organization. Threat Detection & Response … Support Collaborate with SOC analysts, incident responders, and security engineers to enhance cyber defenses. Provide real-time intelligence during security incidents to assist in rapid response. Develop YARA rules, Sigma rules, and threat hunting queries to detect malicious activity. Malware Analysis & Forensics Analyze malware samples, phishing campaigns, and exploit techniques used in attacks. Reverse-engineer malware to extract … IOCs and behavioral patterns. Contribute to the development of security detections, playbooks, and automated threat response. ThreatIntelligence Reporting & Communication Create intelligence reports, dashboards, and risk assessments for stakeholders. Provide threat briefings and recommendations to security teams and leadership. Maintain documentation of threat actor profiles, attack campaigns, and evolving threats. Security Strategy & Continuous Improvement More ❯
Harrington Starr are seeking a ThreatIntelligenceAnalyst for one of global investment banking clients. The role will be joining a small, but specialist cyber security team with a focus on [providing threatintelligence services to the security operations and Engineering teams and to the business as a whole. Key accountabilities on a day to … impacting banking and investment services. Partner with Security Operations to advance detection and response strategies. Create and refine monitoring use cases across endpoint, network, cloud, and transaction systems using threat intel insights. Deliver intelligence to guide incident response, threat hunting, and forensics. Present tailored intelligence reports to technical and executive stakeholders. Key skills needed are: A … good strong technical cyber security background with recent experience in a dedicated ThreatIntelligence role A strong understanding of ThreatIntelligence tools and techniques Experience in using ThreatIntelligence Platforms (TIPs) widely used for IOCs A strong understanding of the latest trends within threatintelligence and the latest attack techniques Please send More ❯
SENIOR THREATINTELLIGENCEANALYST Fully Remote Up to £100,000 + Excellent Staff Bens + Share Scheme SECURE has Strategically Partnered with a Multi-Award-Winning, Software-Based Organisation at the Forefront of Pre-Emptive Exposure Management. As a market leader backed by significant Venture Funding, they combine proactive ThreatIntelligence, Real Attacker Telemetry & Automated More ❯
Network Threat & Vulnerability Analyst - Hybrid - Lancashire £60k to 68k 10.5% bonus 14% pension healthcare plus additional benefits. Network Threat & Vulnerability Analyst needed as part of a brand new team build in an extremely well funded growing cyber security team for this North West based enterprise level critical national infrastructure organisation. As a threat and vulnerability … analyst in this team the primary purpose of the role is to perform, threat analysis, security monitoring and some incident response to business processes comply with cyber security policy frameworks. You must have an investigative proactive mindset and be willing to grow and develop your skills. You will assist in responding to network-based incidents such as DDoS … and collaborate with network teams to implement fixes. You will need as much of the following as possible: 2 to 3 years of experience in cybersecurity operations Experience in Threat Identification. Proficiency in using SIEM tools. Experience in analysing security events and alerts to identify potential threats and incidents. Understanding of network protocols, operating systems, and cybersecurity principles. Ability More ❯
Network Threat & Vulnerability Analyst - Hybrid - Lancashire £60k to 68k 10.5% bonus 14% pension healthcare plus additional benefits. Network Threat & Vulnerability Analyst needed as part of a brand new team build in an extremely well funded growing cyber security team for this North West based enterprise level critical national infrastructure organisation. As a threat and vulnerability … analyst in this team the primary purpose of the role is to perform, threat analysis, security monitoring and some incident response to business processes comply with cyber security policy frameworks. You must have an investigative proactive mindset and be willing to grow and develop your skills. You will assist in responding to network-based incidents such as DDoS … and collaborate with network teams to implement fixes. You will need as much of the following as possible: 2 to 3 years of experience in cybersecurity operations Experience in Threat Identification. Proficiency in using SIEM tools. Experience in analysing security events and alerts to identify potential threats and incidents. Understanding of network protocols, operating systems, and cybersecurity principles. Ability More ❯