City of London, London, United Kingdom Hybrid/Remote Options
Futureheads Recruitment | B Corp™
ThreatIntelligence Analyst (VP) - Global Financial Institution | 6 Month Contract | Inside IR35 | London/Hybrid Are you ready to play a pivotal role in defending a global financial powerhouse against advanced cyber threats? Our client, a leading international bank operating across EMEA, the Americas, APAC, India, and Japan, is expanding its ThreatIntelligence capability. As part … a world-class cybersecurity organisation, they are committed to safeguarding the bank’s global operations and driving proactive defence strategies across all regions. They are now seeking an experienced ThreatIntelligence Analyst (VP) on a 6 month contract (Inside IR35) to join the Threat Management and Intelligence function, the central team that connects threatintelligence … This is a rare opportunity to work at the heart of a global security operation, shaping adversary driven defence and influencing cybersecurity strategy at scale. The Role As a ThreatIntelligence Analyst, you will be responsible for analysing global cyber threats, shaping adversary emulation practices, and enhancing defensive readiness across the organisation. You will collaborate closely with Red More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Vanquish Technologies Limited
through implementation and ongoing support, our commitment is to provide clients with the assurance that they are valued by a company that is both attentive and impactful. Role Title: ThreatIntelligence Analyst Reporting Line Manager: Head of ThreatIntelligence Onsite Requirements (e.g. number of days per week onsite): 5 days Hybrid/Remote Working Policy: onsite … months Extension likelihood: Yes Maximum Daily Rate or Budget Range: 500 IR35 Status (inside/Outside/To Be Determined) Inside Experience Requirements Technology & Vendor Skillsets Required: Familiarity with threatintelligence platforms (TIPs), SIEMs, and threat data enrichment tools. Experience using Breach and Attack Simulation (BAS) platforms to build and validate threat scenarios. Strong understanding of … adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modeling. Hands-on experience with penetration testing tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera. Experience producing threat reports and briefings. Certifications Required or Preferred: Years of relevant experience: 8+ years of experience in threatintelligence, cybersecurity operations, or penetration testing. More ❯
IT Cyber Security Analyst Ref: YC46941 A highly successful IT and telecommunications services company is currently recruiting an IT Cyber Security Analyst (ThreatIntelligence Analyst) to work at their clients site in London. In this role, you will be responsible for identifying, analysing, and communicating cyber threats to support proactive defence strategies. The ideal candidate should have expertise … in threatintelligence analysis, collaboration across teams, familiarity with security tools, and strong analytical skills. ELIGIBLE APPLICANTS: (O) Eligible visa: Permanent residence, Spouse, Partner, Working holiday, Graduate (X) NOT eligible: Student visa, Requiring visa sponsorship, WORK TYPE: office-based VISA SUPPORT: No TYPE: 6 months rolling contract, full-time WORKING HOURS: Mon-Fri 9:00-17:00 SALARY … up to £54k, depending on experience START: Nov-Dec 2025 LOCATION: London (office-based) Cyber Security Analyst Main Responsibilities: Monitor and analyse the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organization's business and technology environment Collaborate with Red Team, Blue Team, and Penetration Testing teams to integrate threatintelligenceMore ❯
City of London, London, United Kingdom Hybrid/Remote Options
Advanced Resource Managers
days office based Must have CHECK CTL and certified Role Overview: We are seeking a highly skilled and experienced Offensive Security Consultant with a strong focus understanding on threatintelligence and attack methods. The ideal candidate will be responsible for managing and conducting advanced penetration testing engagements, leveraging threatintelligence to simulate real-world attacks across … ability to provide strategic and actionable recommendations to significantly enhance our clients' security posture. Responsibilities: Lead and manage the full lifecycle of complex penetration testing engagements, applying a strong threatintelligence-led approach. Execute advanced penetration tests across a broad range of environments (applications, infrastructure, web, APIs, O365, Azure, AWS, OT), directly applying your knowledge of current threat landscapes and attacker TTPs. Develop and maintain sophisticated test plans, execution plans, and targeted use cases directly informed by in-depth threatintelligence analysis. Identify and prioritize OT and IT assets, services, and systems based on their criticality and potential exposure to identified threats. Strategically prioritize, plan, and schedule penetration testing engagements based on comprehensive threatMore ❯
Harrington Starr are seeking a ThreatIntelligence Analyst for one of global investment banking clients. The role will be joining a small, but specialist cyber security team with a focus on [providing threatintelligence services to the security operations and Engineering teams and to the business as a whole. Key accountabilities on a day to day … impacting banking and investment services. Partner with Security Operations to advance detection and response strategies. Create and refine monitoring use cases across endpoint, network, cloud, and transaction systems using threat intel insights. Deliver intelligence to guide incident response, threat hunting, and forensics. Present tailored intelligence reports to technical and executive stakeholders. Key skills needed are: A … good strong technical cyber security background with recent experience in a dedicated ThreatIntelligence role A strong understanding of ThreatIntelligence tools and techniques Experience in using ThreatIntelligence Platforms (TIPs) widely used for IOCs A strong understanding of the latest trends within threatintelligence and the latest attack techniques Please send More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Spencer Rose
Senior Cyber ThreatIntelligence Analyst Salary - £90,000 + Discretionary Bonus Hybrid working - x2 days per week in office (Central London) Spencer Rose are currently hiring for a Senior Cyber Threatintelligence Analyst on behalf of a leading financial services organisation. Within this role, the Senior Cyber ThreatIntelligence Analyst will be working as … part of a team to identify and mitigate emerging cyber threats to help safeguard the organisations infrastructure and ensure the resilience of their networks. The Senior Cyber ThreatIntelligence Analyst will have the following responsibilities - To collaborate with Threat Hunting team to research, document, and develop Use Cases and Hypotheses for proactive hunting activities utilising cyber security … tools including SIEM, EDR, and IDS/IPS. Research, document and develop threat detections based on behavioural attributes of actors, malware operators, and general threats To assess emerging threats against the organisations operational environment and work in partnership with security teams for detection, mitigation, and remediation efforts. The Senior Cyber Threatintelligence Analyst will need to have More ❯
Cyber ThreatIntelligence Analyst – London (Hybrid, 2 days onsite) £80,000 - £90,000 2 days a week in the London office An established global technology organisation is seeking a Cyber ThreatIntelligence Analyst to join its high-impact security team. You’ll play a key role in identifying, analysing and mitigating advanced cyber threats across a … complex, mission-critical environment used by clients worldwide. You’ll collect and assess threatintelligence from multiple sources, track threat actors and their TTPs, support proactive threat hunting and incident response, and deliver clear intelligence insights to both technical teams and senior stakeholders. What we’re looking for: 3+ years’ Cyber ThreatIntelligence experience and 4+ years in cyber security (TI, SOC or IR) Strong understanding of threat actors, TTPs and the intelligence lifecycle Experience with SIEM/EDR tools (Splunk preferred) and threatintelligence platforms Ability to analyse IOCs, develop detections and communicate findings effectively Knowledge of TCP/IP and network fundamentals Python/automation skills More ❯
The department Covers Cybersecurity, Information Security, IT Audit, IT Risks, IT Controls,Access Management, Security Operation and Threat Management. This is a rolling fixed term contract, initially 6 months - on site. The Business administrator will play a key role in overseeing our ThreatIntelligence Centreefforts and ensuring alignment with strategic planning objectives. You will beresponsible for the … end-to-end management of major projects that enhance ourglobal cyber threatintelligence capabilities. This role requiresstrong project management expertise, a solid understanding of cybersecurityoperations, and the ability to effectively collaborate across global teams. Lead … the end-to-endmanagement of the threatintelligence activities while ensuring alignment withour global cybersecurity strategy. Develop and maintaindetailed activity plans, timelines, budgets, and resource allocations. Manage ThreatIntelligence Centre accounting, financial operations, and budget forecasts toensure cost optimisation and alignment with strategic objectives. Facilitatecommunication and coordination with global stakeholders across multiple regionsto ensure alignment of requirements and deliverables. More ❯
The departmentCovers Cybersecurity, Information Security, IT Audit, IT Risks, IT Controls,Access Management, Security Operation, Threat Management and the portfolio forChange for all these areas. This is a rolling fixed term contract, initially 6 months. You will play a key role in overseeing our ThreatIntelligence Centreefforts and ensuring alignment with strategic planning objectives. You will beresponsible … for the end-to-end management of major projects that enhance ourglobal cyber threatintelligence capabilities. This role requiresstrong project management expertise, a solid understanding of cybersecurityoperations, and the ability to effectively collaborate across global teams. Lead … the end-to-endmanagement of the threatintelligence activities while ensuring alignment withour global cybersecurity strategy. Develop and maintaindetailed activity plans, timelines, budgets, and resource allocations. Manage ThreatIntelligence Centre accounting, financial operations, and budget forecasts toensure cost optimisation and alignment with strategic objectives. Facilitatecommunication and coordination with global stakeholders across multiple regionsto ensure alignment of requirements and deliverables. More ❯
Financial Services firm seeks an Operational and Tactical Cyber ThreatIntelligence Analyst to join its ThreatIntelligence team. The ideal candidate will have a strong background in TTP mapping, APT tracking, and hands-on experience in both tactical and operational CTI. This role demands excellent analytical skills, the confidence to present intelligence briefings to Senior … Stakeholders, while also contributing to the development and improvement of threatintelligence programs. Key responsibilities include (but are not limited to): Collecting and analysing cyber threatintelligence from a variety of sources Identifying and assessing advanced threats and adversary tactics Creating and refining use cases Developing and maintaining threat detection rules using tools such as … SIEM, EDR, and IDS/IPS Monitoring and researching emerging threats and threat actor behaviors Producing clear, actionable intelligence reports and briefings for both technical and executive audiences Experience within Financial Services is preferred. This is a hybrid role requiring 2 days per week in the London office, offering £90,000 base + £15,000 bonus! *Please note More ❯
Cybersecurity Project Manager Ref: YC46940 A highly successful IT and telecommunications services company is currently recruiting a Cybersecurity Project Manager/ThreatIntelligence Centre CoE Support. In this role, you will be responsible for overseeing the ThreatIntelligence Centre (TIC) efforts and ensuring alignment with strategic planning objectives, managing major projects that enhance global cyber threatintelligence capabilities. The ideal candidate should have strong project management experience, excellent communication skills, a deep understanding of cybersecurity operations, and the ability to collaborate effectively with global teams. ELIGIBLE APPLICANTS: (O) Eligible visa: Permanent residence, Spouse, Partner, Working holiday, Graduate, Freelance (X) NOT eligible: Student visa, Requiring visa sponsorship WORK TYPE: office-based VISA SUPPORT: No TYPE … EMEA, Americas, Asia Pacific, India) to ensure alignment of requirements and deliverables Track activity progress, manage risks, and implement risk mitigation strategies to ensure successful outcomes Drive standardisation of threatintelligence protocols, tools, and governance across the region Partner with technology, compliance, and risk management teams to ensure compliance with regulatory and legal requirements in each jurisdiction Host More ❯
Role : Assistant Vice President, Cyber ThreatIntelligence Location : London, 2 days p/w Compensation : £90,000 fixed salary + £15,000 bonus (DOE) Industry : Financial Technology Are you looking to work in an innovative, mature and modern Cyber Security environment, at a Global business that facilitate the execution of over $6 trillion worth of transactions on a … partnered with a market-leader in the FinTech space that are searching for a skilled CTI Analyst to join the team: What you will be doing: Collect & analyze cyber threatintelligence from open-source, partners, and vendor feeds. Identify & mitigate advanced threats using SIEM, EDR, IDS/IPS, and threat hunting techniques. Develop detections & hunting use cases … based on threat actor behaviours and TTPs. Produce high-impact intelligence reports for executives, technical teams, and business leaders. Support incident response operations with intelligence analysis and recommendations. What you will need: 3+ years of direct CTI experience Wider experience in Security Operations and/or Incident Response Strong understanding of the intelligence lifecycle Familiarity with More ❯
to make our clients safer and more secure against cyber threats by helping them understand the motivations of relevant actors, identifying their targets and how they operate. The Global ThreatIntelligence Team has built a very strong reputation when it comes to collecting our own data and combining this with open and commercial sources. This role involves analysis … of cyber threats, the development of actionable intelligence, and collaboration with various teams. Your support to the wider organisation will be critical in the development of NCC Group’s ThreatIntelligence capabilities and the broader service we offer. Key Accountabilities: Malware Analysis and Response: Conduct in-depth static and dynamic analysis of new and emerging malware threats … Collaborate with external partners, information-sharing communities, and industry forums to stay updated on new malware threats and to share intelligence. Technical Skills: Proven experience as a Malware Analyst, ThreatIntelligence Analyst, or similar role with a focus on malware research and response. Strong knowledge of reverse engineering tools and techniques for malware analysis, including tools like IDA More ❯
Services We are looking for a skilled Security Operations Centre Analyst to join our Security Operations team. This role focuses on responding to cyber security incidents while supporting proactive threatintelligence efforts. You will play a key part in detecting, investigating, and mitigating threats, as well as improving our security posture through continuous monitoring and analysis. Key Responsibilities … response capabilities through process improvements and automation. Monitor alerts from SOC tools and perform root cause analysis. Collaborate with IT and security teams to remediate vulnerabilities. Gather and analyse threatintelligence to inform detection strategies. Maintain detailed incident records and conduct post-incident reviews. Technical Skills Hands-on experience with SIEM, EDR, IDS/IPS, and SOAR platforms. … of frameworks such as NIST and MITRE ATT&CK. Qualifications Bachelor’s degree in Cyber Security, IT, or related field. 3–5 years in SOC operations, incident response, or threat intelligence. Practical experience with forensic investigations and security monitoring tools. Excellent written and verbal communication skills. Preferred Certifications such as CISSP, GIAC (GCIH, GCIA, GCTI). Experience with malware More ❯
Services We are looking for a skilled Security Operations Centre Analyst to join our Security Operations team. This role focuses on responding to cyber security incidents while supporting proactive threatintelligence efforts. You will play a key part in detecting, investigating, and mitigating threats, as well as improving our security posture through continuous monitoring and analysis. Key Responsibilities … response capabilities through process improvements and automation. Monitor alerts from SOC tools and perform root cause analysis. Collaborate with IT and security teams to remediate vulnerabilities. Gather and analyse threatintelligence to inform detection strategies. Maintain detailed incident records and conduct post-incident reviews. Technical Skills Hands-on experience with SIEM, EDR, IDS/IPS, and SOAR platforms. … of frameworks such as NIST and MITRE ATT&CK. Qualifications Bachelor’s degree in Cyber Security, IT, or related field. 3–5 years in SOC operations, incident response, or threat intelligence. Practical experience with forensic investigations and security monitoring tools. Excellent written and verbal communication skills. Preferred Certifications such as CISSP, GIAC (GCIH, GCIA, GCTI). Experience with malware More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Sanderson Government and Defence
and interpret evidence to provide a holistic view of the organisation's security posture. Present findings and recommendations to senior leadership and governance forums. Collaborate with internal teams (e.g., threatintelligence, compliance, audit) to ensure assurance activities reflect current threat landscapes. Act as a primary interface for business units, ensuring alignment between assurance activities and operational priorities. … talent. Ability to interpret complex technical and business information to assess risk. Experience in supply chain security assurance. Knowledge of secure by design principles and accreditation processes. Understanding of threatintelligence and its application in assurance. Experience working in regulated or high-assurance environments (e.g., government, finance, defence). Familiarity with risk management tools and methodologies. What's More ❯
vulnerability reporting, metrics, and dashboards for management and technical teams via Tenable and Defender. Collaborate with incident response teams using CrowdStrike and Microsoft Defender to correlate vulnerability data with threatintelligence and active security incidents. Maintain up-to-date knowledge of the latest vulnerabilities, exploits, and mitigation techniques, providing guidance and recommendations to IT and business stakeholders. Work … working knowledge of workflow automation, remediation tracking, reporting and prioritization methodologies. Advanced proficiency with vulnerability management tools such as Tenable.sc and Tenable.io. Hands-on experience with endpoint protection and threatintelligence platforms, specifically CrowdStrike and Microsoft Defender. Strong analytical and problem-solving skills, with the ability to interpret complex security data and drive effective remediation. Excellent communication skills More ❯
The departmentCovers Cybersecurity, Information Security, IT Audit, IT Risks, IT Controls,Access Management, Security Operation, Threat Management and the portfolio forChange for all these areas. This is a rolling fixed term contract, initially 6 months. You will play a key role in overseeing our ThreatIntelligence Centreefforts and ensuring alignment with strategic planning objectives click apply for More ❯
a key role in building out the centre, providing SME input and management of third parties, covering areas such as security operations leadership and strategy, incident management and response, threatintelligence, digital forensics, and SLO and SLA definition. You should apply for this role if you are/have: 10+ years hands-on experience in cyber security operations … and/or engineering Experience setting up security operations centres including SIEM and SOAR Strong understanding of end-to-end security incident management and response Threatintelligence digital forensics and SOC automation experience Degree educated or higher from a leading academic institution £700-900/day role dependent on experience; based central London initially for three months. On More ❯
City of London, London, United Kingdom Hybrid/Remote Options
MFK Recruitment
attacks, phishing attempts, and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and … networks, in alignment with best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. Lead and coordinate incident response efforts, including root cause analysis, threat containment and post-incident reporting for clients. Collaborate with the Project and Service Desk teams to embed security into deployments, migrations, upgrades, and automation workflows, ensuring systems remain secure by design. Maintain … is shared across the team for rapid incident handling. Provide mentorship and cybersecurity guidance to junior engineers and Service Desk staff, fostering a culture of security awareness and proactive threat management. Perform ongoing threatintelligence monitoring and security trend analysis to anticipate risks and protect client environments. Support clients in security reporting, compliance reviews, and continuous improvement More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Cititec
Working knowledge of network security , including protocols, firewalls, IDS/IPS, and traffic analysis. Experience with cloud security principles in AWS, Azure, or GCP. Ability to interpret and apply threatintelligence to improve controls and detection coverage. Experience with MacOS preferred Strong communication skills — capable of articulating complex technical issues to both technical and non-technical stakeholders. Proven More ❯
City of London, London, United Kingdom Hybrid/Remote Options
RiverSafe
We’re looking for a hands-on technical expert to join our team and enhance our Microsoft Sentinel & Azure SIEM threat detection capabilities. The Role: Design, implement & tune advanced detection rules and analytics. Translate threatintelligence into actionable detection logic. Lead SIEM enhancements, integrations & content migration. Mentor junior engineers and drive best practices. Collaborate with IR & threat intel teams to refine detections. Skills: Proven experience in SIEM content development & threat detection. Strong expertise with Microsoft Sentinel, Azure & Logic Apps. Deep knowledge of MITRE ATT&CK, attacker TTPs & security principles. Strong analytical & problem-solving skills. More ❯
security team and will be responsible of helping develop effective security controls. Key responsibilities will include: Working closely with the in-house security operations team to drive world class threat detection Building effective detection use cases within the chosen SIEM while minimizing false positives. Utilize online resources for researching and collecting threatintelligence to enhance the SOC More ❯
Job Title: Head of Product – Third-Party CyberSecurity Intelligence Platform Location: London (Remote) Reports to: CEO About the Client: Our client helps enterprises discover, assess, and respond to third-party and supply-chain risks through advanced AI-driven analytics and intelligence . Their mission is to deliver continuous, data-backed visibility into the extended enterprise — enabling organizations to … of Product to lead a world-class technical team , shape the architectural vision , and drive execution across multiple product streams — including large-scale data pipelines and real-time risk intelligence systems . Role Overview: As Head of Product you will be responsible for owning the product roadmap and execution for one or more major modules of our platform (e.g. … . Key Responsibilities: Define and maintain a compelling product vision and roadmap aligned with business goals, customer needs and market dynamics (third-party risk, supply chain resilience, AI-driven intelligence). Engage deeply with customers (prospects, existing users) to understand their workflows, pain points, and desired outcomes; translate those into product requirements. Work with engineering/data/AI More ❯