Tactical CyberThreatIntelligence Analyst (Analyst I) About the role Location: Office (London) or Home based Duration: Permanent, Full time The primary role of the Tactical CyberThreatIntelligence Analyst is to support the production of accurate, high quality and timely intelligence products. … This will include support to management, peers and members of staff and clients, both in-house and clients. Tactical CyberThreatIntelligence Analysts will: Create Open Source summaries concerning cyberthreat incidents Create and update threat actor profiles detailing salient information about cyberthreat actors. Assist in the production of strategic reporting concerning technical themes of interest (malware, IOCs, actor TTPs/campaigns and other developments which have the potential to impact the cyberthreat landscape). Respond to Requests for Intelligence (RFIs) from clients. Contribute to other More ❯
We are seeking a Threat Analyst to join our rapidly growing Information Security team. This is a unique opportunity for an aspiring and motivated professional to be at the forefront of our cyber defence strategy, protecting our brand from existing and emerging threats. You will combine the expertise … of a Threat Hunter and CyberThreatIntelligence Analyst, and will work alongside our Senior Threat Analyst to build our threatintelligence and hunting capabilities from the ground up. You'll have a major input on what new tooling and services we use … and communication skills, and an appetite for complex problem solving. Seize the opportunity to join a dynamic security team, reporting to the Head of Cyber Defence, and lead the development of advanced CTI and threat hunting strategies, seamlessly integrating into our security processes and driving continuous improvements. What More ❯
big ideas into the products, content and services millions of people love. And we do it all right here at Sky. Sitting within our Cyber Fusion Centre, the ThreatIntelligence Service is seeking a ThreatIntelligence Specialist to join our team, to proactively identify and … collect relevant cyberthreat information, enriched across multiple threat feeds and data sources, to ultimately deliver actionable intelligence to our stakeholders. The role will be key in playing a crucial role in the identification of potential threats against the Sky Group and our third parties. What … you'll do Provide a global CyberThreatIntelligence capability by performing horizon scanning and research using OSint and commercial threatintelligence tooling to proactively identify and analyse threats and vulnerabilities Use a variety of sources of information to identify and evaluate threats and vulnerabilities More ❯
New role: Cyber Services Advisor Location: London (Central flexible/hybrid working) Salary: £50,000 - £65,000 Exciting opportunity to join a leading global Insurtech organisation as a key member of the ThreatIntelligence and Proactive Services capabilities. This role sits within the Cyber Insights & Analytics … function, part of the Cyber Underwriting division, supporting cyber underwriting operations across London, U.S., and global offices. The team and business has developed rapidly, and with a projected growth of 35% this year. In this role, you will work in diverse areas such as insurance, cybersecurity, and consulting … strong communication skills, an interest in cybersecurity, with an ambition to be a front-facing expert. You will work closely with the Head of Cyber Insights & Analytics, the Cyber Services Manager, and the cyber underwriters to deliver the proactive cybersecurity services, engage with internal and external stakeholders More ❯
Cyber Security Consultant Location: Remote in the United Kingdom Purpose, objectives, and requirements of the role: BlueVoyant Cyber Security Consultants work within the Professional Services team advising, supporting, and managing clients with multiple activities, including but not limited to: Technical & organizational security controls Cyber and digital transformation … and implementing governance & risk management processes Design implementation and testing of security tooling BC/DR & Incident response capability building and testing Production of threatintelligence reports and research Supply Chain Risk Management Consultants must possess and be able to demonstrate credibility and experience as well as currency … capabilities to protect and defend client organizations and their people, intellectual property, and technology against wide-ranging threats, including nation states and Advanced Persistent Threat groups that act on their behalf. Consultants must be proactive, and able to lead, manage, and problem-solve on multiple workstreams across varied client More ❯
help drive our clients' CTI frameworks and products forward whilst supporting with some of the day-to-day activities. Responsibilities: Lead and support weekly CyberThreatIntelligence (CTI) activities and reporting. Drive continuous improvement of CTI processes and frameworks. Contribute to the development and enhancement of CTI … technical support to the CTI Manager and broader CTI team. Background & Experience: Proven experience leading CTI programmes or managing CTI teams. Strong knowledge of threatintelligence lifecycle and operational CTI practices. Hands-on experience implementing CTI frameworks (e.g., MITRE ATT&CK, Diamond Model, Cyber Kill Chain). … Familiarity with CTI platforms (e.g., MISP, OpenCTI, ThreatConnect) and external intelligence sources (e.g., SpyCloud, Recorded Future, etc.). More ❯
help drive our clients' CTI frameworks and products forward whilst supporting with some of the day-to-day activities. Responsibilities: Lead and support weekly CyberThreatIntelligence (CTI) activities and reporting. Drive continuous improvement of CTI processes and frameworks. Contribute to the development and enhancement of CTI … technical support to the CTI Manager and broader CTI team. Background & Experience: Proven experience leading CTI programmes or managing CTI teams. Strong knowledge of threatintelligence lifecycle and operational CTI practices. Hands-on experience implementing CTI frameworks (e.g., MITRE ATT&CK, Diamond Model, Cyber Kill Chain). … Familiarity with CTI platforms (e.g., MISP, OpenCTI, ThreatConnect) and external intelligence sources (e.g., SpyCloud, Recorded Future, etc.). More ❯
help drive our clients' CTI frameworks and products forward whilst supporting with some of the day-to-day activities. Responsibilities: Lead and support weekly CyberThreatIntelligence (CTI) activities and reporting. Drive continuous improvement of CTI processes and frameworks. Contribute to the development and enhancement of CTI … technical support to the CTI Manager and broader CTI team. Background & Experience: Proven experience leading CTI programmes or managing CTI teams. Strong knowledge of threatintelligence lifecycle and operational CTI practices. Hands-on experience implementing CTI frameworks (e.g., MITRE ATT&CK, Diamond Model, Cyber Kill Chain). … Familiarity with CTI platforms (e.g., MISP, OpenCTI, ThreatConnect) and external intelligence sources (e.g., SpyCloud, Recorded Future, etc.). More ❯
CyberThreat Specialist Location: Any UK Location Salary: Competitive salary and package dependent on experience Career Level: We are hiring at the following levels- Specialist/Senior Analyst Accenture Practice- Secure Transformation Service Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance … work and live. It is personal to all of us." - Julie Sweet, Accenture CEO In our team you will learn: You will have a Cyber Security background, will perform as a client-facing role, and will be willing to contribute to our internal Digital Transformation strategy and expertise. As … a CyberThreat Analyst you will: As part of our Blue Team, you'll use the latest intelligence and tooling to analyse information systems to ensure effective incident detection and response. Don't worry if you don't tick every box - we'd still love to hear More ❯
A leading Financial Services firm seeks a ThreatIntelligence Lead to spearhead their Global threatintelligence initiatives and enhance their Cyber Defence strategy. This is a hands-on, technical role focused on Threat hunting, Malware analysis, and tracking changes made by Threat Actors. … This position plays a key role in shaping the Cyber Defence strategy, driving deliverables, and focusing on Threat-led and Threat detection activities. The organisation is investing in new tooling, including the procurement of a new TIP solution. The individual in this role will be responsible for More ❯
Company Background ThreatConnect enables threatintelligence, security operations, and cyber risk management teams to work together for more effective, efficient, and collaborative cyber defense. With ThreatConnect, organizations can infuse ML and AI-powered threat intel and cyber risk quantification into their work, allowing them … to contextualize an evolving threat landscape, prioritize the most significant risks to their business, and operationalize defenses. More than 250 enterprises and thousands of security operations professionals rely on ThreatConnect every day to protect their organizations' most critical assets. We offer a competitive benefits package with comprehensive insurance coverage … and share in our success. We love to recognize our employees who have gone above and beyond. Job Description ThreatConnect is the most comprehensive threatintelligence platform on the market today. Our platform is used by thousands of organizations, and over 40 of the Fortune 100, to help More ❯
range of experience in these positions - at the high end we are looking for deep experience defending highly contested critical assets and high-value cyber targets against advanced persistent threats and state-level actors. We have more junior roles for exceptional individuals with a proven personal interest and engagement … in cyber attack and defence, and outstanding academic and career performance even if experience is limited. Our goal is to build an entirely new level of assurance and observable rigour into the open source supply chain. We have our own estate to monitor, but more broadly our goal is … team will also contribute ideas and requirements for Canonical product security, improving the resilience and robustness of all Ubuntu customers and users subject to cyber attack. The SecOps team's mission is not only to secure Canonical, but also to contribute to the security of the wider open source More ❯
Content - maintain the availability of the underlying infrastructure, develop new alerts, field parsers, models and automated playbooks, and integrate new log sources where appropriate. ThreatIntelligence & Threat Hunting - provide, develop and integrate external threatintelligence data into the team's detection capabilities; perform proactive threat … test the team's detection capabilities, develop scenario-based training, and organise purple team exercises, both in-house and with third-party providers. Insider Threat - maintain and develop the Data Loss Prevention policies in line with the company's data classification requirements, and implement exceptions for business-approved procedures … with vulnerability scanning and penetration testing tools and techniques. Qualifications: A university degree in one of the following fields is preferred (but not required): Cyber/Information Security, Digital Forensics, Ethical Hacking Computer Science, Software Development, Network Engineering Mathematics, Physics and other STEM subjects Other desirable certifications include : CISSP More ❯
banner. By working collaboratively, we aim to become industry-leading in safety, customer service, financial and operational performance. About the role: The Head of Cyber Security is a critical leadership role at DFTO, responsible for establishing and maturing the group's overall cyber security posture, ensuring it effectively … mitigates risks in the face of the evolving threat landscape. This involves developing a comprehensive cyber security capability framework, assessing the maturity of individual train operating companies (TOCs) against this framework, and creating investment/programme plans to uplift their capabilities to appropriate levels. The role also encompasses … traditional cyber security functions, such as incident management, and a focus on developing common group cyber services for consistency and efficiency. Key Competencies: Interpersonal Skills: Demonstrates a strong ability to build and maintain relationships with a diverse group of stakeholders, including executives, teams across the TOCs and external More ❯
knowledge and technology solutions to deliver the best possible outcomes and get it right first time. Why Join KPMG as a Manager within our Cyber Security function? Cyber security is one of the areas which KPMG has identified for tremendous investment and growth. Our clients face a challenging … cyberthreat and look to us to help them understand and respond to that threat. This is an opportunity to join a high performing team that works with a wide variety of clients, including Defence and National Security, which is a KPMG priority sector. That means we are … learn, and experience within a Security Operations Centre (SOC). Understanding of SOC tools and technologies, such as SIEM, IDS/IPS, EDR and threatintelligence platforms. Proven experience of assessing maturity, managing SOC services and delivering improvements within a SOC environment. Experience bringing a technology perspective to More ❯
knowledge and technology solutions to deliver the best possible outcomes and get it right first time. Why Join KPMG as a Manager within our Cyber Security function? Cyber security is one of the areas which KPMG has identified for tremendous investment and growth. Our clients face a challenging … cyberthreat and look to us to help them understand and respond to that threat. This is an opportunity to join a high performing team that works with a wide variety of clients, including Defence and National Security, which is a KPMG priority sector. That means we are … learn, and experience within a Security Operations Centre (SOC). Understanding of SOC tools and technologies, such as SIEM, IDS/IPS, EDR and threatintelligence platforms. Proven experience of assessing maturity, managing SOC services and delivering improvements within a SOC environment. Experience bringing a technology perspective to More ❯
play a critical role in, overseeing the 24/7/365 monitoring, detection, and response to cybersecurity threats and incidents, ensuring operational excellence, threatintelligence integration, and alignment with the organization's security objectives. The ideal candidate is a proven cybersecurity leader with a deep understanding of … security operations, threat landscapes, incident response, and team leadership. This individual will play a key role in shaping the future of our cyber defense capabilities. Responsibilities: Lead and manage the daily operations of the Security Operations Center, including managing a multi-tiered team of managers, analysts, and incident … incident detection, triage, investigation, and coordinated response efforts to mitigate threats in real time. Ensure continuous improvement of security monitoring tools, automation, playbooks, and threat detection capabilities. Collaborate with other cybersecurity teams, IT, legal, compliance, and business units to ensure an integrated approach to incident handling and threatMore ❯
severity incidents. Create and update security event investigation notes, report on open cases, and maintain case data in the Incident Response Management platform. Monitor threat and vulnerability news services for any relevant information that may impact installed infrastructure. Analyse reports to understand threat campaign(s) techniques, lateral movements … and extract indicators of compromise (IOCs). Continuous engagement with the ThreatIntelligence and 24x7 Monitoring teams. Provide ad-hoc on-call support to review threats and response actions for off-hour critical incident response. What you'll need Job Complexity: Works on and may lead projects or … or equivalent in Information Security, Forensics, or Computer Science; related experience and/or training in the field of IT security monitoring and analysis, cyberthreat analysis, and vulnerability analysis. A Global Information Assurance Certification (GIAC) Certified Incident Handler (GCIH), GIAC Certified Intrusion Analyst (GCIA), or equivalent certification More ❯
and mentoring more junior team members; deeper expertise and applied knowledge within relevant area. Minimum Qualifications: Bachelor's degree in Computer Science, Information Systems, Cyber Security, related technical field, or equivalent practical experience. 6 years of experience in a Detection Engineering or related role, working with EDR and SIEM … issues. About the job In this role, you will be responsible for enabling the technology and tools required to accomplish daily tasks within a Cyber Defense Center (CDC). You will collaborate with multiple cross-functional teams such as Security Architects, Security Analysts, Client Information Technology (IT) resources, and … new emerging technologies, and be passionate about protecting customer data and corporate assets from the threats facing multiple industries. Responsibilities Identify issues in customer cyber defense centers and formulate strategies for improvement, plan implementation of improvements, and execute/oversee plans to completion. Create and modify SIEM use cases More ❯
Role Title: Senior Security Engineer - Security Operations Location: London or Sheffield (Hybrid) About the role: RMG Cyber Security Operations is dedicated to safeguarding our information assets and managing security incidents through robust detection, analysis, and response strategies. We are seeking a Senior Security Engineer to enhance our team and … maintaining, and configuring a wide range of security technologies, including SIEM solutions, DLP solutions, firewall solutions, cloud security centers, IPS (Intrusion Prevention Systems), CTI (CyberThreatIntelligence) solutions, and vulnerability scanners. Proxy solutions like Zscaler are essential. At least one professional certification; CISSP, CISM, CCSP. What we More ❯
of security concepts and proven expertise in penetration testing. Job responsibilities Design and execute testing and simulations - such as penetration tests, technical controls assessments, cyber exercises, or resiliency simulations, and contribute to the development and refinement of assessment methodologies, tools, and frameworks to ensure alignment with the firm's … functional teams to develop comprehensive assessment reports - including detailed findings, risk assessments, and remediation recommendations - making data-driven decisions that encourage continuous improvement Utilize threatintelligence and security research to stay informed about emerging threats, vulnerabilities, industry best practices, and regulations. Apply this knowledge to enhance the firm … s assessment strategy and risk management. Engage with peers and industry groups that share threatintelligence analytics Required qualifications, capabilities, and skills Experience in conducting manual penetration tests against a wide variety of applications and technologies including web, mobile and thick clients, internal and external facing infrastructures, cloud More ❯
functional teams to develop comprehensive assessment reports - including detailed findings, risk assessments, and remediation recommendations - making data-driven decisions that encourage continuous improvement Utilize threatintelligence and security research to stay informed about emerging threats, vulnerabilities, industry best practices, and regulations. Apply this knowledge to enhance the firm … s assessment strategy and risk management. Engage with peers and industry groups that share threatintelligence analytics Required qualifications, capabilities, and skills 5+ years of experience in conducting manual penetration tests against a wide variety of applications and technologies including web, mobile and thick clients, internal and external More ❯
expands the possibilities of data and technology, now and for generations to come. About Us Our UK&I Advisory Practice is a leader in cyber security transformation, partnering with organizations to tackle the evolving digital threat landscape. We combine technical expertise with strategic business insight to deliver end … to-end cyber solutions that enable innovation and secure digital growth. Role Overview As a Lead Cyber Security Advisory Consultant , you will serve as a strategic partner to clients, guiding them through complex security challenges and transformation programs. You'll leverage your cyber expertise and business acumen … a senior escalation point and mentor for advisory team members. Strategic Advisory Partner with CISOs and senior stakeholders to define and execute enterprise-wide cyber security strategies. Develop investment cases and board-level reporting aligned with business priorities. Advise on complex transformations including Zero Trust, SOC modernisation, cloud security More ❯
Cyber Defence Analyst (Splunk CSIRT) London to £80k Are you a tech savvy Cyber Defence Analyst with a broad range of security knowledge? You could be progressing your career at a global, hugely profitable, Investment Management firm. As a Cyber Defence Analyst you will take a proactive … approach to threat hunting and security incident response. You'll play a key role in detection enhancements, improvements to standard operating procedures and will collaborate with internal teams to tune and put new technologies into operation. There's a broad range of responsibilities and projects with a focus on … a week. About you: You have strong experience in Security Operations, CSIRT or similar role You have experience of building out functions of a Cyber Defence Team e.g. insider risk, threatintelligence, breach attack simulation You have a strong knowledge of SIEM and deep Splunk experience You More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
Senior Security Analyst - £50-65k – Hybrid working (Applicants based in UK) – North London HQ This role is ideal for a Cyber Defence individual with strong Tier 2 and above SecOps skills. The Senior Security Analyst will be adaptable as well as forward thinking . They will contribute to … and above incidents Provide Incident response support for all incidents using playbooks. Forensic/Deep Dive analysis providing value dashboards and reports/Threat Hunting/ThreatIntelligence Collaborate and work with the InfoSec SOC team Support future cloud migrations Document policies, processes, toolkits and dashboards Identifying … ways of making security ‘invisible’ Proactive monitoring via situational awareness on infrastructure, network applications/endpoints Senior Security Analyst Skills 3 Years within a Cyber Security role Previous experience as SOC/Security analyst Solid understanding of Security Architecture Experience in MDR, EDR and Threat Hunting SIEM tool More ❯