Analyst, Threat Intelligence Analyst page is loaded Analyst, Threat Intelligence Analyst Apply locations London time type Full time posted on Posted Yesterday job requisition id -WD Do you want your voice heard and your actions to count? Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world's leading financial groups. Across the globe, we … Security, Information Security, IT Audit, IT Risks, IT Controls, Access Management and the portfolio for change for all these areas. MAIN PURPOSE OF THE ROLE To ensure latest cyber threat information is monitored and raise awareness across MUFG EMEA by disseminating reports and interacting with the stakeholders to sort out the issues. The role will involve liaising and coordinating … external and internal threats is defined and being implemented. To support the relationship and associated reporting requirements between Technology and internal and external bodies e.g. Tokyo head office, global Threat Intelligence Teams. KEY RESPONSIBILITIES In this role, you will be responsible for information/cyber security across MUFG's banking and securities business under a dual-hat arrangement. Under More ❯
Security Research Engineer - Threat Protection The Role As a Security Research Engineer at Mimecast, you will be a pivotal technical expert dedicated to researching, analyzing, and developing detections for both malware and phishing threats. Your work will involve dissecting real-world file and web threats, building and optimizing detection signatures, and driving improvements to our advanced detection systems. This … role combines in-depth threat investigation with a focus on enhancing our capabilities to block evolving attacks and provide actionable insights to our customers and internal teams. Why Join Our Team? At Mimecast, you will be at the forefront of neutralizing diverse phishing and malware threats through comprehensive file analysis and research across web vectors. You will dissect … optimizing detection signatures using industry-standard tools like Yara and ClamAV, as well as Mimecast's advanced proprietary detection technologies. This is an opportunity to leverage vast real-world threat data and transform your technical expertise into tangible protection for millions of users globally. If you're driven to understand and dismantle sophisticated attacks, Mimecast offers a dynamic environment More ❯
advanced, and largest, intelligence company! As an entry-level analyst on Recorded Future's Managed Services team, you'll directly support our global clientele through critical triage, escalation, and threatanalysis activities. In collaboration with our Triage and Senior Research teams, you'll validate alerts, identify platform-level issues, and fine-tune detection mechanisms-all while helping to … strengthen the consistency and quality of our threat response offerings. What Makes This Role Unique? Recorded Future's Managed Services team blends tactical analysis with platform-level insights. You're not just triaging-you're actively shaping how alerts evolve, how SOPs scale, and how we partner with Triage Analysts. It's a launchpad for developing deep threat expertise at scale. What you'll do as an Associate Threat Intelligence Response Analyst: 1) Triage & Analysis Independently triage green/amber alerts and Swimlane cases for assigned accounts Conduct threat research escalated by senior analysts-covering phishing, credential harvesting, fraudulent domains, data leakage, social media monitoring, and malicious infrastructure Identify and report alerting rule issues More ❯
Senior Cyber Security Engineer Are you a passionate Cyber Security Engineer with hands-on experience in deploying Microsoft security solutions and supporting clients with robust threat protection strategies? This is a unique opportunity to join a well-established, award winning Managed Services Provider (MSP), known for its strong reputation in the UK tech market, to help deliver cutting-edge … like of (Cisco Meraki, Fortinet, Ubiquiti. WatchGuard) Vulnerability management tool expertise (Tenable, Qualys) Email security solutions Knowledge (Mimecast, Egress) A Working understanding of Microsoft 365 Cloud Technologies and their threat landscape Familiarity with SOC operations, threat detection, incident response, and security analytics As a Cyber security Engineer you should have one or more of SC-200 - Microsoft Certified … Cyber Essentials Plus (CE & CE+) audits, ensuring clients meet security compliance standards Provide escalation support for complex cyber incidents raised by the internal SOC team Perform technical vulnerability remediation, threatanalysis, and reporting Conduct Microsoft 365 and Cloud Security assessments to identify gaps and secure client environments Carry out offensive security and web application assessments (including penetration testing More ❯
management, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threatanalysis and act as a subject matter expert for mitigating cyber risks. This is an outstanding opportunity for an accomplished Information Security Engineer to join a market leading More ❯
management, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threatanalysis and act as a subject matter expert for mitigating cyber risks. This is an outstanding opportunity for an accomplished Cyber Security Engineer to join a market leading More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Precise Placements
tools. Key Responsibilities: Lead and support incident response (IR) and investigation of security threats across a complex enterprise estate. Manage, tune, and develop SIEM and EDR technologies to enhance threat detection and response capabilities. Implement and refine playbooks , automations , and alerting rules in collaboration with security partners. Contribute to threat hunting and proactive detection strategies. Produce actionable reporting … working in or alongside a 24/7 Security Operations Centre . Strong technical exposure to SIEM (ideally Splunk), EDR (CrowdStrike preferred), and SOAR tools. Expertise in incident handling , threatanalysis , and digital forensics . Scripting or automation experience (Python, PowerShell, etc.) is highly beneficial. Knowledge of MITRE ATT&CK , NIST CSF , and related security frameworks. Legal, financial More ❯
Drive the integration of security into every stage of the Software Development Lifecycle (SDLC). Design, implement, and manage security controls to ensure secure product design, development, and deployment. ThreatAnalysis and Mitigation : Collaborate with cross-functional teams to perform threat modelling, identify security risks, and implement effective countermeasures. Proactively assess the security posture of applications through … vulnerability scanning solutions. Strong grasp of secure coding practices and proficiency in integrating security into the Software Development Lifecycle (SDLC). Technical Knowledge and Implementation experience: Direct experience with threat modelling, security reviews, and penetration testing. Proven ability to secure cloud-native architectures, containerization technologies, and Infrastructure as Code (IaC) environments. Familiarity with industry standards and frameworks such as More ❯
West London, London, United Kingdom Hybrid / WFH Options
Walsh Employment
Defender XDR and Microsoft Sentinel (SIEM) Hands-on experience with the Microsoft Defender suite , including Endpoint Detection and Response Solid understanding of Microsoft 365 Cloud Technologies , particularly from a threat landscape perspective Certifications: SC-200 Microsoft Certified: Security Operations Analyst Associate SC-900 Microsoft Certified: Security, Compliance and Identity Fundamentals Personal Attributes: Highly motivated , with a can-do attitude … Communicating with internal stakeholders and clients during active incidents Liaising with third-party suppliers as a single point of contact for incidents Supporting the Cyber Security Team in ongoing threatanalysis and security incident management Maintaining a customer-first approach in all ticket management and communication Benefits & Working Hours Working Hours: 7.5 hours/day on a fortnightly More ❯
findings and intelligence to inform the firm's risk posture and regulatory reporting. Another key aspect of your role will be to manage the intelligence cycle-from collection and analysis to dissemination-ensuring that actionable intelligence is delivered to key stakeholders.Your leadership will ensure the FCIU not only resolves complex cases but also anticipates future threats, safeguarding Checkout. You … ll Make An Impact Lead and develop the strategic direction for the Financial Crime Intelligence Unit (FCIU), establishing it as a centre of excellence for complex investigations and proactive threat intelligence. Serve as a key partner to the MLROs, providing critical insights and comprehensive investigative reports to support SAR/STR decisions and responses to regulatory inquiries. Oversee and … terrorist financing, potential sanctions violations, and proliferation financing, ensuring thorough and timely resolution. Take ownership of the end-to-end investigation process for escalated cases, including evidence gathering, detailed analysis, and the documentation of findings for regulatory and internal purposes. Develop a proactive threatanalysis capability to identify emerging financial crime typologies and vulnerabilities across our platform More ❯
at reducing cyber risk posed by Artificial Intelligence Provide Artificial Intelligence security guidance and subject matter expertise to business and technology teams in areas such as information security assessments, threatanalysis and treatment, security best practices, and secure use of technologies Every single IT colleague is part of our Transformation journey. Join us and pursue your ambitions - our More ❯
landscape, it's important to look at what's actually happening on the ground. Here are the key trends shaping the cybersecurity conversation this year. Ransomware remains a major threat Attackers are becoming more targeted, more professional and more damaging, according to the Nash Squared/Harvey Nash Digital Leadership Report organised crime remains the biggest concern for digital … Zero Trust models. Typical salary: £65,000 to £95,000 DevSecOps Engineer - Combining development, operations and embedded security across the software lifecycle. Typical salary: £75,000 to £110,000 Threat Intelligence Analyst - Providing real-time insight into evolving threats and advising on proactive measures. Typical salary: £50,000 to £85,000 Cybersecurity Analyst - A key all-rounder role, analysts … Employers Are Prioritising Employers are looking for more than technical knowledge, they're searching for people who can make a real impact. Core technical skills include: Incident response and threat hunting Identity and access management Zero Trust architecture Familiarity with UK regulatory standards and NCSC guidance Certifications often requested: CISSP, CISM, CISA CompTIA Security+ ISO 27001 Cloud security credentials More ❯
executive team to contain, control and disrupt any threatand restore normal operations. Responsibilities will include: Championing our security culturetraining our team to be the best form of defence. Conducting threat analyses and ongoing risk assessments to anticipate and design effective controls that really make a difference. Work collaboratively with the Product and Engineering teams to maintain the technical controls … with cyber security industry standards and frameworks in practise (e.g. ISO 27001, NIST CSF, SP 800-53, NCSC CAF, Cyber Essentials). Has a thorough understanding of cyber security threat and risk with the ability to think like an attacker and design controls that make a real difference. Has proven ability to enable a business to move fast, working … to define solutions that allow us to achieve objectives, whilst also keeping us safe. Has good research and analytical skills utilising a variety of sources: online research, industry forums, threat intel feeds etc. using these to maintain oversight of current and future threats and opportunities to mitigate them. Has an enthusiastic roll up your sleeves mentality, confidently getting into More ❯