City of London, London, United Kingdom Hybrid / WFH Options
Vanquish Technologies Limited
through implementation and ongoing support, our commitment is to provide clients with the assurance that they are valued by a company that is both attentive and impactful. Role Title: ThreatIntelligence Analyst Reporting Line Manager: Head of ThreatIntelligence Onsite Requirements (e.g. number of days per week onsite): 5 days Hybrid/Remote Working Policy: onsite … months Extension likelihood: Yes Maximum Daily Rate or Budget Range: 500 IR35 Status (inside/Outside/To Be Determined) Inside Experience Requirements Technology & Vendor Skillsets Required: Familiarity with threatintelligence platforms (TIPs), SIEMs, and threat data enrichment tools. Experience using Breach and Attack Simulation (BAS) platforms to build and validate threat scenarios. Strong understanding of … adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modeling. Hands-on experience with penetration testing tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera. Experience producing threat reports and briefings. Certifications Required or Preferred: Years of relevant experience: 8+ years of experience in threatintelligence, cybersecurity operations, or penetration testing. More ❯
ThreatIntelligence Analyst - OSINT London, Cheltenham or Manchester Thanks for checking out our job opening; we are excited that YOU are interested in learning more about NCC Group. We are on a mission to make society a safer and more secure place. Our people are the ones who make that possible; a global community of talented individuals working … to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity As a ThreatIntelligence Analyst - OSINT, you will play a pivotal role within our global threatintelligence team. Working alongside colleagues across multiple time zones, you will help make … our clients safer by identifying relevant threat actors, understanding their motivations, targets, and methods, and assessing client exposure. The Global ThreatIntelligence team has built a strong reputation in collecting its own data and combining it with open and commercial sources. In this role, you will analyse cyber threats, develop actionable intelligence, and collaborate with internal More ❯
ThreatIntelligence Analyst - OSINT London, Cheltenham or Manchester Thanks for checking out our job opening; we are excited that YOU are interested in learning more about NCC Group. We are on a mission to make society a safer and more secure place. Our people are the ones who make that possible; a global community of talented individuals working … to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity As a ThreatIntelligence Analyst - OSINT, you will play a pivotal role within our global threatintelligence team. Working alongside colleagues across multiple time zones, you will help make … our clients safer by identifying relevant threat actors, understanding their motivations, targets, and methods, and assessing client exposure. The Global ThreatIntelligence team has built a strong reputation in collecting its own data and combining it with open and commercial sources. In this role, you will analyse cyber threats, develop actionable intelligence, and collaborate with internal More ❯
ThreatIntelligence Analyst - OSINT London, Cheltenham or Manchester Thanks for checking out our job opening; we are excited that YOU are interested in learning more about NCC Group. We are on a mission to make society a safer and more secure place. Our people are the ones who make that possible; a global community of talented individuals working … to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity As a ThreatIntelligence Analyst - OSINT, you will play a pivotal role within our global threatintelligence team. Working alongside colleagues across multiple time zones, you will help make … our clients safer by identifying relevant threat actors, understanding their motivations, targets, and methods, and assessing client exposure. The Global ThreatIntelligence team has built a strong reputation in collecting its own data and combining it with open and commercial sources. In this role, you will analyse cyber threats, develop actionable intelligence, and collaborate with internal More ❯
london (city of london), south east england, united kingdom
NCC Group
ThreatIntelligence Analyst - OSINT London, Cheltenham or Manchester Thanks for checking out our job opening; we are excited that YOU are interested in learning more about NCC Group. We are on a mission to make society a safer and more secure place. Our people are the ones who make that possible; a global community of talented individuals working … to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity As a ThreatIntelligence Analyst - OSINT, you will play a pivotal role within our global threatintelligence team. Working alongside colleagues across multiple time zones, you will help make … our clients safer by identifying relevant threat actors, understanding their motivations, targets, and methods, and assessing client exposure. The Global ThreatIntelligence team has built a strong reputation in collecting its own data and combining it with open and commercial sources. In this role, you will analyse cyber threats, develop actionable intelligence, and collaborate with internal More ❯
grow together. You will be part of a culture that values trust, accountability, and shared success where your work truly matters. Job Description Your Career We are seeking a ThreatIntelligence Researcher for our Unit 42 Intelligence Response Unit. This team plays a critical role in providing timely, actionable threatintelligence and response capabilities to … help protect our customers. Your Impact As a ThreatIntelligence Researcher in the Intel Response Unit, your primary responsibilities will include: Embedded Intelligence Support: Partner with the Unit 42 incident response teams to provide intelligence support to cases and track activity with intelligence value, including high profile cases that may require support outside of normal … Incident Response (IR) and Managed Detection and Response (MDR) data, and Intel Holdings. Utilize these resources to produce unique and valuable insights, enhancing the effectiveness and differentiation of our threatintelligence capabilities. Integrate internal holdings with external information to provide actionable intelligence findings to IR teams. Contributing to External Engagement: Develop engaging and informative content, including customer More ❯
ThreatIntelligence AnalystFully Onsite in London Inside IR35 Contract Deerfoot Recruitment has been engaged to identify an experienced ThreatIntelligence Analyst for a leading global banking organisation with an advanced cyber defence function in London. This is a fantastic opportunity to shape threatintelligence, work alongside Red/Blue Teams, and operationalise intelligence using the latest cybersecurity, penetration testing, and Breach & Attack Simulation (BAS) platforms. Key Responsibilities: Monitor and analyse global cyber threat landscapes, identifying threats, adversary tactics, and emerging risks Collaborate with Red Team, Blue Team, and Penetration Testing specialists to integrate intelligence into Breach & Attack Simulation (BAS) scenarios Act as a point of contact between threatintelligence, Red/Blue, and SOC teams to align threat modelling and adversary simulation Support threat hunting activities and provide tactical, contextual intelligence to stakeholders Model and assess threat actors, including motivations, capabilities, attack vectors, and impacts Leverage the MITRE ATT&CK framework for mapping adversary behaviours and detection Develop and update threat profiles, attack More ❯
ThreatIntelligence Analyst Fully Onsite in London Inside IR35 Contract Deerfoot Recruitment has been engaged to identify an experienced ThreatIntelligence Analyst for a leading global banking organisation with an advanced cyber defence function in London. This is a fantastic opportunity to shape threatintelligence, work alongside Red/Blue Teams, and operationalise intelligence using the latest cybersecurity, penetration testing, and Breach & Attack Simulation (BAS) platforms. Key Responsibilities: Monitor and analyse global cyber threat landscapes, identifying threats, adversary tactics, and emerging risks Collaborate with Red Team, Blue Team, and Penetration Testing specialists to integrate intelligence into Breach & Attack Simulation (BAS) scenarios Act as a point of contact between threatintelligence, Red/Blue, and SOC teams to align threat modelling and adversary simulation Support threat hunting activities and provide tactical, contextual intelligence to stakeholders Model and assess threat actors, including motivations, capabilities, attack vectors, and impacts Leverage the MITRE ATT&CK framework for mapping adversary behaviours and detection Develop and update threat profiles, attack More ❯
on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations: London, UK About the Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state sponsored advanced persistent threats (APTs). Cloudforce One works … in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever-growing sources of threatintelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of leveraging an incredibly vast and varied set of data points that only one of the world's largest global … networks can provide. The team is able to analyze these unique data points, at massive scale and efficiency, synthesizing findings into actionable threatintelligence to better protect our customers.The team's core disciplines are data engineering, data science, devops, and security. We use data science and machine learning to process large volumes of data and build threatMore ❯
ThreatIntelligence Project ManagerBanking - CybersecurityFully Onsite in London Inside IR35 Contract Deerfoot Recruitment has been engaged to find a contract Cybersecurity Project Manager to help shape and deliver cyber threatintelligence initiatives for a global financial institution's ThreatIntelligence Centre. This is an exciting opportunity to drive international projects, support executive-level decision … making, and collaborate with high-performing cybersecurity teams across multiple regions. Key Responsibilities Lead and manage end-to-end projects within a global ThreatIntelligence Centre, aligning activities with strategic cybersecurity objectives. Develop and monitor project plans, timelines, budgets, and resource allocation. Coordinate with global stakeholders in EMEA, Americas, APAC, Japan, and India to align requirements and ensure … drive cost optimisation and meet strategic goals. Facilitate recurring international meetings by setting agendas, tracking actions, managing time zone/holiday scheduling, and maximising participation. Drive the standardisation of threatintelligence processes, governance, and tooling. Prepare and deliver high-quality executive reports and presentations. Ensure alignment with compliance, risk, and regulatory requirements across multiple jurisdictions. Track progress, identify More ❯
ThreatIntelligence Project Manager Banking - Cybersecurity Fully Onsite in London Inside IR35 Contract Deerfoot Recruitment has been engaged to find a contract Cybersecurity Project Manager to help shape and deliver cyber threatintelligence initiatives for a global financial institution's ThreatIntelligence Centre. This is an exciting opportunity to drive international projects, support executive … level decision-making, and collaborate with high-performing cybersecurity teams across multiple regions. Key Responsibilities Lead and manage end-to-end projects within a global ThreatIntelligence Centre, aligning activities with strategic cybersecurity objectives. Develop and monitor project plans, timelines, budgets, and resource allocation. Coordinate with global stakeholders in EMEA, Americas, APAC, Japan, and India to align requirements … drive cost optimisation and meet strategic goals. Facilitate recurring international meetings by setting agendas, tracking actions, managing time zone/holiday scheduling, and maximising participation. Drive the standardisation of threatintelligence processes, governance, and tooling. Prepare and deliver high-quality executive reports and presentations. Ensure alignment with compliance, risk, and regulatory requirements across multiple jurisdictions. Track progress, identify More ❯
City of London, London, Coleman Street, United Kingdom
Deerfoot Recruitment Solutions Limited
ThreatIntelligence Project Manager Banking - Cybersecurity Fully Onsite in London Inside IR35 Contract Deerfoot Recruitment has been engaged to find a contract Cybersecurity Project Manager to help shape and deliver cyber threatintelligence initiatives for a global financial institution's ThreatIntelligence Centre. This is an exciting opportunity to drive international projects, support executive … level decision-making, and collaborate with high-performing cybersecurity teams across multiple regions. Key Responsibilities Lead and manage end-to-end projects within a global ThreatIntelligence Centre, aligning activities with strategic cybersecurity objectives. Develop and monitor project plans, timelines, budgets, and resource allocation. Coordinate with global stakeholders in EMEA, Americas, APAC, Japan, and India to align requirements … drive cost optimisation and meet strategic goals. Facilitate recurring international meetings by setting agendas, tracking actions, managing time zone/holiday scheduling, and maximising participation. Drive the standardisation of threatintelligence processes, governance, and tooling. Prepare and deliver high-quality executive reports and presentations. Ensure alignment with compliance, risk, and regulatory requirements across multiple jurisdictions. Track progress, identify More ❯
Primary Details Time Type: Full time Worker Type: Employee ThreatIntelligence Specialist London Permanent (Hybrid) At QBE, our purpose is to enable a more resilient future. We are an international insurer and reinsurer with a local presence in 27 countries. The Opportunity We’re excited to be hiring a ThreatIntelligence Specialist to join our Advanced … Threat Services (ATS) Teamon a full-time, permanent basis! You’ll be part of a supportive team that thrives on teamwork and innovation, where your expertise will be valued as we work together to tackle the ever-evolving cyber threat landscape. We’re looking to welcome our new team member from early January 2026 , so if you’re … ready to make an impact in the new year, we’d love to hear from you! Your New Role Reporting to the Technical Threat Manager , you’llbe responsible for researching, analysing, and reporting on cyber threats targeting QBE’s global operations and technology environment. This role has a strong technical focus, centred on the collection, enrichment, automation, and analysis More ❯
ThreatIntelligence Project Manager Banking - Cybersecurity Fully Onsite in London Inside IR35 Contract Deerfoot Recruitment has been engaged to find a contract Cybersecurity Project Manager to help shape and deliver cyber threatintelligence initiatives for a global financial institution's ThreatIntelligence Centre click apply for full job details More ❯
Initial We are looking for a highly capable and technically skilled Security Analyst (Network & Endpoint) to join our cybersecurity team. This role focuses on network and endpoint security operations, threatintelligence, and incident response within a Security Operations Centre (SOC) environment. The successful candidate will have hands-on experience with leading security platforms and demonstrate the ability to … Network & Endpoint) Location: England/Remote Contract Type: Contract Duration: Contract till 31st Mar 26 Sector: Healthcare . Key Responsibilities: Network Detection & Response: Administer and optimise Darktrace for network threat detection, model tuning, and behavioural analysis. Investigate anomalies and escalate incidents based on network telemetry. Endpoint Protection: Deploy and manage CrowdStrike Falcon agents across enterprise endpoints. Maintain and update … detection rules, ensuring alignment with threat intelligence. Security Operations Centre (SOC): Act as a Level 2 SOC Analyst and Incident Handler. Triage, investigate, and respond to security alerts and incidents. Collaborate with other SOC team members to ensure timely resolution and documentation. ThreatIntelligence & Insider Threat Monitoring: Monitor threat feeds and manage Indicators of Compromise More ❯
that the world depends on every day. As a Cybersecurity Defense professional at Kyndryl, you will encompass cybersecurity, incident response, security operations, vulnerability management, and the world of cyber threat hunting and security intelligence analysis all to protect the very heartbeat of organizations – their infrastructure. In this role, you won't just monitor; you'll actively engage in … will be used as you respond and manage to cybersecurity incidents. Cybersecurity Defense is all about information. You'll gather, analyze, and interpret data applying your own and external threatintelligence to uncover potential security threats and risks. These insights and your ability to analyze complex attack scenarios will be the foundation of our security strategy – helping Kyndryl … of a team that safeguards the digital assets of a cutting-edge organization? Look no further – Kyndryl is seeking a Cybersecurity Specialist to join our team of talented Security Intelligence Analysts . The Kyndryl CSIRT (Cybersecurity Incident Response Team) is looking for a Security Intelligence Analyst to join an advanced team that drives proactive identification of threats within More ❯
on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us Available Locations: London, UK About The Department Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state sponsored advanced persistent threats (APTs). Cloudforce One works … in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever-growing sources of threatintelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of leveraging an incredibly vast and varied set of data points that only one of the world's largest global … networks can provide. The team is able to analyze these unique data points, at massive scale and efficiency, synthesizing findings into actionable threatintelligence to better protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the internet better, safer, and more powerful everyday. To help fulfill this mission, we More ❯
Account Executive – Cybersecurity SaaS (Hybrid, London) Location: London (Hybrid – 2–3 days/week in office) Industry: Cybersecurity/ThreatIntelligence About the Company A fast-growing cybersecurity vendor backed by top-tier investors, this company delivers cutting-edge threatintelligence solutions to help organisations stay ahead of evolving threats. Trusted by global pharma leaders and … decision-makers Consistently meet and exceed revenue targets Requirements 3+ years of experience in SaaS or cybersecurity sales Proven track record of closing complex enterprise deals Strong understanding of threatintelligence or willingness to learn Excellent communication and consultative selling skills Based in London or able to commute to the office 2–3 days/week Why Join More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Space Executive
Account Executive – Cybersecurity SaaS (Hybrid, London) Location: London (Hybrid – 2–3 days/week in office) Industry: Cybersecurity/ThreatIntelligence About the Company A fast-growing cybersecurity vendor backed by top-tier investors, this company delivers cutting-edge threatintelligence solutions to help organisations stay ahead of evolving threats. Trusted by global pharma leaders and … decision-makers Consistently meet and exceed revenue targets Requirements 3+ years of experience in SaaS or cybersecurity sales Proven track record of closing complex enterprise deals Strong understanding of threatintelligence or willingness to learn Excellent communication and consultative selling skills Based in London or able to commute to the office 2–3 days/week Why Join More ❯
london, south east england, united kingdom Hybrid / WFH Options
Space Executive
Account Executive – Cybersecurity SaaS (Hybrid, London) Location: London (Hybrid – 2–3 days/week in office) Industry: Cybersecurity/ThreatIntelligence About the Company A fast-growing cybersecurity vendor backed by top-tier investors, this company delivers cutting-edge threatintelligence solutions to help organisations stay ahead of evolving threats. Trusted by global pharma leaders and … decision-makers Consistently meet and exceed revenue targets Requirements 3+ years of experience in SaaS or cybersecurity sales Proven track record of closing complex enterprise deals Strong understanding of threatintelligence or willingness to learn Excellent communication and consultative selling skills Based in London or able to commute to the office 2–3 days/week Why Join More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Space Executive
Account Executive – Cybersecurity SaaS (Hybrid, London) Location: London (Hybrid – 2–3 days/week in office) Industry: Cybersecurity/ThreatIntelligence About the Company A fast-growing cybersecurity vendor backed by top-tier investors, this company delivers cutting-edge threatintelligence solutions to help organisations stay ahead of evolving threats. Trusted by global pharma leaders and … decision-makers Consistently meet and exceed revenue targets Requirements 3+ years of experience in SaaS or cybersecurity sales Proven track record of closing complex enterprise deals Strong understanding of threatintelligence or willingness to learn Excellent communication and consultative selling skills Based in London or able to commute to the office 2–3 days/week Why Join More ❯
maintained and augmented and that the team members have every opportunity to grow and learn with the organisation. As part of our Blue Team, you’ll use the latest intelligence and tooling to analyse information systems to ensure effective incident detection and response. Job Description If you are looking to make your mark on a rapidly growing SecOps team … join our Blue Team. The ideal candidate will be a self-starter with an inquisitive nature and a keen interest when it comes to technical cybersecurity topics such as threat hunting, attacker tactics and techniques, monitoring and alerting, threatintelligence, and incident readiness and response. Key responsibilities of the role are summarised below: · Security monitoring and incident … the Splunk SIEM, to enable the detection of threats across diverse platforms (e.g. cloud, endpoints, and networks) · Use frameworks like MITRE ATT&CK to map detection rules and maximise threat coverage · Use analytical platforms to query high volume datasets to identify trends and spot unusual behaviours, indicative of malicious activity · Proactive threat hunting using available client data · Collection More ❯
findings clearly in reports and client presentations, tailoring communication for both technical and executive audiences. Work closely with clients to define forensic requirements and develop incident response playbooks. Conduct threat hunting and compromise assessments, correlating findings with threatintelligence (MITRE ATT&CK, TTPs, IOCs). Support cloud forensics in AWS and Azure, ensuring proper collection and handling … analytical, problem-solving, and documentation skills. Ability to translate complex forensic data into clear, client-friendly reports. Knowledge of chain of custody, evidential procedures, and forensic readiness. Familiarity with threatintelligence frameworks such as MITRE ATT&CK. Relevant certifications (desirable): GCFA, GCIH, CISSP, AWS Security Specialty, Azure Security Engineer. As an industry leading, nationwide Marketing, Digital, Analytics, IT More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
and interpret evidence to provide a holistic view of the organisation's security posture. Present findings and recommendations to senior leadership and governance forums. Collaborate with internal teams (e.g., threatintelligence, compliance, audit) to ensure assurance activities reflect current threat landscapes. Act as a primary interface for business units, ensuring alignment between assurance activities and operational priorities. … talent. Ability to interpret complex technical and business information to assess risk. Experience in supply chain security assurance. Knowledge of secure by design principles and accreditation processes. Understanding of threatintelligence and its application in assurance. Experience working in regulated or high-assurance environments (e.g., government, finance, defence). Familiarity with risk management tools and methodologies. What's More ❯
Consultant in Unit 42 you will have the opportunity to work across a number of proactive cyber security domains including Cloud Security, Security Operations, Cyber Risk Management and Artificial Intelligence in cyber security. We are seeking an individual who is passionate about cyber security, curious with a demonstrated track record of continuous learning, and has the technical acumen to … embrace data, technological and innovative approaches to deliver the best consulting outcomes for clients, as they work to address the challenges associated with today’s cyber threat landscape. Your Impact SOC Advisory: 4+ years of consulting experience in SOC, security engineering, SIEM administration, and incident management and demonstrated success with serving large, multinational organisations in designing and implementing an … Security Incident and Event Management (SIEM) platforms, Security Orchestration and Response (SOAR) technologies, Endpoint Protection and Response/Next Gen Protection and Response (EDR/XDR) tools, Next GenFirewalls, ThreatIntelligence and Hunting platforms Defensive Security Skills (desired) : Experience in security operations design, engineering and/or analysis and investigations, ideally in complex environments, with security event correlations More ❯