We are seeking a Threat Analyst to join our rapidly growing Information Security team. This is a unique opportunity for an aspiring and motivated professional to be at the forefront of our cyber defence strategy, protecting our brand from existing and emerging threats. You will combine the expertise of … a Threat Hunter and Cyber ThreatIntelligence Analyst, and will work alongside our Senior Threat Analyst to build our threatintelligence and hunting capabilities from the ground up. You'll have a major input on what new tooling and services we use and the … Seize the opportunity to join a dynamic security team, reporting to the Head of Cyber Defence, and lead the development of advanced CTI and threat hunting strategies, seamlessly integrating into our security processes and driving continuous improvements. What you'll be doing In this role, your key responsibilities will More ❯
Tactical Cyber ThreatIntelligence Analyst (Analyst I) About the role Location: Office (London) or Home based Duration: Permanent, Full time The primary role of the Tactical Cyber ThreatIntelligence Analyst is to support the production of accurate, high quality and timely intelligence products. This will … include support to management, peers and members of staff and clients, both in-house and clients. Tactical Cyber ThreatIntelligence Analysts will: Create Open Source summaries concerning cyber threat incidents Create and update threat actor profiles detailing salient information about cyber threat actors. Assist in … strategic reporting concerning technical themes of interest (malware, IOCs, actor TTPs/campaigns and other developments which have the potential to impact the cyber threat landscape). Respond to Requests for Intelligence (RFIs) from clients. Contribute to other tasks, including (but not limited to) marketing, client engagement, relationship More ❯
products, content and services millions of people love. And we do it all right here at Sky. Sitting within our Cyber Fusion Centre, the ThreatIntelligence Service is seeking a ThreatIntelligence Specialist to join our team, to proactively identify and collect relevant cyber threat information, enriched across multiple threat feeds and data sources, to ultimately deliver actionable intelligence to our stakeholders. The role will be key in playing a crucial role in the identification of potential threats against the Sky Group and our third parties. What you'll do Provide a … global Cyber ThreatIntelligence capability by performing horizon scanning and research using OSint and commercial threatintelligence tooling to proactively identify and analyse threats and vulnerabilities Use a variety of sources of information to identify and evaluate threats and vulnerabilities targeting Sky's attack surface entities More ❯
flexible/hybrid working) Salary: £50,000 - £65,000 Exciting opportunity to join a leading global Insurtech organisation as a key member of the ThreatIntelligence and Proactive Services capabilities. This role sits within the Cyber Insights & Analytics function, part of the Cyber Underwriting division, supporting cyber underwriting … the cyber underwriters to deliver the proactive cybersecurity services, engage with internal and external stakeholders, and help insureds and stakeholders navigate the evolving cyber threat landscape. Responsibilities will include: Deliver Cybersecurity Services: You will help deliver our proactive services such as cyber tabletop exercises, security awareness and training sessions … development of cyber policies and procedures, and threat report briefings. ThreatIntelligence Reporting: You will transform complex threatintelligence data into actionable insights by crafting detailed, quarterly reports that spotlight industry trends and emerging risks. Your analysis will empower policyholders with the knowledge they need More ❯
also to contribute to the security of the wider open source ecosystem. They might share knowledge through public presentations and industry events, and share threatintelligence with the wider community or represent Canonical in sector-specific governance bodies. What you will do in this role: Implement and evolve … and guide the remediation of security threats and cyber attacks Grow the presence and thought leadership of Canonical SecOps practice Contribute to open source threatintelligence initiatives Drive threat modelling, table top exercises and other SecOps practices across Engineering, IS and Canonical Develop Canonical SecOps learning and … Drive and a track record of going above-and-beyond expectations Deep personal motivation to be at the forefront of technology security Expertise in threat modelling and risk management frameworks Knowledge of security architecture and market-leading security tools Experience contributing to, and consuming, threatintelligence feeds More ❯
Content - maintain the availability of the underlying infrastructure, develop new alerts, field parsers, models and automated playbooks, and integrate new log sources where appropriate. ThreatIntelligence & Threat Hunting - provide, develop and integrate external threatintelligence data into the team's detection capabilities; perform proactive threat … test the team's detection capabilities, develop scenario-based training, and organise purple team exercises, both in-house and with third-party providers. Insider Threat - maintain and develop the Data Loss Prevention policies in line with the company's data classification requirements, and implement exceptions for business-approved procedures More ❯
Vulnerability and Threat Hunting Manager Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in our … attractions. The Vulnerability and Threat Hunting Manager is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerability management programme, conducting threat assessments, and … business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead ThreatIntelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with Security Standards. Stakeholder Communication More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Merlin Entertainments
Vulnerability and Threat Hunting Manager Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in our … attractions. The Vulnerability and Threat Hunting Manager is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerability management programme, conducting threat assessments, and … business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead ThreatIntelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with Security Standards. Stakeholder Communication More ❯
london, south east england, United Kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
and above incidents Provide Incident response support for all incidents using playbooks. Forensic/Deep Dive analysis providing value dashboards and reports/Threat Hunting/ThreatIntelligence Collaborate and work with the InfoSec SOC team Support future cloud migrations Document policies, processes, toolkits and dashboards Identifying … Years within a Cyber Security role Previous experience as SOC/Security analyst Solid understanding of Security Architecture Experience in MDR, EDR and Threat Hunting SIEM tool exposure Relevant Cyber Security qualifications Excellent communication Skills Scripting or coding in Python, Ruby or PowerShell (desirable) For more information on the More ❯
to come. About Us Our UK&I Advisory Practice is a leader in cyber security transformation, partnering with organizations to tackle the evolving digital threat landscape. We combine technical expertise with strategic business insight to deliver end-to-end cyber solutions that enable innovation and secure digital growth. Role … actionable strategies. Guide clients through compliance with DORA, NIS2, and UK regulatory frameworks. Design comprehensive cyber security architectures that integrate cloud, identity, data, and threat protection. Build actionable implementation roadmaps considering business objectives and constraints. Evaluate and integrate partner technologies (e.g., Microsoft, AWS, GCP) for optimal client outcomes. Deliver … business cases that communicate ROI and business enablement. Conduct maturity assessments using frameworks such as NIST CSF, ISO 27001, and industry-specific standards. Facilitate threat and risk workshops tailored to client environments. Showcase innovation through demos of emerging technologies like XDR, SASE, and SOAR. Practice Development Mentor consultants and More ❯
event data, and alerts to identify potential threats Knowledge and experience of network protocols, traffic analysis, and cyber-attack methodologies Knowledge and experience of threatintelligence, risk management, vulnerability management, and penetration testing Please note sponsorship is not available for this position, and you must be able to More ❯
be progressing your career at a global, hugely profitable, Investment Management firm. As a Cyber Defence Analyst you will take a proactive approach to threat hunting and security incident response. You'll play a key role in detection enhancements, improvements to standard operating procedures and will collaborate with internal … strong experience in Security Operations, CSIRT or similar role You have experience of building out functions of a Cyber Defence Team e.g. insider risk, threatintelligence, breach attack simulation You have a strong knowledge of SIEM and deep Splunk experience You have a good understanding of various security More ❯
incident response, compliance, and implementing innovative security technologies to strengthen the organisation's defenses. Essential functions of the job: SOC operations: perform incident triaging, threat detection, and response activities. SIEM & EDR management: advance and configure SIEM and EDR systems to optimise threat detection and response in Azure environments. … response: investigate and mitigate security incidents, applying root cause analysis and remediation. Security testing: conduct regular application and network security assessments to identify vulnerabilities. Threatintelligence: monitor the cybersecurity landscape for emerging threats and develop innovative defensive strategies. Development security: monitor version control systems, identify vulnerabilities, and collaborate More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Police Digital Services
Lead the security working group for specified national capabilities Apply and implement Secure by Design Monitor systems for anomalies or unusual events, and use threatintelligence sources to identify security incidents and coordinate with relevant stakeholders for a swift resolution Enhance the security culture within the national Policing More ❯
DFTO, responsible for establishing and maturing the group's overall cyber security posture, ensuring it effectively mitigates risks in the face of the evolving threat landscape. This involves developing a comprehensive cyber security capability framework, assessing the maturity of individual train operating companies (TOCs) against this framework, and creating … gaps, and develop/oversee implementation of tailored uplift programmes. Develop core cyber capabilities: Including robust cyber incident management (with executive reporting) and comprehensive threatintelligence/vulnerability management programs as key priorities. Group Cyber Services & Technology: Develop, promote and implement shared cyber services and evaluate/select … Extensive experience developing and implementing cyber security strategies, frameworks (including maturity models), and risk management methodologies in complex organisations. Accredited in ISO27001 or similar. Threat Landscape & Incident Response: Deep understanding of modern cyber threats and attack vectors, coupled with proven experience in developing and managing effective incident response processes. More ❯
remote London/Berkshire Overview: Senior SOC Analyst Level 3 to join a specialist Managed Security Services business. You will be responsible for advanced threat hunting/triage, incident response etc with a strong focus on the Microsoft Security Stack. Key Responsibilities: Lead and resolve complex security incidents/… escalations Conduct advanced threat hunting using the Microsoft Security Stack. Build, optimise and maintain workbooks, rules, analytics etc. Correlate data across Microsoft 365 Defender, Azure Defender and Sentinel. Perform root cause analysis and post-incident reporting. Aid in mentoring and upskilling Level 1 and 2 SOC analysts. Required Skills … of custom analytic rules. Workbook creation and dashboarding. Automation using Playbooks and SOAR integration. Kusto Query Language (KQL): Writing complex, efficient queries for advanced threat hunting and detection. Correlating data across key tables (e.g., SignInLogs, SecurityEvent, OfficeActivity, DeviceEvents). Developing custom detection rules, optimising performance, and reducing false positives. More ❯
and configuring a wide range of security technologies, including SIEM solutions, DLP solutions, firewall solutions, cloud security centers, IPS (Intrusion Prevention Systems), CTI (Cyber ThreatIntelligence) solutions, and vulnerability scanners. Proxy solutions like Zscaler are essential. At least one professional certification; CISSP, CISM, CCSP. What we offer you More ❯
a leading provider of advanced cybersecurity services, safeguarding organizations against evolving digital threats. We are seeking an Associate Director who will spearhead the Forensics, ThreatIntelligence and Incident Response practice area for EMEA. This pivotal role involves leading a team of elite cybersecurity consultants, overseeing a substantial revenue … is imperative for you to remain abreast of advancements in technology and evolving market trends, particularly those pertaining to Data security and privacy, Artificial Intelligence, Zero Trust, and Secure Access Service Edge (SASE), Cyber resilience and risk quantification as well as market regulatory needs and compliance. Additionally, the capacity … teams to develop programs that enhance knowledge of cyber operations, threats, regulations, and case studies Managing the business and P&L of the Verizon threat and advisory practice for EMEA You'll Need to have: Experience as a Cyber Security executive at a leading cybersecurity company or consulting firm More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Entasis Partners
collaborating with global teams to maintain and improve cyber resilience. Key Responsibilities: Manage and optimize key security tools, including Defender, CrowdStrike, and Zscaler Lead threatintelligence activities, IT controls, and performance dashboards Develop and run phishing simulations & cyber security awareness programs Collaborate with global teams to ensure consistent More ❯
a leading provider of advanced cybersecurity services, safeguarding organizations against evolving digital threats. We are seeking an Associate Director who will spearhead the Forensics, ThreatIntelligence and Incident Response practice area for EMEA. This pivotal role involves leading a team of elite cybersecurity consultants, overseeing a substantial revenue … is imperative for you to remain abreast of advancements in technology and evolving market trends, particularly those pertaining to Data security and privacy, Artificial Intelligence, Zero Trust, and Secure Access Service Edge (SASE), Cyber resilience and risk quantification as well as market regulatory needs and compliance. Ability to understand … enhance the field's knowledge of cyber operations, evolving threats, regulations, and relevant case studies. Managing the business and P&L of the Verizon Threat and Advisory Practice for EMEA. You'll Need to have: Experience working as a Cyber Security executive at a leading Cyber Security company or More ❯
metrics and monitoring/audits Network, VM & container image and system hardening, Cloud issues and misconfigurations Endpoint Security, Infrastructure Identity and Access Management, SIEM, Threatintelligence, common misconfigs (DNS, email, networking, etc.) Organising and performing penetration testing of our infrastructure, and collaborating with external parties on those tests. More ❯
to provide the best-in-class security to protect the bank. We live and breathe the Allica values and deliver services intelligently using automation, intelligence, and innovation. Role Description An experienced Head of IT Security is required to join a fast-paced IT division, to facilitate and enhance all … strategy of enhancing the bank's IT security further. Using a combination of third-party tooling and custom solutions to assist you with security threat analysis and detection, you will help drive the security strategy for current and future product implementations. With good mentoring and coaching capabilities, you will … to monitor, detect, and respond to potential threats in real-time. Lead the establishment of a Security Operations Center (SOC) for continuous monitoring and threat intelligence. Continuously evaluate and enhance security tools, technologies, and processes to stay ahead of evolving threats. Application and Cloud Security Implement best practices for More ❯
Build OT-specific detection and response capabilities, including custom playbooks. Technology Implementation Oversee global deployment of SIEM (e.g., Splunk, Graylog, Wazuh), SOAR, EDR, and Threat Intel platforms. Vendor & Team Management Act as the primary contact for the outsourced SOC provider; manage SLAs and vendor performance. Build and mentor internal … Technical expertise with SIEM, SOAR, EDR, and OT protocols Familiar with SCADA/ICS environments and MITRE ATT&CK framework. Skilled in incident response, threat hunting, SLA management, and executive communication. Preferred Qualifications Degree in Computer Science, InfoSec, or related field. Certifications: CISSP, CISM, GIAC (e.g., GCFA, GNFA), or … OT certs (e.g., GICSP, ISA/IEC 62443). Familiarity with cloud security tools, IT/OT integration, and threat modeling. More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Intaso
Build OT-specific detection and response capabilities, including custom playbooks. Technology Implementation Oversee global deployment of SIEM (e.g., Splunk, Graylog, Wazuh), SOAR, EDR, and Threat Intel platforms. Vendor & Team Management Act as the primary contact for the outsourced SOC provider; manage SLAs and vendor performance. Build and mentor internal … Technical expertise with SIEM, SOAR, EDR, and OT protocols Familiar with SCADA/ICS environments and MITRE ATT&CK framework. Skilled in incident response, threat hunting, SLA management, and executive communication. Preferred Qualifications Degree in Computer Science, InfoSec, or related field. Certifications: CISSP, CISM, GIAC (e.g., GCFA, GNFA), or … OT certs (e.g., GICSP, ISA/IEC 62443). Familiarity with cloud security tools, IT/OT integration, and threat modeling. More ❯
scale. And if something doesn't go to plan, this role will be accountable alongside the executive team to contain, control and disrupt any threat-and restore normal operations. Responsibilities will include: Championing our security culture-training our team to be the best form of defence. Conducting threat … and frameworks in practise (e.g. ISO 27001, NIST CSF, SP 800-53, NCSC CAF, Cyber Essentials). Has a thorough understanding of cyber security threat and risk with the ability to think like an attacker and design controls that make a real difference. Has proven ability to enable a … us to achieve objectives, whilst also keeping us safe. Has good research and analytical skills utilising a variety of sources: online research, industry forums, threat intel feeds etc. using these to maintain oversight of current and future threats and opportunities to mitigate them. Has an enthusiastic 'roll up your More ❯