the security community and society through collaboration, sharing and learning and protect our Critical National Infrastructure in line with Government regulations. We are seeking a skilled and experienced Cyber Threat Operational Intelligence Manager to join our team. The ideal candidate will be responsible for leading a team at the heart of Vodafone's Cyber Defence organization: analyzing cyber … threats and providing actionable insights to protect Vodafone and its customers from potential attacks. This role requires great people management skills, a deep understanding of cyber threat landscape, strong analytical skills, the ability to communicate effectively with stakeholders and to work collaboratively with colleagues of varying backgrounds and experience. Lead one of Vodafone Group's Cyber ThreatIntelligence Teams with line management responsibilities for several staff with varying levels of expertise and experience. Create and/or guide the creation of threat assessments and provide actionable intelligence to relevant stakeholders. Lead and support proactive investigations on priority threats through our Threat Action Groups/Threat and Vulnerability Reviews. Support Incident Management/CSOC More ❯
triage and escalation of reports and requests from Government organisations. Support Incident Management when required during periods of heightened operational activity. Maintain an understanding of the real-world cyber threat, identifying trends and emerging threats. Maintain an understanding of the cyber threats likely to target the business. Facilitate the timely sharing of high-quality actionable Cyber ThreatIntelligence … stakeholders. Work collaboratively with Incident Management, providing insights on adversaries to enable a more effective response, and capturing insights for wider use. Support the implementation and ongoing management of ThreatIntelligence tooling and infrastructure, including, malware sandboxes, and threatintelligence platforms. Engage with the wider public sector cyber security, cyber threatintelligence and assessment … communication skills, including the ability to clearly and simply explain technical details to non-technical audiences, and engage with senior stakeholders. Experience working with internal and external stakeholders. Cyber ThreatIntelligence Specific Excellent understanding of the tools, techniques and procedures used by adversaries in real-world cyber attacks. Experience monitoring a variety of sources of information to identify More ❯
triage and escalation of reports and requests from Government organisations. * Support Incident Management when required during periods of heightened operational activity. * Maintain an understanding of the real-world cyber threat, identifying trends and emerging threats. * Maintain an understanding of the cyber threats likely to target the business. * Facilitate the timely sharing of high-quality actionable Cyber ThreatIntelligence … stakeholders. * Work collaboratively with Incident Management, providing insights on adversaries to enable a more effective response, and capturing insights for wider use. * Support the implementation and ongoing management of ThreatIntelligence tooling and infrastructure, including, malware sandboxes, and threatintelligence platforms. * Engage with the wider public sector cyber security, cyber threatintelligence and assessment … communication skills, including the ability to clearly and simply explain technical details to non-technical audiences, and engage with senior stakeholders. * Experience working with internal and external stakeholders. Cyber ThreatIntelligence Specific * Excellent understanding of the tools, techniques and procedures used by adversaries in real-world cyber attacks. * Experience monitoring a variety of sources of information to identify More ❯
triage and escalation of reports and requests from Government organisations. * Support Incident Management when required during periods of heightened operational activity. * Maintain an understanding of the real-world cyber threat, identifying trends and emerging threats. * Maintain an understanding of the cyber threats likely to target the business. * Facilitate the timely sharing of high-quality actionable Cyber ThreatIntelligence … stakeholders. * Work collaboratively with Incident Management, providing insights on adversaries to enable a more effective response, and capturing insights for wider use. * Support the implementation and ongoing management of ThreatIntelligence tooling and infrastructure, including, malware sandboxes, and threatintelligence platforms. * Engage with the wider public sector cyber security, cyber threatintelligence and assessment … communication skills, including the ability to clearly and simply explain technical details to non-technical audiences, and engage with senior stakeholders. * Experience working with internal and external stakeholders. Cyber ThreatIntelligence Specific * Excellent understanding of the tools, techniques and procedures used by adversaries in real-world cyber attacks. * Experience monitoring a variety of sources of information to identify More ❯
Citi's Cyber Intelligence Center (CIC) is a global team that delivers timely threatintelligence to technical teams and decision makers, in support of threat detection, preparation, and incident response activities. The Regional Lead will oversee the team's operations in the UK/EU time-zone, including oversight of regional staff, driving quality control, collaboration … with other cyber-technical functions in the region, and working with senior leaders. The role will also help maintain our network of global intelligence partners. Direct experience in cyber threatintelligence is a necessity. This is a hybrid role with an in-office attendance component. Experience in fusion center operating environments or crisis response will be helpful. … Responsibilities: Lead the regional co-ordination of a cyber threatintelligence function Support local leadership and business in their intelligence needs Provide intelligence support to adjacent teams in a fusion center environment. Oversee quality control and production strategy for the region Conduct internal and external briefings on a regular basis, including to company leadership, to peer More ❯
The team you'll be working with: Consultant - Offensive Security Testing Role Overview: We are seeking a highly skilled and experienced Offensive Security Consultant with a strong focus on threatintelligence and attack methods. The ideal candidate will manage and conduct advanced penetration testing engagements, leveraging threatintelligence to simulate real-world attacks across various environments … provide strategic, actionable recommendations to enhance our clients' security posture. What you'll be doing: Responsibilities: Lead and manage the full lifecycle of complex penetration testing engagements, applying a threatintelligence-led approach. Execute advanced penetration tests across environments such as applications, infrastructure, web, APIs, O365, Azure, AWS, and OT, using current threat landscape knowledge and attacker … TTPs. Develop and maintain detailed test plans and use cases informed by threatintelligence analysis. Identify and prioritize critical OT and IT assets based on potential threats and exposure. Plan and schedule testing engagements based on threat assessments and client needs. Produce clear, detailed reports with technical findings, business impact, and strategic remediation recommendations for diverse audiences. More ❯
A leading, award-winning cyber security and risk management organisation is seeking a highly experienced and motivated Senior Cyber Security and ThreatIntelligence Sales Consultant. This is an exciting opportunity to join a fast-growing team delivering cutting-edge security, threatintelligence, and managed service solutions to enterprise clients. Key Responsibilities Sell security and threatintelligence solutions, platforms, and managed services into global enterprise accounts. Present a wide-ranging portfolio of innovative and established security solutions to new and existing customers. Identify client needs and deliver tailored technical and business-aligned solutions. Target prospective customers through cold calling, face-to-face meetings, and professional networking. Manage the full sales cycle from prospecting to … and RFP proposals. Deliver impactful presentations to senior-level stakeholders. Maintain long-term relationships with key decision-makers and influencers. Build and execute account plans focused on security technologies, threatintelligence, and managed services. Drive business strategy to grow revenue and profitability through cross-selling opportunities. Navigate complex sales environments with political and commercial awareness. Required Experience & Skills More ❯
Principal Cybersecurity Researcher (Reverse Engineering) London, UK With 1,000 intelligence professionals, over $300M in sales, and serving over 1,900 clients worldwide, Recorded Future is the world's most advanced, and largest, intelligence company! Reversing Emulation and Testing (RET) is a core function of Insikt Group's Technical Analysis (TA) Team. We seek a principal technical threat … lead high-impact research and drive innovation in analytical capabilities within Insikt Group. You will guide and shape technical research into state-sponsored and cybercriminal malware, collaborating across functional intelligence teams to support finished intelligence reporting and platform enrichment. Your responsibilities will include not only conducting advanced malware reverse engineering and infrastructure emulation but also designing and implementing … internal tools and workflows that increase our team's efficiency. You will be expected to develop and formalize novel approaches to dynamic analysis, configuration extraction, and threat behavior modeling. This position entails representing Insikt Group's technical threat research in customer briefings, webinars, and industry engagements. You will communicate complex technical findings to diverse audiences ranging from internal More ❯
you will be a key member of our Cyber Security Incident Response Team (CSIRT), responsible for identifying, analyzing, and mitigating cyber threats. This role requires a proactive approach to threat hunting, cyber threatintelligence, and incident response, ensuring the protection of BCG's global network. You will work closely with the Security Operations Center (SOC), Security Information … to strengthening our security posture and minimizing business risks associated with cyber threats. Act as a Tier 3 Incident Responder, supporting complex investigations into cyber security incidents. Conduct proactive threat hunting to detect and neutralize emerging threats. Monitor and analyze logs via SIEM, EDR, and network traffic analysis tools for potential attack indicators. Investigate security incidents, including malware infections … phishing attacks, and unauthorized access attempts. Develop and enhance incident response playbooks, ensuring alignment with evolving threats. Analyze threatintelligence sources to identify new attack vectors and adversary tactics. Provide forensic analysis and malware reverse engineering to assess security incidents. Collaborate with IT, Risk, and Compliance teams to ensure regulatory compliance and security best practices. Produce timely reports More ❯
on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations: London, UK About the Department Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state sponsored advanced persistent threats (APTs). Cloudforce One works … in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever-growing sources of threatintelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of leveraging an incredibly vast and varied set of data points that only one of the world's largest global … networks can provide. The team is able to analyze these unique data points, at massive scale and efficiency, synthesizing findings into actionable threatintelligence to better protect our customers. About the Role Cloudflare is a system spanning the globe, on a mission to make the internet better, safer, and more powerful everyday. To help fulfill this mission, we More ❯
Company Background ThreatConnect enables threatintelligence, security operations, and cyber risk management teams to work together for more effective, efficient, and collaborative cyber defense. With ThreatConnect, organizations can infuse ML and AI-powered threat intel and cyber risk quantification into their work, allowing them to contextualize an evolving threat landscape, prioritize the most significant risks to … family to grow with us and share in our success. We love to recognize our employees who have gone above and beyond. Job Description ThreatConnect is the most comprehensive threatintelligence platform on the market today. Our platform is used by thousands of organizations, and over 40 of the Fortune 100, to help them quickly aggregate, analyze, and … act on their threat data to mitigate risk and threats to their network security. We're looking for a talented and experienced Customer Success Engineer CSE who can hit the ground running in a fast-paced, quickly evolving environment. The position will report to the Director of Customer Success Engineering. The right candidate will bring deep knowledge of the More ❯
experience working in an existing cyber security operations role and be able to demonstrate working knowledge of IT security operations including security alert/incident response and investigation practices, threatintelligence and hunting, and cyber security tooling and reporting. This role also provides the opportunity to contribute to the ongoing improvement of our cyber security detection and protection … reporting (e.g. Microsoft Sentinel SIEM, endpoint XDR, cloud & network) and confidence in writing SIEM queries. Experience in endpoint and network-based security detection, prevention and investigations An interest in threatintelligence and knowledge of threat hunting techniques Experience supporting incident response engagements: containing threats, root cause analysis and restoring operations Demonstrable experience of working with information and More ❯
basis. Additionally, this may include exploring and sourcing new vendor/service providers, establishing a commercial relationship where applicable, and incorporating into the overall CRA service proposition. Develop Cyber ThreatIntelligence strategy: Occasionally source or author Cyber ThreatIntelligence (CTI) using a mix of public/OSINT and private licensed sources. The CTI should be actionable More ❯
With 1,000 intelligence professionals, over $300M in sales, and serving over 1,900 clients worldwide, Recorded Future is the world's most advanced, and largest, intelligence company! About Recorded Future At Recorded Future, we're on a mission to empower organisations to disrupt adversaries with intelligence. As the world's largest intelligence company, our platform delivers … to interpret performance metrics and optimise accordingly. A passion for coaching, developing talent, and creating a high-performance sales culture. Experience or strong interest in the information security and threatintelligence landscape. Why Join Us? A mission-driven company making a real impact in cybersecurity and global safety. A diverse and inclusive team of professionals who bring innovation … Recorded Future employees (or "Futurists"), represent over 40 nationalities and embody our core values of having high standards, practicing inclusion, and acting ethically. Our dedication to empowering clients with intelligence to disrupt adversaries has earned us a 4.8-star user rating from Gartner and more than 45 of the Fortune 100 companies as clients. Want more info? Blog & Podcast More ❯
An SC cleared Threat Management Consultant is required for an initial 6 month contract. This role is fully remote and is inside IR35 so will require working via an FCSA accredited umbrella company. Key Skills and experience: Establish an operational interlock with the CSMS and own security incident response and recovery on behalf of IBM as the supplier for … sending of appropriate log event data to the CSMS Develop incident response playbooks Design and implement SIOC processes to supplement the UK SOC monitoring service: * Ongoing tuning of Qradar * ThreatIntelligence * Threat Hunting Implement vunlnerability scanning using Tenable in AWS Design and Implement UK SOC monitoring service Due to the nature and urgency of this post, candidates More ❯
and analyze security alerts from various sources to detect and respond to potential threats in real-time. - Develop, implement, and fine-tune detection rules and correlation logic to improve threat detection capabilities. - Conduct in-depth investigations of security incidents, perform forensic analysis, and coordinate incident response activities. - Maintain and optimize security information and event management systems and other security … tools used in the SOC. - Collaborate with other teams to enhance threatintelligence, improve incident response procedures, and provide regular reports on security posture. A day in the life A day in the life As a Security Engineer in Detections, your day revolves around safeguarding our digital assets. This position supports other AWS Security Engineers with security engineering … security operations and incident response activities. You will be responsible for coordinating and facilitating security response activities, fine-tuning detection rules. You'll investigate potential incidents, collaborate with threatintelligence teams, and develop new detection algorithms. About the team About the team Diverse Experiences Amazon Security values diverse experiences. Even if you do not meet all of the More ❯
ZeroFox is at the forefront of digital security, offering cutting-edge Digital Risk Protection, ThreatIntelligence, and External Attack Surface Management solutions. We are on the lookout for a dynamic and skilled Senior Product Manager who will play a pivotal role in shaping and driving the vision for our products. This position demands a strategic thinker with a … the Senior Product Manager, you will effectively lead the product lifecycle, from conceptualizing innovative ideas to launching high-impact solutions that empower our clients to navigate the evolving digital threat landscape. Key Responsibilities: Product Strategy: Develop and implement a robust product strategy that aligns with ZeroFox's mission and addresses key market challenges. Collaboration: Work alongside engineering, sales, and … disrupt external cyber threats on the surface, deep, and dark web. ZeroFox offers the only unified cybersecurity platform combining advanced AI analytics, digital risk and privacy protection, full-spectrum threatintelligence, and a robust portfolio of breach, incident and takedown response capabilities to protect customers from growing threats across the external attack surface. It's a great time More ❯
Job Description Cyber Threat Specialist Location: Any UK Location Salary: Competitive salary and package dependent on experience Career Level: We are hiring at the following levels- Specialist/Senior Analyst Accenture Practice- Secure Transformation Service Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically … have a Cyber Security background, will perform as a client-facing role, and will be willing to contribute to our internal Digital Transformation strategy and expertise. As a Cyber Threat Analyst you will: As part of our Blue Team, you'll use the latest intelligence and tooling to analyse information systems to ensure effective incident detection and response. … you're excited about the role and think you could make a difference, please get in touch. Qualification The following skills and experience are essential for this role: Proactive threat hunting using available client data and developing improvements to threat hunting capabilities Collection and interpretation of different sources of threatintelligence Actively researching emerging threats and More ❯
the Executive and project leadership to ensure security is represented in commercial proposals, assurance processes, and delivery planning. Maintain strong relationships with relevant external stakeholders (e.g. NCSC, NPSA), monitoring threatintelligence and security guidance. Operational Security & Risk Management Lead the design, implementation, and monitoring of controls across endpoint security, identity and access management, and cloud infrastructure (e.g., AWS … for cyber-attacks and disruptions. Support secure architecture and infrastructure reviews across projects and services. Risk Management & Security Engineering Conduct and lead structured technical and procedural risk assessments, including threat modelling and security reviews for new projects or systems. Collaborate with IT and engineering teams to identify, address, and continuously improve security control effectiveness. Oversee the management of external … non-technical stakeholders. Strong analytical, communication, and problem-solving skills. Experience supporting secure delivery of technology platforms or sensitive services is highly desirable. Us: Prevail Partners delivers high quality intelligence, research and consultancy services to clients ranging from governments and multinational corporations to non-governmental organisations. These services are delivered predominantly across Europe, the Middle East and Africa. We More ❯
Audit and Risk Committee (ARC). Your Mission: Set Vision and Strategy: Define and own the Group-wide cyber security strategy aligned with business ambition, ESG goals, and evolving threat landscapes. Lead from the Front: Inspire, build, and mentor a high-performing global cyber team-across defensive security, threatintelligence, and cyber engineering. Board-Level Influence: Serve … with authority and clarity. Drive Transformation: Lead security by design across cloud, data, AI, IoT, and operational technology landscapes-embedding security in every initiative. Stay Ahead of Threats: Oversee threat detection, incident response, and resilience programs with precision and global coordination. Shape Culture: Champion a cyber-aware culture across 100,000+ employees, embedding secure behaviours in the DNA of … a bias for action, pragmatism, and delivery. scale. Gravitas and credibility with boards, senior management, regulators, auditors, and external stakeholders. Hands-on understanding of security architecture, cloud, identity and threat intelligence. Resilience under pressure - the ability to make calm, fast decisions in high-stakes situations. Specifically, the role covers: Leadership: Industry leading vision and communication to the business on More ❯
lead in customer-facing engagements, translating complex security needs into effective solution architectures Design Zero Trust-aligned network and endpoint architectures, including segmentation, micro-segmentation, NAC, and DNS-layer threat protection Lead conversations around network modernization , helping clients evolve from legacy architectures to software-defined, cloud-integrated, and policy-driven network designs Deliver workshops, product demonstrations, and proof-of … endpoint protection and EDR platforms such as CrowdStrike, SentinelOne, Microsoft Defender, or Tanium Familiarity with DNS security tools and strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITRE ATT&CK and NIST CSF Excellent communication skills with the ability to influence … as the technical lead in pre-sales engagements focused on network and endpoint security. Conduct client discovery sessions, workshops, and assessments with an emphasis on segmentation strategies, visibility, and threat defence. Deliver compelling technical presentations and product demonstrations to both technical and business audiences. Solution Design & Architecture Design and validate secure architectures incorporating network segmentation/micro segmentation, DNS More ❯
lead in customer-facing engagements, translating complex security needs into effective solution architectures Design Zero Trust-aligned network and endpoint architectures, including segmentation, micro-segmentation, NAC, and DNS-layer threat protection Lead conversations around network modernization , helping clients evolve from legacy architectures to software-defined, cloud-integrated, and policy-driven network designs Deliver workshops, product demonstrations, and proof-of … endpoint protection and EDR platforms such as CrowdStrike, SentinelOne, Microsoft Defender, or Tanium Familiarity with DNS security tools and strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITRE ATT&CK and NIST CSF Excellent communication skills with the ability to influence … as the technical lead in pre-sales engagements focused on network and endpoint security. Conduct client discovery sessions, workshops, and assessments with an emphasis on segmentation strategies, visibility, and threat defence. Deliver compelling technical presentations and product demonstrations to both technical and business audiences. Solution Design & Architecture Design and validate secure architectures incorporating network segmentation/micro segmentation, DNS More ❯
Investigator Department: Research & Investigations Employment Type: Full Time Location: London, UK Description Do you want to be on the front lines of fighting crypto crime and stopping nation-state threat actors? Are you excited by the challenge of tracing stolen and laundered digital assets across the most complex blockchain environments? Are you looking to join a mission-driven team … is critical to Elliptic's mission of safeguarding the integrity of the global crypto ecosystem. As a Senior Investigator, you will be a key member of our elite Investigations & ThreatIntelligence team, working closely with government agencies, the Crypto Industry, and strategic partners across the EMEA region. Your expertise in tracing complex, state-sponsored activity and uncovering the … TTPs of nation-state and highly sophisticated threat actors will directly inform mitigation operations, in-depth research, and policy decisions. Through deep collaboration with law enforcement, regulators, and analytic partners, your work will help disrupt illicit financial networks, strengthen crypto-related threat detection, and reinforce Elliptic's position as a trusted partner to those on the front lines More ❯
have strong understanding of as many of the following areas as possible, and be able to demonstrate it: Security Detection and Monitoring Detection Engineering Malware Analysis (Static and Dynamic) Threat Hunting and ThreatIntelligence (MITRE ATT&CK) Penetration Testing Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk More ❯
shape a forward-thinking security culture across the business. Day-to-day you can expect to: Lead incident response for breaches, malware attacks, root cause analysis, and recovery Monitor threat feeds and correlate intelligence with tooling to identify emerging risks Oversee vulnerability management and assess remediation effectiveness Collaborate with IT, DevOps, and GRC to align security efforts with … and remediating software/hardware issues A solid understanding of both automated and manual penetration testing Hands-on experience identifying, testing, and mitigating system vulnerabilities A strong grasp of threatintelligence and incident response processes A collaborative mindset, with the ability to explain technical risks to non-technical audiences Logical and lateral problem-solving skills Calmness under pressure More ❯