3 of 3 Remote/Hybrid Threat Intelligence Jobs in Oxfordshire

Cyber Security Assurance Specialist

Hiring Organisation
Circle Recruitment
Location
Oxford, Oxfordshire, England, United Kingdom
Employment Type
Contractor
Contract Rate
£45.00 - £55.00 per hour
change control procedures Experience designing or reviewing secure software supply chain and CI/CD security . Ability to interpret CVEs, CVSS scores, and threat intelligence feeds. Strong stakeholder engagement and communication skills with an ability to produce technical reports and articulate risk to non-specialists. Excellent written … technical security reports for assurance cycles Support compliance audit evidence packs (GovAssure/CAF, CE+, ISO 27001) Develop or update security standard documents (e.g. threat modelling, vulnerability mgmt) Support cyber input for IT, research or OT programmes Work with IT teams to co-author and test secure configuration standards ...

CYBER SECURITY ASSURANCE SPECIALIST

Hiring Organisation
Contracts Consultancy Ltd
Location
OX14, Clifton Hampden, Oxfordshire, United Kingdom
Employment Type
Contract
standards. Support incident management, vulnerability assessments, and SOC-related activities. Contribute to secure software supply chain practices, including CI/CD security reviews. Interpret threat intelligence, CVEs, and CVSS scores to inform risk-based decision making. Collaborate with stakeholders across technical and non-technical teams, clearly articulating risks ...

Domain Abuse Operational Analyst

Hiring Organisation
Jobleads-UK
Location
Oxford, England, United Kingdom
.UK registry and help protect users from online harm. This is an ideal opportunity for someone with a strong interest in cyber threat operations and a desire to build hands‐on experience and develop their skills further. What You’ll Be Doing Investigating domain abuse reports using internal tools … open‐source intelligence (OSINT), escalating complex cases when needed Supporting operational workflows and identifying ways to improve our tools, processes and automation Assisting in the development and refinement of detection rules and identifying patterns in malicious activity Liaising with registrars and other external stakeholders to help resolve abuse cases ...