Threat Intelligence Jobs in Tyne and Wear

5 of 5 Threat Intelligence Jobs in Tyne and Wear

Cyber Security Analyst

newcastle-upon-tyne, tyne and wear, north east england, United Kingdom
Network IT Recruitment Limited
this could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands on experience: - Threat Detection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct … forensic investigations, and support remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threat intelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication – Work closely and collaborate with senior analysts and clients … and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threat intelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration More ❯
Posted:

Incident Response Analyst

newcastle-upon-tyne, tyne and wear, north east england, United Kingdom
Pentest People
testing merges the benefits of consultant-led penetration testing with ongoing vulnerability assurance through our advanced SecurePortal. This provides clients with a continuous, living threat management system throughout the duration of the contract, rather than a single point-in-time assessment. We’re expanding our Incident Response team and … responsibilities include: Conducting initial incident assessments and contribute to Incident Response management. Participate in live Incident Response operations including digital forensics. Perform security assessments, threat intelligence gathering and OSINT analysis. Collaborating with other departments to facilitate a holistic cybersecurity service. Engaging with clients on day-to-day basis … the ability to manage and coordinate various incidents whilst remaining calm under pressure. Ability to align client deliverables with industry best practices. Experience in threat intelligence and analysis to support proactive IR. Capable of taking ownership of tasks, ensuring quality delivery and supporting the IR's team growth. More ❯
Posted:

Cloud Security Engineer

newcastle-upon-tyne, tyne and wear, north east england, United Kingdom
TalentHawk
infrastructure. Experience handling security incidents, including detection, analysis, and response. Proficiency in scripting languages (e.g., Python, PowerShell, Bash). Ability to analyse and utilize threat intelligence to enhance security measures. Experience with security tools such as firewalls, WAFs, intrusion detection/prevention systems, and vulnerability scanners. Conducting security More ❯
Posted:

Associate Cyber Security Analyst Aspire Technology Solutions

Gateshead, Tyne And Wear, United Kingdom
CyberNorth
ensuring the security and integrity of systems and data. What you will be doing Triage: Monitor security queues, triage alerts, and determine incident severity. Threat Analysis: Stay updated on threat intelligence and integrate it into operations. Continuous Learning: Engage in ongoing learning and professional development. Vulnerability Management More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Manager - Red Team Lead

newcastle-upon-tyne, tyne and wear, north east england, United Kingdom
Lawrence Harvey
Responsibilities: Lead the design, execution, and post-engagement debriefs of sophisticated red and purple team operations. Develop advanced attack methodologies and integrate the latest threat intelligence to stay ahead of attackers. Provide mentorship and leadership to red team members, sharing expertise in offensive security tactics and best practices. More ❯
Posted: