What You'll Be Working On: ️ Collecting, analyzing, and disseminating cyber threat intelligence to identify emerging threats and attack patterns ️ Working with internal teams to integrate threat intelligence into security operations and incident response processes ️ Using advanced tools and techniques to track and analyze threat actors, APTs, and malware campaigns ️ Developing and presenting actionable intelligence reports to … stakeholders to improve proactive defense strategies ️ Collaborating with external partners, industry groups, and threat intelligence vendors to gather and share threat data What We're Looking For: ️ Proven experience as a Cyber Threat Intelligence Specialist or in a similar threatanalysis role ️ Strong knowledge of threat intelligence frameworks (e.g., STIX/TAXII, MITRE ATT … CK) and tools (e.g., SIEM, threat intelligence platforms) ️ Experience with threat hunting, incident response, and malware analysis ️ Familiarity with cyber threat actors, attack methodologies, and geopolitical threat landscapes ️ Certifications such as GIAC Cyber Threat Intelligence (GCTI), CISSP, or CompTIA Security+ are highly desirable More ❯
Security Research Engineer - Threat Protection The Role As a Security Research Engineer at Mimecast, you will be a pivotal technical expert dedicated to researching, analyzing, and developing detections for both malware and phishing threats. Your work will involve dissecting real-world file and web threats, building and optimizing detection signatures, and driving improvements to our advanced detection systems. This … role combines in-depth threat investigation with a focus on enhancing our capabilities to block evolving attacks and provide actionable insights to our customers and internal teams. Why Join Our Team? At Mimecast, you will be at the forefront of neutralizing diverse phishing and malware threats through comprehensive file analysis and research across web vectors. You will dissect … optimizing detection signatures using industry-standard tools like Yara and ClamAV, as well as Mimecast's advanced proprietary detection technologies. This is an opportunity to leverage vast real-world threat data and transform your technical expertise into tangible protection for millions of users globally. If you're driven to understand and dismantle sophisticated attacks, Mimecast offers a dynamic environment More ❯
PPS) are fully integrated in the design process and adhere to the minimum standards expected in delivering an inherently secure power plant. This is benchmarked against the Design Basis Threat (DBT) and regulatory expectations. You will work closely with stakeholders across the business, including engineers, safety professionals and other technical experts, to influence the design and convey proportionate and … with NPSA protective security principles of Deter, Detect, Delay, Mitigate and Respond. Analytical skills collating complex data from across the stakeholder space to determine credible conclusions around risk assessments, threat capability and adversarial pathways. Demonstrable ability to convey the principles of secure by design (ideally in a nuclear context) and the graded approach. Complemented by the ability to practice … people with transferable skills. Key Selection Criteria Demonstratable understanding of the principles behind secure-by-design and the graded approach Knowledgeable in the practice and principles of requirements identification, analysis, and synthesis, to create substantiation of security claims, arguments, and evidence. Experience in the delivery of physical security solutions in a highly regulated environment Ideally able to demonstratable capability More ❯
PPS) are fully integrated in the design process and adhere to the minimum standards expected in delivering an inherently secure power plant. This is benchmarked against the Design Basis Threat (DBT) and regulatory expectations. You will work closely with stakeholders across the business, including engineers, safety professionals and other technical experts, to influence the design and convey proportionate and … with NPSA protective security principles of Deter, Detect, Delay, Mitigate and Respond. Analytical skills collating complex data from across the stakeholder space to determine credible conclusions around risk assessments, threat capability and adversarial pathways. Demonstrable ability to convey the principles of secure by design (ideally in a nuclear context) and the graded approach. Complemented by the ability to practice … people with transferable skills. Key Selection Criteria Demonstratable understanding of the principles behind secure-by-design and the graded approach Knowledgeable in the practice and principles of requirements identification, analysis, and synthesis, to create substantiation of security claims, arguments, and evidence. Experience in the delivery of physical security solutions in a highly regulated environment Ideally able to demonstratable capability More ❯
PPS) are fully integrated in the design process and adhere to the minimum standards expected in delivering an inherently secure power plant. This is benchmarked against the Design Basis Threat (DBT) and regulatory expectations. You will work closely with stakeholders across the business, including engineers, safety professionals and other technical experts, to influence the design and convey proportionate and … with NPSA protective security principles of Deter, Detect, Delay, Mitigate and Respond. Analytical skills collating complex data from across the stakeholder space to determine credible conclusions around risk assessments, threat capability and adversarial pathways. Demonstrable ability to convey the principles of secure by design (ideally in a nuclear context) and the graded approach. Complemented by the ability to practice … people with transferable skills. Key Selection Criteria Demonstratable understanding of the principles behind secure-by-design and the graded approach Knowledgeable in the practice and principles of requirements identification, analysis, and synthesis, to create substantiation of security claims, arguments, and evidence. Experience in the delivery of physical security solutions in a highly regulated environment Ideally able to demonstratable capability More ❯
to learn more about this opportunity, feel free to reach out and apply today! Responsibilities: Monitor and analyse security events within the SOC, ensuring timely detection and response. Perform threatanalysis, vulnerability assessments, and implement mitigation strategies. Develop and refine incident response playbooks and procedures. Conduct root cause analysis (RCA) for high-priority incidents to prevent recurrence. … Must Have: Minimum of two years' experience in a SOC or managed security environment. Strong knowledge of network security (firewalls, IDS/IPS, VPNs). Proficiency in incident response, threatanalysis, and vulnerability management. Experience working with SIEM tools for monitoring and event analysis. Understanding of malware analysis, forensic investigations, and endpoint security. Strong analytical and problem More ❯
newport, midlands, united kingdom Hybrid / WFH Options
AIRBUS Defence and Space Limited
is a technical, hands-on role that will work with a variety of security tools and technologies protecting our whole enterprise. You will be responsible for managing our Cyber Threat Intelligence (CTI) research and Threat Hunting activities, the entire lifecycle of our detection rules repository and SOC automation stack. You will be responsible for the technical evolution of … a team who live and breathe cyber security and to work for a company with great products and technologies around the globe. **HOW YOU WILL CONTRIBUTE TO THE TEAM** * **ThreatAnalysis - **Leverage the organization’s CTI provider as a strategic asset , not just a data source-integrating external intel with internal context to assess real impact and relevance. … Conduct in-depth analysis of cyber threats (APT groups, malware campaigns, zero-days, etc.) and assess their relevance to Airbus operations, especially the aerospace and defense-related. Translate complex threat data into clear, actionable intelligence for technical and non-technical stakeholders. Produce regular and ad hoc threat intelligence reports , briefings, and dashboards tailored to specific business units More ❯
newport, midlands, united kingdom Hybrid / WFH Options
AIRBUS Defence and Space Limited
is a technical, hands-on role that will work with a variety of security tools and technologies protecting our whole enterprise. You will be responsible for managing our Cyber Threat Intelligence (CTI) research and Threat Hunting activities, the entire lifecycle of our detection rules repository and SOC automation stack. You will be responsible for the technical evolution of … a team who live and breathe cyber security and to work for a company with great products and technologies around the globe. **HOW YOU WILL CONTRIBUTE TO THE TEAM** * **ThreatAnalysis - **Leverage the organization’s CTI provider as a strategic asset , not just a data source-integrating external intel with internal context to assess real impact and relevance. … Conduct in-depth analysis of cyber threats (APT groups, malware campaigns, zero-days, etc.) and assess their relevance to Airbus operations, especially the aerospace and defense-related. Translate complex threat data into clear, actionable intelligence for technical and non-technical stakeholders. Produce regular and ad hoc threat intelligence reports , briefings, and dashboards tailored to specific business units More ❯
London, England, United Kingdom Hybrid / WFH Options
Airbus
is a technical, hands-on role that will work with a variety of security tools and technologies protecting our whole enterprise. You will be responsible for managing our Cyber Threat Intelligence (CTI) research and Threat Hunting activities, the entire lifecycle of our detection rules repository and SOC automation stack. You will be responsible for the technical evolution of … a team who live and breathe cyber security and to work for a company with great products and technologies around the globe. **HOW YOU WILL CONTRIBUTE TO THE TEAM** * **ThreatAnalysis - **Leverage the organization’s CTI provider as a strategic asset , not just a data source-integrating external intel with internal context to assess real impact and relevance. … Conduct in-depth analysis of cyber threats (APT groups, malware campaigns, zero-days, etc.) and assess their relevance to Airbus operations, especially the aerospace and defense-related. Translate complex threat data into clear, actionable intelligence for technical and non-technical stakeholders. Produce regular and ad hoc threat intelligence reports , briefings, and dashboards tailored to specific business units More ❯
Newport-On-Tay, north east scotland, united kingdom Hybrid / WFH Options
AIRBUS Defence and Space Limited
is a technical, hands-on role that will work with a variety of security tools and technologies protecting our whole enterprise. You will be responsible for managing our Cyber Threat Intelligence (CTI) research and Threat Hunting activities, the entire lifecycle of our detection rules repository and SOC automation stack. You will be responsible for the technical evolution of … a team who live and breathe cyber security and to work for a company with great products and technologies around the globe. **HOW YOU WILL CONTRIBUTE TO THE TEAM** * **ThreatAnalysis - **Leverage the organization’s CTI provider as a strategic asset , not just a data source-integrating external intel with internal context to assess real impact and relevance. … Conduct in-depth analysis of cyber threats (APT groups, malware campaigns, zero-days, etc.) and assess their relevance to Airbus operations, especially the aerospace and defense-related. Translate complex threat data into clear, actionable intelligence for technical and non-technical stakeholders. Produce regular and ad hoc threat intelligence reports , briefings, and dashboards tailored to specific business units More ❯
Newport-On-Tay, north east scotland, united kingdom Hybrid / WFH Options
AIRBUS Defence and Space Limited
is a technical, hands-on role that will work with a variety of security tools and technologies protecting our whole enterprise. You will be responsible for managing our Cyber Threat Intelligence (CTI) research and Threat Hunting activities, the entire lifecycle of our detection rules repository and SOC automation stack. You will be responsible for the technical evolution of … a team who live and breathe cyber security and to work for a company with great products and technologies around the globe. **HOW YOU WILL CONTRIBUTE TO THE TEAM** * **ThreatAnalysis - **Leverage the organization’s CTI provider as a strategic asset , not just a data source-integrating external intel with internal context to assess real impact and relevance. … Conduct in-depth analysis of cyber threats (APT groups, malware campaigns, zero-days, etc.) and assess their relevance to Airbus operations, especially the aerospace and defense-related. Translate complex threat data into clear, actionable intelligence for technical and non-technical stakeholders. Produce regular and ad hoc threat intelligence reports , briefings, and dashboards tailored to specific business units More ❯
is a technical, hands-on role that will work with a variety of security tools and technologies protecting our whole enterprise. You will be responsible for managing our Cyber Threat Intelligence (CTI) research and Threat Hunting activities, the entire lifecycle of our detection rules repository and SOC automation stack. You will be responsible for the technical evolution of … a team who live and breathe cyber security and to work for a company with great products and technologies around the globe. **HOW YOU WILL CONTRIBUTE TO THE TEAM** * **ThreatAnalysis - **Leverage the organization’s CTI provider as a strategic asset , not just a data source-integrating external intel with internal context to assess real impact and relevance. … Conduct in-depth analysis of cyber threats (APT groups, malware campaigns, zero-days, etc.) and assess their relevance to Airbus operations, especially the aerospace and defense-related. Translate complex threat data into clear, actionable intelligence for technical and non-technical stakeholders. Produce regular and ad hoc threat intelligence reports , briefings, and dashboards tailored to specific business units More ❯
is a technical, hands-on role that will work with a variety of security tools and technologies protecting our whole enterprise. You will be responsible for managing our Cyber Threat Intelligence (CTI) research and Threat Hunting activities, the entire lifecycle of our detection rules repository and SOC automation stack. You will be responsible for the technical evolution of … a team who live and breathe cyber security and to work for a company with great products and technologies around the globe. **HOW YOU WILL CONTRIBUTE TO THE TEAM** * **ThreatAnalysis - **Leverage the organization’s CTI provider as a strategic asset , not just a data source-integrating external intel with internal context to assess real impact and relevance. … Conduct in-depth analysis of cyber threats (APT groups, malware campaigns, zero-days, etc.) and assess their relevance to Airbus operations, especially the aerospace and defense-related. Translate complex threat data into clear, actionable intelligence for technical and non-technical stakeholders. Produce regular and ad hoc threat intelligence reports , briefings, and dashboards tailored to specific business units More ❯
Newport, Monmouthshire, United Kingdom Hybrid / WFH Options
is a technical, hands-on role that will work with a variety of security tools and technologies protecting our whole enterprise. You will be responsible for managing our Cyber Threat Intelligence (CTI) research and Threat Hunting activities, the entire lifecycle of our detection rules repository and SOC automation stack. You will be responsible for the technical evolution of … a team who live and breathe cyber security and to work for a company with great products and technologies around the globe. HOW YOU WILL CONTRIBUTE TO THE TEAM ThreatAnalysis - Leverage the organization s CTI provider as a strategic asset , not just a data source-integrating external intel with internal context to assess real impact and relevance. … Conduct in-depth analysis of cyber threats (APT groups, malware campaigns, zero-days, etc.) and assess their relevance to Airbus operations, especially the aerospace and defense-related. Translate complex threat data into clear, actionable intelligence for technical and non-technical stakeholders. Produce regular and ad hoc threat intelligence reports , briefings, and dashboards tailored to specific business units More ❯
Job Description: Job Description Cyber Threat Analyst Roles and Responsibilities Tier 2 Analyst You must hold a UK passport only due to the security clearance, we can only accept single national status (2nd passport holders, OCI & ILR candidates can't be accepted) and you must have been in the UK for the last 5 years. This role is based … 12hr shift pattern MUST have at least 6months working experience in SIEM technologies Job Description The Tier 2 Cyber Security Analyst is a mid-Tier position within the Cyber ThreatAnalysis Centre (CTAC), responsible for advancing the initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organization. This … Tier 1 Analysts. The Tier 2 Analyst works closely with senior and junior analysts to ensure a seamless SOC operation and acts as a bridge between foundational and advanced threat detection and response functions. Responsibilities: • Conduct escalated triage and analysis on security events identified by Tier 1 Analysts, determining threat severity and advising on initial response actions. More ❯
fintech. Job Description We're looking for a senior investigator to play a pivotal role within our global Financial Crime Intelligence Unit (FCIU). As a center of intelligence, threatanalysis, and investigative excellence, this role is key to proactively identifying, investigating, and mitigating complex financial crime threats for You will conduct complex, deep-dive investigations across multiple … as a key partner to the MLROs, providing critical insights and comprehensive investigative reports to support SAR/STR decisions and responses to regulatory inquiries. Contribute to a proactive threatanalysis capability to identify emerging financial crime typologies and vulnerabilities, utilising data-driven techniques and open-source intelligence (OSINT). Produce high-impact intelligence reports and strategic briefings More ❯
of technical expertise combined with strong communication skills, and an ability to work under pressure within a client-facing capacity. Key responsibilities: Provide front line cyber security monitoring and analysis within a Security Operations Centre (SOC) Perform threat detection and incident response using SIEM tools such as Splunk and Microsoft Defender Conduct in-depth investigations into security alerts … escalating where appropriate and providing remediation advice Carry out threatanalysis to improve detection capability and contribute to continuous service improvement Act as a key point of contact for clients, providing expert advice and clear communication on cyber matters Apply up-to-date knowledge of the cyber threat landscape and defence best practices Essential skills and experience More ❯
Senior Cyber Security Engineer Are you a passionate Cyber Security Engineer with hands-on experience in deploying Microsoft security solutions and supporting clients with robust threat protection strategies? This is a unique opportunity to join a well-established, award winning Managed Services Provider (MSP), known for its strong reputation in the UK tech market, to help deliver cutting-edge … like of (Cisco Meraki, Fortinet, Ubiquiti. WatchGuard) Vulnerability management tool expertise (Tenable, Qualys) Email security solutions Knowledge (Mimecast, Egress) A Working understanding of Microsoft 365 Cloud Technologies and their threat landscape Familiarity with SOC operations, threat detection, incident response, and security analytics As a Cyber security Engineer you should have one or more of SC-200 - Microsoft Certified … Cyber Essentials Plus (CE & CE+) audits, ensuring clients meet security compliance standards Provide escalation support for complex cyber incidents raised by the internal SOC team Perform technical vulnerability remediation, threatanalysis, and reporting Conduct Microsoft 365 and Cloud Security assessments to identify gaps and secure client environments Carry out offensive security and web application assessments (including penetration testing More ❯
s infrastructure. You’ll be at the forefront of safeguarding Industrial Control Systems and SCADA networks from evolving cyber threats.Key Responsibilities: Monitor and assess OT cybersecurity systems, ensuring effective threat detection and response. Conduct threatanalysis and vulnerability assessments to support incident response activities. Develop and implement incident response plans tailored to OT environments. Support vulnerability management … the OT security ecosystem. Essential Skills & Experience: Strong understanding of OT/ICS cybersecurity or relevant control systems (SCADA/PLC) – training provided where required. Experience with network security, threat detection, and incident response. Knowledge of security frameworks and regulations including NIST, IEC, NIS Directive, and Cyber Kill Chain. Analytical mindset with the ability to manage complex investigations and More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
IT Security Threat Analyst - Solihull Crimson and IMI have joined forces to build IMI's new security team and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security and want to be part of a dynamic team that is shaping the future of security within a successful global … company, we want to hear from you! We are seeking a highly skilled and experienced IT Security Threat Analyst to join the team. In this role, you will be responsible for identifying, analysing and mitigating potential threats to our organisations information systems. You will work closely with the Head of IT Security for Incident and Threat Management and … plus benefits depending on experience. Key Responsibilities * Monitor and analyse security alerts and incidents to identify potential threats. * Conduct through investigations of security breaches and incidents. * Develop and implement threat detection and response strategies. * Collaborate with cross functional teams to enhance security protocols. * Provide detailed reports and recommendations on threat mitigation. * Participate in incident response. Critical Skills for More ❯
management, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threatanalysis and act as a subject matter expert for mitigating cyber risks. This is an outstanding opportunity for an accomplished Information Security Engineer to join a market leading More ❯
Redscan (a trading name of Redscan Cyber Security Limited)
will help identify and analyse potential threats utilising a number of different SIEM & EDR tools. To be a key member of Security Operations Centre (SOC) and provide real-time threatanalysis and detection. Respond to system generated alerts, analyse logs and traffic patterns. Provide analysis and trending of security log data from many monitoring points. Support multiple … to pre-emptively eliminate the possibility of system breaches. Other duties as assigned. About you Requirements A passion for Cyber Security and enjoys solving problems Knowledge of the security threat landscape Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusion detection systems) Knowledge of TCP/IP Protocols, network analysis, and network/ More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
IT Security Threat Analyst - Solihull Crimson and IMI have joined forces to build IMI's new security team and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security and want to be part of a dynamic team that is shaping the future of security within a successful global … company, we want to hear from you! We are seeking a highly skilled and experienced IT Security Threat Analyst to join the team. In this role, you will be responsible for identifying, analysing and mitigating potential threats to our organisations information systems. You will work closely with the Head of IT Security for Incident and Threat Management and … plus benefits depending on experience. Key Responsibilities Monitor and analyse security alerts and incidents to identify potential threats. Conduct through investigations of security breaches and incidents. Develop and implement threat detection and response strategies. Collaborate with cross functional teams to enhance security protocols. Provide detailed reports and recommendations on threat mitigation. Participate in incident response. Critical Skills for More ❯
West Malling, Kent, United Kingdom Hybrid / WFH Options
Lumina Energy
threats are evolving, and our team is at the heart of protecting critical infrastructure and data. As a Cyber Security Engineer, you'll help lead our proactive efforts in threat detection, response, and mitigation. This role is vital to safeguarding the confidentiality, integrity, and availability of systems and services. What you'll be doing Act on security alerts, incidents … ensure timely responses. Diagnose and investigate security incidents following agreed procedures. Escalate and document unresolved incidents and support recovery efforts. Operate within our enterprise-level SOC and collaborate on threat intelligence. Utilise tools like Microsoft E5, Sentinel, and Darktrace to monitor and prevent threats. Analyse malware and respond to high-priority incidents. Support vulnerability management and threatanalysis … equivalent function. Proficiency with Microsoft Security Suite (including Sentinel) and Darktrace or similar. Must have an understanding of cyber threats including malware, ransomware, DDoS, insider threats. Strong knowledge of threat modelling, security monitoring, and cloud environments. Familiarity with GDPR, data protection, and privacy impact assessments. Excellent communication and collaboration skills with a proactive mindset. Industry certifications (e.g., CISSP, CEH More ❯
management, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threatanalysis and act as a subject matter expert for mitigating cyber risks. This is an outstanding opportunity for an accomplished Cyber Security Engineer to join a market leading More ❯