after BGV completion, so 4 Weeks Notice is also okay The Role: We are looking for an experienced Akamai WAF Engineer with expertise in web application security, content distribution, Threat and Vulnerability Management, DDoS protections, and delivering change projects. As part of the Cyber Security Team, you will collaborate with other cyber professionals across Digital Cyber Security and the … Key Responsibilities: Deliver security software and configurations using Akamai, GCP, and Azure cloud native products. Maintain security solutions for our Enterprise and Digital Channels. Manage DDoS, Vulnerability management, and threatintelligence, ensuring layer 6 & 7 defenses are proactive against cyber threats. Participate in incident response and threat mitigation strategies. Required Skills: Strong experience with multiple WAF solutions More ❯
principles in the context of safety-critical systems and regulated environments. Demonstrated experience leading the development of cybersecurity assurance artefacts for certification programmes. Practical understanding of airworthiness risk modelling, threat identification, attack surface reduction, and aircraft-level threat scenarios. Ability to produce certification-ready documentation aligned to EASA/UK CAA guidance, including traceability to compliance objectives. Strong … communication and interpersonal skills, with the ability to translate complex cybersecurity concepts for engineering, safety, and programme stakeholders. Knowledge of aerospace cybersecurity policy, risk management, and threatintelligence as applied to aircraft development environments. Collaborative and detail-oriented, able to work across international teams and regulatory boundaries. Desired skills Experience supporting cybersecurity assurance within other EASA/UK … responding to regulatory audits, design reviews, and certification authority engagements. Understanding aircraft production and supply chain security, including configuration management, supplier assurance, and design data integrity. Exposure to digital threat modelling techniques tailored to aerospace domains (MITRE ATT&CK for ICS/Aerospace, STRIDE-LM). Ability to contribute to internal capability development, methodology refinement, and knowledge transfer across More ❯
security-related tickets in Primarks service desk system for the Primark environment Contribute to the execution of Security Operations Centre (SOC) capabilities, ensuring efficient and effective operation of detection, threat and incident response Participant in the triaging events from a wide range of sources, including reports from employees, security systems and threatintelligence data Perform analysis and More ❯
Havant, Hampshire, South East, United Kingdom Hybrid / WFH Options
Reed Technology
on involvement in ensuring compliance to security frameworks (ISO27001, NIST, eCAF). * Proven experience in implementing security systems and/or monitoring tools. * Strong knowledge of SIEM, Vulnerability Management, ThreatIntelligence, and IAM systems. * Experience contributing to enterprise-level security initiatives and aligning with industry standards. * Strong collaboration skills, including experience working with IT Operations teams and third More ❯
Chelmsford, Essex, South East, United Kingdom Hybrid / WFH Options
Keystream Group Limited
needs of local government. To read more about our business area, please visit Corporate Services and Transformation Key Responsibilities: Lead and develop an active Security Operations team focused on threat detection, incident management, and prevention of data breaches or service disruptions. Build and mature the Security Operations Centre (SOC) with a focus on cyber risks, threatintelligenceMore ❯
Conduct technical workshops and product training for customers and internal teams. Represent the company at industry conferences, webinars, and trade shows . Stay up to date with industry trends, threat landscapes , and evolving security requirements. Provide feedback to product management based on customer and market insights. Qualifications & Experience: Bachelor's degree in Computer Science , Engineering, or a related field … in SASE technologies , including: SD-WAN Zero Trust Network Access (ZTNA) Cloud Security & Secure Web Gateways (SWG) Firewall-as-a-Service ( FWaaS ) CASB (Cloud Access Security Broker) Endpoint Security & ThreatIntelligence Strong understanding of networking fundamentals , including TCP/IP, routing (BGP, OSPF, EIGRP), switching, and VPN technologies . Familiarity with network security protocols such as IPSec, SSL More ❯
strategy to safeguard DBT's sensitive data and digital assets. Lead risk management, ensuring compliance with UK government standards (eg, NCSC, GDPR, and NIST frameworks). Oversee incident response, threatintelligence, and resilience planning to protect against cyber threats. Collaborate with cross-government partners, industry stakeholders, and international counterparts to enhance cybersecurity capabilities. Provide strategic leadership to a More ❯
today! Responsibilities: Investigate escalated security incidents and determine their root causes. Review incidents passed on by Tier 1 analysts and assess them using a variety of data sources. Apply threatintelligence, including indicators of compromise (IOCs) and TTPs, to analyse alerts and incidents. Utilise SIEM tools (particularly Crowdstrike SIEM) to monitor and assess host, network, and identity data. More ❯
s information security strategy , including policy, tooling, and training. Conduct risk assessments, oversee remediation plans, and guide secure-by-design approaches across projects. Provide technical leadership in areas including threatintelligence, compliance reporting, and incident response . Support regulatory and internal audits, contributing clear documentation and continuous improvement. Collaborate with internal teams and external partners, including service providers More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Reed Technology
s information security strategy , including policy, tooling, and training. Conduct risk assessments, oversee remediation plans, and guide secure-by-design approaches across projects. Provide technical leadership in areas including threatintelligence, compliance reporting, and incident response . Support regulatory and internal audits, contributing clear documentation and continuous improvement. Collaborate with internal teams and external partners, including service providers More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
s information security strategy , including policy, tooling, and training. Conduct risk assessments, oversee remediation plans, and guide secure-by-design approaches across projects. Provide technical leadership in areas including threatintelligence, compliance reporting, and incident response . Support regulatory and internal audits, contributing clear documentation and continuous improvement. Collaborate with internal teams and external partners, including service providers More ❯
operations, managing complex security challenges with a business-focused approach - protecting what is most valuable to our clients. You'll be assessing risk across business, technology and operations, considering threatintelligence and helping to build the full security view that underpins systems resilience and client confidence. Required qualifications to be successful in this role Exceptional planning and communication More ❯
Immingham, North East Lincolnshire, UK Hybrid / WFH Options
Rullion
testing, data management, and coordination of cyber security with physical and personnel security teams. Human Risk Management : Develop cyber security awareness materials, manage phishing protection programmes, and handle external threat intelligence. Software Development & Cloud Security : Support the integration of security policies into DevOps processes and cloud-based tools. Business & Change Management : Contribute to risk mitigation strategies for business development … field. Understanding of technology principles within the energy sector (not essential but beneficial). Why Join VPI? Known for our ability to think and act fast using our energy intelligence, our mission is to enable the energy transition by providing the power we need today and tomorrow Whether you’re an experienced professional or looking to grow, VPI provides More ❯
Immingham, Lincolnshire, United Kingdom Hybrid / WFH Options
Rullion Managed Services
testing, data management, and coordination of cyber security with physical and personnel security teams. * Human Risk Management: Develop cyber security awareness materials, manage phishing protection programmes, and handle external threat intelligence. * Software Development & Cloud Security: Support the integration of security policies into DevOps processes and cloud-based tools. * Business & Change Management: Contribute to risk mitigation strategies for business development … field. * Understanding of technology principles within the energy sector (not essential but beneficial). Why Join VPI? * Known for our ability to think and act fast using our energy intelligence, our mission is to enable the energy transition by providing the power we need today and tomorrow * Whether you're an experienced professional or looking to grow, VPI provides More ❯
Employment Type: Permanent
Salary: £40000 - £43000/annum Pension,Medical,Incentive plan,25 Ho
team members, looking for opportunities to strengthen their skills or acquire new ones. • Monitor and analyze emerging desktop security trends, data protection best practices, and security technology advancements through threatintelligence feeds, security publications, industry conferences, and cybersecurity networks to inform risk management and security strategy decisions. BASIC QUALIFICATIONS - 5+ years of cross functional project delivery experience - 5+ More ❯
environment. Develop Custom Security Tooling: Contribute to the creation and maintenance of in-house tools that enhance our security capabilities and automation. Product Security Support: Assist in security assessments, threat modeling, and penetration testing, working closely with the Product Security team. Secure Development Lifecycle: Help implement and improve security gates within the SDLC. Adapt & Collaborate: Be prepared to dive … into any emerging security challenges. We're a small team with big responsibilities, and flexibility is key. Investigate and triage security alerts, manage security incidents. Gather, curate and communicate threat intelligence. Support and advise business stakeholders in relation to cyber security issues. Generate reports for both technical and non-technical staff and stakeholders. What you bring: At least More ❯
What You'll Be Working On: ️ Collecting, analyzing, and disseminating cyber threatintelligence to identify emerging threats and attack patterns ️ Working with internal teams to integrate threatintelligence into security operations and incident response processes ️ Using advanced tools and techniques to track and analyze threat actors, APTs, and malware campaigns ️ Developing and presenting actionable intelligence reports to stakeholders to improve proactive defense strategies ️ Collaborating with external partners, industry groups, and threatintelligence vendors to gather and share threat data What We're Looking For: ️ Proven experience as a Cyber ThreatIntelligence Specialist or in a similar threat analysis role ️ Strong knowledge of threatintelligence frameworks (e.g. … STIX/TAXII, MITRE ATT&CK) and tools (e.g., SIEM, threatintelligence platforms) ️ Experience with threat hunting, incident response, and malware analysis ️ Familiarity with cyber threat actors, attack methodologies, and geopolitical threat landscapes ️ Certifications such as GIAC Cyber ThreatIntelligence (GCTI), CISSP, or CompTIA Security+ are highly desirable More ❯
What You'll Be Working On: ️ Gathering, analyzing, and disseminating threatintelligence from multiple sources to identify emerging cyber threats ️ Identifying attack patterns, trends, and vulnerabilities to inform defensive strategies ️ Collaborating with internal teams to enhance incident response and improve threat detection capabilities ️ Producing detailed threat reports, including indicators of compromise (IOCs), tactics, techniques, and procedures … TTPs) ️ Supporting vulnerability management and assisting with the development of security posture recommendations What We're Looking For: ️ Proven experience as a ThreatIntelligence Analyst or in a similar role within cybersecurity ️ Strong knowledge of threatintelligence platforms (TIPs), open-source intelligence (OSINT), and malware analysis ️ Familiarity with cybersecurity frameworks (e.g., MITRE ATT&CK, STIX More ❯
Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
Akkodis
Cyber ThreatIntelligence Analyst Akkodis are currently working in partnership with a leading service provider to recruit a Cyber ThreatIntelligence Analyst to join a leading Cyber Defence Team and play a pivotal role in providing actionable technical intelligence to detection engineers, threat hunters and security operations. This role offers a highly competitive salary … and the opportunity for remote working. The Role As a Cyber ThreatIntelligence Analyst you will support the rest of the Cyber Defence engineering team in regard to the roadmap and what to focus on. You will share intel to help them understand what's emerging as well as what advanced persistent threat actors are leveraging to … compromise systems. You will work directly across all areas of Cyber Defence to produce bespoke and technical intelligence across Tactical, Strategic, and Operational intelligence. The Responsibilities Conduct in-depth analysis of threat groups, their capabilities, motivations, and tactics A strong understanding of threats posed Articulate complex concepts to various stakeholders across the business. Knowledge of tactics, techniques and More ❯
Job title: Cyber ThreatIntelligence Analyst Location: Preston, Frimley or Filton We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular role. Salary: Circa £45,000 depending on experience What you’ll be doing: Performing threat research to identify threats relevant to BAE Systems, including collecting … processing, and disseminating actionable, high fidelity threatintelligence Assisting with the identification of current tactics, techniques, & procedures (TTPs) and Indicators of Compromise (IOC) Uses analysis techniques useful for investigating suspected attacks and perform intelligence tasking Will develop and maintain knowledge of cyber security threats, analyst toolsets and relevant activity group tactics, techniques, and procedures (TTPs) Your skills … and experiences: Essential: An understanding of Cyber ThreatIntelligence techniques and best practice Knowledge of cyber threat landscape, current affairs, and geopolitics, including activity groups and how to apply this knowledge within an operational environment Desirable: Knowledge of the types of threat actors and how they operate Knowledge of network protocols such as HTTP(S), SMTP More ❯
Citi's Cyber Intelligence Center (CIC) is a global team that delivers timely threatintelligence to technical teams and decision makers, in support of threat detection, preparation, and incident response activities. The Regional Lead will oversee the team's operations in the UK/EU time-zone, including oversight of regional staff, driving quality control, collaboration … with other cyber-technical functions in the region, and working with senior leaders. The role will also help maintain our network of global intelligence partners. Direct experience in cyber threatintelligence is a necessity. This is a hybrid role with an in-office attendance component. Experience in fusion center operating environments or crisis response will be helpful. … Responsibilities: Lead the regional co-ordination of a cyber threatintelligence function Support local leadership and business in their intelligence needs Provide intelligence support to adjacent teams in a fusion center environment. Oversee quality control and production strategy for the region Conduct internal and external briefings on a regular basis, including to company leadership, to peer More ❯
Role: Cyber Threat Analyst Location: Any UK Salary: Competitive salary and package dependent on experience Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or more spent outside of the UK) and declaration of being a British … have a Cyber Security background, will perform as a client-facing role, and will be willing to contribute to our internal Digital Transformation strategy and expertise. As a Cyber Threat Analyst you will: As part of our Blue Team, you’ll use the latest intelligence and tooling to analyse information systems to ensure effective incident detection and response. … If you’re excited about the role and think you could make a difference, please get in touch. The following skills and experience are essential for this role: Proactive threat hunting using available client data and developing improvements to threat hunting capabilities Collection and interpretation of different sources of threatintelligence Actively researching emerging threats and More ❯
Job Description Cyber Threat Specialist Location: Any UK Location Salary: Competitive salary and package dependent on experience Career Level: We are hiring at the following levels- Specialist/Senior Analyst Accenture Practice- Secure Transformation Service Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically … have a Cyber Security background, will perform as a client-facing role, and will be willing to contribute to our internal Digital Transformation strategy and expertise. As a Cyber Threat Analyst you will: As part of our Blue Team, you'll use the latest intelligence and tooling to analyse information systems to ensure effective incident detection and response. … you're excited about the role and think you could make a difference, please get in touch. Qualification The following skills and experience are essential for this role: Proactive threat hunting using available client data and developing improvements to threat hunting capabilities Collection and interpretation of different sources of threatintelligence Actively researching emerging threats and More ❯
Principal Cybersecurity Researcher (Reverse Engineering) London, UK With 1,000 intelligence professionals, over $300M in sales, and serving over 1,900 clients worldwide, Recorded Future is the world's most advanced, and largest, intelligence company! Reversing Emulation and Testing (RET) is a core function of Insikt Group's Technical Analysis (TA) Team. We seek a principal technical threat … lead high-impact research and drive innovation in analytical capabilities within Insikt Group. You will guide and shape technical research into state-sponsored and cybercriminal malware, collaborating across functional intelligence teams to support finished intelligence reporting and platform enrichment. Your responsibilities will include not only conducting advanced malware reverse engineering and infrastructure emulation but also designing and implementing … internal tools and workflows that increase our team's efficiency. You will be expected to develop and formalize novel approaches to dynamic analysis, configuration extraction, and threat behavior modeling. This position entails representing Insikt Group's technical threat research in customer briefings, webinars, and industry engagements. You will communicate complex technical findings to diverse audiences ranging from internal More ❯
in London - Contract - Hybrid Inside IR35 - umbrella Key Responsibilities SIEM Management & Optimization: Design, implement, and maintain Microsoft Sentinel workspaces, connectors, analytics rules, and playbooks Develop advanced KQL queries for threat hunting and reporting Optimize SIEM performance, cost, and data retention policies Troubleshoot log ingestion and parsing issues Log Source Integration: Onboard and configure critical log sources (AD, firewalls, servers … cloud infrastructure) Manage event collection and forwarding infrastructure Implement data filtering and custom log parsing Threat Detection & Use Case Development: Develop and refine detection rules based on threatintelligence and attack patterns Continuously improve detection efficacy and reduce false positives Security Monitoring & Incident Response: Monitor systems for anomalies and malicious activity Contribute to threat hunting and More ❯