Remote 'Threat Intelligence' Job Vacancies

1 to 25 of 56 Remote Threat Intelligence Jobs

SENIOR THREAT INTELLIGENCE ANALYST

North London, London, United Kingdom
Hybrid / WFH Options
Secure Recruitment Ltd
SENIOR THREAT INTELLIGENCE ANALYST Fully Remote Up to £100,000 + Excellent Staff Bens + Share Scheme SECURE has Strategically Partnered with a Multi-Award-Winning, Software-Based Organisation at the Forefront of Pre-Emptive Exposure Management. As a market leader backed by significant Venture Funding, they combine proactive Threat Intelligence, Real Attacker Telemetry & Automated Red … Teaming to Continuously Identify & Validate Real Exposure. Success in this position will enable the business to Transform Raw Intelligence into Actionable Insights that Protect Fortune 500 Companies & Critical Infrastructure Providers, helping them outrun Real-World Threats in Real-Time. Role Overview: We're looking to speak with ambitious Senior Threat Intelligence Analyst to Expand Offensive Security Capabilities … around Honeypot Data Analysis. You'll Design & Deploy Detections for N-Day & 0-Day Exploits using a Global Network, Develop CTI Platforms for Real-Time Threat Analysis, Drive Rapid Reaction Efforts & Author Threat Intelligence Reports. Ideally based in the UK, you don't need to tick every box - if you're motivated to make an impact, read More ❯
Employment Type: Permanent, Work From Home
Posted:

Threat Intelligence Analyst

City of London, London, United Kingdom
Hybrid / WFH Options
Vanquish Technologies Limited
through implementation and ongoing support, our commitment is to provide clients with the assurance that they are valued by a company that is both attentive and impactful. Role Title: Threat Intelligence Analyst Reporting Line Manager: Head of Threat Intelligence Onsite Requirements (e.g. number of days per week onsite): 5 days Hybrid/Remote Working Policy: onsite … months Extension likelihood: Yes Maximum Daily Rate or Budget Range: 500 IR35 Status (inside/Outside/To Be Determined) Inside Experience Requirements Technology & Vendor Skillsets Required: Familiarity with threat intelligence platforms (TIPs), SIEMs, and threat data enrichment tools. Experience using Breach and Attack Simulation (BAS) platforms to build and validate threat scenarios. Strong understanding of … adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modeling. Hands-on experience with penetration testing tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera. Experience producing threat reports and briefings. Certifications Required or Preferred: Years of relevant experience: 8+ years of experience in threat intelligence, cybersecurity operations, or penetration testing. More ❯
Employment Type: Contract, Work From Home
Rate: £500 per day
Posted:

Threat Intelligence Analyst

Houston, Texas, United States
Hybrid / WFH Options
K.L. McKinney
Key Responsibilities: Threat Intelligence Collection & Analysis Gather and analyze threat intelligence from open sources (OSINT), dark web, threat feeds, and industry reports. Identify Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) used by threat actors. Track Advanced Persistent Threats (APTs) and emerging cyber threats relevant to the organization. Threat Detection & Response … Support Collaborate with SOC analysts, incident responders, and security engineers to enhance cyber defenses. Provide real-time intelligence during security incidents to assist in rapid response. Develop YARA rules, Sigma rules, and threat hunting queries to detect malicious activity. Malware Analysis & Forensics Analyze malware samples, phishing campaigns, and exploit techniques used in attacks. Reverse-engineer malware to extract … IOCs and behavioral patterns. Contribute to the development of security detections, playbooks, and automated threat response. Threat Intelligence Reporting & Communication Create intelligence reports, dashboards, and risk assessments for stakeholders. Provide threat briefings and recommendations to security teams and leadership. Maintain documentation of threat actor profiles, attack campaigns, and evolving threats. Security Strategy & Continuous Improvement More ❯
Employment Type: Any
Salary: USD 110,000 Annual
Posted:

Penetration Tester

London Area, United Kingdom
Hybrid / WFH Options
Advanced Resource Managers
days office based Must have CHECK CTL and certified Role Overview: We are seeking a highly skilled and experienced Offensive Security Consultant with a strong focus understanding on threat intelligence and attack methods. The ideal candidate will be responsible for managing and conducting advanced penetration testing engagements, leveraging threat intelligence to simulate real-world attacks across … ability to provide strategic and actionable recommendations to significantly enhance our clients' security posture. Responsibilities: Lead and manage the full lifecycle of complex penetration testing engagements, applying a strong threat intelligence-led approach. Execute advanced penetration tests across a broad range of environments (applications, infrastructure, web, APIs, O365, Azure, AWS, OT), directly applying your knowledge of current threat landscapes and attacker TTPs. Develop and maintain sophisticated test plans, execution plans, and targeted use cases directly informed by in-depth threat intelligence analysis. Identify and prioritize OT and IT assets, services, and systems based on their criticality and potential exposure to identified threats. Strategically prioritize, plan, and schedule penetration testing engagements based on comprehensive threat More ❯
Posted:

Penetration Tester

City of London, London, United Kingdom
Hybrid / WFH Options
Advanced Resource Managers
days office based Must have CHECK CTL and certified Role Overview: We are seeking a highly skilled and experienced Offensive Security Consultant with a strong focus understanding on threat intelligence and attack methods. The ideal candidate will be responsible for managing and conducting advanced penetration testing engagements, leveraging threat intelligence to simulate real-world attacks across … ability to provide strategic and actionable recommendations to significantly enhance our clients' security posture. Responsibilities: Lead and manage the full lifecycle of complex penetration testing engagements, applying a strong threat intelligence-led approach. Execute advanced penetration tests across a broad range of environments (applications, infrastructure, web, APIs, O365, Azure, AWS, OT), directly applying your knowledge of current threat landscapes and attacker TTPs. Develop and maintain sophisticated test plans, execution plans, and targeted use cases directly informed by in-depth threat intelligence analysis. Identify and prioritize OT and IT assets, services, and systems based on their criticality and potential exposure to identified threats. Strategically prioritize, plan, and schedule penetration testing engagements based on comprehensive threat More ❯
Posted:

Cyber Threat Intelligence Specialist

Hatfield, Hertfordshire, South East, United Kingdom
Hybrid / WFH Options
Synergize Consulting Limited
Cyber Threat Intelligence Specialist - Contract role We are supporting our client, a leading IT services and solutions company, in their search for a Cyber Threat Intelligence Specialist in Hertfordshire. In this role, you'll be responsible for gathering, correlating, and interpreting data from multiple sources to deliver actionable threat intelligence. You'll assess how a … to key stakeholders. *Candidates must hold valid SC clearance* Contract Details Initial Term: 3 months (with strong potential for extension) Location: Hertfordshire Work Model: Hybrid Key Responsibilities Work with Threat Intelligence Platforms (TIPs), taking ownership of these platforms. Analyse and assess cyber threats, identifying patterns and trends. Apply the intelligence life cycle, from collection through to reporting. … Ensure the Threat Intelligence Programme meets organisational aims. Influence and advise stakeholders on security-focused decisions. Work closely alongside other Security Operations teams such as SOC. Identify intelligence of concern across various sources and tools, and conduct analysis and assessment of such threats and their potential impact on the business. What We're Looking For Experience in More ❯
Employment Type: Contract
Posted:

Cyber SecOps & Threat Specialist, Law Firm, Bristol

Bristol, Avon, South West, United Kingdom
Hybrid / WFH Options
ITS Recruitment
Cyber SecOps and Threat Intelligence Specialist, Law Firm, Bristol We are seeking a Cyber Security and Threat Intelligence Specialist to join an expanding team in this 3,000 user international Law Firm, strengthening its ability to detect, respond to, and prevent cyber threats. Location: Bristol Reports to: Head of Cyber Security Hybrid Role: 3-4 days … work from home The Role Play a key role in maturing incident response and threat intelligence functions Evolve and mature the firm's capability for detecting and responding to cyber incidents Help develop strategies and roadmaps for cyber security technology Assist in the research, selection and deployment of new technical security controls for use by the firm Provide … a point of technical authority and governance for the effective use of technical security controls across the firm Act as an escalation point for threat hunting and security incidents Investigate alerts from Azure/Defender, IT monitoring systems, and 3rd-party SOC, helping to ensure critical assets remain secure Manage supplier relationships, report on control effectiveness, and support compliance More ❯
Employment Type: Permanent, Work From Home
Salary: £85,000
Posted:

Cyber Security Threat Hunter

Bristol, Avon, England, United Kingdom
Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Bristol/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter … you will be responsible for proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITRE ATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and … as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, Threat Intelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding of network protocols, operating systems (Windows, Linux More ❯
Employment Type: Full-Time
Salary: £75,000 - £85,000 per annum
Posted:

Cyber Security Threat Hunter

Edinburgh, Midlothian, Scotland, United Kingdom
Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Edinburgh/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter … you will be responsible for proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITRE ATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and … as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, Threat Intelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding of network protocols, operating systems (Windows, Linux More ❯
Employment Type: Full-Time
Salary: £75,000 - £85,000 per annum
Posted:

Cyber Security Threat Hunter

Peterborough, Cambridgeshire, England, United Kingdom
Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Peterborough/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter … you will be responsible for proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITRE ATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and … as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, Threat Intelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding of network protocols, operating systems (Windows, Linux More ❯
Employment Type: Full-Time
Salary: £75,000 - £85,000 per annum
Posted:

Security Architect

Coventry, England, United Kingdom
Hybrid / WFH Options
NLB Services
Hybrid - 3 days/week) Type of employment - Contract (Initially 6 months) Job Description: Role: 10+ years of experience in Cyber security Designing & implementation on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration Configure … Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and minimal false positives. Threat Intelligence Integration Integrate threat intelligence feeds into Sentinel to enhance detection capabilities and contextualize alerts … landscape. Incident Response Automation Design and implement playbooks using Logic Apps to automate incident response workflows for common OT security events. Execution of the use cases on SIEM, SOAR & Threat Intelligence Build custom workbooks and dashboards to visualize OT security posture, threat trends, and SOC performance metrics. More ❯
Posted:

Cyber Threat and Vulnerability Manager

London, United Kingdom
Hybrid / WFH Options
Inspire People
a team at the heart of the global economy! The Department for International Trade (DIT) and Inspire People are partnering together to bring you an exciting opportunity for a Threat and Vulnerability Manager to protect DIT and the wider UK government from cyber threats in a fast paced and exciting role, responsible for the Vulnerability Management and Threat … wider UK government from cyber threats in a fast paced and exciting role. Reporting to the Head of Cyber Security Operations, you will manage and be responsible for the Threat and Vulnerability Management function within the SOC, by providing leadership on identification and improvement opportunities, and ensuring service owners are aware of weaknesses in their security posture and are … day-to-day role will involve the need to: Working with the Security Leadership team to develop a strategic road map for an effective vulnerability detection, assessment, remediation, and threat intelligence program. Line management of the threat and vulnerability management team. Building sustainable relationships to champion the adoption of vulnerability and threat management, compliance, and penetration More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SENIOR THREAT INTELLIGENCE ANALYST

London, United Kingdom
Hybrid / WFH Options
Secure Recruitment Ltd
SENIOR THREAT INTELLIGENCE ANALYST Fully Remote Up to £100,000 + Excellent Staff Bens + Share Scheme SECURE has Strategically Partnered with a Multi-Award-Winning, Software-Based Organisation at the Forefront of Pre-Emptive Exposure Management. As a market leader backed by significant Venture Funding, they combine proactive Threat Intelligence, Real Attacker Telemetry & Automated Red More ❯
Employment Type: Permanent
Salary: GBP 100,000 Annual
Posted:

Senior SOC Analyst

Portsmouth, England, United Kingdom
Hybrid / WFH Options
Cloud People
and managed services to customers across enterprise, public sector and fast growing scale ups. Its Security Practice protects clients through a powerful mix of Managed Detection and Response (MDR), Threat Hunting, Vulnerability Management, Penetration Testing and Incident Response, supported by a world class Security Advisory function. As a Senior SOC Analyst, you will take a leading role in identifying … detection and response capabilities. This is an opportunity to make a genuine impact, with the freedom to innovate and the support to grow into roles such as SOC Lead, Threat Hunter, Security Engineer or Incident Responder. Why This Role Stands Out Join a $1B global IT and Cyber Defence provider that invests heavily in people and technology Work with … remediation Providing technical guidance and mentoring to junior analysts within the SOC Developing and tuning detection use cases, correlation rules and playbooks in SIEM and EDR tools Conducting proactive threat hunting across diverse customer environments Working with engineering teams to enhance visibility, automation and telemetry Supporting incident response and coordinating remediation across teams Producing detailed incident reports and contributing More ❯
Posted:

SOC Manager

England, United Kingdom
Hybrid / WFH Options
Anson McCade
SOC Incident Response & Threat Hunting Manager Fully Remote (UK-based) | Up to £85,000 + 10–15% Bonus + £6k Car Allowance + Excellent Benefits (Occasional travel to Warrington, approx. once per quarter) Our client is expanding their virtual Security Operations Centre (vSOC) and looking for an experienced SOC Incident Response & Threat Hunting Manager to lead and develop … a hands-on leadership role, ideal for someone who’s equally comfortable managing people and tackling complex security incidents directly. You’ll guide analysts through live investigations, lead advanced threat hunting operations, and help shape the strategy for the Cyber Threat Intelligence (CTI) capability. The focus is on leadership through technical excellence — combining deep expertise in DFIR … threat hunting, and detection engineering with a proactive approach to strengthening security posture across diverse customer environments. The Role Lead and mentor Tier 3 SOC and Incident Response Analysts. Act as the technical lead on high-severity security incidents from initial detection through to post-incident review. Design and execute advanced threat hunting exercises, integrating intelligence from More ❯
Posted:

Cyber Security Engineer

Liverpool, England, United Kingdom
Hybrid / WFH Options
Love2shop
critical assets, and driving the integration of automation and AI to enhance our security operations. Security Analysis Monitor and analyse security alerts to detect threats, using behavioural analytics and threat intelligence to uncover anomalies. You’ll also conduct proactive threat hunting and maintain detailed risk profiles for users, systems, and applications to support a strong security posture. … and compliance, performing daily health checks and resolving any issues that arise. Working closely with Infrastructure teams, you’ll ensure endpoint configurations meet organisational standards. You’ll also enhance threat-hunting capabilities by integrating threat intelligence and correlating EDR data with SIEM and XDR platforms for deeper insights. Data Loss Prevention (DLP) In this part of the … response lifecycle from containment to recovery. You’ll document incidents thoroughly, follow established playbooks, and help improve them over time. Automation will be key to streamlining investigations and enriching threat intelligence. Testing and Validation You’ll take part in cyber crisis simulations, penetration testing, and table-top exercises to ensure our defences are robust and response plans are effective. More ❯
Posted:

Cyber Security Engineer

Welwyn Garden City, England, United Kingdom
Hybrid / WFH Options
PayPoint plc
critical assets, and driving the integration of automation and AI to enhance our security operations. Security Analysis Monitor and analyse security alerts to detect threats, using behavioural analytics and threat intelligence to uncover anomalies. You’ll also conduct proactive threat hunting and maintain detailed risk profiles for users, systems, and applications to support a strong security posture. … and compliance, performing daily health checks and resolving any issues that arise. Working closely with Infrastructure teams, you’ll ensure endpoint configurations meet organisational standards. You’ll also enhance threat-hunting capabilities by integrating threat intelligence and correlating EDR data with SIEM and XDR platforms for deeper insights. Data Loss Prevention (DLP) In this part of the … response lifecycle from containment to recovery. You’ll document incidents thoroughly, follow established playbooks, and help improve them over time. Automation will be key to streamlining investigations and enriching threat intelligence. Testing and Validation You’ll take part in cyber crisis simulations, penetration testing, and table-top exercises to ensure our defences are robust and response plans are effective. More ❯
Posted:

Cyber SecOps & Threat Specialist, Law Firm, Bristol

Bristol, Gloucestershire, United Kingdom
Hybrid / WFH Options
Cyber SecOps and Threat Intelligence Specialist, Law Firm, Bristol We are seeking a Cyber Security and Threat Intelligence Specialist to join an expanding team in this 3,000 user international Law Firm, strengthening its ability to detect, respond to, and prevent cyber threats. Location: Bristol Reports to: Head of Cyber Security Hybrid Role: 3-4 days More ❯
Posted:

Senior Security Risk Assurance Manager

City of London, London, United Kingdom
Hybrid / WFH Options
Sanderson Government and Defence
and interpret evidence to provide a holistic view of the organisation's security posture. Present findings and recommendations to senior leadership and governance forums. Collaborate with internal teams (e.g., threat intelligence, compliance, audit) to ensure assurance activities reflect current threat landscapes. Act as a primary interface for business units, ensuring alignment between assurance activities and operational priorities. … talent. Ability to interpret complex technical and business information to assess risk. Experience in supply chain security assurance. Knowledge of secure by design principles and accreditation processes. Understanding of threat intelligence and its application in assurance. Experience working in regulated or high-assurance environments (e.g., government, finance, defence). Familiarity with risk management tools and methodologies. What's More ❯
Employment Type: Permanent, Work From Home
Posted:

Senior Security Risk Assurance Manager

London, South East, England, United Kingdom
Hybrid / WFH Options
Sanderson
and interpret evidence to provide a holistic view of the organisation's security posture. Present findings and recommendations to senior leadership and governance forums. Collaborate with internal teams (e.g., threat intelligence, compliance, audit) to ensure assurance activities reflect current threat landscapes. Act as a primary interface for business units, ensuring alignment between assurance activities and operational priorities. … talent. Ability to interpret complex technical and business information to assess risk. Experience in supply chain security assurance. Knowledge of secure by design principles and accreditation processes. Understanding of threat intelligence and its application in assurance. Experience working in regulated or high-assurance environments (e.g., government, finance, defence). Familiarity with risk management tools and methodologies. What's More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

Cyber Security & Centralised Services Manager

London Area, United Kingdom
Hybrid / WFH Options
MFK Recruitment
attacks, phishing attempts, and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and … networks, in alignment with best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. Lead and coordinate incident response efforts, including root cause analysis, threat containment and post-incident reporting for clients. Collaborate with the Project and Service Desk teams to embed security into deployments, migrations, upgrades, and automation workflows, ensuring systems remain secure by design. Maintain … is shared across the team for rapid incident handling. Provide mentorship and cybersecurity guidance to junior engineers and Service Desk staff, fostering a culture of security awareness and proactive threat management. Perform ongoing threat intelligence monitoring and security trend analysis to anticipate risks and protect client environments. Support clients in security reporting, compliance reviews, and continuous improvement More ❯
Posted:

Cyber Security & Centralised Services Manager

City of London, London, United Kingdom
Hybrid / WFH Options
MFK Recruitment
attacks, phishing attempts, and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and … networks, in alignment with best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. Lead and coordinate incident response efforts, including root cause analysis, threat containment and post-incident reporting for clients. Collaborate with the Project and Service Desk teams to embed security into deployments, migrations, upgrades, and automation workflows, ensuring systems remain secure by design. Maintain … is shared across the team for rapid incident handling. Provide mentorship and cybersecurity guidance to junior engineers and Service Desk staff, fostering a culture of security awareness and proactive threat management. Perform ongoing threat intelligence monitoring and security trend analysis to anticipate risks and protect client environments. Support clients in security reporting, compliance reviews, and continuous improvement More ❯
Posted:

Cyber Security & Centralised Services Manager

London, South East, England, United Kingdom
Hybrid / WFH Options
MFK Recruitment
attacks, phishing attempts, and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and … networks, in alignment with best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. Lead and coordinate incident response efforts, including root cause analysis, threat containment and post-incident reporting for clients. Collaborate with the Project and Service Desk teams to embed security into deployments, migrations, upgrades, and automation workflows, ensuring systems remain secure by design. Maintain … is shared across the team for rapid incident handling. Provide mentorship and cybersecurity guidance to junior engineers and Service Desk staff, fostering a culture of security awareness and proactive threat management. Perform ongoing threat intelligence monitoring and security trend analysis to anticipate risks and protect client environments. Support clients in security reporting, compliance reviews, and continuous improvement More ❯
Employment Type: Full-Time
Salary: £55,000 - £65,000 per annum
Posted:

Global CSIRT Senior Analyst

England, United Kingdom
Hybrid / WFH Options
KPMG UK
incidents within KPMG’s Global Information Security Services (ISS) function. ISS delivers and oversees critical cybersecurity capabilities—including Security Monitoring & Response (SMR), Vulnerability Assessment & Secure Development (VASD), and Cyber Threat Intelligence (CTI)—across Global, Global Functions, and the broader KPMG network of member firms. This position offers an exciting opportunity to join a progressive and innovation-driven security More ❯
Posted:

Senior SOC Analyst (Level 3)

Crawley, England, United Kingdom
Hybrid / WFH Options
InfoSec People Ltd
within a dedicated Security Operations Centre, working at the forefront of protecting high-value national assets. The successful candidate will act as a technical authority for advanced incident response, threat hunting, and security engineering, with a strong focus on the Microsoft security stack. Key Responsibilities Serve as the primary escalation point for complex incidents and lead on incident response. … Conduct in-depth threat hunting, forensic investigations, and root cause analysis. Develop, test, and optimise detection use cases, rules, and playbooks within Microsoft Sentinel and Defender. Provide mentorship and guidance to junior SOC analysts, enhancing team capability. Collaborate with IT and OT teams to address unique security requirements across CNI environments. Drive improvements in SOC operations, automation, and incident … response processes. Monitor evolving threats and integrate threat intelligence into daily operations. Ensure adherence to industry standards and compliance frameworks (NIS2, CAF, ISO 27001). Skills & Experience Required Extensive background in SOC operations, incident response, and threat hunting. Expertise with the Microsoft security stack, including: Microsoft Sentinel (SIEM/SOAR) Microsoft Defender for Endpoint, Identity, Cloud Apps More ❯
Posted:
Threat Intelligence
10th Percentile
£43,000
25th Percentile
£49,875
Median
£75,000
75th Percentile
£90,000
90th Percentile
£107,880