Remote Threat Intelligence Job Vacancies

1 to 25 of 162 Remote Threat Intelligence Jobs

Cyber Threat Intelligence Analyst

Reading, Berkshire, South East, United Kingdom
Hybrid / WFH Options
Queen Square Recruitment Limited
Our client, a leading global organization, is partnering with a prestigious end client based in Reading. Were excited to offer an outstanding opportunity for askilled Threat Intelligence Specialist to join a dynamic IT team . If you are interested and have the relevant skills and experience, please apply promptly to discuss further. Job Title: Threat Intelligence Specialist Location: Reading, UK (Hybrid 4 days onsite) Duration: 6 months Rate: £465 per day Inside IR35 We are seeking a Threat Intelligence Specialist to join a global security team on a 6-month contract. This is a hands-on role where youll play a key part in strengthening the organisations cyber defence posture by collecting, analysing … disseminating actionable intelligence. Youll work closely with incident response, security operations, vulnerability management, and leadership teams to anticipate threats, mitigate risks, and improve resilience. Key Responsibilities: Collect and analyse intelligence to address high-priority security requirements. Produce and share actionable threat intelligence with stakeholders across security operations, incident response, and fraud prevention. Conduct dark web investigations and More ❯
Employment Type: Contract
Rate: Up to £465 per day
Posted:

Cyber Threat Intelligence Manager

United Kingdom
Hybrid / WFH Options
Hargreaves Lansdown
Hargreaves Lansdown is seeking a talented and experienced Cyber Threat Intelligence Manager to join our dynamic Cyber Defence team in Bristol. As our CTI Manager, you will play a critical role in protecting our organisation from cyber threats by proactively identifying, analysing, contextualising, and escalating potential risks. We operate a threat-centric cyber defence posture and CTI … you are passionate about cyber security, have a keen eye for detail, and thrive in a challenging and rewarding work environment, we encourage you to apply for the Cyber Threat Intelligence Manager position. What you'll be doing Responsible for the strategic direction and day-to-day running of the Cyber Threat Intelligence (CTI) function. Driving … the creation and ongoing management of the Threat Intelligence Strategy. Build and cultivate strong working relationships with key stakeholders across the whole of Hargreaves Lansdown, such as Cyber Defence Management, CISO 'Heads of' and Digital/Technology risk management, to ensure owners are aware of managed and unmanaged threats. Act as a direct line manager for members of More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Threat Intelligence Manager

Bristol, United Kingdom
Hybrid / WFH Options
Hargreaves Lansdown
Hargreaves Lansdown is seeking a talented and experienced Cyber Threat Intelligence Manager to join our dynamic Cyber Defence team in Bristol. As our CTI Manager, you will play a critical role in protecting our organisation from cyber threats by proactively identifying, analysing, contextualising, and escalating potential risks. We operate a threat-centric cyber defence posture and CTI … you are passionate about cyber security, have a keen eye for detail, and thrive in a challenging and rewarding work environment, we encourage you to apply for the Cyber Threat Intelligence Manager position. What you'll be doing Responsible for the strategic direction and day-to-day running of the Cyber Threat Intelligence (CTI) function. Driving … the creation and ongoing management of the Threat Intelligence Strategy. Build and cultivate strong working relationships with key stakeholders across the whole of Hargreaves Lansdown, such as Cyber Defence Management, CISO 'Heads of' and Digital/Technology risk management, to ensure owners are aware of managed and unmanaged threats. Act as a direct line manager for members of More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Threat Intelligence Manager

South West, United Kingdom
Hybrid / WFH Options
Hargreaves Lansdown
Hargreaves Lansdown is seeking a talented and experienced Cyber Threat Intelligence Manager to join our dynamic Cyber Defence team in Bristol. As our CTI Manager, you will play a critical role in protecting our organisation from cyber threats by proactively identifying, analysing, contextualising, and escalating potential risks. We operate a threat-centric cyber defence posture and CTI … you are passionate about cyber security, have a keen eye for detail, and thrive in a challenging and rewarding work environment, we encourage you to apply for the Cyber Threat Intelligence Manager position. What you'll be doing Responsible for the strategic direction and day-to-day running of the Cyber Threat Intelligence (CTI) function. Driving … the creation and ongoing management of the Threat Intelligence Strategy. Build and cultivate strong working relationships with key stakeholders across the whole of Hargreaves Lansdown, such as Cyber Defence Management, CISO 'Heads of' and Digital/Technology risk management, to ensure owners are aware of managed and unmanaged threats. Act as a direct line manager for members of More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Threat Intelligence Manager

Bradley Stoke, Gloucestershire, United Kingdom
Hybrid / WFH Options
Hargreaves Lansdown
Hargreaves Lansdown is seeking a talented and experienced Cyber Threat Intelligence Manager to join our dynamic Cyber Defence team in Bristol. As our CTI Manager, you will play a critical role in protecting our organisation from cyber threats by proactively identifying, analysing, contextualising, and escalating potential risks. We operate a threat-centric cyber defence posture and CTI … you are passionate about cyber security, have a keen eye for detail, and thrive in a challenging and rewarding work environment, we encourage you to apply for the Cyber Threat Intelligence Manager position. What you'll be doing Responsible for the strategic direction and day-to-day running of the Cyber Threat Intelligence (CTI) function. Driving … the creation and ongoing management of the Threat Intelligence Strategy. Build and cultivate strong working relationships with key stakeholders across the whole of Hargreaves Lansdown, such as Cyber Defence Management, CISO 'Heads of' and Digital/Technology risk management, to ensure owners are aware of managed and unmanaged threats. Act as a direct line manager for members of More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Threat Intelligence Manager

Bristol, Avon, South West, United Kingdom
Hybrid / WFH Options
Hargreaves Lansdown
Hargreaves Lansdown is seeking a talented and experienced Cyber Threat Intelligence Manager to join our dynamic Cyber Defence team in Bristol. As our CTI Manager, you will play a critical role in protecting our organisation from cyber threats by proactively identifying, analysing, contextualising, and escalating potential risks. We operate a threat-centric cyber defence posture and CTI … you are passionate about cyber security, have a keen eye for detail, and thrive in a challenging and rewarding work environment, we encourage you to apply for the Cyber Threat Intelligence Manager position. What you'll be doing Responsible for the strategic direction and day-to-day running of the Cyber Threat Intelligence (CTI) function. Driving … the creation and ongoing management of the Threat Intelligence Strategy. Build and cultivate strong working relationships with key stakeholders across the whole of Hargreaves Lansdown, such as Cyber Defence Management, CISO 'Heads of' and Digital/Technology risk management, to ensure owners are aware of managed and unmanaged threats. Act as a direct line manager for members of More ❯
Employment Type: Permanent, Part Time, Work From Home
Posted:

Cyber Threat Intelligence Manager

newport, wales, united kingdom
Hybrid / WFH Options
Hargreaves Lansdown
Hargreaves Lansdown is seeking a talented and experienced Cyber Threat Intelligence Manager to join our dynamic Cyber Defence team in Bristol. As our CTI Manager, you will play a critical role in protecting our organisation from cyber threats by proactively identifying, analysing, contextualising, and escalating potential risks. We operate a threat-centric cyber defence posture and CTI … you are passionate about cyber security, have a keen eye for detail, and thrive in a challenging and rewarding work environment, we encourage you to apply for the Cyber Threat Intelligence Manager position. What you'll be doing Responsible for the strategic direction and day-to-day running of the Cyber Threat Intelligence (CTI) function. Driving … the creation and ongoing management of the Threat Intelligence Strategy. Build and cultivate strong working relationships with key stakeholders across the whole of Hargreaves Lansdown, such as Cyber Defence Management, CISO 'Heads of' and Digital/Technology risk management, to ensure owners are aware of managed and unmanaged threats. Act as a direct line manager for members of More ❯
Posted:

Cyber Threat Intelligence Manager

bath, south west england, united kingdom
Hybrid / WFH Options
Hargreaves Lansdown
Hargreaves Lansdown is seeking a talented and experienced Cyber Threat Intelligence Manager to join our dynamic Cyber Defence team in Bristol. As our CTI Manager, you will play a critical role in protecting our organisation from cyber threats by proactively identifying, analysing, contextualising, and escalating potential risks. We operate a threat-centric cyber defence posture and CTI … you are passionate about cyber security, have a keen eye for detail, and thrive in a challenging and rewarding work environment, we encourage you to apply for the Cyber Threat Intelligence Manager position. What you'll be doing Responsible for the strategic direction and day-to-day running of the Cyber Threat Intelligence (CTI) function. Driving … the creation and ongoing management of the Threat Intelligence Strategy. Build and cultivate strong working relationships with key stakeholders across the whole of Hargreaves Lansdown, such as Cyber Defence Management, CISO 'Heads of' and Digital/Technology risk management, to ensure owners are aware of managed and unmanaged threats. Act as a direct line manager for members of More ❯
Posted:

Cyber threat Analyst

Hemel Hempstead, Hertfordshire, England, United Kingdom
Hybrid / WFH Options
Fynity
Cyber Threat Intelligence Analyst Hemel Hempstead | Hybrid: 3 Days WFH/2 Days On-SiteUp to £60,000 + Excellent Benefits Security Clearance: SC Cleared + Eligible for DV ClearanceA great opportunity to take your cyber threat intelligence skills to the next level? This is an exciting opportunity to join a fast-growing, mission-driven cyber … team working at the forefront of Defence and National Security.The Cyber Threat Intelligence Analyst will play a key role in identifying and neutralising emerging threats that could impact our most critical national infrastructure. This is a hands-on, high-impact role where you’ll shape the threat intel capability and directly support security operations in a cutting … edge SOC environment.As a Cyber threat Analyst, you will: Managing and automating threat intel feeds from multiple open and closed sources Monitoring OSINT, dark web forums, and internal telemetry for threat indicators Translating raw technical data into actionable insights for security teams Collaborating with SOC and Incident Response teams to support real-time threat mitigation Creating More ❯
Employment Type: Full-Time
Salary: £55,000 - £60,000 per annum
Posted:

Threat Intelligence Business Analyst

Knutsford, England, United Kingdom
Hybrid / WFH Options
eTeam
We are a Global Recruitment specialist that provides support to the clients across EMEA, APAC, US and Canada. We have an excellent job opportunity for you. Role Title: Threat Intelligence Business Analyst Location: Knutsford WA16 9EU | Hybrid, 60% Office, 40% Remote Duration: 31/03/2026 Rate:402GBP/Day(Inside IR35) Role Description: The Threat Intelligence Business Analyst plays a critical role in identifying and translating business problems and intelligence requirements into actionable solutions that support the strategic objectives of the Chief Security Office (CSO). Operating within a cross-functional analytics team, the role supports the development and delivery of capabilities within the DataWalk platform by gathering requirements, shaping operational designs … and ensuring stakeholder alignment. The analyst acts as a bridge between business stakeholders, intelligence analysts, and technical teams, ensuring that solutions are viable, scalable, and embedded effectively across the organisation. Key Accountabilities • Identify and analyse business problems and intelligence requirements that require change or enhancement • Collaborate with stakeholders to obtain, document, and validate business requirements for DataWalk • Identify More ❯
Posted:

Threat Intelligence Business Analyst

warrington, cheshire, north west england, united kingdom
Hybrid / WFH Options
eTeam
We are a Global Recruitment specialist that provides support to the clients across EMEA, APAC, US and Canada. We have an excellent job opportunity for you. Role Title: Threat Intelligence Business Analyst Location: Knutsford WA16 9EU | Hybrid, 60% Office, 40% Remote Duration: 31/03/2026 Rate:402GBP/Day(Inside IR35) Role Description: The Threat Intelligence Business Analyst plays a critical role in identifying and translating business problems and intelligence requirements into actionable solutions that support the strategic objectives of the Chief Security Office (CSO). Operating within a cross-functional analytics team, the role supports the development and delivery of capabilities within the DataWalk platform by gathering requirements, shaping operational designs … and ensuring stakeholder alignment. The analyst acts as a bridge between business stakeholders, intelligence analysts, and technical teams, ensuring that solutions are viable, scalable, and embedded effectively across the organisation. Key Accountabilities • Identify and analyse business problems and intelligence requirements that require change or enhancement • Collaborate with stakeholders to obtain, document, and validate business requirements for DataWalk • Identify More ❯
Posted:

Cyber Threat Intelligence Analyst

Hemel Hempstead, Hertfordshire, South East, United Kingdom
Hybrid / WFH Options
Sopra Steria
We are building a Cyber Threat team. It's a great time to join us in our expansion, and work with a portfolio of high profile clients, with the opportunity to work on a large client base. Our Cyber Threat |Intelligence Analyst will be a critical member of the dedicated SOC team and run our Malware Information … Sharing Platform (MISP) instance, to deliver actionable operational and tactical threat intelligence. This involves monitoring, analysis, and dissemination of threat information to support our customer security posture. We need strong analytical skills, deep knowledge of threat intelligence frameworks, and the ability to collaborate optimally across teams with varied strengths and partners. You do need to hold … What you'll be doing: Develop and integrate automated feeds and enrichment sources. Provide training sessions and documentation for SOC staff on effective usage of MISP. Supervise various sources (threat feeds, OSINT, dark web, internal logs) for emerging threats; and facilitate threat intelligence. Analyse collected data to identify patterns, indicators of compromise, and emerging adversary behaviours. Produce monthly More ❯
Employment Type: Permanent, Work From Home
Salary: £65,000
Posted:

Cyber Threat Intelligence Analyst

Hemel Hempstead, Hertfordshire, England, United Kingdom
Hybrid / WFH Options
Sopra Steria
We are building a Cyber Threat team. It's a great time to join us in our expansion, and work with a portfolio of high profile clients, with the opportunity to work on a large client base. Our Cyber Threat |Intelligence Analyst will be a critical member of the dedicated SOC team and run our Malware Information … Sharing Platform (MISP) instance, to deliver actionable operational and tactical threat intelligence. This involves monitoring, analysis, and dissemination of threat information to support our customer security posture. We need strong analytical skills, deep knowledge of threat intelligence frameworks, and the ability to collaborate optimally across teams with varied strengths and partners. You do need to hold … What you'll be doing: Develop and integrate automated feeds and enrichment sources. Provide training sessions and documentation for SOC staff on effective usage of MISP. Supervise various sources (threat feeds, OSINT, dark web, internal logs) for emerging threats; and facilitate threat intelligence. Analyse collected data to identify patterns, indicators of compromise, and emerging adversary behaviours. Produce monthly More ❯
Employment Type: Full-Time
Salary: £55,000 - £65,000 per annum
Posted:

Senior Systems Analyst

London, United Kingdom
Hybrid / WFH Options
Wellington Management Company
threats to understand and refine processes and controls. Your responsibilities will include but are not limited to being an escalation point and expert on cyber incidents of various types, threat hunting for TTPs prioritized by internal and external threat intelligence, owning team process improvements as well as mentorship, and staying on top of industry technology and cyber … threat advancements. We are a passionate global team dedicated to helping keep our clients and our firm safe.# RESPONSIBILITIES Maintain a core competency in event analysis and serve as an escalation point for noteworthy investigations, deeper investigations, and those that require critical attention. Continue to build out new capabilities within the program aligned with our attack surface. Opportunities include … dashboards, direct alerting, risk-based alerting, reports, and other objects as needed in Splunk. Continue to maintain a depth of knowledge within the cyber security field. This entails following threat actor activity targeting the industry and speaking knowledgeably at regular internal threat intelligence briefings. Leveraging threat intelligence, experience, and other inputs to perform active threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cybersecurity Specialist 3

Atlanta, Georgia, United States
Hybrid / WFH Options
Cook Systems International
compliance tab for instruction on how the CANDIDATE must obtain this letter)Job Summary:An advanced-level security professional, participates in advanced information security related projects, performs deep-dive threat hunting, incident response, vulnerability management, and security architecture design, focusing on complex and novel threats that bypass automated systems. Is trained and experienced in meeting security needs of the … its employees in multiple locations and ensure people, processes, and technology aligns with the desired security posture of the organization. This role typically requires extensive experience, advanced skills in threat detection and mitigation, and may involve developing and optimizing security tools and processes. Cybersecurity Specialist 3 may serve as lead worker for projects and team.Entry QualificationsBachelor's degree in … or related field or equivalent experience and four (4) years of proven experience and demonstrated success in technology leadership with emphasis on information security and data governance.Key Responsibilities:Advanced Threat Hunting:? Proactively search for sophisticated, covert threats that evade automated detection.? Possess a deep understanding of cybersecurity threats, vulnerabilities, security frameworks, and monitoring (link removed)plex Incident Response:? Investigate More ❯
Employment Type: Any
Salary: USD Annual
Posted:

Cyber Intelligence Analyst with Security Clearance

Huntsville, Alabama, United States
Hybrid / WFH Options
Gridiron IT Solutions
Cyber Intelligence Analyst Location: Huntsville, AL Work Type: Onsite Remote Work: No Job Description Work as a member of a threat intelligence team responsible for understanding how emerging cyber threats impact the client organization while conducting highly detail-oriented security threat analysis and working with clients to validate and characterize threats. Support incident detection, response operations … provide input on new detection strategies and remediation guidance. Form accurate and precise analysis and escalate it to appropriate teammates or internal teams for additional assistance or review. Provide intelligence context to support the fine-tuning of signatures. Qualifications 8+ years of experience with cybersecurity 4+ years of experience conducting threat research focused on nation-state, criminal, or … as social networking sites, blogs, and microblogs, and internet mapping tools Experience with computer network protocols and operations Knowledge of cyber intrusion vectors, malware, networking, and monitoring Knowledge of threat intelligence tradecraft, including structured analytic, contrarian, and imaginative analytic techniques Ability to write concise analytical products and assessments Top Secret clearance Bachelor's degree Additional Qualifications Experience with More ❯
Employment Type: Permanent
Salary: USD 140,000 Annual
Posted:

Senior SOC Engineer

Scotland, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent, Work From Home
Posted:

Senior SOC Engineer

United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

Glasgow, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

Wolverhampton, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

Midlands, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

Birmingham, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

Bristol, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

London, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Engineer

Cheltenham, Gloucestershire, United Kingdom
Hybrid / WFH Options
Anson Mccade
and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management … Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic … Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations and coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Threat Intelligence
10th Percentile
£43,200
25th Percentile
£54,625
Median
£73,250
75th Percentile
£90,000
90th Percentile
£110,000