Points If You Have: Experience implementing two or more of the following ServiceNow capabilities: Hardware Asset Management, Software Asset Management, Vulnerability Management, Configuration Compliance, ThreatIntelligence, Service Catalog, Workflow, Integration Hub, Configuration Management, or Service Mapping, Demonstrable experience in setup of ServiceNow integration with SOAP, REST, LDAP, SSO more »
SC clearance with UK-eyes only caveat. Enterprise Security Architectures (SABSA, MODAF). Desirable: DV Clearance. Knowledge of Quantum Cryptography & Quantum Key management. Current threatintelligence awareness. Knowledge of NATO security policy, risk management and Accreditation. Understanding of the role of advisory boards within the UK Government or more »
Leeds, England, United Kingdom Hybrid / WFH Options
Anson McCade
ThreatIntelligence Lead Location: London - Hybrid Travel: Max 2 days consulting travel Employment : Full-Time Role Overview : We are seeking a skilled ThreatIntelligence Lead to join our team, focusing on supporting the defence of a major UK Critical National Infrastructure (CNI) organization. In this role … you will oversee the collation and analysis of ThreatIntelligence (TI), ensuring the SOC (Security Operations Centre) is equipped with the necessary insights to proactively defend against cyber threats. The ideal candidate will have a strong technical background, exceptional analytical skills, and the ability to effectively communicate complex … concepts to technical and non-technical audiences. Responsibilities: • Produce and maintain threat assessments to provide a comprehensive understanding of the customer threat landscape. • Maintain and update the Indicator of Compromise (IoC) database tailored to the monitored environment and threats. • Oversee threat profiles and threat modelling, detailing more »
ThreatIntelligence Analyst Our client stands as a cornerstone in the realm of digital security solutions, offering state-of-the-art services to safeguard clients against ever-morphing cyber threats. With a dedication to pioneering innovations and unwavering excellence, the company empowers governments and organizations to fortify their … digital assets and infrastructure. They are in search of a proficient ThreatIntelligence Analyst to complement its esteemed team of cybersecurity specialists. As a ThreatIntelligence Analyst you will wield significant influence in identifying, dissecting, and neutralizing cyber threats, thereby ensuring the unshakeable security and resilience … of our clients' operations. Key Responsibilities: Employ advanced intelligence tools and methodologies to monitor and analyze cyber threats across various channels, including open-source intelligence and dark web monitoring. Conduct exhaustive research and analysis to discern emerging threats, dissect attack patterns, and decipher threat actor behaviors. Craft more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Orbis Group
ThreatIntelligence Lead (Salary flexible for the right candidate) Do you want to join a fast-paced company with a cloud security product with industry recognition and awards? Would you like to do research that has a positive impact on the security community? Are you unhappy with your … then this is the role for you! The role: A cloud security scale-up, founded by cyber security SME's, are searching for a ThreatIntelligence Lead to conduct malware analysis, lead threatintelligence research, and build internal tooling for security projects. You will be of … the research team that specifically focuses on Malware. This role will include line management responsibilities (no prior management experience is needed) of one other threatintelligence engineer and expectations to grow the team if/when needed. Desirable experience: 6+ months of experience working in a public cloud more »
a global cybersecurity leader that secures human progress with Secureworks® Taegis™, a SaaS-based, open XDR platform built on 20+ years of real-world threatintelligence and research, improving customers’ ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions. We enjoy competitive … team. Responsibilities Leverage internal, commercial, and open-source tools and data sources to analyze, enrich and synthesize indicators of compromise and/or other intelligence artifacts to provide meaningful and actionable intelligence Analyze raw data sets and extract relevant insight to form high quality TI responses Perform proactive … products, where appropriate Maintain a broad understanding and knowledge of the latest offensive and defensive Tactics, Techniques and Procedures (TTPs) as well as overall Threat Landscape trends Collaborate internally and externally, and develop, enhance and produce Secureworks TI products Own and execute ongoing projects such as customer threatmore »
ThreatIntelligence Lead Hybrid - 1-2 times a month Locations - Guildford or Preston Salary - £60,000 - £64,000 + 10% annual bonus MUST be eligible for SC Clearance This is an opportunity to work for a globally leading FTSY 500 defence organisation in their brand new team and … project! Role - We are on the hunt for a leader within the Threat Modelling/Intelligence space. You will be supporting with the strategic road mapping of the project, selecting the most appropriate tech stack to move forward with and building a team of Threat Modellers. Leading … the delivery of the threat modelling function by providing analysis and guidance. Acting as the Threat Modelling Lead, providing direction to Threat Modellers Capturing and disseminating security information and providing threat modelling expertise Communicating with multiple business functions and programmes, being the first point of contact more »
Senior ThreatIntelligence Analyst Hybrid - 1-2 times a month Locations - Guildford or Preston Salary - £50,000 - £55,000 MUST be eligible for SC Clearance This is an opportunity to work for a globally leading FTSY 500 defence organisation in their brand new team and project Role - We … are on the hunt for a senior level analyst that has ideally come from a SOC, Red Team or Threat Modelling background. Reporting into the Lead Threat Modeller. Creating and implementing processes and procedures for threat modelling capability Maintaining up to date knowledge of cyber security threats … activity group tactics, techniques, and procedures (TTPs) Supporting Purple team by building attack simulations showing potential attack patterns to support future remediation. Key Skills Threat Modelling Knowledge of Threat Landscape, Current Affairs and Geopolitics Operational Risk Management Red or Purple Team abilities Cyber/ThreatIntelligencemore »
on two new positions. My clients UK SOC is going through a state of transformation and they need someone to help scope and develop threat management as a function. You will be working on nation state threat actors and need to be eligible for or currently hold SC … clearance. A background in cyber operations and intelligence (doesn’t have to be cyber) is required, as well as a proven interest and keeping up to date on global cyber threats. The preferred candidate should possess a minimum of 2 years of experience in a SOC environment. This role … necessitates the ability to Identify, analyze, and mitigate threatintelligence from various sources, underscoring the importance of an understanding of OSINT. Additionally, the Lead role involves additional responsibilities, including direct management of a team and reporting to one senior stakeholders and a knowledge of Purple/Red team more »
to our customers and streamline and automate our business processes. To help us manage our cybersecurity incidents, whilst performing forensic investigations and providing cyber threatintelligence services, we're looking for two talented individuals with strong analytical skills to join this growing team. At AXA we work smart … security analysts to provide recommendations on security mechanisms Support the maintenance, testing and execution of the AXA UK Security Incident Management framework Provide cyber threatintelligence to in scope UK entities Due to the number of applications we expect to receive for this role, we reserve the right … networking and common protocol behaviours Proven experience using a major scripting/programming language or search query language to support in security operations and threat detection GIAC certified qualification would be ideal but not essential Comfortable with packet analysis and ideally experienced with network detection and response tooling Experience more »
to our customers and streamline and automate our business processes. To help us manage our cybersecurity incidents, whilst performing forensic investigations and providing cyber threatintelligence services, we're looking for two talented individuals with strong analytical skills to join this growing team. At AXA we work smart … security analysts to provide recommendations on security mechanisms Support the maintenance, testing and execution of the AXA UK Security Incident Management framework Provide cyber threatintelligence to in scope UK entities Due to the number of applications we expect to receive for this role, we reserve the right … networking and common protocol behaviours Proven experience using a major scripting/programming language or search query language to support in security operations and threat detection GIAC certified qualification would be ideal but not essential Comfortable with packet analysis and ideally experienced with network detection and response tooling Experience more »
email security, network security tools, SIEM and SOAR etc, and be able to optimise such tools. • Must have a have experience in Vulnerability/Threat management including threatintelligence and threat hunting. • Must have good written and oral communication skills, including incident reporting and stakeholder management. more »
operation across the globe. You will be passionate about cyber security and thrive on continued professional development and increasing personal knowledge as the potential threat to cyber security becomes more complex. You must be able to work proactively to reduce the risk posed to the company. You will hold … unauthorized activities. Investigate potential incidents and provide timely feedback. Analyze events to identify trends, threats, and vulnerabilities. Work to contain and remediate security incidents. ThreatIntelligence Keep up to date with latest trends in cybersecurity threats, vulnerabilities, and best practices. Security Infrastructure Management Assist with the maintenance of … with security tools such as SIEM/EDR and vulnerability Management. Proven experience in a security operations role. In-depth knowledge of cybersecurity principles, threat landscapes, and attack vectors. Experience working in a large, multinational, complex company. Good knowledge of infrastructure concepts – such as Windows/Linux, DNS, AD more »
security services to major organisations worldwide. Our global team of over 4,850 cybersecurity professionals includes specialised consultants, former law enforcement officials, forensic investigators, intelligence analysts, data scientists, legal professionals and industry leaders in cybersecurity and privacy. We are rated as a leader by multiple industry analysts for Global … cost to the attacker”. Our Cyber Incident Response practice works closely alongside many other of our front-line technical teams, including our global threatintelligence team, our Managed Cyber Defence threat hunting team and our ethical hacking practice. We also work with PwC’s dedicated crisis more »
Greater London, England, United Kingdom Hybrid / WFH Options
Franklin Fitch
audit findings. o Management and configuration of vulnerability management tools (Microsoft Azure and Qualys) o Support the InfoSec function in proactively identifying and leveraging threatintelligence sources to inform strategic vulnerability mitigation measures. Threat Management o Take lead on the daily threat management activities o Maintain more »
roadmap to ensure that the SOC sets the standard for SOCs in the UK and remains performant in line with customer’s requirements and threat profiles. The SDM drives continuous improvement of the SOC services to increase performance and reduce costs. This includes supporting the project teams with delivering … with the authority teams and tenant owners. The SDM is a leader with a deep knowledge of technical and cyber security technologies and cyber threat tools, tactics, techniques and procedures who is experienced in planning and managing development activities in accordance with industry standard project and engineering methodologies. Requirements … security controls as well as detection tools to protect large cloud estates; Utilise SIEM tools to detect security breaches and recognise the importance of threat led Use Cases. Knowledge of SIEM/SOAR tools (Splunk and Sentinel at a minimum) and other appropriate tooling e.g. SOAR, ThreatIntelligencemore »
I’m working with a boutique consultancy, who are seeking to grow to their existing cyber function with another dedicated incident response/threat hunting specialist. This role is varied, offering the incumbent an opportunity to conduct incident response and threat hunting engagements. Some of your responsibilities will … going through cyber incidents, which may include Ransomware, BEC and cloud incidents. Working closely with the wider cyber function, including but not limited to threatintelligence and forensics to assist with investigations and improve the threat hunting service. Create and improve playbooks/runbooks. Conduct threat … incident response experience. Certifications such as GCIH, GCIA or GCFA/E. Ideally, consultancy experience however, strong regulated exposure is also welcomed. Strong baseline threat hunting skills and ideally, an interest in research focused tasks. This is an exciting role for an incident responder, looking for a step up more »
limited to: A comprehensive grasp of security vulnerabilities, their categorization, remediation methods, and associated risks is imperative Proficiency in prioritising vulnerability remediation based on threatintelligence and business context is crucial Strong skills in generating meaningful reports and communicating effectively with relevant stakeholders are a must Familiarity with more »
Manchester Area, United Kingdom Hybrid / WFH Options
Searchability®
/Prevention/Documentation Responsibilities: Monitor SIEM Systems Identify and investigate security threats Responding to alerts Documentation Collaborating within an information security environment Proactive threatintelligence What We Offer: An opportunity to work within an innovative, and forward thinking information security team, addressing enterprise level security risks. Flexible more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »