Threat Intelligence Job Vacancies

151 to 175 of 778 Threat Intelligence Jobs

Security Consultant (Security Operations / SOC)

Chesterfield, England, United Kingdom
Hybrid / WFH Options
Logiq
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM More ❯
Posted:

Security Consultant (Security Operations / SOC)

Wakefield, England, United Kingdom
Hybrid / WFH Options
Logiq
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM More ❯
Posted:

Security Consultant (Security Operations / SOC)

Telford, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Posted:

Security Consultant (Security Operations / SOC)

Chester, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Posted:

Security Consultant (Security Operations / SOC)

Basildon, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Posted:

Security Consultant (Security Operations / SOC)

Lincoln, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Posted:

Security Consultant (Security Operations / SOC)

Wolverhampton, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Posted:

Security Consultant (Security Operations / SOC)

Ipswich, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Posted:

Security Consultant (Security Operations / SOC)

London, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Posted:

Security Consultant (Security Operations / SOC)

Worcester, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Posted:

Security Consultant (Security Operations / SOC)

Peterborough, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Posted:

Security Consultant (Security Operations / SOC)

Shrewsbury, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Posted:

Security Consultant (Security Operations / SOC)

Northampton, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Posted:

Security Consultant (Security Operations / SOC)

Luton, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Posted:

Security Consultant (Security Operations / SOC)

Warrington, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Posted:

Security Consultant (Security Operations / SOC)

Swindon, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Posted:

Security Consultant (Security Operations / SOC)

Belfast, Northern Ireland, United Kingdom
Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Posted:

Security Consultant (Security Operations / SOC)

Bolton, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Posted:

Security Consultant (Security Operations / SOC)

Hounslow, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or More ❯
Posted:

VP - Cybersecurity Technical Delivery Manager

London, England, United Kingdom
Hybrid / WFH Options
MUFG
global Information Security Standards and Procedures (ISSP) requirements and local security requirements. The department deploys, supports and monitors security solutions such as virus protection, vulnerability management, compliance monitoring and threat/incident management activities to reduce risk. NUMBER OF DIRECT REPORTS 1-2 MAIN PURPOSE OF THE ROLE To manage the technical delivery of various cybersecurity projects and contribute … Demonstrable proficiency in a wide range of information IT security technologies and embedded security; at the minimum knowledge must cover key cybersecurity domains such as Identity and Access Management, Threat Intelligence, Risk Evaluation, Security Assessment/Testing, Incidence Management and Vendor/Cloud products assessment Possessing high level of analytical ability where problems are typically unusual and difficult More ❯
Posted:

Information Security Manager

Newcastle upon Tyne, England, United Kingdom
Core-Asset Consulting
practices. Solid technical knowledge and experience on security technologies (like Endpoint protection, Mobile Security, Data Protection, Cloud Security, etc.) and on cyber security capabilities (SIEM, SOC, CERT, Vulnerability Management, Threat intelligence etc.) Strong knowledge of main Information Security standards and frameworks (ISO27001, ISO22301, ISF, NIST, COBIT.) Good background in information management, with clear understanding of the challenges of More ❯
Posted:

Tier 1 SOC Analyst

Stone, Staffordshire, England, United Kingdom
Hybrid / WFH Options
Oscar Technology
and triage security alerts from SIEM and EDR platforms. Investigate potential security incidents and escalate as needed. Analyse logs from various systems including firewalls, endpoints, and cloud environments. Support threat intelligence efforts by identifying indicators of compromise (IOCs). Document triage actions, observations, and escalations clearly and accurately. Assist in fine-tuning detection rules to reduce false positives More ❯
Employment Type: Full-Time
Salary: £25,000 - £30,000 per annum
Posted:

SIEM Administrator - Global Brand - Enterprise & Fast pace - Leeds REF 884

Leeds, England, United Kingdom
Interface Recruitment UK
deliver solutions to gain visibility of security events within our environment. Build new or develop existing event correlation, reporting and remediation capabilities based on advanced monitoring use cases, external threat intelligence, and known traffic patterns. Regularly review Audit Logs to recognise both normal and abnormal activity. Responsibilities: Develop and enhance security policies, processes, procedures and technical controls to More ❯
Posted:

Managing Consultant - SOC Services

Crawley, England, United Kingdom
Hybrid / WFH Options
Thales
Response and Recovery Planning: Oversee incident response strategies, including the establishment of playbooks, workflows, and escalation procedures to improve response times and overall effectiveness. Collaborate with clients to enhance threat detection, response, and reporting mechanisms, ensuring they are equipped to mitigate evolving cybersecurity risks. Provide guidance on managing and recovering from cybersecurity incidents to minimize downtime and operational impact. … on knowledge of SIEM platforms and technologies, such as Splunk, QRadar, Google, LogRhythm and SolarWinds. Solid understanding of EDR, MDR and XDR technologies and processes. Extensive experience of integrating Threat Intelligence, Automation tools and AI capability into SOC environments. Strong analytical skills with the ability to evaluate complex technical issues and devise effective solutions. Excellent communication and presentation More ❯
Posted:

Cyber Security Operations Specialist - 2 positions available

London, England, United Kingdom
Hybrid / WFH Options
Police Digital Service
remediation of identified vulnerabilities. Lead the security working group for specified national capabilities. Apply and implement Secure by Design principles. Monitor systems for anomalies or unusual events, and use threat intelligence sources to identify security incidents and coordinate with relevant stakeholders for a swift resolution. Enhance the security culture within the national Policing services by promoting best practices More ❯
Posted:
Threat Intelligence
10th Percentile
£45,000
25th Percentile
£49,000
Median
£67,500
75th Percentile
£82,500
90th Percentile
£112,000