Abingdon, Oxfordshire, United Kingdom Hybrid / WFH Options
Sophos Group
leading endpoint, network, email, and cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs … worldwide, defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threatintelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at . Role … accurate revenue forecasts and budgets for the renewal sales team, aligning with company objectives and the delivery of accurate and timely forecasts by the team for escalation reporting. Market Intelligence: Stay updated on industry trends, competitors, and customer needs to offer localize insights to global MI, including specific focus on trends regarding renewal best practices. Process Improvement: Continuously evaluate More ❯
Minneapolis, Minnesota, United States Hybrid / WFH Options
Target
previous Red Team experience, not just experience in the offensive security industry. Red Team members regularly: Consult on, design, and execute adversary emulation operations Conduct research into real-world threat actor tactics, techniques, and procedures to develop proof-of-concept tools and playbooks Bypass preventative and detective security controls to accomplish operational goals Partner with the Cyber Security Incident … Response Team and other stakeholders in the organization to identify improvement opportunities Collaborate with Cyber ThreatIntelligence, Detection, and Threat Hunting engineers and analysts on research Work with non-security engineering teams to educate, and collaborate on operational objectives Expect To: Develop strategic adversary emulation objectives and operational plans Execute adversary emulation operations to surface risk in … engagements Lead and train operators Communicate effectively with and directly support defenders Present findings and operational work to groups in a clear and professional manner Study the techniques of Threat Actors, and apply that lens to operational work Partner with other Team Members to improve tools and procedures Manage work effectively in the team's project management tools (Github More ❯
status About You 3-5 years of experience in cyber security roles, with hands-on involvement in implementing frameworks like NIST, eCAF, or ISO27001 Experience in SIEM, Vulnerability Management, ThreatIntelligence, and IAM tools Background in supporting enterprise-level security initiatives aligned with regulatory or certification standards If you're interested in hearing more about the role please More ❯
status About You 3-5 years of experience in cyber security roles, with hands-on involvement in implementing frameworks like NIST, eCAF, or ISO27001 Experience in SIEM, Vulnerability Management, ThreatIntelligence, and IAM tools Background in supporting enterprise-level security initiatives aligned with regulatory or certification standards If you're interested in hearing more about the role please More ❯
Fenix24 is an industry-leading cyber disaster recovery and restoration company. Battling threat actors as The World's First Civilian Cybersecurity Force , Fenix24 delivers cybersecurity services through its four battalions: Fenix24 for ransomware recovery and restoration; Athena7 for IT security assessments, strategy and planning; Grypho5 for ongoing security-based management; and Argos99 for expert insights into data, assets and … its Securitas Summa program, Fenix24 ensures organizations are prepared to effectively resist and rapidly recover from a cyberattack, offering a combination of managed data and infrastructure protection, real-time threatintelligence, and ongoing hardening and breach resistance. About This Position The Technical Account Manager is responsible for providing technical guidance and building strong relationships with clients. They ensure More ❯
optimise detection and response capabilities. This role demands a deep engineering mindset and an appetite for innovation. You'll design and implement automated detection and response pipelines, integrate advanced threatintelligence, and lead the use of behavioural analytics and attack simulation across our environment. Your technical breadth will span modern cloud-native stacks (Azure, GCP), serverless and containerised … range of security tooling including DLP, SIEM, CNAPP, and XDR, and tools such as Wiz, Darktrace, Microsoft Defender, Intune, and Sentinel. You will also bring hands-on experience in threat hunting, log analysis, red/blue team operations, and incident response coordination-building tooling and processes that respond to real-world threats at scale. You will report directly into More ❯
East London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
Further desirables, but not essentials for this role; A CISSP,CISM,CCSP,GIAC certification or any equivalent Knowledge of working in secure environments and accredited labs R&D experience Threatintelligence experience Application testing experience Reference: AMC/DRI/CBAM Postcode: E14 #dari More ❯
Bexley, England, United Kingdom Hybrid / WFH Options
Anson Mccade
Further desirables, but not essentials for this role; A CISSP,CISM,CCSP,GIAC certification or any equivalent Knowledge of working in secure environments and accredited labs R&D experience Threatintelligence experience Application testing experience Reference: AMC/DRI/CBAM Postcode: E14 #dari TPBN1_UKTJ More ❯
may be a good fit if you: 3+ years of software engineering experience, with security experience a plus and/or. 5+ years of detection engineering, incident response, or threat hunting experience. A solid understanding of cloud environments and operations. Experience working with engineering teams in a SaaS environment. Exceptional communication and collaboration skills. An ability to lead projects … involving large-scale Kubernetes environments. A high level of proficiency in Python and query languages such as SQL. Experience analyzing attack behavior and prototyping high-quality detections. Experience with threatintelligence, malware analysis, infrastructure as code, detection engineering, or forensics. Experience contributing to a high growth startup environment. Deadline to apply: None. Applications will be reviewed on a More ❯
Chesterfield, Derbyshire, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
Success in leveraging traditional best practices such as ITIL Experience of identity and access management, and end user device management Experience of delivering against cyber security roadmaps Experience building threatintelligence and horizon scanning tools Strong communication skills This post requires a basic DBS to be passed What you'll get in return This exciting position is paying More ❯
With 1,000 intelligence professionals, over $300M in sales, and serving over 1,900 clients worldwide, Recorded Future is the world’s most advanced, and largest, intelligence company! Recorded Future is looking to hire an In-House Counsel to support the EMEA region focussing on the DACH region and ad hoc general legal matters globally. Reporting to the … Recorded Future employees (or “Futurists”), represent over 40 nationalities and embody our core values of having high standards, practicing inclusion, and acting ethically. Our dedication to empowering clients with intelligence to disrupt adversaries has earned us a 4.8-star user rating from Gartner and more than 45 of the Fortune 100 companies as clients. Want more info? Blog & Podcast … Learn everything you want to know (and maybe some things you’d rather not know) about the world of cyber threatintelligence Linkedin , Instagram &Twitter : What’s happening at Recorded Future The Record : The Record is a cybersecurity news publication that explores the untold stories in this rapidly changing field Timeline : History of Recorded Future Recognition : Check out More ❯
boundaries. Behavioral Analysis: Observe and analyze LLM behavior under attack conditions, understanding how different linguistic manipulations impact their responses and security posture. Required Skills 5+ years of experience in threatintelligence, penetration testing, or incident response LLM Red-Teaming Expertise: Demonstrated professional, project, or personal experience in red-teaming large language models, including a strong understanding of common More ❯
Warrington, Cheshire, North West, United Kingdom Hybrid / WFH Options
Vaultex UK
aligned with Architecture and Operations Perform security assessments including vulnerability scans and application testing Liaise with centres and admin functions Support the ongoing Security Awareness Programme Deliver and communicate threatintelligence assessments Provide second level support on IT Security incidents Create security requirements for projects and implementation of security controls Support the Head of Cyber Operations in providing More ❯
as possible. The company supports a diverse client base across critical sectors and operates a 24/7 SOC model with a strong emphasis on quality triage, incident response, threat hunting, and internal cyber development — not just alert monitoring. You’ll be part of a well-supported, technically capable team with a strong track record in crisis response and … progression and internal knowledge-sharing culture Key Responsibilities Triage and investigate alerts from a range of SIEM and EDR platforms Perform initial escalation, incident classification, and severity assessment Conduct threat hunting and intel correlation using raw log sources Produce clear incident documentation and response reports Participate in internal security operations (log management, monitoring, etc.) Engage in client-focused services … chain risk, and CIS-based gap analysis Contribute to the design and improvement of playbooks, procedures, and crisis simulations Occasionally support advisory work around common threats like ransomware, insider threat, and lateral movement About You 1.5+ years in a SOC or CSIRT role Experience working with raw data and security log analysis Comfortable with threat intel, IOC correlation More ❯
an experienced analyst or an ambitious junior ready to move up, this is your opportunity to work with leading SIEM platforms like Microsoft Sentinel and Splunk in a dynamic, threat-rich environment that never stands still. What You’ll Be Doing Monitoring and triaging alerts across secure environments Investigating complex threats using logs, network traffic, and endpoint telemetry Assisting … Building smarter detection rules aligned with MITRE ATT&CK Producing clear, actionable incident reports for both technical and leadership teams Staying one step ahead of attackers by integrating evolving threat intel What We’re Looking For Proven hands-on experience in a SOC environment Strong working knowledge of SIEM tools, especially Microsoft Sentinel or Splunk Solid understanding of core More ❯
world-class defences as we scale. And if something doesn't go to plan, this role will be accountable alongside the executive team to contain, control and disrupt any threat-and restore normal operations. Responsibilities will include: Championing our security culture-training our team to be the best form of defence. Conducting threat analyses and ongoing risk assessments … with cyber security industry standards and frameworks in practise (e.g. ISO 27001, NIST CSF, SP 800-53, NCSC CAF, Cyber Essentials). Has a thorough understanding of cyber security threat and risk with the ability to think like an attacker and design controls that make a real difference. Has proven ability to enable a business to move fast, working … to define solutions that allow us to achieve objectives, whilst also keeping us safe. Has good research and analytical skills utilising a variety of sources: online research, industry forums, threat intel feeds etc. using these to maintain oversight of current and future threats and opportunities to mitigate them. Has an enthusiastic 'roll up your sleeves' mentality, confidently getting into More ❯
with application and engineering teams on log ingestion tasks. Validate log content ingested into the SIEM. Co-develop and enhance monitoring use cases with the Cyber Defense Center and Threat Intel teams. Represent CSIRT in stakeholder meetings to ensure the right logs are captured. Create dashboards and reports to enhance visibility. Support blue team activities during red team exercises. More ❯
/researching on previously reported IOCs. Participate in collaborative sessions with other CNDSPs and IC agencies on malicious intrusions, attacks or suspicious activities, as well as share emerging Cyber Threat Intel data. Assist in the development of IOCs for active defensive countermeasures and passive detection signatures. Day or Swing shift position available. REQUIRED SKILLS AND ABILITIES: Expertise in reverse More ❯
Warwick, Warwickshire, West Midlands, United Kingdom
La Fosse
Cyber ThreatIntelligence Analyst We are helping a household name that impacts all of our lives to develop new cyber capabilities from the ground up. They're looking for a Cyber ThreatIntelligence analyst to help out with their Threat Intell function and keep them ahead of the curve when it comes to threat … systems in place and you'll have the chance to shape the future of their cybersecurity operations from the very beginning. We're looking for candidates with experience in: Threat management and modelling TTPs Cyber threatintelligence tools and technologies. Staying up to date with new and emerging threats Details: Location: West Midlands – 2x a month on More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
NCC Group
the leading global Cyber Security and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity You will be acting as a team leader within the Strategic ThreatIntelligence team, reporting to the Strategic ThreatIntelligence Manager. As a senior member in this team, you will have some limited line management responsibilities but will … be expected to be heavily involved in the training and mentoring of other Threatintelligence team members, as well as supporting the overall growth of the Strategic ThreatIntelligence team. You will be expected to have strong consultancy skills and experience in delivering large/complex pieces of client facing work where you will need to … be able to manage multiple internal and external stakeholders. Key Accountabilities Support the development and growth of our Strategic ThreatIntelligence capabilities in line with our overall ThreatIntelligence and Corporate Strategy Support and lead the delivery of Regulator-driven ThreatIntelligence Engagements (CBEST, TIBER, CORIE, iCAST, AASE) Deliver services from our ThreatMore ❯
Are you interested in joining a supportive and collaborative team at a firm that values Cybersecurity? If so, read on! A forward-thinking Financial Services firm is seeking a Threat Detection Engineer to join its Cyber Security team. This role is crucial in managing and improving the firm's SIEM solution. You will be responsible for designing and developing … responsibilities include: SIEM Solution Management: Oversee the full lifecycle from deployment to continuous improvement. Use Case Development: Design and implement use cases to support security monitoring and incident response. ThreatIntelligence Integration: Integrate external CTI into the SIEM platform to enhance proactive threat detection. To be considered for this role, you should have a background as a … Threat Detection Engineer, ideally with experience using Splunk and Sentinel, and some experience working in a regulated environment (preferably Financial Services). This is a hybrid opportunity, requiring 3 days in the Edinburgh office, with a salary of up to £90,000. For immediate consideration, please contact me at . Please note that this client cannot sponsor We encourage More ❯
and customer-impacting issues within the day-to-day role to management. How You'll Do It Maintains an in-depth knowledge of security trends, attacker techniques, and relevant threat actors Use data analysis and threat intel to detect, disrupt, and eradicate threat actors. Proactively detects advanced threats and adversaries that evade traditional security controls. Develops hunt More ❯
and customer-impacting issues within the day-to-day role to management. *How You'll Do It * * Maintains an in-depth knowledge of security trends, attacker techniques, and relevant threat actors Use data analysis and threat intel to detect, disrupt, and eradicate threat actors. Proactively detects advanced threats and adversaries that evade traditional security controls. Develops hunt More ❯
Your new company One of the largest Central Government Organisations managing trade, investment and business growth Your new role Cyber ThreatIntelligence/Threat Hunter Specialist - SC Cleared What you'll need to succeed My client is looking for an experienced Cyber ThreatIntelligence and Threat Hunter Specialist with experience across: CTI - Develop CTI … tactical, operational and strategic intelligence framework and processes Threat hunting - Develop and lead structured threat hunting campaigns-based threatintelligence, MITRE ATT&CK, and risk models Pen Testing - Support internal testing of hypotheses and validation of remediation from pen tests You will be experienced and hands-on with a Cyber ThreatIntelligence and … Threat Hunting Specialist, providing support services to the team in setting up processes and requirements around Cyber ThreatIntelligence and Threat Hunting Requirements. You will help design, build and operationalise CTI and proactive detection capabilities and establish and mature the internal CTI function. You will be helping to protect the organisation and wider estate from cyber More ❯
Employment Type: Contract
Rate: £650.0 - £700.0 per day + £650 - £700 per day inside IR35
Your new company One of the largest Central Government Organisations managing trade, investment and business growth Your new role Cyber ThreatIntelligence/Threat Hunter Specialist - SC Cleared What you'll need to succeed My client is looking for an experienced Cyber ThreatIntelligence and Threat Hunter Specialist with experience across: CTI - Develop CTI … tactical, operational and strategic intelligence framework and processes Thread hunting - Develop and lead structured threat hunting campaigns-based threatintelligence, MITRE ATT&CK, and risk models Pen Testing - Support internal testing of hypotheses and validation of remediation from pen tests You will be experienced and hands-on with a Cyber ThreatIntelligence and Threat Hunting Specialist, providing support services to the team in setting up processes and requirements around Cyber ThreatIntelligence and Thread Hunting Requirements. You will help design, build and operationalise CTI and proactive detection capabilities and establish and mature the internal CTI function. You will be helping to protect the organisation and wider estate from cyber threats in More ❯