materials production, collateral effects estimate, and joint planning group support Assist in the coordination of joint strategic and operational planning and execution of joint fires, targeting, capability pairing, and threat mitigation in support of the Cyber Mission Force and partner operations Provide advice to leadership on all principles of the Joint Targeting Cycle to include: Focused, Effects-Based, Interdisciplinary … and Fires in exercises Participates as Senior Fires support in exercises Develops joint targeting policies and procedures Certified Ethical Hacker (CEH) CompTIA Security+ GIAC Security Essentials (GSEC) GIAC Cyber ThreatIntelligence (GCTI) GIAC Open-Source Intelligence (GOSI) GIAC Certified Intrusion Analyst (GCIA) GIAC Defending Advanced Threats (GDAT) Certified Information Systems Security Professional (CISSP More ❯
Abingdon, Oxfordshire, United Kingdom Hybrid / WFH Options
Sophos Group
leading endpoint, network, email, and cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs … worldwide, defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threatintelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at . Role … accurate revenue forecasts and budgets for the renewal sales team, aligning with company objectives and the delivery of accurate and timely forecasts by the team for escalation reporting. Market Intelligence: Stay updated on industry trends, competitors, and customer needs to offer localize insights to global MI, including specific focus on trends regarding renewal best practices. Process Improvement: Continuously evaluate More ❯
status About You 3-5 years of experience in cyber security roles, with hands-on involvement in implementing frameworks like NIST, eCAF, or ISO27001 Experience in SIEM, Vulnerability Management, ThreatIntelligence, and IAM tools Background in supporting enterprise-level security initiatives aligned with regulatory or certification standards If you're interested in hearing more about the role please More ❯
status About You 3-5 years of experience in cyber security roles, with hands-on involvement in implementing frameworks like NIST, eCAF, or ISO27001 Experience in SIEM, Vulnerability Management, ThreatIntelligence, and IAM tools Background in supporting enterprise-level security initiatives aligned with regulatory or certification standards If you're interested in hearing more about the role please More ❯
Fenix24 is an industry-leading cyber disaster recovery and restoration company. Battling threat actors as The World's First Civilian Cybersecurity Force , Fenix24 delivers cybersecurity services through its four battalions: Fenix24 for ransomware recovery and restoration; Athena7 for IT security assessments, strategy and planning; Grypho5 for ongoing security-based management; and Argos99 for expert insights into data, assets and … its Securitas Summa program, Fenix24 ensures organizations are prepared to effectively resist and rapidly recover from a cyberattack, offering a combination of managed data and infrastructure protection, real-time threatintelligence, and ongoing hardening and breach resistance. About This Position The Technical Account Manager is responsible for providing technical guidance and building strong relationships with clients. They ensure More ❯
optimise detection and response capabilities. This role demands a deep engineering mindset and an appetite for innovation. You'll design and implement automated detection and response pipelines, integrate advanced threatintelligence, and lead the use of behavioural analytics and attack simulation across our environment. Your technical breadth will span modern cloud-native stacks (Azure, GCP), serverless and containerised … range of security tooling including DLP, SIEM, CNAPP, and XDR, and tools such as Wiz, Darktrace, Microsoft Defender, Intune, and Sentinel. You will also bring hands-on experience in threat hunting, log analysis, red/blue team operations, and incident response coordination-building tooling and processes that respond to real-world threats at scale. You will report directly into More ❯
East London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
Further desirables, but not essentials for this role; A CISSP,CISM,CCSP,GIAC certification or any equivalent Knowledge of working in secure environments and accredited labs R&D experience Threatintelligence experience Application testing experience Reference: AMC/DRI/CBAM Postcode: E14 #dari More ❯
may be a good fit if you: 3+ years of software engineering experience, with security experience a plus and/or. 5+ years of detection engineering, incident response, or threat hunting experience. A solid understanding of cloud environments and operations. Experience working with engineering teams in a SaaS environment. Exceptional communication and collaboration skills. An ability to lead projects … involving large-scale Kubernetes environments. A high level of proficiency in Python and query languages such as SQL. Experience analyzing attack behavior and prototyping high-quality detections. Experience with threatintelligence, malware analysis, infrastructure as code, detection engineering, or forensics. Experience contributing to a high growth startup environment. Deadline to apply: None. Applications will be reviewed on a More ❯
Chesterfield, Derbyshire, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
Success in leveraging traditional best practices such as ITIL Experience of identity and access management, and end user device management Experience of delivering against cyber security roadmaps Experience building threatintelligence and horizon scanning tools Strong communication skills This post requires a basic DBS to be passed What you'll get in return This exciting position is paying More ❯
Luton, England, United Kingdom Hybrid / WFH Options
LHH
guidance please visit : https://www.gov.uk/government/publications/united-kingdom-security-vetting-clearance-levels. Desirable DV Clearance. Knowledge of Quantum Cryptography & Quantum Key management. Current threatintelligence awareness. Knowledge of NATO security policy, risk management and Accreditation. Understanding of the role of advisory boards within the UK Government or NATO for security. More ❯
boundaries. Behavioral Analysis: Observe and analyze LLM behavior under attack conditions, understanding how different linguistic manipulations impact their responses and security posture. Required Skills 5+ years of experience in threatintelligence, penetration testing, or incident response LLM Red-Teaming Expertise: Demonstrated professional, project, or personal experience in red-teaming large language models, including a strong understanding of common More ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
AirSearch
EDR (Endpoint Detection and Response) SIEM (Security Information and Event Management) Penetration Testing & Vulnerability Management Governance, Risk & Compliance (GRC) support Phishing Simulation & Security Awareness Training Data Loss Prevention (DLP) ThreatIntelligence and Continuous Monitoring As demand for scalable cybersecurity grows, the business is now investing in its internal sales function and is seeking a Sales Development Manager to More ❯
that systems and processes are optimized for growth and efficiency Develop and execute our information security strategy, governance framework and reporting structure Manage security operations and lead incident response, threatintelligence, and vulnerability management efforts Define and maintain information security policies, standards, and processes, ensuring alignment with data privacy and other related policies; own and maintain the incident More ❯
Warrington, Cheshire, North West, United Kingdom Hybrid / WFH Options
Vaultex UK
aligned with Architecture and Operations Perform security assessments including vulnerability scans and application testing Liaise with centres and admin functions Support the ongoing Security Awareness Programme Deliver and communicate threatintelligence assessments Provide second level support on IT Security incidents Create security requirements for projects and implementation of security controls Support the Head of Cyber Operations in providing More ❯
as possible. The company supports a diverse client base across critical sectors and operates a 24/7 SOC model with a strong emphasis on quality triage, incident response, threat hunting, and internal cyber development — not just alert monitoring. You’ll be part of a well-supported, technically capable team with a strong track record in crisis response and … progression and internal knowledge-sharing culture Key Responsibilities Triage and investigate alerts from a range of SIEM and EDR platforms Perform initial escalation, incident classification, and severity assessment Conduct threat hunting and intel correlation using raw log sources Produce clear incident documentation and response reports Participate in internal security operations (log management, monitoring, etc.) Engage in client-focused services … chain risk, and CIS-based gap analysis Contribute to the design and improvement of playbooks, procedures, and crisis simulations Occasionally support advisory work around common threats like ransomware, insider threat, and lateral movement About You 1.5+ years in a SOC or CSIRT role Experience working with raw data and security log analysis Comfortable with threat intel, IOC correlation More ❯
as possible. The company supports a diverse client base across critical sectors and operates a 24/7 SOC model with a strong emphasis on quality triage, incident response, threat hunting, and internal cyber development — not just alert monitoring. You’ll be part of a well-supported, technically capable team with a strong track record in crisis response and … progression and internal knowledge-sharing culture Key Responsibilities Triage and investigate alerts from a range of SIEM and EDR platforms Perform initial escalation, incident classification, and severity assessment Conduct threat hunting and intel correlation using raw log sources Produce clear incident documentation and response reports Participate in internal security operations (log management, monitoring, etc.) Engage in client-focused services … chain risk, and CIS-based gap analysis Contribute to the design and improvement of playbooks, procedures, and crisis simulations Occasionally support advisory work around common threats like ransomware, insider threat, and lateral movement About You 1.5+ years in a SOC or CSIRT role Experience working with raw data and security log analysis Comfortable with threat intel, IOC correlation More ❯
an experienced analyst or an ambitious junior ready to move up, this is your opportunity to work with leading SIEM platforms like Microsoft Sentinel and Splunk in a dynamic, threat-rich environment that never stands still. What You’ll Be Doing Monitoring and triaging alerts across secure environments Investigating complex threats using logs, network traffic, and endpoint telemetry Assisting … Building smarter detection rules aligned with MITRE ATT&CK Producing clear, actionable incident reports for both technical and leadership teams Staying one step ahead of attackers by integrating evolving threat intel What We’re Looking For Proven hands-on experience in a SOC environment Strong working knowledge of SIEM tools, especially Microsoft Sentinel or Splunk Solid understanding of core More ❯
world-class defences as we scale. And if something doesn't go to plan, this role will be accountable alongside the executive team to contain, control and disrupt any threat-and restore normal operations. Responsibilities will include: Championing our security culture-training our team to be the best form of defence. Conducting threat analyses and ongoing risk assessments … with cyber security industry standards and frameworks in practise (e.g. ISO 27001, NIST CSF, SP 800-53, NCSC CAF, Cyber Essentials). Has a thorough understanding of cyber security threat and risk with the ability to think like an attacker and design controls that make a real difference. Has proven ability to enable a business to move fast, working … to define solutions that allow us to achieve objectives, whilst also keeping us safe. Has good research and analytical skills utilising a variety of sources: online research, industry forums, threat intel feeds etc. using these to maintain oversight of current and future threats and opportunities to mitigate them. Has an enthusiastic 'roll up your sleeves' mentality, confidently getting into More ❯
with application and engineering teams on log ingestion tasks. Validate log content ingested into the SIEM. Co-develop and enhance monitoring use cases with the Cyber Defense Center and Threat Intel teams. Represent CSIRT in stakeholder meetings to ensure the right logs are captured. Create dashboards and reports to enhance visibility. Support blue team activities during red team exercises. More ❯
/researching on previously reported IOCs. Participate in collaborative sessions with other CNDSPs and IC agencies on malicious intrusions, attacks or suspicious activities, as well as share emerging Cyber Threat Intel data. Assist in the development of IOCs for active defensive countermeasures and passive detection signatures. Day or Swing shift position available. REQUIRED SKILLS AND ABILITIES: Expertise in reverse More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
NCC Group
the leading global Cyber Security and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity You will be acting as a team leader within the Strategic ThreatIntelligence team, reporting to the Strategic ThreatIntelligence Manager. As a senior member in this team, you will have some limited line management responsibilities but will … be expected to be heavily involved in the training and mentoring of other Threatintelligence team members, as well as supporting the overall growth of the Strategic ThreatIntelligence team. You will be expected to have strong consultancy skills and experience in delivering large/complex pieces of client facing work where you will need to … be able to manage multiple internal and external stakeholders. Key Accountabilities Support the development and growth of our Strategic ThreatIntelligence capabilities in line with our overall ThreatIntelligence and Corporate Strategy Support and lead the delivery of Regulator-driven ThreatIntelligence Engagements (CBEST, TIBER, CORIE, iCAST, AASE) Deliver services from our ThreatMore ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Maxwell Bond
Threat Analyst/SOC/Microsoft Sentinel/KQL/SIEM Threat Analyst/SOC/Microsoft Sentinel/KQL/SIEM Threat Analyst – Manchester/Hybrid - £30K Maxwell Bond have engaged with an MSSP in the Manchester area that’re looking for a Threat Analyst to join their team. We’re looking for somebody that … rules, creating workbooks and queries to enhance visibility and reduce false positives Working with clients across different sectors, helping them understand threats and improve their security posture Collaborating with ThreatIntelligence and Engineering teams to strengthen detection and response capabilities What we’re looking for: Solid experience working with Microsoft Sentinel in a live SOC environment Strong knowledge … on ability with KQL (Kusto Query Language) Understanding of attack techniques (MITRE ATT&CK, etc.) and incident response workflows Comfortable working across different client environments and adapting to varied threat landscapes Previous experience in an MSSP or managed services environment is an advantage Job details: Salary up to £30,000 Hybrid working – once a week in the office Clear More ❯
of us is able to contribute fully. Our unique backgrounds and perspectives strengthen our ability to achieve Amazon's mission of being Earth's most customer-centric company. Our ThreatIntelligence (TI) team is looking for an experienced Intelligence Specialist with demonstrated subject matter expertise in fraud threatintelligence either in the private or public … sector. Ideal candidates have served in a capacity within law enforcement and the intelligence community performing a wide variety of support functions to include detecting, identifying, assessing, exploiting, countering and/or neutralizing the intelligence collection or adversarial efforts of fraud actors. This position will be based in Singapore to support the SPS TI team's APAC outfit. … will be on a team responsible for identifying and analyzing fraud activity, discovering tactics, techniques, and procedures employed by the fraud actors along with new fraud trents, and providing intelligence support to investigations. You will ideally also identify areas for process improvement and work with other cross-functional teams to automate and streamline new and existing workflows. This position More ❯
Are you interested in joining a supportive and collaborative team at a firm that values Cybersecurity? If so, read on! A forward-thinking Financial Services firm is seeking a Threat Detection Engineer to join its Cyber Security team. This role is crucial in managing and improving the firm's SIEM solution. You will be responsible for designing and developing … responsibilities include: SIEM Solution Management: Oversee the full lifecycle from deployment to continuous improvement. Use Case Development: Design and implement use cases to support security monitoring and incident response. ThreatIntelligence Integration: Integrate external CTI into the SIEM platform to enhance proactive threat detection. To be considered for this role, you should have a background as a … Threat Detection Engineer, ideally with experience using Splunk and Sentinel, and some experience working in a regulated environment (preferably Financial Services). This is a hybrid opportunity, requiring 3 days in the Edinburgh office, with a salary of up to £90,000. For immediate consideration, please contact me at . Please note that this client cannot sponsor We encourage More ❯
Who Is Nisos? Nisos is the human risk management company specializing in unmasking threats before they escalate. We are a trusted advisor who operates as an extension of security, intelligence, legal, and human resource teams to protect their people and business. Our intelligence-led solutions help enterprises make critical decisions, manage human risk, and drive real world consequences … for digital threats. For more information, visit: . What Is The Opportunity? As a Protective Intelligence Specialist at Nisos, you'll join a dynamic team focused on protecting client information in the digital landscape. This role offers the opportunity to leverage your OSINT collection skills and analytical mindset while monitoring and mitigating online threats through Nisos' proprietary Ascend platform. … domains, while directly contributing to client security by identifying and removing PII exposures. Working in Nisos' Belfast office, you'll collaborate with international team members in a fast-paced intelligence environment that values both meticulous attention to detail and creative problem-solving. This position provides a clear path for growth in the threatintelligence field, allowing you More ❯