Threat Intelligence Job Vacancies

226 to 250 of 585 Threat Intelligence Jobs

Lead Security Architect

Manchester, Lancashire, United Kingdom
Hybrid / WFH Options
Manchester Digital
delivery of critical systems that protect citizens and national interests. Working with the Principal Security Architect, you will own security architecture for a major portfolio, translate business goals and threat intelligence into practical controls, and mentor SEO level architects to raise capability across multiple programmes. You will engage senior stakeholders, balance risk against usability and cost, and shape … Security Architect strategy, translating them into reusable templates and guardrails. Lead architecture reviews for high risk projects, providing actionable recommendations and tracking remediation through to closure. Perform and interpret threat modelling/pen test results, converting findings into road mapped improvements and measurable risk reductions. Advise on security controls for hybrid and cloud platforms (AWS, Azure, Kubernetes, serverless), balancing … effective controls. Technical depth: hands on knowledge of cloud security, IAM, container & API security, network segmentation, encryption and DevSecOps toolchains; capable of explaining exploitability of complex vulnerabilities. Pen testing & threat modelling: scoping, overseeing and translating results into enforceable patterns and backlog items. Influential communication: proven ability to engage C suite and delivery squads alike, adapting style to gain agreement More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cyber Operations Analyst

City of London, London, United Kingdom
Hybrid / WFH Options
Iceberg
escalate incidents with sound judgement — this isn’t checkbox security work. Dive deep into data using PCAP, endpoint logs, network telemetry and behavioral analytics. Hunt for threats proactively, leveraging threat intelligence, patterns, and instincts built from experience. Work cross-functionally with other teams to contain, mitigate and learn from security incidents. Act as a mentor to Tier … better tooling and smarter monitoring. What You Bring You’re not new to this. You’ve been in the trenches and know what it takes to stay ahead of threat actors. Ideally, you bring: Hands-on experience with SIEM platforms , especially Splunk. Strong familiarity with MITRE ATT&CK , intrusion detection/prevention systems, and malware behaviour. Confidence in network More ❯
Posted:

Senior Cyber Operations Analyst

London Area, United Kingdom
Hybrid / WFH Options
Iceberg
escalate incidents with sound judgement — this isn’t checkbox security work. Dive deep into data using PCAP, endpoint logs, network telemetry and behavioral analytics. Hunt for threats proactively, leveraging threat intelligence, patterns, and instincts built from experience. Work cross-functionally with other teams to contain, mitigate and learn from security incidents. Act as a mentor to Tier … better tooling and smarter monitoring. What You Bring You’re not new to this. You’ve been in the trenches and know what it takes to stay ahead of threat actors. Ideally, you bring: Hands-on experience with SIEM platforms , especially Splunk. Strong familiarity with MITRE ATT&CK , intrusion detection/prevention systems, and malware behaviour. Confidence in network More ❯
Posted:

Systems Application Analyst with Security Clearance

Newport News, Virginia, United States
Innova Solutions, Inc
Palo Alto Cortex XDR and SOAR platforms. Candidate will be responsible for designing, developing, and maintaining xSOAR playbooks, automating security workflows, and administering the xSOAR environment to enhance our threat detection and response capabilities. Required: Bachelor's degree in computer science, Cybersecurity, or a related field (or equivalent experience). 3+ years of experience in cybersecurity, with a focus … on automation and orchestration. Proven experience with Palo Alto XSOAR administration and playbook development. Hands-on experience with Palo Alto Cortex XDR for threat detection and response. Strong scripting and programming skills in Python, PowerShell, or JavaScript. Familiarity with integrating XSOAR with APIs and third-party security tools (e.g., SIEM, ticketing systems, threat intelligence platforms). Understanding … of cybersecurity concepts, including incident response, threat hunting, and security operations. Excellent problem-solving skills and ability to work in a fast-paced environment. Strong communication skills to collaborate with technical and non-technical stakeholders. Qualified candidates should APPLY NOW for immediate consideration! Please hit APPLY to provide the required information, and we will be back in touch as More ❯
Employment Type: Permanent
Salary: USD 52 Hourly
Posted:

Director of Security Assurance and Remediation

London, England, United Kingdom
Robert Walters UK
Stay updated on security technologies, policies, and regulations, recommending improvements. Review and optimize security policies, standards, and controls in line with regulations and company strategy. Integrate processes with Cyber Threat Intelligence for threat monitoring and response. Align security risk management with organizational risk frameworks and ensure consistent practices across security functions. Leadership Lead by example, demonstrating technical More ❯
Posted:

Cyber Security Practitioner

United Kingdom
BAE Systems
be doing: Responsible for Incident Response planning through the creation and maintenance of incident response playbooks and management of the response Submarines Cyber Security incidents Managing, translating and disseminating threat intelligence Assurance of BAU support provider operational cyber security activities and ensure support provider delivery in line with appropriate cyber security standards and risk tolerance Challenge insecure practices … As part of the Submarines Cyber Security Team, you will have the opportunity to play a key role in supporting incident response through effective planning, maintaining documentation, and translating threat intelligence. You'll also contribute to the day-to-day cyber security operations within the Submarines business unit. In this role, you'll be instrumental in minimizing risk and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Lead Cyber Security Analyst (6 month FTC)

London, England, United Kingdom
Simply Business
Continue with Google Continue with Google Continue with Google Continue with Google Here’s what you’ll be doing: When you join Simply Business, you’ll protect us from threat actors who attempt to evade our cyber defences. This is a hands-on technical position where you’ll play an important role in increasing the maturity of our Security … SOC team oversee and develop on incident response activities and ensure timely communication with internal and external stakeholders facilitate table tops and training for analysts including malware reverse engineering, threat intelligence and network and security log analysis be a Technical leader and mentor for our SOC analysts. Foster a high performing team of trained, knowledgeable cyber security professionals … communicate effectively with diverse stakeholders, including executive management experienced overseeing security tools and technologies (SIEM, IDS/IPS, EDR, vulnerability management) able to work with cloud environments exposure to threat modelling (We know it’s tough, but please try to avoid the confidence gap . You don’t have to match all the bullet points above to be considered More ❯
Posted:

Markets Product Security Engineer

London, England, United Kingdom
ION Group
emerging threats associated with the product line you are managing and any dependencies; Act as the interface between CSIRT and Product teams as part of security incident activities; Deliver threat modelling and hunting to identify vulnerabilities in product design and provide control recommendations to mitigate those risks; Engage in architecture and design reviews to ensure product alignment with Security … and regulatory standards that may impact product implementations; Support the engineering of control solutions where existing offerings are not available; Provide security expertise during incident and problem management. Produce threat intelligence briefings and other work products to share information across the organisation Respond to ad-hoc requests for platform security related guidance This role may require some overnight More ❯
Posted:

Cyber & Information Security Manager

London, England, United Kingdom
Hybrid / WFH Options
PAYTER
Experience with security risk quantification methodologies • Understanding of data privacy regulations beyond PCI (e.g., GDPR, CCPA) Incident Response & Forensics • Experience with digital forensics and incident response frameworks • Knowledge of threat hunting techniques and tools • Experience with security automation and orchestration platforms • Understanding of threat intelligence platforms and implementation Soft Skills: Ability to influence security decisions across teams … resistance to security controls and requirements Experience implementing cultural shifts toward greater security awareness Ability to remain calm and effective during security incidents and crises Adaptability to rapidly evolving threat landscapes and security technologies Resilience when facing pushback on necessary security controls Capacity to learn and implement new security approaches as the field evolves Got excited? After reading this More ❯
Posted:

Cyber & Information Security Manager

Maidstone, England, United Kingdom
Hybrid / WFH Options
Payter B.V
Experience with security risk quantification methodologies ● Understanding of data privacy regulations beyond PCI (e.g., GDPR, CCPA) Incident Response & Forensics ● Experience with digital forensics and incident response frameworks ● Knowledge of threat hunting techniques and tools ● Experience with security automation and orchestration platforms ● Understanding of threat intelligence platforms and implementation Soft Skills: Ability to influence security decisions across teams … resistance to security controls and requirements Experience implementing cultural shifts toward greater security awareness Ability to remain calm and effective during security incidents and crises Adaptability to rapidly evolving threat landscapes and security technologies Resilience when facing pushback on necessary security controls Capacity to learn and implement new security approaches as the field evolves Got excited? After reading this More ❯
Posted:

Service Design Analyst

London, England, United Kingdom
NCC Group
descriptions, process flows, service blueprints, and operational procedures. Define and maintain client-specific SLAs, OLAs, KPIs, and service catalog entries across the managed services portfolio (e.g., SIEM, SOC operations, Threat Intelligence). Create and update onboarding materials, escalation paths, playbooks, and operational runbooks specific to the client environment. Service Transition Support Work closely with the Service Delivery Manager … client (rather than multi-tenant environments). Ability to produce detailed service documentation, process diagrams, and clear operational instructions. Understanding of cybersecurity managed services such as SIEM, SOC operations, Threat Monitoring, and Incident Response. Strong organisational skills and attention to detail. Excellent communication skills, able to work effectively across technical, operational, and client-facing teams. Desirable ITIL v4 Foundation More ❯
Posted:

Head of Cyber Security

London, England, United Kingdom
KDR Talent Solutions
and deliver the cyber security strategy aligned with business and regulatory needs Lead risk management, governance, and compliance (PCI DSS v4, ISO 27001, SWIFT CSCF preferred) Oversee incident response, threat intelligence, and business continuity planning Drive infrastructure, cloud, and endpoint security across AWS, Azure, GCP Manage vulnerability testing, red teaming, SOC and EDR functions Foster a strong security More ❯
Posted:

Security Operations Analyst

Leeds, England, United Kingdom
Hybrid / WFH Options
Medical Protection Society
logs, investigating breaches, and supporting the development and implementation of security policies and best practices. The analyst plays a crucial role in safeguarding MPS data and assets by reviewing threat intelligence and recommending risk mitigation strategies. Additionally, the role involves promoting security awareness, supporting security projects, and enhancing security services. Role Responsibilities Monitor, detect, and respond to cyber More ❯
Posted:

Cyber Security Consultant (DV Security Clearance)

Basingstoke, England, United Kingdom
CGI
operations, managing complex security challenges with a business–focused approach – protecting what is most valuable to our clients. You'll be assessing risk across business, technology and operations, considering threat intelligence and helping to build the full security view that underpins systems resilience and client confidence. Required qualifications to be successful in this role Exceptional planning and communication More ❯
Posted:

Security Operations Analyst

Leeds, West Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
The Medical Protection Society
and supporting the creation and implementation of security policies and best practices. The Analyst plays a key part in protecting MPS data and assets from potential threats by reviewing threat intelligence and recommending ways to prevent or minimize risks. In addition to day-to-day tasks, the role also involves supporting and promoting security best practices, as well More ❯
Employment Type: Permanent, Work From Home
Salary: £40,000
Posted:

Cyber Defence Services - Manager

England, United Kingdom
Hybrid / WFH Options
KPMG UK
security field. Amazing Extras Knowledge of NCSC CTAS and CPA Assurance Schemes Knowledge of working in secure environments (List X facilities) and accredited labs (ISO17025) Research and Development experience Threat Intelligence experience Qualifications and Skills Qualifications are a good way to demonstrate knowledge but are not the be all and end all, our team is made up of More ❯
Posted:

Security Operations Analyst

Leeds, West Yorkshire, United Kingdom
Hybrid / WFH Options
Medical Protection Society
and supporting the creation and implementation of security policies and best practices. The Analyst plays a key part in protecting MPS data and assets from potential threats by reviewing threat intelligence and recommending ways to prevent or minimize risks. In addition to day-to-day tasks, the role also involves supporting and promoting security best practices, as well More ❯
Employment Type: Permanent
Salary: £30000 - £40000/annum
Posted:

Cyber Security Manager

Newport, Wales, United Kingdom
Yolk Recruitment Ltd
processes, methodologies, architecture, technologies and tools, system configuration or other activities to mitigate security risks to Client. Skills & Experience Required Intrusion Detection and Prevention Service (IDPS). Advanced Persistent Threat protection (APT). E-mail sandbox technology. Management of the Public Key Infrastructure (PKI) infrastructure. Vulnerability Scanning and remediation. Real-time metrics portal, as well as monthly and ad … hoc reporting. Threat Intelligence. Forensic capability. #J-18808-Ljbffr More ❯
Posted:

Senior Threat Intelligence Analyst - Outside IR35

London Area, United Kingdom
Hybrid / WFH Options
RiverSafe
Skills Expertise in threat intelligence, cybersecurity operations, or related functions. Proficiency with threat intelligence platforms (e.g. MISP, ThreatConnect, Recorded Future, Anomali). Solid understanding of common malware, threat actor groups, APT campaigns and geopolitical threats. Familiarity with STIX/TAXII, YARA, Sigma, and IOC/TTP formats. Deep knowledge of the MITRE ATT&CK framework … and cyber kill chain methodology. The Role Monitor the threat landscape to identify emerging cyber threats, vulnerabilities and adversary tactics, techniques and procedures (TTPs). Support threat hunting, incident response and vulnerability management with relevant threat context and attribution. Perform adversary tracking and contribute to the development of threat models using frameworks such as MITRE ATT … CK, Diamond Model, and Kill Chain. Collaborate with SOC, IR, Red Team and Vulnerability Management teams to contextualise and operationalise threat intelligence. **This role is predominantly remote but requires flexibility to come into the London office as and when required More ❯
Posted:

Senior Threat Intelligence Analyst - Outside IR35

City of London, London, United Kingdom
Hybrid / WFH Options
RiverSafe
Skills Expertise in threat intelligence, cybersecurity operations, or related functions. Proficiency with threat intelligence platforms (e.g. MISP, ThreatConnect, Recorded Future, Anomali). Solid understanding of common malware, threat actor groups, APT campaigns and geopolitical threats. Familiarity with STIX/TAXII, YARA, Sigma, and IOC/TTP formats. Deep knowledge of the MITRE ATT&CK framework … and cyber kill chain methodology. The Role Monitor the threat landscape to identify emerging cyber threats, vulnerabilities and adversary tactics, techniques and procedures (TTPs). Support threat hunting, incident response and vulnerability management with relevant threat context and attribution. Perform adversary tracking and contribute to the development of threat models using frameworks such as MITRE ATT … CK, Diamond Model, and Kill Chain. Collaborate with SOC, IR, Red Team and Vulnerability Management teams to contextualise and operationalise threat intelligence. **This role is predominantly remote but requires flexibility to come into the London office as and when required More ❯
Posted:

Cyber Threat Intelligence Analyst with Security Clearance

Fort Belvoir, Virginia, United States
Mission Services LLC (MSI)
Title: Cyber Threat Intelligence Analyst Client: U.S. Army Location: Fort Belvoir, VA 22060 • Provides cyber risk and threat identification by proactively and continuously monitoring the internal and external landscape for relevant events, risks and threats related to malicious code, vulnerabilities and attacks. • Performs monitoring and analysis of threat intelligence monitoring tool services, product contracts and … mitigation TTPs for identified malicious logic within the customer's environment. • Maintains current knowledge of tools and best practices in advanced persistent threats. • Regularly develops and produces succinct written intelligence reports 706 constructed from technical analysis and collected threat information for ECMA internal consumers. • Contributes cyber security perspective to discussions and decisions regarding MITRE Telecommunication&CK for Cloud. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Threat Intelligence Analyst - Outside IR35

London, England, United Kingdom
Hybrid / WFH Options
RiverSafe
Get AI-powered advice on this job and more exclusive features. Skills Expertise in threat intelligence, cybersecurity operations, or related functions. Proficiency with threat intelligence platforms (e.g. MISP, ThreatConnect, Recorded Future, Anomali). Solid understanding of common malware, threat actor groups, APT campaigns and geopolitical threats. Familiarity with STIX/TAXII, YARA, Sigma, and IOC …/TTP formats. Deep knowledge of the MITRE ATT&CK framework and cyber kill chain methodology. The Role Monitor the threat landscape to identify emerging cyber threats, vulnerabilities and adversary tactics, techniques and procedures (TTPs). Support threat hunting, incident response and vulnerability management with relevant threat context and attribution. Perform adversary tracking and contribute to the … development of threat models using frameworks such as MITRE ATT&CK, Diamond Model, and Kill Chain. Collaborate with SOC, IR, Red Team and Vulnerability Management teams to contextualise and operationalise threat intelligence. **This role is predominantly remote but requires flexibility to come into the London office as and when required** Seniority level Seniority level Mid-Senior level Employment More ❯
Posted:

Cyber Threat Intelligence Analyst with Security Clearance

Huntsville, Alabama, United States
Hybrid / WFH Options
Gridiron IT Solutions
Cyber Threat Intelligence Analyst Location: Huntsville, AL Work Type: Onsite Remote Work: No Job Description Work as a member of a threat intelligence team responsible for understanding how emerging cyber threats impact the client organization while conducting highly detail-oriented security threat analysis and working with clients to validate and characterize threats. Support incident detection … provide input on new detection strategies and remediation guidance. Form accurate and precise analysis and escalate it to appropriate teammates or internal teams for additional assistance or review. Provide intelligence context to support the fine-tuning of signatures. Qualifications 8+ years of experience with cybersecurity 4+ years of experience with conducting threat research focused on nation-state, criminal … as social networking sites, blogs and microblogs, and internet mapping tools Experience with computer network protocols and operations Knowledge of Cyber intrusion vectors, malware, networking, and monitoring Knowledge of threat intelligence tradecraft, including structured analytic, contrarian, and imaginative analytic techniques Ability to write concise analytical products and assessments Top Secret clearance Bachelor's degree Additional Qualifications Experience with More ❯
Employment Type: Permanent
Salary: USD 140,000 Annual
Posted:

Senior Threat Intelligence Analyst

United Kingdom
Hybrid / WFH Options
Sportserve
We offer office-based, hybrid, and remote work on permanent and consultancy contracts globally, making us a true global employer of choice. We are looking to hire a Senior Threat Intelligence Analyst to join our global Technology team. This role offers a challenging, fast-paced, and exciting environment with ample opportunities to influence and grow within the technology … area. The Senior Threat Intelligence Analyst plays a critical role in detecting and responding to cyber threats, refining alerting systems, and leading security investigations. The ideal candidate will have deep expertise in network and infrastructure security, embrace a DevSecOps mindset, and excel in collaborative, agile environments. This role involves working closely with the 3rd Line Security Engineering team … to enhance threat response and protection, serving as the first line of support in responding to security incidents. The key values we uphold in Technology are: Ownership, Continuous Improvement, Trust, and Honesty. What you'll be getting up to: Lead threat intelligence operations, collecting, analyzing, and contextualizing data from internal and external sources to identify emerging threats More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Threat Intelligence Analyst

Bristol, Avon, South West, United Kingdom
Hybrid / WFH Options
Hargreaves Lansdown
experience we're looking for, please go ahead and apply. We'd love to hear from you! About the role We have a fantastic new role for a Cyber Threat Intelligence Analyst to join part of our Cyber Defence team. You will be reporting into the Cyber Threat Intelligence Lead, and you will be responsible for … gathering threat intelligence via cutting-edge security technologies and other sources. You will also identify, interrupt, and suppress threat actors that target the Hargreaves Lansdown enterprise environment. What you'll be doing Proactively identifying advanced threats that evade automated security solutions, to allow mitigations or enhanced monitoring to be implemented. Proactively hunting and performing analysis against available … datasets. Develop datasets utilising cyber services available, also identifying gaps in data from the portfolio of deployed security tools. Leverage internal and external resources to research threats, vulnerabilities, and intelligence on various attackers and attack infrastructure. Use existing security platforms to identify threats, determine root cause, scope, and severity of each and compile/report findings into a finished More ❯
Employment Type: Permanent, Part Time, Work From Home
Salary: £55,000
Posted:
Threat Intelligence
10th Percentile
£45,000
25th Percentile
£49,188
Median
£67,500
75th Percentile
£82,500
90th Percentile
£111,500