Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Manchester Digital
delivery of critical systems that protect citizens and national interests. Working with the Principal Security Architect, you will own security architecture for a major portfolio, translate business goals and threatintelligence into practical controls, and mentor SEO level architects to raise capability across multiple programmes. You will engage senior stakeholders, balance risk against usability and cost, and shape … Security Architect strategy, translating them into reusable templates and guardrails. Lead architecture reviews for high risk projects, providing actionable recommendations and tracking remediation through to closure. Perform and interpret threat modelling/pen test results, converting findings into road mapped improvements and measurable risk reductions. Advise on security controls for hybrid and cloud platforms (AWS, Azure, Kubernetes, serverless), balancing … effective controls. Technical depth: hands on knowledge of cloud security, IAM, container & API security, network segmentation, encryption and DevSecOps toolchains; capable of explaining exploitability of complex vulnerabilities. Pen testing & threat modelling: scoping, overseeing and translating results into enforceable patterns and backlog items. Influential communication: proven ability to engage C suite and delivery squads alike, adapting style to gain agreement More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Iceberg
escalate incidents with sound judgement — this isn’t checkbox security work. Dive deep into data using PCAP, endpoint logs, network telemetry and behavioral analytics. Hunt for threats proactively, leveraging threatintelligence, patterns, and instincts built from experience. Work cross-functionally with other teams to contain, mitigate and learn from security incidents. Act as a mentor to Tier … better tooling and smarter monitoring. What You Bring You’re not new to this. You’ve been in the trenches and know what it takes to stay ahead of threat actors. Ideally, you bring: Hands-on experience with SIEM platforms , especially Splunk. Strong familiarity with MITRE ATT&CK , intrusion detection/prevention systems, and malware behaviour. Confidence in network More ❯
escalate incidents with sound judgement — this isn’t checkbox security work. Dive deep into data using PCAP, endpoint logs, network telemetry and behavioral analytics. Hunt for threats proactively, leveraging threatintelligence, patterns, and instincts built from experience. Work cross-functionally with other teams to contain, mitigate and learn from security incidents. Act as a mentor to Tier … better tooling and smarter monitoring. What You Bring You’re not new to this. You’ve been in the trenches and know what it takes to stay ahead of threat actors. Ideally, you bring: Hands-on experience with SIEM platforms , especially Splunk. Strong familiarity with MITRE ATT&CK , intrusion detection/prevention systems, and malware behaviour. Confidence in network More ❯
Palo Alto Cortex XDR and SOAR platforms. Candidate will be responsible for designing, developing, and maintaining xSOAR playbooks, automating security workflows, and administering the xSOAR environment to enhance our threat detection and response capabilities. Required: Bachelor's degree in computer science, Cybersecurity, or a related field (or equivalent experience). 3+ years of experience in cybersecurity, with a focus … on automation and orchestration. Proven experience with Palo Alto XSOAR administration and playbook development. Hands-on experience with Palo Alto Cortex XDR for threat detection and response. Strong scripting and programming skills in Python, PowerShell, or JavaScript. Familiarity with integrating XSOAR with APIs and third-party security tools (e.g., SIEM, ticketing systems, threatintelligence platforms). Understanding … of cybersecurity concepts, including incident response, threat hunting, and security operations. Excellent problem-solving skills and ability to work in a fast-paced environment. Strong communication skills to collaborate with technical and non-technical stakeholders. Qualified candidates should APPLY NOW for immediate consideration! Please hit APPLY to provide the required information, and we will be back in touch as More ❯
Stay updated on security technologies, policies, and regulations, recommending improvements. Review and optimize security policies, standards, and controls in line with regulations and company strategy. Integrate processes with Cyber ThreatIntelligence for threat monitoring and response. Align security risk management with organizational risk frameworks and ensure consistent practices across security functions. Leadership Lead by example, demonstrating technical More ❯
be doing: Responsible for Incident Response planning through the creation and maintenance of incident response playbooks and management of the response Submarines Cyber Security incidents Managing, translating and disseminating threatintelligence Assurance of BAU support provider operational cyber security activities and ensure support provider delivery in line with appropriate cyber security standards and risk tolerance Challenge insecure practices … As part of the Submarines Cyber Security Team, you will have the opportunity to play a key role in supporting incident response through effective planning, maintaining documentation, and translating threat intelligence. You'll also contribute to the day-to-day cyber security operations within the Submarines business unit. In this role, you'll be instrumental in minimizing risk and More ❯
Continue with Google Continue with Google Continue with Google Continue with Google Here’s what you’ll be doing: When you join Simply Business, you’ll protect us from threat actors who attempt to evade our cyber defences. This is a hands-on technical position where you’ll play an important role in increasing the maturity of our Security … SOC team oversee and develop on incident response activities and ensure timely communication with internal and external stakeholders facilitate table tops and training for analysts including malware reverse engineering, threatintelligence and network and security log analysis be a Technical leader and mentor for our SOC analysts. Foster a high performing team of trained, knowledgeable cyber security professionals … communicate effectively with diverse stakeholders, including executive management experienced overseeing security tools and technologies (SIEM, IDS/IPS, EDR, vulnerability management) able to work with cloud environments exposure to threat modelling (We know it’s tough, but please try to avoid the confidence gap . You don’t have to match all the bullet points above to be considered More ❯
emerging threats associated with the product line you are managing and any dependencies; Act as the interface between CSIRT and Product teams as part of security incident activities; Deliver threat modelling and hunting to identify vulnerabilities in product design and provide control recommendations to mitigate those risks; Engage in architecture and design reviews to ensure product alignment with Security … and regulatory standards that may impact product implementations; Support the engineering of control solutions where existing offerings are not available; Provide security expertise during incident and problem management. Produce threatintelligence briefings and other work products to share information across the organisation Respond to ad-hoc requests for platform security related guidance This role may require some overnight More ❯
London, England, United Kingdom Hybrid / WFH Options
PAYTER
Experience with security risk quantification methodologies • Understanding of data privacy regulations beyond PCI (e.g., GDPR, CCPA) Incident Response & Forensics • Experience with digital forensics and incident response frameworks • Knowledge of threat hunting techniques and tools • Experience with security automation and orchestration platforms • Understanding of threatintelligence platforms and implementation Soft Skills: Ability to influence security decisions across teams … resistance to security controls and requirements Experience implementing cultural shifts toward greater security awareness Ability to remain calm and effective during security incidents and crises Adaptability to rapidly evolving threat landscapes and security technologies Resilience when facing pushback on necessary security controls Capacity to learn and implement new security approaches as the field evolves Got excited? After reading this More ❯
Maidstone, England, United Kingdom Hybrid / WFH Options
Payter B.V
Experience with security risk quantification methodologies ● Understanding of data privacy regulations beyond PCI (e.g., GDPR, CCPA) Incident Response & Forensics ● Experience with digital forensics and incident response frameworks ● Knowledge of threat hunting techniques and tools ● Experience with security automation and orchestration platforms ● Understanding of threatintelligence platforms and implementation Soft Skills: Ability to influence security decisions across teams … resistance to security controls and requirements Experience implementing cultural shifts toward greater security awareness Ability to remain calm and effective during security incidents and crises Adaptability to rapidly evolving threat landscapes and security technologies Resilience when facing pushback on necessary security controls Capacity to learn and implement new security approaches as the field evolves Got excited? After reading this More ❯
descriptions, process flows, service blueprints, and operational procedures. Define and maintain client-specific SLAs, OLAs, KPIs, and service catalog entries across the managed services portfolio (e.g., SIEM, SOC operations, ThreatIntelligence). Create and update onboarding materials, escalation paths, playbooks, and operational runbooks specific to the client environment. Service Transition Support Work closely with the Service Delivery Manager … client (rather than multi-tenant environments). Ability to produce detailed service documentation, process diagrams, and clear operational instructions. Understanding of cybersecurity managed services such as SIEM, SOC operations, Threat Monitoring, and Incident Response. Strong organisational skills and attention to detail. Excellent communication skills, able to work effectively across technical, operational, and client-facing teams. Desirable ITIL v4 Foundation More ❯
and deliver the cyber security strategy aligned with business and regulatory needs Lead risk management, governance, and compliance (PCI DSS v4, ISO 27001, SWIFT CSCF preferred) Oversee incident response, threatintelligence, and business continuity planning Drive infrastructure, cloud, and endpoint security across AWS, Azure, GCP Manage vulnerability testing, red teaming, SOC and EDR functions Foster a strong security More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
Medical Protection Society
logs, investigating breaches, and supporting the development and implementation of security policies and best practices. The analyst plays a crucial role in safeguarding MPS data and assets by reviewing threatintelligence and recommending risk mitigation strategies. Additionally, the role involves promoting security awareness, supporting security projects, and enhancing security services. Role Responsibilities Monitor, detect, and respond to cyber More ❯
operations, managing complex security challenges with a business–focused approach – protecting what is most valuable to our clients. You'll be assessing risk across business, technology and operations, considering threatintelligence and helping to build the full security view that underpins systems resilience and client confidence. Required qualifications to be successful in this role Exceptional planning and communication More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
The Medical Protection Society
and supporting the creation and implementation of security policies and best practices. The Analyst plays a key part in protecting MPS data and assets from potential threats by reviewing threatintelligence and recommending ways to prevent or minimize risks. In addition to day-to-day tasks, the role also involves supporting and promoting security best practices, as well More ❯
security field. Amazing Extras Knowledge of NCSC CTAS and CPA Assurance Schemes Knowledge of working in secure environments (List X facilities) and accredited labs (ISO17025) Research and Development experience ThreatIntelligence experience Qualifications and Skills Qualifications are a good way to demonstrate knowledge but are not the be all and end all, our team is made up of More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Medical Protection Society
and supporting the creation and implementation of security policies and best practices. The Analyst plays a key part in protecting MPS data and assets from potential threats by reviewing threatintelligence and recommending ways to prevent or minimize risks. In addition to day-to-day tasks, the role also involves supporting and promoting security best practices, as well More ❯
processes, methodologies, architecture, technologies and tools, system configuration or other activities to mitigate security risks to Client. Skills & Experience Required Intrusion Detection and Prevention Service (IDPS). Advanced Persistent Threat protection (APT). E-mail sandbox technology. Management of the Public Key Infrastructure (PKI) infrastructure. Vulnerability Scanning and remediation. Real-time metrics portal, as well as monthly and ad … hoc reporting. Threat Intelligence. Forensic capability. #J-18808-Ljbffr More ❯
Skills Expertise in threatintelligence, cybersecurity operations, or related functions. Proficiency with threatintelligence platforms (e.g. MISP, ThreatConnect, Recorded Future, Anomali). Solid understanding of common malware, threat actor groups, APT campaigns and geopolitical threats. Familiarity with STIX/TAXII, YARA, Sigma, and IOC/TTP formats. Deep knowledge of the MITRE ATT&CK framework … and cyber kill chain methodology. The Role Monitor the threat landscape to identify emerging cyber threats, vulnerabilities and adversary tactics, techniques and procedures (TTPs). Support threat hunting, incident response and vulnerability management with relevant threat context and attribution. Perform adversary tracking and contribute to the development of threat models using frameworks such as MITRE ATT … CK, Diamond Model, and Kill Chain. Collaborate with SOC, IR, Red Team and Vulnerability Management teams to contextualise and operationalise threat intelligence. **This role is predominantly remote but requires flexibility to come into the London office as and when required More ❯
City of London, London, United Kingdom Hybrid / WFH Options
RiverSafe
Skills Expertise in threatintelligence, cybersecurity operations, or related functions. Proficiency with threatintelligence platforms (e.g. MISP, ThreatConnect, Recorded Future, Anomali). Solid understanding of common malware, threat actor groups, APT campaigns and geopolitical threats. Familiarity with STIX/TAXII, YARA, Sigma, and IOC/TTP formats. Deep knowledge of the MITRE ATT&CK framework … and cyber kill chain methodology. The Role Monitor the threat landscape to identify emerging cyber threats, vulnerabilities and adversary tactics, techniques and procedures (TTPs). Support threat hunting, incident response and vulnerability management with relevant threat context and attribution. Perform adversary tracking and contribute to the development of threat models using frameworks such as MITRE ATT … CK, Diamond Model, and Kill Chain. Collaborate with SOC, IR, Red Team and Vulnerability Management teams to contextualise and operationalise threat intelligence. **This role is predominantly remote but requires flexibility to come into the London office as and when required More ❯
Title: Cyber ThreatIntelligence Analyst Client: U.S. Army Location: Fort Belvoir, VA 22060 • Provides cyber risk and threat identification by proactively and continuously monitoring the internal and external landscape for relevant events, risks and threats related to malicious code, vulnerabilities and attacks. • Performs monitoring and analysis of threatintelligence monitoring tool services, product contracts and … mitigation TTPs for identified malicious logic within the customer's environment. • Maintains current knowledge of tools and best practices in advanced persistent threats. • Regularly develops and produces succinct written intelligence reports 706 constructed from technical analysis and collected threat information for ECMA internal consumers. • Contributes cyber security perspective to discussions and decisions regarding MITRE Telecommunication&CK for Cloud. More ❯
London, England, United Kingdom Hybrid / WFH Options
RiverSafe
Get AI-powered advice on this job and more exclusive features. Skills Expertise in threatintelligence, cybersecurity operations, or related functions. Proficiency with threatintelligence platforms (e.g. MISP, ThreatConnect, Recorded Future, Anomali). Solid understanding of common malware, threat actor groups, APT campaigns and geopolitical threats. Familiarity with STIX/TAXII, YARA, Sigma, and IOC …/TTP formats. Deep knowledge of the MITRE ATT&CK framework and cyber kill chain methodology. The Role Monitor the threat landscape to identify emerging cyber threats, vulnerabilities and adversary tactics, techniques and procedures (TTPs). Support threat hunting, incident response and vulnerability management with relevant threat context and attribution. Perform adversary tracking and contribute to the … development of threat models using frameworks such as MITRE ATT&CK, Diamond Model, and Kill Chain. Collaborate with SOC, IR, Red Team and Vulnerability Management teams to contextualise and operationalise threat intelligence. **This role is predominantly remote but requires flexibility to come into the London office as and when required** Seniority level Seniority level Mid-Senior level Employment More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
Cyber ThreatIntelligence Analyst Location: Huntsville, AL Work Type: Onsite Remote Work: No Job Description Work as a member of a threatintelligence team responsible for understanding how emerging cyber threats impact the client organization while conducting highly detail-oriented security threat analysis and working with clients to validate and characterize threats. Support incident detection … provide input on new detection strategies and remediation guidance. Form accurate and precise analysis and escalate it to appropriate teammates or internal teams for additional assistance or review. Provide intelligence context to support the fine-tuning of signatures. Qualifications 8+ years of experience with cybersecurity 4+ years of experience with conducting threat research focused on nation-state, criminal … as social networking sites, blogs and microblogs, and internet mapping tools Experience with computer network protocols and operations Knowledge of Cyber intrusion vectors, malware, networking, and monitoring Knowledge of threatintelligence tradecraft, including structured analytic, contrarian, and imaginative analytic techniques Ability to write concise analytical products and assessments Top Secret clearance Bachelor's degree Additional Qualifications Experience with More ❯
We offer office-based, hybrid, and remote work on permanent and consultancy contracts globally, making us a true global employer of choice. We are looking to hire a Senior ThreatIntelligence Analyst to join our global Technology team. This role offers a challenging, fast-paced, and exciting environment with ample opportunities to influence and grow within the technology … area. The Senior ThreatIntelligence Analyst plays a critical role in detecting and responding to cyber threats, refining alerting systems, and leading security investigations. The ideal candidate will have deep expertise in network and infrastructure security, embrace a DevSecOps mindset, and excel in collaborative, agile environments. This role involves working closely with the 3rd Line Security Engineering team … to enhance threat response and protection, serving as the first line of support in responding to security incidents. The key values we uphold in Technology are: Ownership, Continuous Improvement, Trust, and Honesty. What you'll be getting up to: Lead threatintelligence operations, collecting, analyzing, and contextualizing data from internal and external sources to identify emerging threats More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
experience we're looking for, please go ahead and apply. We'd love to hear from you! About the role We have a fantastic new role for a Cyber ThreatIntelligence Analyst to join part of our Cyber Defence team. You will be reporting into the Cyber ThreatIntelligence Lead, and you will be responsible for … gathering threatintelligence via cutting-edge security technologies and other sources. You will also identify, interrupt, and suppress threat actors that target the Hargreaves Lansdown enterprise environment. What you'll be doing Proactively identifying advanced threats that evade automated security solutions, to allow mitigations or enhanced monitoring to be implemented. Proactively hunting and performing analysis against available … datasets. Develop datasets utilising cyber services available, also identifying gaps in data from the portfolio of deployed security tools. Leverage internal and external resources to research threats, vulnerabilities, and intelligence on various attackers and attack infrastructure. Use existing security platforms to identify threats, determine root cause, scope, and severity of each and compile/report findings into a finished More ❯
Employment Type: Permanent, Part Time, Work From Home