Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
Cyber ThreatIntelligence Analyst Location: Huntsville, AL Work Type: Onsite Remote Work: No Job Description Work as a member of a threatintelligence team responsible for understanding how emerging cyber threats impact the client organization while conducting highly detail-oriented security threat analysis and working with clients to validate and characterize threats. Support incident detection … provide input on new detection strategies and remediation guidance. Form accurate and precise analysis and escalate it to appropriate teammates or internal teams for additional assistance or review. Provide intelligence context to support the fine-tuning of signatures. Qualifications 8+ years of experience with cybersecurity 4+ years of experience with conducting threat research focused on nation-state, criminal … as social networking sites, blogs and microblogs, and internet mapping tools Experience with computer network protocols and operations Knowledge of Cyber intrusion vectors, malware, networking, and monitoring Knowledge of threatintelligence tradecraft, including structured analytic, contrarian, and imaginative analytic techniques Ability to write concise analytical products and assessments Top Secret clearance Bachelor's degree Additional Qualifications Experience with More ❯
We offer office-based, hybrid, and remote work on permanent and consultancy contracts globally, making us a true global employer of choice. We are looking to hire a Senior ThreatIntelligence Analyst to join our global Technology team. This role offers a challenging, fast-paced, and exciting environment with ample opportunities to influence and grow within the technology … area. The Senior ThreatIntelligence Analyst plays a critical role in detecting and responding to cyber threats, refining alerting systems, and leading security investigations. The ideal candidate will have deep expertise in network and infrastructure security, embrace a DevSecOps mindset, and excel in collaborative, agile environments. This role involves working closely with the 3rd Line Security Engineering team … to enhance threat response and protection, serving as the first line of support in responding to security incidents. The key values we uphold in Technology are: Ownership, Continuous Improvement, Trust, and Honesty. What you'll be getting up to: Lead threatintelligence operations, collecting, analyzing, and contextualizing data from internal and external sources to identify emerging threats More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
experience we're looking for, please go ahead and apply. We'd love to hear from you! About the role We have a fantastic new role for a Cyber ThreatIntelligence Analyst to join part of our Cyber Defence team. You will be reporting into the Cyber ThreatIntelligence Lead, and you will be responsible for … gathering threatintelligence via cutting-edge security technologies and other sources. You will also identify, interrupt, and suppress threat actors that target the Hargreaves Lansdown enterprise environment. What you'll be doing Proactively identifying advanced threats that evade automated security solutions, to allow mitigations or enhanced monitoring to be implemented. Proactively hunting and performing analysis against available … datasets. Develop datasets utilising cyber services available, also identifying gaps in data from the portfolio of deployed security tools. Leverage internal and external resources to research threats, vulnerabilities, and intelligence on various attackers and attack infrastructure. Use existing security platforms to identify threats, determine root cause, scope, and severity of each and compile/report findings into a finished More ❯
Employment Type: Permanent, Part Time, Work From Home
Direct message the job poster from Lorien Sourcing Consultant at Lorien: Empowering Businesses with Strategic Procurement Solutions Job Posting: L3 Insider Threat Engineering Lead - DLP Location: Remote UK Job Type: Contract About the Role We are seeking a highly skilled L3 Insider Threat Engineering Lead - DLP to manage and enhance our Insider Threat Data Loss Prevention (DLP … capabilities. This role is pivotal in ensuring the effectiveness of our DLP platform and leading a globally distributed team of engineers. Reporting to the Global Head of Insider Threat, you will play a crucial role in safeguarding sensitive data and mitigating insider risks. Key Responsibilities Oversee the technical management, troubleshooting, and administration of the DLP platform. Lead and mentor … a diverse team of Insider Threat Engineers specializing in DLP, providing guidance, coaching, and technical expertise. Collaborate with the L1 Insider Threat Manager, the L3 Insider Threat Engineering Lead – IRM, and senior leadership to refine strategies, rules, policies, and procedures for data loss prevention. Develop and maintain a technical roadmap aligned with the overall cybersecurity strategy. Optimize More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
UK Home Office
55pm Job summary Cyber Security at the Home Office is critical to protecting a large government department and safeguarding critical digital infrastructure. The Cyber Security Operations Centre (CSOC) ThreatIntelligence team is tasked with understanding and contextualising the Home Office’s cyber threat landscape. The team manages the department’s intelligence requirements, based on assessed threats … team of six works alongside other CSOC areas to provide awareness of threats, allowing for the deployment of targeted defences and the sharing of timely and actionable guidance. The Threat Assessment Lead plays a critical role in the success of the Cyber Security Operations Centre (CSOC) by overseeing all threatintelligence activities. This includes defining intelligence … ensuring timely dissemination of insights. The role supports protective monitoring, contributes to incident response, and leads the development of team members through line management and professional development. As the ThreatIntelligence Lead, your day-today responsibilities will be to: Lead the delivery of cyber threatintelligence processes, ensuring outputs align with organisational policies and effectively communicate More ❯
Threat Hunter UK (Manchester, Cheltenham or London) We are seeking a highly capable and hands-on Threat Hunter to design and lead a professional threat hunting capability focused on identifying sophisticated adversaries through hypothesis-driven analysis and automation. You will be responsible for proactively detecting and analysing advanced threats across the customers environment. Ensuring our threat models and threat hunts are tightly aligned to industry risks to the customer. This is a high-impact role with significant autonomy. You’ll need to think critically, and hunt methodically. As a Threat Hunter, you will actively search for cyber threats that evade traditional security solutions. Your role will involve conducting in-depth analysis, identifying indicators … of compromise (IOCs), and working cross-functionally with the Security Operations Centre Analysts, Detection Engineers, Privacy Team and Engineering Team to mitigate risks. Summary Threat Detection and Monitoring: Design, build, and own a formal threat hunting program with a strong emphasis on hypothesis-based hunting methodologies. Use threatintelligence, MITRE ATT&CK, and risk models to More ❯
by employees, our mental and financial health resources, and our personalized learning opportunities - just to name a few! Job Description Your Career Palo Alto Networks is seeking a senior Threat Hunter to join Unit 42's Managed Services group. Threat Hunters in Unit 42 play a critical role in safeguarding organizations against cyber threats by proactively searching for … threats across multiple datasets. They are responsible for leading and conducting threat hunting activities related to malware, threat actor groups, and campaign activity. This position requires a cross-disciplinary approach that involves a deep understanding of cybersecurity, incident response, threatintelligence, and hands-on technical skills. One primary responsibility of this role is to proactively search … for signs of malicious activity within an organization's network. Our Threat Hunters use advanced tools and methodologies to identify anomalies and potential threats that may go undetected by traditional security solutions. Additionally, our Threat Hunters should actively engage in research and experimentation to develop new hunting techniques and stay ahead of evolving threats. Effective communication is crucial More ❯
have a Cyber Security background, will perform as a client-facing role, and will be willing to contribute to our internal Digital Transformation strategy and expertise. As a Cyber Threat Analyst you will: As part of our Blue Team, you’ll use the latest intelligence and tooling to analyse information systems to ensure effective incident detection and response. … If you’re excited about the role and think you could make a difference, please get in touch. The following skills and experience are essential for this role: Proactive threat hunting using available client data and developing improvements to threat hunting capabilities Collection and interpretation of different sources of threatintelligence Actively researching emerging threats and … identify, investigate, and support the mitigation of cyber threats within client environments highlighting any identified risks Collaborate with security detection engineers to design and implement customised detection alerts Provide threat-related input and investigation support during relevant cybersecurity incidents Deliver detailed threat reporting including executive briefings, and actionable recommendations to technical and non-technical stakeholders Set yourself apart More ❯
Job Title: Lead Threat Detection Analyst Location: Preston, Frimley or Filton. We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular role. Salary: Circa £59,000 depending on experience and skills What you'll be doing: Delivery of core triage function as part of protective monitoring services across … impact Lead the development of people, process and technology improvements to aid the service Provide subject matter advice on security analysis and development of detection content Deputise for the Threat Detection Manager when required Analyses requirements and advises on scope and options for continual operational improvement Your skills and experiences: Essential: Experience of working within Security Operations or equivalent … and shopping discounts - you may also be eligible for an annual incentive. The Cyber Operations team: Cyber Operations is responsible for protecting BAE Systems from Cyber Attack by various threat actors. Not only do we protect BAE Systems and its employees, indirectly we protect those who protect us - who serve in our military and rely on the products and More ❯
triage and escalation of reports and requests from Government organisations. Support Incident Management when required during periods of heightened operational activity. Maintain an understanding of the real-world cyber threat, identifying trends and emerging threats. Maintain an understanding of the cyber threats likely to target the business. Facilitate the timely sharing of high-quality actionable Cyber ThreatIntelligence … stakeholders. Work collaboratively with Incident Management, providing insights on adversaries to enable a more effective response, and capturing insights for wider use. Support the implementation and ongoing management of ThreatIntelligence tooling and infrastructure, including, malware sandboxes, and threatintelligence platforms. Engage with the wider public sector cyber security, cyber threatintelligence and assessment … communication skills, including the ability to clearly and simply explain technical details to non-technical audiences, and engage with senior stakeholders. Experience working with internal and external stakeholders. Cyber ThreatIntelligence Specific Excellent understanding of the tools, techniques and procedures used by adversaries in real-world cyber attacks. Experience monitoring a variety of sources of information to identify More ❯
triage and escalation of reports and requests from Government organisations. * Support Incident Management when required during periods of heightened operational activity. * Maintain an understanding of the real-world cyber threat, identifying trends and emerging threats. * Maintain an understanding of the cyber threats likely to target the business. * Facilitate the timely sharing of high-quality actionable Cyber ThreatIntelligence … stakeholders. * Work collaboratively with Incident Management, providing insights on adversaries to enable a more effective response, and capturing insights for wider use. * Support the implementation and ongoing management of ThreatIntelligence tooling and infrastructure, including, malware sandboxes, and threatintelligence platforms. * Engage with the wider public sector cyber security, cyber threatintelligence and assessment … communication skills, including the ability to clearly and simply explain technical details to non-technical audiences, and engage with senior stakeholders. * Experience working with internal and external stakeholders. Cyber ThreatIntelligence Specific * Excellent understanding of the tools, techniques and procedures used by adversaries in real-world cyber attacks. * Experience monitoring a variety of sources of information to identify More ❯
triage and escalation of reports and requests from Government organisations. * Support Incident Management when required during periods of heightened operational activity. * Maintain an understanding of the real-world cyber threat, identifying trends and emerging threats. * Maintain an understanding of the cyber threats likely to target the business. * Facilitate the timely sharing of high-quality actionable Cyber ThreatIntelligence … stakeholders. * Work collaboratively with Incident Management, providing insights on adversaries to enable a more effective response, and capturing insights for wider use. * Support the implementation and ongoing management of ThreatIntelligence tooling and infrastructure, including, malware sandboxes, and threatintelligence platforms. * Engage with the wider public sector cyber security, cyber threatintelligence and assessment … communication skills, including the ability to clearly and simply explain technical details to non-technical audiences, and engage with senior stakeholders. * Experience working with internal and external stakeholders. Cyber ThreatIntelligence Specific * Excellent understanding of the tools, techniques and procedures used by adversaries in real-world cyber attacks. * Experience monitoring a variety of sources of information to identify More ❯
Paradyme is seeking experienced Cyber Defense Incident Responders for upcoming projects in support of major federal law enforcement and intelligence customers. The people in these positions will work in secured federal facilities in: Washington, DC; Huntsville, AL; and Clarksburg, WV. A current TOP SECRET clearance is required to be considered. In our teams, the Incident Responder performs duties on … Team operations. Applying both hands-on technical skills, the Responder proactively and reactively defends against cyber threats in critical moments. The ideal candidate has hand-on experience with advanced threat detection, incident response, and collaborative security assessments to protect critical government customer systems and infrastructure. Key Responsibilities: Perform vulnerability assessments, incident response, and threat hunting operations Support Purple … Team initiatives by integrating offensive (Red Team) and defensive (Blue Team) strategies Able to execute strategic security plans aligned with threatintelligence and operational priorities ThreatIntelligence and Risk Assessment Interprets threatintelligence based on real-world risks Conduct risk-based evaluations of critical systems, networks, and Industrial Control Systems (ICS) infrastructure Maintain current More ❯
Paradyme is seeking experienced Cyber Defense Incident Responders for upcoming projects in support of major federal law enforcement and intelligence customers. The people in these positions will work in secured federal facilities in: Washington, DC; Huntsville, AL; and Clarksburg, WV. A current TOP SECRET clearance is required to be considered. In our teams, the Incident Responder performs duties on … Team operations. Applying both hands-on technical skills, the Responder proactively and reactively defends against cyber threats in critical moments. The ideal candidate has hand-on experience with advanced threat detection, incident response, and collaborative security assessments to protect critical government customer systems and infrastructure. Key Responsibilities: Perform vulnerability assessments, incident response, and threat hunting operations Support Purple … Team initiatives by integrating offensive (Red Team) and defensive (Blue Team) strategies Able to execute strategic security plans aligned with threatintelligence and operational priorities ThreatIntelligence and Risk Assessment Interprets threatintelligence based on real-world risks Conduct risk-based evaluations of critical systems, networks, and Industrial Control Systems (ICS) infrastructure Maintain current More ❯
Paradyme is seeking experienced Cyber Defense Incident Responders for upcoming projects in support of major federal law enforcement and intelligence customers. The people in these positions will work in secured federal facilities in: Washington, DC; Huntsville, AL; and Clarksburg, WV. A current TOP SECRET clearance is required to be considered. In our teams, Incident Responder performs duties on Blue … Team operations. Applying both hands-on technical skills, the Responder proactively and reactively defends against cyber threats in critical moments. The ideal candidate has hand-on experience with advanced threat detection, incident response, and collaborative security assessments to protect critical government customer systems and infrastructure. In addition, the Senior Responder will have the experience to determine strategies and lead … efforts to advance cyber defense capability. Key Responsibilities: A member of Leadership and Strategic Planning group Lead and coordinate advanced vulnerability assessments, incident response, and threat hunting operations Support Purple Team initiatives by integrating offensive (Red Team) and defensive (Blue Team) strategies Help develop and execute strategic security plans aligned with threatintelligence and operational priorities ThreatMore ❯
/7 to detect, analyze, and respond to unauthorized activity. Your expertise will drive rapid identification and response to APTs and zero-day attacks while leveraging OSINT and threatintelligence to maintain an active defense posture. Responsibilities: • Monitor SIEM and security tools to detect cyber threats and anomalies • Investigate suspicious activity and determine root cause of incidents • Perform … threat hunting for APTs and stealthy attacks • Leverage threatintelligence (including OSINT) to inform detection • Develop scripts and tools to enhance IR capabilities • Apply Defense-in-Depth principles across environments • Support enterprise deployment of cybersecurity tools and detection logic Skills and Experience: • 5+ years of relevant cybersecurity experience • 2+ years of root cause analysis and IR experience … experience with at least two of: IDS/IPS, antivirus, firewalls, DLP, vulnerability scanners, forensics, malware analysis • Strong scripting (SPL, PowerShell, Python preferred) • Experience with MITRE ATT&CK and threat detection models Education: Bachelors preferred. Must have Cybersecurity Service Provider - Incident Responder related certification (CEH, GCIA, GCIH, CSIH, CFR, or equivalent) Must have or be able to obtain an More ❯
TMC Technologies is in search of a mid-level Cybersecurity Analyst to join the FBI's ESOC Cyber ThreatIntelligence (CTI) Team. TheCTI Teamis responsible for monitoring and analyzing external cyber threat data to provide insights and actionable intelligence about potential cyber threats. The candidate must be a US citizen and possess a minimum of an … required - Minimum of 5 years of relevant experience required - Experience with identifying indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs) used by attackers required - Expertise in established cyber threatintelligence frameworks, such as MITRE ATT&CK required - Experience with open-source intelligence (OSINT) collection methods and tools preferred - Bachelor's Degree preferred - Preferred certifications include: GIAC … Cyber ThreatIntelligence (GCTI) Microsoft Sentinel We are equal opportunity/affirmative action employers, committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, disability, or protected veteran status, or any other protected characteristic under state or local law. More ❯
TMC Technologies is in search of a senior level Cybersecurity Analyst to join the FBI's ESOC Cyber ThreatIntelligence (CTI) Team. TheCTI Teamis responsible for monitoring and analyzing external cyber threat data to provide insights and actionable intelligence about potential cyber threats. The candidate must be a US citizen and possess a minimum of an … required - Minimum of 8 years of relevant experience required - Experience with identifying indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs) used by attackers required - Expertise in established cyber threatintelligence frameworks, such as MITRE ATT&CK required - Experience with open-source intelligence (OSINT) collection methods and tools preferred - Bachelor's Degree preferred - Preferred certifications include: GIAC … Cyber ThreatIntelligence (GCTI) Microsoft Sentinel Splunk Enterprise Security We are equal opportunity/affirmative action employers, committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, disability, or protected veteran status, or any other protected characteristic under state or local More ❯
Level 1 (BLT1) or SC-200, this could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands on experience: - Threat Detection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct forensic investigations, and support … remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threatintelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication – Work closely and collaborate with senior analysts and clients to keep security operations running smoothly. The Ideal Profile: - Experience in an IT-focused … cybersecurity and SOC operations. Proactive and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threatintelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration drive success. Ready to elevate More ❯
Level 1 (BLT1) or SC-200, this could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands on experience: - Threat Detection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct forensic investigations, and support … remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threatintelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication – Work closely and collaborate with senior analysts and clients to keep security operations running smoothly. The Ideal Profile: - Experience in an IT-focused … cybersecurity and SOC operations. Proactive and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threatintelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration drive success. Ready to elevate More ❯
role PwC serves more than 200,000 clients in 152 countries, and we use our vantage point as one of the largest international professional services networks to provide global threatintelligence services, tailored and delivered locally to our clients. Our research underpins our security services and is used by public and private sector organisations around the world to … protect networks, provide situational awareness and inform strategy. What your day will look like: As a DevOps engineer in our ThreatIntelligence practice, you will work on core infrastructure and maintain and deliver mission critical systems. Roles and responsibilities: Maintaining a range of existing systems built in GCP and running Kubernetes and docker systems. Building and maintaining internal … tools, systems and REST APIs used by the team, for example to publish and distribute finished intelligence reporting, and maintain internal databases of technical intelligence. Collaborating with service and product owners to understand how we can improve our interfaces and APIs to assist them in consuming intelligence in their services. Contributing to internal documentation for both technical (devops More ❯
analytical techniques, machine learning, and statistical modelling to solve complex operational challenges. Working within a secure, multidisciplinary environment, you'll help deliver data-driven insights to support decision-making, threat detection, intelligence analysis, and national defence strategies. Key Responsibilities Develop and deploy data models, machine learning algorithms, and statistical analyses to support defence and national security operations. Work … with structured and unstructured data from diverse sources such as sensors, ISR feeds, satellite imagery, communications, cyber threat logs, and intelligence reports. Collaborate with domain experts, analysts, and engineers to understand mission needs and translate them into actionable data science problems. Design and build data pipelines and processes for data collection, cleansing, transformation, and validation. Support real-time … date with emerging technologies in AI, deep learning, and data analytics relevant to the defence sector. Skills and Qualifications Essential: Proven experience as a Data Scientist, ideally in defence, intelligence, law enforcement, or government. Active EDV/UK*C security clearance. Proficient in Python and/or R, with experience using data science libraries (e.g., Pandas, NumPy, Scikit-learn More ❯
Level 1 (BLT1) or SC-200. This could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands-on experience: Threat Detection & Response: Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar, etc.) and respond quickly to potential threats. Incident Investigation: Analyze security incidents, conduct forensic investigations, and support remediation … efforts. Vulnerability Management: Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence: Leverage SOAR platforms and threatintelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication: Work closely with senior analysts and clients to maintain smooth security operations. The Ideal Profile: Experience in an IT-focused role with a keen … cybersecurity and SOC operations. Proactive and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threatintelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration drive success. Ready to elevate More ❯
Level 1 (BLT1) or SC-200. This could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands-on experience: Threat Detection & Response: Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar, etc.) and act quickly to counter potential threats. Incident Investigation: Analyse security incidents, conduct forensic investigations, and support … remediation efforts. Vulnerability Management: Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence: Leverage SOAR platforms and threatintelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication: Work closely with senior analysts and clients to keep security operations running smoothly. The Ideal Profile: Experience in an IT-focused role with … cybersecurity and SOC operations. Proactive and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threatintelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration drive success. Ready to elevate More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
Babcock
Location(s): UK, Europe & Africa : UK : Leeds BAE Systems Digital Intelligence is home to 4,500 digital, cyber, and intelligence experts. We work collaboratively across 10 countries to collect, connect, and understand complex data, enabling governments, armed forces, and commercial businesses to unlock digital advantage in demanding environments. Job Title: Front Line Analyst Requisition ID: 121791 Location: Leeds … industry capabilities. Communicate with government or commercial security operation centers for root-cause analysis. Create low to medium complexity KQL analytics and hunt queries, conduct IOC and anomaly-based threat hunts, and identify root causes. Identify and tag incorrect alert logic and high false positive detection rules for review. Transform internal and partner threatintelligence into actionable … detections. Coach junior analysts and colleagues as needed. Lead threat hunting workgroups during events for complex TTPs across industries. Deliver ad-hoc training and workshops to promote security awareness and team knowledge. Provide daily SITREPs on attacker activity to local teams. Experience Knowledge of intrusion analysis on Windows end-user devices and servers. Knowledge of intrusion analysis on Azure More ❯