Threat Intelligence Job Vacancies

276 to 300 of 312 Threat Intelligence Jobs

Intel Analyst Integrator with Security Clearance

Fort Bragg, North Carolina, United States
K2 Solutions Inc
K2 Solutions is seeking an Intelligence Analyst - Integrator to provide direct support to USSOCOM by fusing intelligence and operational data to enhance mission effectiveness. The analyst will work closely with intelligence, operations, and special mission teams to identify, assess, and integrate intelligence-driven solutions that support USSOCOM objectives. Must be a U.S. citizen Must have a … Top Secret clearance Responsibilities: Conduct all-source intelligence analysis to support special operations missions and planning. Develop, integrate, and disseminate intelligence products that support operational and strategic objectives. Identify and analyze intelligence gaps, providing recommendations for collection and exploitation. Support fusion efforts between intelligence and operational teams to enhance situational awareness. Work with DoD and interagency … partners to coordinate intelligence activities. Provide briefings and reports to senior leadership on emerging threats and operational risks. Utilize advanced analytical tools and databases, including Palantir, TAC, Analyst Notebook, and other classified intelligence systems. Assist in the integration of new intelligence capabilities into USSOCOM operations. Support targeting and operational planning by providing timely and actionable intelligence. Qualifications More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cyber Security Sales

London, United Kingdom
Xact Placements Limited
A leading, award-winning cyber security and risk management organisation is seeking a highly experienced and motivated Senior Cyber Security and Threat Intelligence Sales Consultant. This is an exciting opportunity to join a fast-growing team delivering cutting-edge security, threat intelligence, and managed service solutions to enterprise clients. Key Responsibilities Sell security and threat intelligence solutions, platforms, and managed services into global enterprise accounts. Present a wide-ranging portfolio of innovative and established security solutions to new and existing customers. Identify client needs and deliver tailored technical and business-aligned solutions. Target prospective customers through cold calling, face-to-face meetings, and professional networking. Manage the full sales cycle from prospecting to … and RFP proposals. Deliver impactful presentations to senior-level stakeholders. Maintain long-term relationships with key decision-makers and influencers. Build and execute account plans focused on security technologies, threat intelligence, and managed services. Drive business strategy to grow revenue and profitability through cross-selling opportunities. Navigate complex sales environments with political and commercial awareness. Required Experience & Skills More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations Engineer

London, United Kingdom
Woolf Group
fund that is number one in their specialist area and is currently rebuilding their entire pricing & risk management platform from scratch. Responsibilities: Evaluate new security technologies and tools. Improve threat detection and response capabilities with a code-first approach. Automate manual processes utilizing Infrastructure as Code (IaC). Collaborate and co-develop with external suppliers and internal engineering teams … to ensure data sources and detection rules are well enriched. Required: Strong understanding of the latest security threats, threat actors, and the tactics and techniques adopted. Proven experience with programming languages such as Python, Rust, C++, or others. Knowledge of SecOps tooling (SIEM, SOAR, Threat Intelligence). More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cryptocurrency Investigator

London, United Kingdom
Hybrid / WFH Options
Elliptic Enterprises Ltd
Investigator Department: Research & Investigations Employment Type: Full Time Location: London, UK Description Do you want to be on the front lines of fighting crypto crime and stopping nation-state threat actors? Are you excited by the challenge of tracing stolen and laundered digital assets across the most complex blockchain environments? Are you looking to join a mission-driven team … is critical to Elliptic's mission of safeguarding the integrity of the global crypto ecosystem. As a Senior Investigator, you will be a key member of our elite Investigations & Threat Intelligence team, working closely with government agencies, the Crypto Industry, and strategic partners across the EMEA region. Your expertise in tracing complex, state-sponsored activity and uncovering the … TTPs of nation-state and highly sophisticated threat actors will directly inform mitigation operations, in-depth research, and policy decisions. Through deep collaboration with law enforcement, regulators, and analytic partners, your work will help disrupt illicit financial networks, strengthen crypto-related threat detection, and reinforce Elliptic's position as a trusted partner to those on the front lines More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SOC Analyst

Reading, England, United Kingdom
La Fosse
investigate security alerts using tools such as Splunk, Microsoft Defender, and CrowdStrike, escalating incidents as needed and ensuring timely resolution. Leverage Microsoft Co-pilot and automation workflows to streamline threat detection, incident triage, and response processes. Conduct in-depth log analysis and correlation across multiple data sources to identify potential security threats and reduce false positives. Support threat hunting and root cause analysis efforts, providing detailed documentation and recommendations based on findings. Collaborate with L1 analysts, engineering teams, and threat intelligence functions to enhance detection capabilities and improve overall SOC effectiveness. More ❯
Posted:

Senior Full Stack Software Engineer

United Kingdom
Hyperproof
At ReversingLabs, our software supply chain security and threat intelligence solutions have become essential to advancing cybersecurity maturity around the globe. We're on a journey to expand adoption and accelerate growth by hiring top talent across the security industry. Notable breaches such as SolarWinds, CircleCI, and 3CX have elevated software supply chain security as a top initiative … across every organization developing or purchasing software. Only ReversingLabs delivers the software package analysis speed and intelligence needed to protect against this critical area of risk. Our vision is clear. Arming every company with end-to-end insights to ensure development releases securely, IT purchases safely, and the SOC can effectively detect, isolate, and respond. Your future role as … about Plenty of opportunities to grow your career A collaborative and innovative workplace where your ideas matter ReversingLabs was founded in 2009 with the mission to offer the ultimate threat detection solutions. Our security products are used by some of the largest organizations in the world, including 2 of the top 3 banks, 4 of the top 6 software More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security ML Engineer - Tech Leader

London, United Kingdom
Hybrid / WFH Options
Cisco Systems, Inc
Area of Interest Job Type Professional AI or Artificial Intelligence Job Id Who we are: The Cisco Talos Security Intelligence and Research Group is at the forefront of detecting and correlating threats in real-time, using the world's largest threat detection network. We collaborate extensively across Cisco's security ecosystem, driving innovation in threat detection … potential detection gaps, propose projects and ideas, and define and implement a plan to make them real. Analyze large datasets to extract complex data patterns. Monitor changes in the threat landscape via automation and visualization techniques and develop models to identify new threats. You will have the opportunity to build or enhance machine-learning pipelines to support Cisco's … new techniques to the rest of the team. Publish internal and external reports, papers and blog posts detailing your research findings. Background in cybersecurity, with a strong emphasis on threat detection. Solid experience in machine learning and data science, proficient in both supervised and unsupervised algorithms and frameworks such as TensorFlow, PyTorch, or Scikit-learn. Experience working with large More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Technologist Apprentice

Birmingham, Staffordshire, United Kingdom
Getting In Limited
system by using a mix of research and practical exploration Analyse and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. National Cyber Security Centre) Combine different sources to create an enriched view of cyber threats and hazards Research and investigate common attack techniques and … relate these to normal and observed digital system behaviour and recommend how to defend against them. Interpret and demonstrate use of external source of vulnerabilities (e.g. OWASP, intelligence sharing initiatives, open source) Undertake security risk assessments for simple systems without direct supervision and propose basic remediation advice in the context of the employer Source and analyse security cases and … computer, digital network and cyber security technology Recommend improvements to the cyber security posture of an employer or customer based on research into future potential cyber threats and considering threat trends Write program code or scripts to meet a given design requirement in accordance with employers' coding standards Identify cyber security threats relevant to a defined context Accurately, objectively More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Government Account Executive

England, United Kingdom
Hybrid / WFH Options
Intaso
Government/Public Sector Account Executive - EMEA The Company: 📍Rapidly growing Threat Intelligence Vendor 📍European HQ's with offices in US and UK 📍Backed by well known Investors Ace Capital Partners 📍Presence already in EU amongst Goverments and public sector bodies The role: 📍End-to-end sales cycles with European public sector and defence 📍Own relationships within NCSC More ❯
Posted:

Penetration Tester

Preston, Lancashire, United Kingdom
BAE Systems
weaknesses and enhancing defensive capabilities Contributes to the development of Active Defence, Red Team capabilities through people, process, and technology where appropriate Maintains a broad understanding of the external threat environment and attacker tactics, techniques, and procedures Your skills and experiences: Demonstrable experience in penetration testing Proficient in penetration testing tools such as Burp Suite, Nmap, Metasploit etc CREST … and shopping discounts - you may also be eligible for an annual incentive. The Cyber Operations Team Cyber Operations is responsible for protecting BAE Systems from Cyber Attacks by various threat actors. Not only do we protect BAE systems and its employees, indirectly we protect those who protect us - who serve in our military and rely on the products and … services we create. Across Threat Intelligence, Threat Detection, Incident Response and Active Defence we work to evolve cyber operations as a world class capability. This role will sit under the Active Defence, Red Team who are responsible for delivering the following capabilities in support of Cyber Operations: Red Teaming, Purple Teaming, Security Critical Control Testing, Threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Presales

Cirencester, England, United Kingdom
LYNK
training and development budget 25 days holiday + public holidays On-site gym access What you’ll be doing Lead technical discovery sessions with prospects Design solutions across MDR, Threat Intelligence, Risk Management, Penetration Testing, consultative services and Crisis Simulations Deliver tailored demos, proof of concepts, scope of works, and simulations Work alongside the sales team to close More ❯
Posted:

Incident Response Lawyer

London Area, United Kingdom
Iceberg
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threat intelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
Posted:

Incident Response Lawyer

City of London, London, United Kingdom
Iceberg
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threat intelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
Posted:

Cyber Risk and Governance Manager

United Kingdom
BAE Systems
Design (SbD) principles, while meeting all legal and regulatory obligations Produce clear, data-driven reports that track cyber risk trends, key performance indicators (KPIs), key risk indicators (KRIs), and threat intelligence - supporting effective decision-making across the Air Sector and wider business Build positive relationships across departments, including Security, Architecture, Cyber Security, Manufacturing, and Engineering, to enable seamless More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer, Incident Response

London, United Kingdom
Amazon
applications powering the most sophisticated e-commerce platform ever built. We value broad and deep technical knowledge, specifically in the fields of forensics, malware analysis, network security, application security, threat hunting, and threat intelligence. Key job responsibilities - Responding to security incidents, and coordinating a cohesive response involving multiple teams across Amazon. - Providing security engineering solutions and support during … impact of current security trends, advisories, publications, and academic research to Amazon, coordinating response as necessary across affected teams. - Keeping your knowledge and skills current with the rapidly changing threat landscape. - Participating in a follow-the-sun on-call rotation. About the team Diverse Experiences Amazon Security values diverse experiences. Even if you do not meet all of the … etc) while coordinating with various teams and providing reporting to leadership. PREFERRED QUALIFICATIONS - Technical depth in one or more specialties including: application security, infrastructure security, digital forensics, malware analysis, threat hunting or some combination thereof. - Relevant industry certifications from SANS, ISC2, etc. - Experience working as part of a Computer Security Incident Response Team (CSIRT) - Familiarity/experience with AWS More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Enterprise Account Executive (Cybersecurity Consultancy)

England, United Kingdom
Hybrid / WFH Options
Fruition Group
the UK market. Working closely with solution architects and global delivery teams, you'll represent a full-stack portfolio of cybersecurity services - including consulting, systems integration, cloud security, and threat intelligence. Key Responsibilities: Drive new business development by identifying and closing enterprise sales opportunities across the UK. Build relationships with senior decision-makers (CIOs, CISOs, Heads of Information Security … cybersecurity , IT consulting , or technology services . Demonstrated success in closing high-value B2B deals (typically £250k+). Strong knowledge of cybersecurity domains (cloud security, identity and access management, threat detection, managed security services). Ability to influence senior stakeholders and complex buying groups within large enterprise environments. Strong commercial acumen, negotiation skills, and the ability to thrive in More ❯
Posted:

Threat Management Consultant

Nationwide, United Kingdom
Hybrid / WFH Options
Experis
Threat Management Consultant Remote working 6 months UMBRELLA ONLY Eligible for SC or Active SC - will be able to start before the clearance checks are complete Essential Skills for the role Establish an operational interlock with the CSMS and own security incident response and recovery on behalf of IBM as the supplier for PPB. Raise awareness to the CSMS … sending of appropriate log event data to the CSMS Develop incident response playbooks Design and implement SIOC processes to supplement the UK SOC monitoring service: Ongoing tuning of Qradar Threat Intelligence Threat Hunting Implement vulnerability scanning using Tenable in AWS Design and Implement UK SOC monitoring service More ❯
Employment Type: Contract
Rate: £600 - £665/day
Posted:

SC cleared Threat Management Consultant - Inside IR35

London, United Kingdom
Hybrid / WFH Options
LA International Computer Consultants Ltd
An SC cleared Threat Management Consultant is required for an initial 6 month contract. This role is fully remote and is inside IR35 so will require working via an FCSA accredited umbrella company. Key Skills and experience: Establish an operational interlock with the CSMS and own security incident response and recovery on behalf of IBM as the supplier for … sending of appropriate log event data to the CSMS Develop incident response playbooks Design and implement SIOC processes to supplement the UK SOC monitoring service: * Ongoing tuning of Qradar * Threat Intelligence * Threat Hunting Implement vunlnerability scanning using Tenable in AWS Design and Implement UK SOC monitoring service Due to the nature and urgency of this post, candidates More ❯
Employment Type: Contract, Work From Home
Posted:

Security Engineer

City of London, London, United Kingdom
mthree
and capability, ensuring detections are robust and not brittle, thoroughly tested, and that alerts and supporting information is available to and understood by operational cyber security teams. Experience Required Threat Led: Ability to assess and validate information from various sources on cyber and informational security threats to business Ability to analyse and identify significance of processed intelligence to … identify trends, threat actor TTPs and potential capabilities. Ability to break down and translate information into tangible actionable data. Secure & Test-Driven Engineering Understanding of cyber security threat frameworks such as MITRE ATT&CK, Lockheed Martin Killchain etc. Ability to specify/implement processes to maintain required level of security for a component/product/system during … negative test cases. Ability to conducts code reviews of existing content and processes to identify and enhance or mitigate security issues. Contribute to security evaluation of or testing of threat/vulnerabilities faced by systems. Applies recognised evaluation/testing methodologies, tools and techniques to signature development/reviews, suggesting new ones where appropriate. Research: Ability to quantify and More ❯
Posted:

Security Engineer

London Area, United Kingdom
mthree
and capability, ensuring detections are robust and not brittle, thoroughly tested, and that alerts and supporting information is available to and understood by operational cyber security teams. Experience Required Threat Led: Ability to assess and validate information from various sources on cyber and informational security threats to business Ability to analyse and identify significance of processed intelligence to … identify trends, threat actor TTPs and potential capabilities. Ability to break down and translate information into tangible actionable data. Secure & Test-Driven Engineering Understanding of cyber security threat frameworks such as MITRE ATT&CK, Lockheed Martin Killchain etc. Ability to specify/implement processes to maintain required level of security for a component/product/system during … negative test cases. Ability to conducts code reviews of existing content and processes to identify and enhance or mitigate security issues. Contribute to security evaluation of or testing of threat/vulnerabilities faced by systems. Applies recognised evaluation/testing methodologies, tools and techniques to signature development/reviews, suggesting new ones where appropriate. Research: Ability to quantify and More ❯
Posted:

CI Investigations Desk Officer with Security Clearance

Maryland, United States
Sphinx
investigations and the production of analytical reviews. Analytical reviews will identify investigative gaps and operational potential, to include, CI flags, CI indicators, and operational vulnerabilities which pose a CI threat to Human Intelligence activities. The roles and responsibilities of the CI Investigations Desk Officer includes conducting coordination among analytical elements of the Department of Defense (DoD). Such … elements include, the Intelligence and Security Command (INSCOM), Army Service Component Commands, other government agencies, and the Department of the Army. CI Investigations Desk Officers will also provide threat information derived from CI investigations back to the division leadership. They will conduct weekly, monthly, and quarterly operational briefings with Government Team/Branch/Division Chiefs and review … the counterintelligence mission. They must also be knowledgeable of and experienced with Army CI authorities and how they are executed in accordance with other statutes and policies such as Intelligence Oversight. CI professionals must be adaptable and self-motivated. They should be capable of shifting focus and prioritizing actions in support of the broader mission objectives with little to More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior AI Engineer

London, South East, England, United Kingdom
Hybrid / WFH Options
Method Resourcing
in production with a strong focus on performance, explainability, and cost-efficiency. What You'll Bring: Deep applied experience in ML/DL , with bonus points for work in threat detection , phishing , or abuse detection Proven ability to design and deploy full-stack AI pipelines in production Strong experience in backend engineering , ideally with Go and ML frameworks like … infrastructure (AWS) , Kubernetes , and Terraform Experience evaluating and deploying models (including anomaly detection, RAG, and clustering) in noisy, evolving data environments Nice to Have: Experience with Perl Knowledge of threat intelligence integration and MCP architectures Location: Hybrid - 2 days a week on-site in Central London Salary: Up to £130,000 , depending on experience RSG Plc is acting More ❯
Employment Type: Full-Time
Salary: £110,000 - £130,000 per annum
Posted:

OSINT / PAI - SME (SOCOM) with Security Clearance

Fort Bragg, North Carolina, United States
KASTELLUM Group, LLC
KASTELLUM is seeking exceptionally qualified individuals to serve as Publicly Available Information Intelligence Analyst Subject Matter Experts to join our team in North Carolina supporting USSOCOM. Publicly Available Information Intelligence Analyst Subject Matter Experts (PAI SMEs) are responsible for researching, developing and presenting PAI intelligence products at the operational and tactical levels for senior leaders. PAI analysts … shall interface with intelligence organizations to produce analytical products and assessments supporting targeting efforts, HUMINT and exploitation operations, and threat analysis. Intelligence SMEs shall possess SME-level skill-sets in the specific intelligence disciplines with demonstrated experience and results to include knowledge of training requirements, mission requirements, with the ability to communicate accurately and effectively with … Responsibilities: PAI SMEs shall analyze, evaluate, interpret, and disseminate information on political, economic, social, cultural, physical, geographic, or scientific conditions and trends. PAI SMEs shall fuse PAI for multi-intelligence product development, including outlining regional and ideological discussions in specific foreign language media environments. PAI Analyst are responsible for researching, developing, and presenting PAI intelligence products at the More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Incident Response Manager

Reading, Berkshire, South East, United Kingdom
La Fosse
rapid coordination across business units and leveraging tools like Splunk and Defender to contain and mitigate threats Design, maintain, and continuously enhance playbooks, response frameworks, and tabletop exercises, incorporating threat intelligence and detection insights from CrowdStrike and Splunk to mature IR readiness. Lead root cause analysis and develop actionable remediation plans; deliver executive-level reporting and trend analysis More ❯
Employment Type: Contract
Rate: £635 - 675 per day
Posted:

Global Investigator

London, United Kingdom
Hybrid / WFH Options
Hedera Hashgraph
TRM Labs is a blockchain intelligence company committed to fighting crime and creating a safer world. By leveraging blockchain data, threat intelligence, and advanced analytics, our products empower governments, financial institutions, and crypto businesses to combat illicit activity and global security threats. At TRM, you'll join a mission-driven, fast-paced team made up of experts … in law enforcement, data science, engineering, and financial intelligence, tackling complex global challenges daily. Whether analyzing blockchain data, developing cutting-edge tools, or collaborating with global organizations, you'll have the opportunity to make a meaningful and lasting impact. As a member of the Global Investigations Team, you will conduct ad hoc investigations, time sensitive blockchain analysis for our … partners, and develop solutions that allow TRM to scale rapidly and effectively. You will collaborate with an experienced team of blockchain intelligence experts, engineers, and data scientists to deliver cutting-edge support to TRM's clients. The impact you'll have here: Investigate complex cases involving phishing, blockchain exploits, hacks, terrorism finance, account take overs (ATOs), money laundering, sim More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Threat Intelligence
10th Percentile
£45,000
25th Percentile
£49,188
Median
£67,500
75th Percentile
£82,500
90th Percentile
£111,500