Counterintelligence (CI) Officer will conduct defensive CI activities in support of the NGA mission. Duties may include: Conduct daily research to gather, assimilate, evaluate and interpret information concerning intelligence, terrorism and espionage threats against NGA personnel, programs, technology and information systems and/or facilities and the National System for GEOINT (NSG). Provide daily CI analyses for distribution … to selected parties within NGA, the DoD, and the Intelligence Community. Assimilate, evaluate and interpret all-source information related to NGA from an operational security perspective. Publish intelligence with recommendations for mitigation and countermeasures, as appropriate. Detect and assess anomalous activities for links to possible foreign intelligence collection within NGA with recommended countermeasures. Immediately alert the government … to imminent foreign intelligence, terrorism and espionage threats with recommended countermeasures. Provide analytical forecasts of foreign intelligence, terrorism and espionage threats against NGA as requested with recommended countermeasures. Provide CI assessments of proposed international agreements involving GEOINT sharing as requested. Provide annual CI threat analyses of foreign intelligence and terrorism threats to NGA employees assigned to More ❯
With 1,000 intelligence professionals, over $300M in sales, and serving over 1,900 clients worldwide, Recorded Future is the world's most advanced, and largest, intelligence company! Recorded Future is looking to hire an In-House Counsel to support the EMEA region focussing on the DACH region and ad hoc general legal matters globally. Reporting to the … Recorded Future employees (or "Futurists"), represent over 40 nationalities and embody our core values of having high standards, practicing inclusion, and acting ethically. Our dedication to empowering clients with intelligence to disrupt adversaries has earned us a 4.8-star user rating from Gartner and more than 45 of the Fortune 100 companies as clients. Want more info? Blog & Podcast … Learn everything you want to know (and maybe some things you'd rather not know) about the world of cyber threatintelligence Linkedin , Instagram &Twitter : What's happening at Recorded Future The Record : The Record is a cybersecurity news publication that explores the untold stories in this rapidly changing field Timeline : History of Recorded Future Recognition : Check out More ❯
Surrey, England, United Kingdom Hybrid / WFH Options
Sanderson
business units - Act as a security advocate and guide cross-functional teams in secure practices. Lead technical initiatives - Provide hands-on leadership and mentor more junior team members. Conduct threat and vulnerability assessments - Take a proactive role in identifying potential security threats. Skills and experience required: Strong experience in risk & controls within the information security, ideally in a regulated … complex enterprise environments (e.g., multiple sites, technologies). Hands-on leadership in technical InfoSec initiatives. Strong understanding and implementation of control frameworks (NIST CSF, COBIT). Ability to run threatintelligence and vulnerability assessments. Experience collaborating with 2nd and 3rd line governance teams (e.g., audit, compliance). Strong stakeholder engagement and influencing skills. Reasonable Adjustments: Respect and equality More ❯
CyberOps Planner The Ascendancy Group's Mission To be the unequaled provider of special operations forces (SOF) and Intelligence Community focused technical, service, and training-based solutions. Overview The CyberOps Planner position is a full-time position supporting operational planning, integration, and execution of cyberspace operations in coordination with Joint, Interagency, and Coalition partners as part of Operations in … component, or combatant command Proficient in cyber doctrine, including JP 3-12 (Cyberspace Operations), JP 5-0 (Joint Planning), and related guidance Familiarity with cyberspace targeting, access operations, cyber threatintelligence, and force employment models Preferred Qualifications: Graduate of a recognized Joint Planning Course (e.g., SAASS, or SAMS, or JAWS, or SAWS, or JIOPC) Experience supporting Combatant Command … relationships, reputation, and trust. We are passionate about everything we do. One hundred percent of our government-focused teammates are former members of the Department of Defense or the Intelligence Community who still believe in supporting our nation. We offer like-minded individuals the opportunity to continue working in small teams on unique and challenging problem sets that further More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Hays
Security technical assurance program. Testing and verifying the effectiveness of security controls and mitigating threats. Document outcomes of testing and assurance activity and discuss findings with key stakeholders. Undertake threatintelligence and data leakage. Reviewing, writing and updating the organisation's policies, standards and procedures. What you need to do now If you're interested in this role More ❯
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threatintelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threatintelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threatintelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threatintelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
london (city of london), south east england, united kingdom
Iceberg
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threatintelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
Account Executives and support them with background research and context. Collaborate with marketing to provide feedback on campaign performance and market signals. Stay up to date on cybersecurity trends, threatintelligence, and The clients products and value proposition. You’ll need: 1-2 years’ experience in a sales or business development role, ideally in B2B SaaS or cybersecurity. More ❯
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
london, south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
slough, south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
Reed
of technical talent acquisition, capability building, and organisational change within a security context. Day-to-day of the role: Partner with cyber security leadership to define workforce needs across threatintelligence, governance, engineering, and operations. Develop and implement talent strategies to attract, retain, and grow cyber professionals. Support skills gap analysis and capability mapping across the cyber function. More ❯
across networks, systems, and app security Excellent communicator who thrives in client-facing roles SC clearance eligible (DV a bonus)/(OSCP bonus) Bonus Points For: R&D or threat intel experience Application testing or ISO17025 environments That hacker mindset we all love We care about passion and skill, not paper. No degree? No problem. Join us to work More ❯
Welwyn Garden City, Hertfordshire, United Kingdom Hybrid / WFH Options
Pontoon
What We're Looking For: To thrive in this role, you should possess the following technical skills and experience: Cyber Security Tools : Hands-on experience with SOAR platforms and ThreatIntelligence Platforms. Programming Expertise : Proficiency in Python script with a solid experience of REST APIs to develop and interact with them effectively. Framework Knowledge : Familiarity with the MITRE … ATT&CK framework or equivalent, including knowledge of emerging threat actor tactics, techniques, and procedures. Operating Systems : Experience and working knowledge of both Linux and Windows platforms. Public Cloud Experience: Familiarity with working in public cloud environments is a plus! Adecco is a disability-confident employer. It is important to us that we run an inclusive and accessible recruitment More ❯
DLS Engineering is seeking an Intelligence Analyst (OSINT/PAI) supporting the US Space Force in Colorado Springs, CO. The Intelligence Support Analyst is responsible for collecting, analyzing, and reporting on information derived from publicly available sources to support sensitive activities, operations, threat assessments, due diligence, or online research efforts. This role involves leveraging advanced tools, methodologies … and tradecraft to produce actionable intelligence from social media, news media, geospatial data, public records, forums, and other open sources. Intelligence Analyst Key Responsibilities: - Conduct systematic collection and analysis of publicly available information (PAI), including social media platforms, online forums, news outlets, and government databases. - Develop and maintain Online Vulnerability Assessment (OVA) reports, threat assessments, and intelligence briefings tailored to operational or client needs. - Identify emerging threats, trends, or patterns relevant to security, geopolitical risk, cyber threats, fraud, or reputational risk. - Utilize Open-Source Intelligence (OSINT) tools and platforms (e.g., Maltego, Babel Street, Echosec, ShadowDragon, etc.) and adhere to ethical and legal collection standards. - Monitor social media and online platforms for indicators of threatMore ❯
as power-projection platforms to provide Force Protection and Security, combat support maintenance and sustainment, mission enhancements and engineering capability. Integrate warfighting team training evolutions tailored to the latest threatintelligence and combatant commander needs and requirements. EDUCATION/TRAINING Minimum: High School Diploma Preferred: Bachelor's Degree EXPERIENCE Seven or more years working in acquisitions and/ More ❯
Nashville, Tennessee, United States Hybrid / WFH Options
Broadcast Music, Inc
THE JOB Essential Functions: which may be representative but not all inclusive of those commonly associated with this position. Responds to information and cyber security incidents by analyzing logs, threat intel, and other sources of information. Functions as a liaison between the Technical Security team and business units to track and monitor incident response and provide status updates as … deployment of specialized controls, standards, or infrastructure changes, and/or changes in development processes. Identifies and resolves any false positive findings in assessment results. Maintains knowledge of the threat landscape and intelligence feeds to identify and triage new threats and vulnerabilities targeting BMI. Serves as a point of contact on issues, dependencies, and risks related to vulnerability More ❯
The Woodlands, TX Key Responsibilities: Works closely with internal technology teams, business stakeholders, MSSP, and outside vendors to research, analyze and monitor security threats. Mentors other analysts responsible for threat intel, incident response, network, cloud, endpoint and database security. Deploys and manages security solutions to assist with logging, alerting, and threat analysis. Security system monitoring and alerting appropriate … systems administration experience required. 2+ years' EDR management experience required. 1+ years' SIEM management experience required. Other beneficial experience, (i.e., VA, IPS, Cloud Security, Routing and Switching, Vulnerability Management, Threat Reputation/Intel Solution, CASB, Python, or Automation/Orchestration), preferred. Competencies Required: Demonstrated success in managing, analyzing, and solving complex network technical issues. Technical knowledge of security configurations More ❯
Wilmslow, Cheshire, United Kingdom Hybrid / WFH Options
ID Co
issues and own remediations. Knowledge of security operations and incident management, including configuration, operation, and maintenance of secure systems, detection and response to incidents, and collection and use of threat intelligence. Knowledge of security management systems and organisational security controls, including standards, best practices, and approaches to risk assessment and mitigation. Knowledge of human factors, including usable security, social … issues and own remediations. Knowledge of security operations and incident management, including configuration, operation, and maintenance of secure systems, detection and response to incidents, and collection and use of threat intelligence. Knowledge of security management systems and organisational security controls, including standards, best practices, and approaches to risk assessment and mitigation. Knowledge of human factors, including usable security, social More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
highly skilled SOC Solutions Engineer to enhance security operations and strengthen detection & response strategies. This is a hands-on engineering role focused on IBM QRadar, playbook automation, and advanced threat modelling to deliver cutting-edge security solutions. What you'll do: SIEM Engineering & Management: Deploy, configure, and optimise QRadar. Onboard log sources from cloud/on-prem environments. Build … detection and anomaly rules. Playbook Development & Automation: Design and implement automated response playbooks (phishing, lateral movement, exfiltration) with SOAR tools (e.g., Logic Apps, XSOAR). Threat Detection & Response: Investigate alerts, enrich detection logic with threat intel, coordinate incident response. Threat Modelling & Use Case Development: Apply MITRE ATT&CK, STRIDE, and Kill Chain frameworks to build detection use … security (SOC/NOC environment preferred). Strong knowledge of log parsing, SIEM query languages (KQL, SPL, AQL), and automation with Python/PowerShell. Deep understanding of incident response, threat detection, and frameworks (MITRE, NIST, CIS). Knowledge of vulnerability scanning, penetration testing, and network traffic analysis. Familiarity with ITIL processes (Incident, Problem, Change). Excellent stakeholder communication, with More ❯