Threat Intelligence Job Vacancies

276 to 300 of 308 Threat Intelligence Jobs

Counterintelligence (CI) Officer 127-003 with Security Clearance

Saint Louis, Missouri, United States
IC-CAP
Counterintelligence (CI) Officer will conduct defensive CI activities in support of the NGA mission. Duties may include: Conduct daily research to gather, assimilate, evaluate and interpret information concerning intelligence, terrorism and espionage threats against NGA personnel, programs, technology and information systems and/or facilities and the National System for GEOINT (NSG). Provide daily CI analyses for distribution … to selected parties within NGA, the DoD, and the Intelligence Community. Assimilate, evaluate and interpret all-source information related to NGA from an operational security perspective. Publish intelligence with recommendations for mitigation and countermeasures, as appropriate. Detect and assess anomalous activities for links to possible foreign intelligence collection within NGA with recommended countermeasures. Immediately alert the government … to imminent foreign intelligence, terrorism and espionage threats with recommended countermeasures. Provide analytical forecasts of foreign intelligence, terrorism and espionage threats against NGA as requested with recommended countermeasures. Provide CI assessments of proposed international agreements involving GEOINT sharing as requested. Provide annual CI threat analyses of foreign intelligence and terrorism threats to NGA employees assigned to More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Legal Counsel, EMEA

London, United Kingdom
Recorded Future
With 1,000 intelligence professionals, over $300M in sales, and serving over 1,900 clients worldwide, Recorded Future is the world's most advanced, and largest, intelligence company! Recorded Future is looking to hire an In-House Counsel to support the EMEA region focussing on the DACH region and ad hoc general legal matters globally. Reporting to the … Recorded Future employees (or "Futurists"), represent over 40 nationalities and embody our core values of having high standards, practicing inclusion, and acting ethically. Our dedication to empowering clients with intelligence to disrupt adversaries has earned us a 4.8-star user rating from Gartner and more than 45 of the Fortune 100 companies as clients. Want more info? Blog & Podcast … Learn everything you want to know (and maybe some things you'd rather not know) about the world of cyber threat intelligence Linkedin , Instagram &Twitter : What's happening at Recorded Future The Record : The Record is a cybersecurity news publication that explores the untold stories in this rapidly changing field Timeline : History of Recorded Future Recognition : Check out More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Security Analyst / Hybrid

Surrey, England, United Kingdom
Hybrid / WFH Options
Sanderson
business units - Act as a security advocate and guide cross-functional teams in secure practices. Lead technical initiatives - Provide hands-on leadership and mentor more junior team members. Conduct threat and vulnerability assessments - Take a proactive role in identifying potential security threats. Skills and experience required: Strong experience in risk & controls within the information security, ideally in a regulated … complex enterprise environments (e.g., multiple sites, technologies). Hands-on leadership in technical InfoSec initiatives. Strong understanding and implementation of control frameworks (NIST CSF, COBIT). Ability to run threat intelligence and vulnerability assessments. Experience collaborating with 2nd and 3rd line governance teams (e.g., audit, compliance). Strong stakeholder engagement and influencing skills. Reasonable Adjustments: Respect and equality More ❯
Employment Type: Full-Time
Salary: Salary negotiable
Posted:

CyberOps Planner with Security Clearance

Tampa, Florida, United States
Ascendancy Group Ltd, The
CyberOps Planner The Ascendancy Group's Mission To be the unequaled provider of special operations forces (SOF) and Intelligence Community focused technical, service, and training-based solutions. Overview The CyberOps Planner position is a full-time position supporting operational planning, integration, and execution of cyberspace operations in coordination with Joint, Interagency, and Coalition partners as part of Operations in … component, or combatant command Proficient in cyber doctrine, including JP 3-12 (Cyberspace Operations), JP 5-0 (Joint Planning), and related guidance Familiarity with cyberspace targeting, access operations, cyber threat intelligence, and force employment models Preferred Qualifications: Graduate of a recognized Joint Planning Course (e.g., SAASS, or SAMS, or JAWS, or SAWS, or JIOPC) Experience supporting Combatant Command … relationships, reputation, and trust. We are passionate about everything we do. One hundred percent of our government-focused teammates are former members of the Department of Defense or the Intelligence Community who still believe in supporting our nation. We offer like-minded individuals the opportunity to continue working in small teams on unique and challenging problem sets that further More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Technical Assurance Lead

Cardiff, South Glamorgan, Wales, United Kingdom
Hybrid / WFH Options
Hays
Security technical assurance program. Testing and verifying the effectiveness of security controls and mitigating threats. Document outcomes of testing and assurance activity and discuss findings with key stakeholders. Undertake threat intelligence and data leakage. Reviewing, writing and updating the organisation's policies, standards and procedures. What you need to do now If you're interested in this role More ❯
Employment Type: Contract, Work From Home
Rate: £500.0 - £650.0 per day + £500-£650 Per Day
Posted:

Incident Response Lawyer

London Area, United Kingdom
Iceberg
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threat intelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
Posted:

Incident Response Lawyer

City of London, London, United Kingdom
Iceberg
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threat intelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
Posted:

Incident Response Lawyer

slough, south east england, united kingdom
Iceberg
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threat intelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
Posted:

Incident Response Lawyer

london, south east england, united kingdom
Iceberg
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threat intelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
Posted:

Incident Response Lawyer

london (city of london), south east england, united kingdom
Iceberg
services. This award-winning cyber group is uniquely positioned at the intersection of law, digital forensics, and strategic response. With capabilities that span incident response, regulatory strategy, privacy law, threat intelligence, security controls, and tech litigation, they’re rewriting how legal support is delivered in high-pressure digital environments. What You’ll Be Doing You’ll play a More ❯
Posted:

EMEA Sales development Representative

London, South East, England, United Kingdom
Progresso Search
Account Executives and support them with background research and context. Collaborate with marketing to provide feedback on campaign performance and market signals. Stay up to date on cybersecurity trends, threat intelligence, and The clients products and value proposition. You’ll need: 1-2 years’ experience in a sales or business development role, ideally in B2B SaaS or cybersecurity. More ❯
Employment Type: Full-Time
Salary: £40,000 - £45,000 per annum
Posted:

Cybersecurity Consultant – Senior Manager

London Area, United Kingdom
Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
Posted:

Cybersecurity Consultant – Senior Manager

City of London, London, United Kingdom
Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
Posted:

Cybersecurity Consultant – Senior Manager

london, south east england, united kingdom
Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
Posted:

Cybersecurity Consultant – Senior Manager

london (city of london), south east england, united kingdom
Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
Posted:

Cybersecurity Consultant – Senior Manager

slough, south east england, united kingdom
Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with a clear focus on measurable outcomes. Mentor and support junior and mid-level consultants — building team capability and consulting excellence. More ❯
Posted:

Cyber Security HR Specialist

Sheffield, South Yorkshire, England, United Kingdom
Hybrid / WFH Options
Reed
of technical talent acquisition, capability building, and organisational change within a security context. Day-to-day of the role: Partner with cyber security leadership to define workforce needs across threat intelligence, governance, engineering, and operations. Develop and implement talent strategies to attract, retain, and grow cyber professionals. Support skills gap analysis and capability mapping across the cyber function. More ❯
Employment Type: Contractor
Rate: £400 - £475 per day, Inc benefits
Posted:

Penetration Tester

United Kingdom
Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
across networks, systems, and app security Excellent communicator who thrives in client-facing roles SC clearance eligible (DV a bonus)/(OSCP bonus) Bonus Points For: R&D or threat intel experience Application testing or ISO17025 environments That hacker mindset we all love We care about passion and skill, not paper. No degree? No problem. Join us to work More ❯
Posted:

SOAR Engineer - Security Orchestration, Automation & Response

Welwyn Garden City, Hertfordshire, United Kingdom
Hybrid / WFH Options
Pontoon
What We're Looking For: To thrive in this role, you should possess the following technical skills and experience: Cyber Security Tools : Hands-on experience with SOAR platforms and Threat Intelligence Platforms. Programming Expertise : Proficiency in Python script with a solid experience of REST APIs to develop and interact with them effectively. Framework Knowledge : Familiarity with the MITRE … ATT&CK framework or equivalent, including knowledge of emerging threat actor tactics, techniques, and procedures. Operating Systems : Experience and working knowledge of both Linux and Windows platforms. Public Cloud Experience: Familiarity with working in public cloud environments is a plus! Adecco is a disability-confident employer. It is important to us that we run an inclusive and accessible recruitment More ❯
Employment Type: Contract
Rate: £800 - £850/day Inside IR35
Posted:

Space Force Intelligence Analyst (OSINT/PAI) with Security Clearance

Colorado Springs, Colorado, United States
recruiting savvy
DLS Engineering is seeking an Intelligence Analyst (OSINT/PAI) supporting the US Space Force in Colorado Springs, CO. The Intelligence Support Analyst is responsible for collecting, analyzing, and reporting on information derived from publicly available sources to support sensitive activities, operations, threat assessments, due diligence, or online research efforts. This role involves leveraging advanced tools, methodologies … and tradecraft to produce actionable intelligence from social media, news media, geospatial data, public records, forums, and other open sources. Intelligence Analyst Key Responsibilities: - Conduct systematic collection and analysis of publicly available information (PAI), including social media platforms, online forums, news outlets, and government databases. - Develop and maintain Online Vulnerability Assessment (OVA) reports, threat assessments, and intelligence briefings tailored to operational or client needs. - Identify emerging threats, trends, or patterns relevant to security, geopolitical risk, cyber threats, fraud, or reputational risk. - Utilize Open-Source Intelligence (OSINT) tools and platforms (e.g., Maltego, Babel Street, Echosec, ShadowDragon, etc.) and adhere to ethical and legal collection standards. - Monitor social media and online platforms for indicators of threat More ❯
Employment Type: Permanent
Salary: USD 130,000 Annual
Posted:

Mission Operations IV -- SpOC/Mission Delta 3 Force Presentation with Security Clearance

Colorado Springs, Colorado, United States
Aleut Federal LLC
as power-projection platforms to provide Force Protection and Security, combat support maintenance and sustainment, mission enhancements and engineering capability. Integrate warfighting team training evolutions tailored to the latest threat intelligence and combatant commander needs and requirements. EDUCATION/TRAINING Minimum: High School Diploma Preferred: Bachelor's Degree EXPERIENCE Seven or more years working in acquisitions and/ More ❯
Employment Type: Permanent
Salary: USD 129,000 Annual
Posted:

Security Engineer Remote

Nashville, Tennessee, United States
Hybrid / WFH Options
Broadcast Music, Inc
THE JOB Essential Functions: which may be representative but not all inclusive of those commonly associated with this position. Responds to information and cyber security incidents by analyzing logs, threat intel, and other sources of information. Functions as a liaison between the Technical Security team and business units to track and monitor incident response and provide status updates as … deployment of specialized controls, standards, or infrastructure changes, and/or changes in development processes. Identifies and resolves any false positive findings in assessment results. Maintains knowledge of the threat landscape and intelligence feeds to identify and triage new threats and vulnerabilities targeting BMI. Serves as a point of contact on issues, dependencies, and risks related to vulnerability More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity EDR Analyst

Spring, Texas, United States
Hybrid / WFH Options
INSPYR Solutions
The Woodlands, TX Key Responsibilities: Works closely with internal technology teams, business stakeholders, MSSP, and outside vendors to research, analyze and monitor security threats. Mentors other analysts responsible for threat intel, incident response, network, cloud, endpoint and database security. Deploys and manages security solutions to assist with logging, alerting, and threat analysis. Security system monitoring and alerting appropriate … systems administration experience required. 2+ years' EDR management experience required. 1+ years' SIEM management experience required. Other beneficial experience, (i.e., VA, IPS, Cloud Security, Routing and Switching, Vulnerability Management, Threat Reputation/Intel Solution, CASB, Python, or Automation/Orchestration), preferred. Competencies Required: Demonstrated success in managing, analyzing, and solving complex network technical issues. Technical knowledge of security configurations More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Operations Lead

Wilmslow, Cheshire, United Kingdom
Hybrid / WFH Options
ID Co
issues and own remediations. Knowledge of security operations and incident management, including configuration, operation, and maintenance of secure systems, detection and response to incidents, and collection and use of threat intelligence. Knowledge of security management systems and organisational security controls, including standards, best practices, and approaches to risk assessment and mitigation. Knowledge of human factors, including usable security, social … issues and own remediations. Knowledge of security operations and incident management, including configuration, operation, and maintenance of secure systems, detection and response to incidents, and collection and use of threat intelligence. Knowledge of security management systems and organisational security controls, including standards, best practices, and approaches to risk assessment and mitigation. Knowledge of human factors, including usable security, social More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SOC Solutions Engineer

City of London, London, United Kingdom
Hybrid / WFH Options
Anson Mccade
highly skilled SOC Solutions Engineer to enhance security operations and strengthen detection & response strategies. This is a hands-on engineering role focused on IBM QRadar, playbook automation, and advanced threat modelling to deliver cutting-edge security solutions. What you'll do: SIEM Engineering & Management: Deploy, configure, and optimise QRadar. Onboard log sources from cloud/on-prem environments. Build … detection and anomaly rules. Playbook Development & Automation: Design and implement automated response playbooks (phishing, lateral movement, exfiltration) with SOAR tools (e.g., Logic Apps, XSOAR). Threat Detection & Response: Investigate alerts, enrich detection logic with threat intel, coordinate incident response. Threat Modelling & Use Case Development: Apply MITRE ATT&CK, STRIDE, and Kill Chain frameworks to build detection use … security (SOC/NOC environment preferred). Strong knowledge of log parsing, SIEM query languages (KQL, SPL, AQL), and automation with Python/PowerShell. Deep understanding of incident response, threat detection, and frameworks (MITRE, NIST, CIS). Knowledge of vulnerability scanning, penetration testing, and network traffic analysis. Familiarity with ITIL processes (Incident, Problem, Change). Excellent stakeholder communication, with More ❯
Employment Type: Permanent, Work From Home
Posted:
Threat Intelligence
10th Percentile
£43,000
25th Percentile
£54,250
Median
£74,000
75th Percentile
£90,000
90th Percentile
£110,000