Threat Intelligence Job Vacancies

51 to 75 of 352 Threat Intelligence Jobs

Cyber Threat Intelligence Analyst - TTP Focus with Security Clearance

Huntsville, Alabama, United States
Hybrid / WFH Options
OSAAVA Services
Position Overview: We are seeking a skilled Cyber Threat Intelligence (CTI) Analyst with a focus on adversary Tactics, Techniques, and Procedures (TTPs) to support cyber defense operations in a mission-critical DoD environment. This position requires strong analytical abilities to assess and track cyber adversaries, identify trends and attack patterns, and provide actionable intelligence for both defensive … and proactive cyber operations. As a member of a multidisciplinary threat intelligence team, you will work closely with cyber defenders, incident responders, and stakeholders to enrich detection capabilities and enhance the organization's overall cybersecurity posture. Key Responsibilities: Analyze, document, and track adversary TTPs using frameworks like MITRE ATT&CK, and integrate findings into threat detection strategies. … Produce detailed cyber threat intelligence reports, briefings, and technical advisories for internal and external stakeholders. Fuse data from multiple sources (e.g., open-source intel, classified feeds, threat hunting) to provide a holistic threat picture. Collaborate with SOC and Incident Response teams to inform detections and investigations based on threat intelligence findings. Monitor and report More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Consultant Penetration Tester

London, United Kingdom
Applicable Limited
The team you'll be working with: Consultant - Offensive Security Testing Role Overview: We are seeking a highly skilled and experienced Offensive Security Consultant with a strong focus on threat intelligence and attack methods. The ideal candidate will manage and conduct advanced penetration testing engagements, leveraging threat intelligence to simulate real-world attacks across various environments … provide strategic, actionable recommendations to enhance our clients' security posture. What you'll be doing: Responsibilities: Lead and manage the full lifecycle of complex penetration testing engagements, applying a threat intelligence-led approach. Execute advanced penetration tests across environments such as applications, infrastructure, web, APIs, O365, Azure, AWS, and OT, using current threat landscape knowledge and attacker … TTPs. Develop and maintain detailed test plans and use cases informed by threat intelligence analysis. Identify and prioritize critical OT and IT assets based on potential threats and exposure. Plan and schedule testing engagements based on threat assessments and client needs. Produce clear, detailed reports with technical findings, business impact, and strategic remediation recommendations for diverse audiences. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SOC MANAGER - FLORIDA - URGENT with Security Clearance

Boca Raton, Florida, United States
Cyberstrike Group
a diverse SOC team of Tier 1, 2, and 3 analysts Coordinate incident response efforts, working closely with internal departments (e.g., IT, Risk, Legal) and external partners (e.g., MSSPs, threat intelligence providers) Lead post-incident analysis to determine root causes and implement corrective actions Regularly review and enhance SOC processes, including playbooks, response protocols, and threat hunting … field. 6+ years of cybersecurity experience, with at least 2 years in a SOC leadership role Expertise in cybersecurity frameworks (e.g., MITRE ATT&CK, NIST, CIS), incident response, and threat intelligence In-depth knowledge of security operations, including SIEM, EDR, IDS/IPS, malware analysis, and vulnerability management Strong background in cloud security operations and monitoring across AWS … Azure, and GCP Preferred Proven success in incident resolution within SLAs and based on severity. Experience in threat hunting, digital forensics, or malware analysis. Knowledge of advanced persistent threats (APTs) and contemporary attack techniques. Proficiency in security automation (SOAR), orchestration, and scripting (e.g., Python, PowerShell). Preferred certifications: CISSP, CISM, CEH, or similar. Familiarity with DevSecOps, CI/CD More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Director of Cyber Operations

Cambridge, England, United Kingdom
SoCode Recruitment
a seasoned and visionary cybersecurity leader to head global security operations at an innovative, fast-paced technology organisation. This role will drive the strategic and operational excellence of our threat detection, incident response, and vulnerability management functions across a globally distributed digital estate. Reporting directly to the Chief Information Security Officer (CISO), this high-impact position is responsible for … growth, and cybersecurity thought leadership across the business. What You’ll Be Doing: Shape and deliver the long-term roadmap for detection and response aligned with business strategy and threat landscape. Lead a highly skilled global team in building scalable, responsive, and intelligence-driven capabilities. Evolve functions such as Threat Intelligence, Security Testing, and Analytics to … enterprise. Strong executive communication skills, with the ability to translate complex risk issues into business-relevant insight and strategy. A strategic thinker with deep domain knowledge across enterprise security, threat intelligence, and incident response, and who can effectively influence C-Suite stakeholders. Demonstrated experience leading and mentoring cross-functional, high-performing teams with a focus on development and More ❯
Posted:

Senior Cyber Security Specialist

Greater Bristol Area, United Kingdom
Naviro
Cyber Operations and GRC, ensuring UK-specific compliance and security resilience. Role: Security Incidents: Oversee incident management and response, including root cause analysis, impact assessment, and post-incident reviews. Threat Management: Develop and refine threat intelligence, threat hunting capabilities, and prevention/detection measures. Security Technologies: Configure, maintain, and optimise security platforms (SIEM/XDR, EDR … to UK cyber security regulations, including UK GDPR, Cyber Essentials, and any industry-specific security requirements. Skills and Experience: 5–7 years' experience in security operations, engineering, or cyber threat management. Strong knowledge of SIEM, XDR, EDR, vulnerability management, firewalls, and network security. Hands-on experience in security control implementation and maintenance (e.g. ISO27001, Cyber Essentials). Familiarity with More ❯
Posted:

SOC Analyst - DV, SC, SECURITY

South West, England, United Kingdom
Adecco
monitoring, logging, and compliance frameworks* Excellent analytical skills and a keen eye for detail* Strong written and verbal communication skills Desirable: * An interest in or basic understanding of cyber threat intelligence, including how attackers operate and how to spot signs of compromise (e.g., suspicious files, unusual behaviour, or known attack patterns)* Relevant cyber security or networking certifications (e.g. … Excellent benefits package* Opportunities for professional development and certification* A collaborative and secure working environment* Fully on-site role with no shift work Keywords: SOC Analyst, SIEM, Incident Response, Threat Intelligence, Cyber Security, Network Security, Compliance, Logging, Monitoring, Security Operations, SC Clearance, DV Clearance, Wiltshire Jobs, British Nationals Only, Security Assessments, Cyber Qualifications, Networking Certifications, Cyber Threats, IOCs More ❯
Employment Type: Full-Time
Salary: £40,000 - £46,000 per annum
Posted:

Cyber Security Analyst

United Kingdom
Pentest People
Our innovative approach to security testing merges the benefits of consultant-led penetration testing with ongoing vulnerability assurance through our advanced SecurePortal. This provides clients with a continuous, living threat management system throughout the duration of the contract, rather than a single point-in-time assessment. We are expanding our Incident Response team and are looking for a DFIR … future incidents. Key Responsibilities: Conduct initial incident assessments and support ongoing Incident Response (IR) management. Participate in live IR operations, including digital forensics and data acquisition. Perform security assessments, threat intelligence gathering, and OSINT analysis. Collaborate with internal teams to deliver a holistic cybersecurity service. Engage with clients regularly to collect relevant logs and gain infrastructure access for … incidents to minimise disruption. Strong communication skills with the ability to stay calm and effective under pressure. Able to align client deliverables with industry best practices. Skilled in proactive threat intelligence and analysis to support IR operations. Proactive, responsible, and eager to contribute to the growth of the Incident Response team. While this role is advertised as remote More ❯
Posted:

SOC Analyst

Hemel Hempstead, Hertfordshire, England, United Kingdom
Fynity
environments Investigating events using system logs, network traffic, and endpoint telemetry Supporting containment and recovery efforts during active security incidents Continuously enhancing SOC capabilities, tooling, and detection rules using threat-informed approaches like MITRE ATT&CK Producing detailed incident reports and documentation for both technical and non-technical stakeholders Assisting with threat intelligence activities as needed Staying … Hands-on experience working in a Security Operations Centre (SOC) Solid knowledge of SIEM tools such as Microsoft Sentinel or Splunk Familiarity with the MITRE ATT&CK framework and threat detection methodologies Strong analytical skills with a keen eye for detail in log analysis and network monitoring Basic understanding of enterprise security architecture including firewalls, VPNs, AV, and web More ❯
Employment Type: Full-Time
Salary: £10,000 per annum
Posted:

Senior UEBA Security Engineer

Florissant, Missouri, United States
Hybrid / WFH Options
Centene
highly skilled Senior UEBA (User and Entity Behavior Analytics) Engineer to lead the implementation, and optimization of advanced security analytics solutions. The ideal candidate will possess deep expertise in threat detection, data analysis, and behavioral analytics, driving initiatives to enhance the organization's security posture through proactive monitoring and anomaly detection. This role requires a deep understanding of security … analytics, behavioral baselining, data integration, and threat detection methodologies. This role will serve as a key technical leader, mentor, and strategic advisor within the cybersecurity team to enhance threat detection and overall security posture. Solution Design & Leadership: Architect and maintain scalable UEBA solutions, integrating with SIEMs, data lakes, and other security technologies. Design & Implementation: Deploy and configure UEBA … in-depth analysis and investigation of alerts triggered by anomalous behavior. Incident Response Support: Provide expert guidance and technical analysis for security incidents involving anomalous user and entity behavior. Threat Hunting: Assist in proactive threat hunting efforts using behavioral insights from the UEBA platform. Optimization: Continuously fine-tune analytics models to reduce false positives and improve detection capabilities. More ❯
Employment Type: Permanent
Salary: USD 76 Hourly
Posted:

Senior UEBA Security Engineer

Columbia, Missouri, United States
Hybrid / WFH Options
Centene
highly skilled Senior UEBA (User and Entity Behavior Analytics) Engineer to lead the implementation, and optimization of advanced security analytics solutions. The ideal candidate will possess deep expertise in threat detection, data analysis, and behavioral analytics, driving initiatives to enhance the organization's security posture through proactive monitoring and anomaly detection. This role requires a deep understanding of security … analytics, behavioral baselining, data integration, and threat detection methodologies. This role will serve as a key technical leader, mentor, and strategic advisor within the cybersecurity team to enhance threat detection and overall security posture. Solution Design & Leadership: Architect and maintain scalable UEBA solutions, integrating with SIEMs, data lakes, and other security technologies. Design & Implementation: Deploy and configure UEBA … in-depth analysis and investigation of alerts triggered by anomalous behavior. Incident Response Support: Provide expert guidance and technical analysis for security incidents involving anomalous user and entity behavior. Threat Hunting: Assist in proactive threat hunting efforts using behavioral insights from the UEBA platform. Optimization: Continuously fine-tune analytics models to reduce false positives and improve detection capabilities. More ❯
Employment Type: Permanent
Salary: USD 76 Hourly
Posted:

Senior UEBA Security Engineer

St. Louis, Missouri, United States
Hybrid / WFH Options
Centene
highly skilled Senior UEBA (User and Entity Behavior Analytics) Engineer to lead the implementation, and optimization of advanced security analytics solutions. The ideal candidate will possess deep expertise in threat detection, data analysis, and behavioral analytics, driving initiatives to enhance the organization's security posture through proactive monitoring and anomaly detection. This role requires a deep understanding of security … analytics, behavioral baselining, data integration, and threat detection methodologies. This role will serve as a key technical leader, mentor, and strategic advisor within the cybersecurity team to enhance threat detection and overall security posture. Solution Design & Leadership: Architect and maintain scalable UEBA solutions, integrating with SIEMs, data lakes, and other security technologies. Design & Implementation: Deploy and configure UEBA … in-depth analysis and investigation of alerts triggered by anomalous behavior. Incident Response Support: Provide expert guidance and technical analysis for security incidents involving anomalous user and entity behavior. Threat Hunting: Assist in proactive threat hunting efforts using behavioral insights from the UEBA platform. Optimization: Continuously fine-tune analytics models to reduce false positives and improve detection capabilities. More ❯
Employment Type: Permanent
Salary: USD 76 Hourly
Posted:

Senior UEBA Security Engineer

Jefferson City, Missouri, United States
Hybrid / WFH Options
Centene
highly skilled Senior UEBA (User and Entity Behavior Analytics) Engineer to lead the implementation, and optimization of advanced security analytics solutions. The ideal candidate will possess deep expertise in threat detection, data analysis, and behavioral analytics, driving initiatives to enhance the organization's security posture through proactive monitoring and anomaly detection. This role requires a deep understanding of security … analytics, behavioral baselining, data integration, and threat detection methodologies. This role will serve as a key technical leader, mentor, and strategic advisor within the cybersecurity team to enhance threat detection and overall security posture. Solution Design & Leadership: Architect and maintain scalable UEBA solutions, integrating with SIEMs, data lakes, and other security technologies. Design & Implementation: Deploy and configure UEBA … in-depth analysis and investigation of alerts triggered by anomalous behavior. Incident Response Support: Provide expert guidance and technical analysis for security incidents involving anomalous user and entity behavior. Threat Hunting: Assist in proactive threat hunting efforts using behavioral insights from the UEBA platform. Optimization: Continuously fine-tune analytics models to reduce false positives and improve detection capabilities. More ❯
Employment Type: Permanent
Salary: USD 76 Hourly
Posted:

Senior UEBA Security Engineer

Kansas City, Missouri, United States
Hybrid / WFH Options
Centene
highly skilled Senior UEBA (User and Entity Behavior Analytics) Engineer to lead the implementation, and optimization of advanced security analytics solutions. The ideal candidate will possess deep expertise in threat detection, data analysis, and behavioral analytics, driving initiatives to enhance the organization's security posture through proactive monitoring and anomaly detection. This role requires a deep understanding of security … analytics, behavioral baselining, data integration, and threat detection methodologies. This role will serve as a key technical leader, mentor, and strategic advisor within the cybersecurity team to enhance threat detection and overall security posture. Solution Design & Leadership: Architect and maintain scalable UEBA solutions, integrating with SIEMs, data lakes, and other security technologies. Design & Implementation: Deploy and configure UEBA … in-depth analysis and investigation of alerts triggered by anomalous behavior. Incident Response Support: Provide expert guidance and technical analysis for security incidents involving anomalous user and entity behavior. Threat Hunting: Assist in proactive threat hunting efforts using behavioral insights from the UEBA platform. Optimization: Continuously fine-tune analytics models to reduce false positives and improve detection capabilities. More ❯
Employment Type: Permanent
Salary: USD 76 Hourly
Posted:

Director, Security Assurance and Remediation (London)

Highgate, Greater London, UK
Hybrid / WFH Options
CLS-Group
resources to better use. CLS products are designed to enable clients to manage risk most effectively across the full FX lifecycle - whether through more efficient processing tools or market intelligence derived from the largest single source of FX executed data available to the market. Our ambition to make a positive difference starts with our people. Our values - Protect, Improve … improvements. Key member of the function who regularly reviews Security Policies, Standards and Controls and optimize position on areas associated to regulations and company strategy. Integrate processes with Cyber Threat Intelligence to ensure appropriate monitoring of the threat landscape for emerging security risks and ensure swift response to zero-day threats. Collaborating on Security Risk Management strategies … degree in computer science, Cybersecurity, Information Technology, or related field. Master's degree preferred. CRISC, CISM, CISA, CDPSE, or similar advanced security certifications. Advantageous to have experience in Artificial Intelligence, post quantum computing and cyber risk quantification. Considerable experience in cybersecurity, with notable experience in a senior or managerial role focused on security policy, standards, controls testing, governance, and More ❯
Employment Type: Full-time
Posted:

Senior Project Manager - Cyber Security

United Kingdom
Hybrid / WFH Options
Bridewell Consulting Limited
Implementation, Cyber Strategy, Cyber Risk Management, Data Privacy, Offensive Security, Security Architecture, and Cloud Security & Engineering. Lead the onboarding process for Managed Security Services including Managed Detection & Response, Cyber Threat Intelligence, and Vulnerability Management Services. Collaborate with technical teams to ensure seamless integration of managed services within clients' environments. Build and maintain strong relationships with internal teams and … Implementation, Cyber Strategy, Cyber Risk Management, Data Privacy, Offensive Security, Security Architecture, and Cloud Security & Engineering. Lead the onboarding process for Managed Security Services including Managed Detection & Response, Cyber Threat Intelligence, and Vulnerability Management Services. Collaborate with technical teams to ensure seamless integration of managed services within clients' environments. Build and maintain strong relationships with internal teams and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations Manager

Reading, Oxfordshire, United Kingdom
Hays Technology
also serves as a technical authority within the team and department. What you'll need to succeed Security Operations & Incident Response Lead security operations services, including monitoring, incident response, threat management, and intrusion detection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery … efforts with internal teams and vendors. Establish and manage threat intelligence processes to ensure timely remediation of vulnerabilities. Monitor and analyse performance metrics to support security troubleshooting and continuous improvement. Identity & Access Management Provide expert technical leadership for identity and access management, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of … Qualifications Degree or equivalent industry certification. Professional certification in security/identity (e.g. CREST, GIAC). ITIL Foundation certification. Incident response certification preferred. Technical Knowledge Proficient in SIEM, EDR, threat detection, and vulnerability management. Solid understanding of network security (firewalls, segmentation, IDS/IPS). Experience with Windows, Mac, Linux environments and security tooling. Familiarity with public cloud platforms More ❯
Employment Type: Permanent
Salary: GBP 57,696 - 73,039 Annual
Posted:

Security Operations Manager

Reading, Berkshire, South East, United Kingdom
Hays
also serves as a technical authority within the team and department. What you'll need to succeed Security Operations & Incident Response Lead security operations services, including monitoring, incident response, threat management, and intrusion detection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery … efforts with internal teams and vendors. Establish and manage threat intelligence processes to ensure timely remediation of vulnerabilities. Monitor and analyse performance metrics to support security troubleshooting and continuous improvement. Identity & Access Management Provide expert technical leadership for identity and access management, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of … Qualifications Degree or equivalent industry certification. Professional certification in security/identity (e.g. CREST, GIAC). ITIL Foundation certification. Incident response certification preferred. Technical Knowledge Proficient in SIEM, EDR, threat detection, and vulnerability management. Solid understanding of network security (firewalls, segmentation, IDS/IPS). Experience with Windows, Mac, Linux environments and security tooling. Familiarity with public cloud platforms More ❯
Employment Type: Permanent
Salary: £70,000
Posted:

Security Operations Lead

London, United Kingdom
Hybrid / WFH Options
Square Enix Co Ltd
Management (SIEM) platforms and the configuration of our wider security tools are key. We are also seeking candidates with experience leveraging AI to enhance productivity and effectiveness. Key Deliverables: Threat Detection & Incident Response Leading investigation and analysis of security alerts to identify and promptly respond to security events. Leading the response to major cyber security incidents, collaborating with key … improving our security operations processes, escalation paths and playbooks. Leveraging AI capabilities to enhance the effectiveness of our security capabilities and your own productivity in the role. Consuming relevant threat intelligence to drive proactive action within the Cyber Security and wider IT environment. Indicative Performance Measures Mean time for business recovery to C1 (Highest criticality) level security incidents … and following common response frameworks. Experience within the gaming industry providing security operations support to game releases, game infrastructure monitoring and live game operations. Strong appreciation of the cyber threat landscape and attacker tactics, techniques and procedures. Experience developing operational processes and playbooks. Desirable Interpersonal Skills: Ability to remain composed and effective during high-pressure situations. Clear focus on More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SOC Analyst - DV, SC, SECURITY

Wiltshire, United Kingdom
Adecco
monitoring, logging, and compliance frameworks Excellent analytical skills and a keen eye for detail Strong written and verbal communication skills Desirable: An interest in or basic understanding of cyber threat intelligence, including how attackers operate and how to spot signs of compromise (e.g., suspicious files, unusual behaviour, or known attack patterns) Relevant cyber security or networking certifications (e.g. More ❯
Employment Type: Permanent
Salary: GBP 40,000 - 46,000 Annual
Posted:

Security Consultant (Security Operations / SOC)

United Kingdom
Hybrid / WFH Options
Logiq
working collaboratively with them to help increase overall maturity. Setting proportionate goals and strategy for cyber exercising and implementing a plan to achieve this. The implementation of a comprehensive threat intelligence capability. Alignment of defensive cyber processes which have provided a measurable improvement for detect and respond functions. Using a suitable maturity model to the development of the … bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM More ❯
Posted:

Tier 1 SOC Analyst

Stone, Staffordshire, England, United Kingdom
Hybrid / WFH Options
Oscar Technology
and triage security alerts from SIEM and EDR platforms. Investigate potential security incidents and escalate as needed. Analyse logs from various systems including firewalls, endpoints, and cloud environments. Support threat intelligence efforts by identifying indicators of compromise (IOCs). Document triage actions, observations, and escalations clearly and accurately. Assist in fine-tuning detection rules to reduce false positives More ❯
Employment Type: Full-Time
Salary: £25,000 - £30,000 per annum
Posted:

Information Systems Security Manager with Security Clearance

Fairfax, Virginia, United States
M.C. Dean
and allow for effective and efficient execution of business functions. 3. Provide effective leadership to identify, assess, and mitigate cybersecurity risks; exercise direct ownership of system monitoring and auditing, threat intelligence, vulnerability management, incident response, cybersecurity awareness, and other critical continuous monitoring processes. 4. Lead investigations of computer security violations and incidents, reporting as necessary to both the More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Director, Digital Risks Cyber Assurance (London)

London, UK
Hybrid / WFH Options
Control Risks
United Kingdom, with a primary focus on cyber assurance, third-party risk management, and large-scale regulatory compliance audits. In this role, you will collaborate closely with our cyber threat intelligence, advisory, and response teams to expand our digital risk business. Your responsibility will include representing our global penetration testing team, overseeing the assessment of cybersecurity programs, ensuring More ❯
Employment Type: Full-time
Posted:

Director, Digital Risks Cyber Assurance (London)

South Kensington, England, United Kingdom
Hybrid / WFH Options
Control Risks
United Kingdom, with a primary focus on cyber assurance, third-party risk management, and large-scale regulatory compliance audits. In this role, you will collaborate closely with our cyber threat intelligence, advisory, and response teams to expand our digital risk business. Your responsibility will include representing our global penetration testing team, overseeing the assessment of cybersecurity programs, ensuring More ❯
Posted:

Principal Cyber Security Consultant

Bath, Somerset, United Kingdom
Hybrid / WFH Options
Bmt Defence Services LTD
Federation of Security Operations Centre (SOC)operations across two or more organisational environments such as enterprise, edge/deployed environments or cloud . Demonstrable knowledge of cyber detection (e.g., threat identification/intelligence, real-time monitoring, anomaly detection) and cyber response (e.g. incident response, eradication and remediation, recovery, post-incident analysis). DevSecOps. Zero Trust Architecture (ZTA) expertise More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Threat Intelligence
10th Percentile
£45,000
25th Percentile
£49,000
Median
£66,434
75th Percentile
£82,500
90th Percentile
£112,500