'Threat Intelligence' Job Vacancies

76 to 100 of 174 Threat Intelligence Jobs

CREST Penetration Tester SC Clearance

London, South East, England, United Kingdom
Robert Walters
consulting leader delivering secure, innovative solutions across industries. We foster collaboration, inclusion, and continuous growth, with networks supporting diversity, equity, and belonging. What You'll do: Lead and manage threat intelligence-led penetration tests across applications, infrastructure, cloud (AWS/Azure/O365), APIs, and OT Develop advanced test plans, identify critical assets, and deliver detailed, actionable reports … attack techniques to strengthen proactive security What You'll Bring: CREST CRT (or higher) certification - essential 5+ years' experience in penetration testing with strong understanding of adversarial tactics and threat intelligence Expertise across network, cryptography, vulnerabilities, and attack vectors Strong communication and reporting skills Experience with Breach Attack Simulation, vulnerability management, cloud security reviews (AWS/Azure/ More ❯
Employment Type: Full-Time
Salary: £50,000 - £55,000 per annum
Posted:

Threat Intelligence Analyst

Lancashire, England, United Kingdom
Apply Recruitment
Network Threat & Vulnerability Analyst - Hybrid - Lancashire £60k to 68k 10.5% bonus 14% pension healthcare plus additional benefits. Network Threat & Vulnerability Analyst needed as part of a brand new team build in an extremely well funded growing cyber security team for this North West based enterprise level critical national infrastructure organisation. As a threat and vulnerability analyst in … this team the primary purpose of the role is to perform, threat analysis, security monitoring and some incident response to business processes comply with cyber security policy frameworks. You must have an investigative proactive mindset and be willing to grow and develop your skills. You will assist in responding to network-based incidents such as DDoS attacks, lateral movement … and collaborate with network teams to implement fixes. You will need as much of the following as possible: 2 to 3 years of experience in cybersecurity operations Experience in Threat Identification. Proficiency in using SIEM tools. Experience in analysing security events and alerts to identify potential threats and incidents. Understanding of network protocols, operating systems, and cybersecurity principles. Ability More ❯
Posted:

Threat Intelligence Analyst

Greater Manchester, England, United Kingdom
Apply Recruitment
Network Threat & Vulnerability Analyst - Hybrid - Lancashire £60k to 68k 10.5% bonus 14% pension healthcare plus additional benefits. Network Threat & Vulnerability Analyst needed as part of a brand new team build in an extremely well funded growing cyber security team for this North West based enterprise level critical national infrastructure organisation. As a threat and vulnerability analyst in … this team the primary purpose of the role is to perform, threat analysis, security monitoring and some incident response to business processes comply with cyber security policy frameworks. You must have an investigative proactive mindset and be willing to grow and develop your skills. You will assist in responding to network-based incidents such as DDoS attacks, lateral movement … and collaborate with network teams to implement fixes. You will need as much of the following as possible: 2 to 3 years of experience in cybersecurity operations Experience in Threat Identification. Proficiency in using SIEM tools. Experience in analysing security events and alerts to identify potential threats and incidents. Understanding of network protocols, operating systems, and cybersecurity principles. Ability More ❯
Posted:

SOC Manager - Incident Response & Threat Hunting

United Kingdom
CBSbutler Holdings Limited
Job Title: SOC Incident Response & Threat Hunting Manager Location: Remote Salary: £75k - £85k plus 10% bonus and £6k car allowance Mon - Fri as well as an on-call rota - 1 week in 4. Candidates must be willing and eligible to go through SC security clearance for this role Job Description: We are seeking a highly skilled and experienced SOC … Incident Response & Threat Hunting Manager to join our growing Security Operations Centre. This pivotal role will be responsible for leading our Tier 3 Security and Incident Response Analysts, overseeing advanced incident response activities, driving proactive threat hunting initiatives, and providing strategic direction for the Cyber Threat Intelligence (CTI) capability. This is a hands-on leadership position … incident response (DFIR), and a proactive mindset to anticipate and neutralise sophisticated and evolving cyber threats. Key Responsibilities: Provide expert guidance and technical oversight on complex security incidents and threat hunting operations. Lead and coordinate high-severity incident response engagements, acting as the primary incident lead when required. This includes managing cross-functional teams, communications, and critical decision-making More ❯
Employment Type: Permanent
Salary: £85,000
Posted:

SOC/CSIRT Level 3 Analysts

United Kingdom
Morson Edge
seniority. Stakeholders – Build and maintain collaborative working relationships with internal technology teams, external partners, suppliers, and providers to drive outcomes and agree on courses of action. Principal Responsibilities Advanced Threat Hunting: Analyse and assess multiple threat intelligence sources and indicators of compromise (IOC) to identify patterns, vulnerabilities, and anomalies, then use this intelligence and tooling to … of success is upholding IT, OT, and organisational resilience against cyber threats and incidents. Qualifications Considerable experience in a SOC Level 2 or 3 role with expertise in advanced threat hunting and incident response across IT and OT environments. SOC-specific training, qualifications, or a degree in Computer Science, Cybersecurity, IT, or a related subject. Ideally hold recognised security … such as targeted ransomware or state-sponsored attacks. Summary: My client are looking for an experienced Incident Response (CSIRT)/SOC Level 3 Analyst with deep expertise in advanced threat hunting, incident response, and cyber defence operations, capable of leading on high-severity incidents and mentoring junior analysts while strengthening resilience across IT and OT environments. More ❯
Employment Type: Contract
Rate: £600 - 800 per day + None
Posted:

Level 3 SOC Analyst

Edinburgh, Scotland, United Kingdom
Element Materials Technology
and Extended Detection and Response (XDR) Prompt analysis and triage of alerts and security events. Support the Incident Response (IR) team to report potential or actual incidents Conduct proactive Threat Hunting across the estate and help develop the Threat Intelligence capability Work closely with the Incident Response (IR) team and report potential or actual incidents. Support the … technical findings to a non-technical audience. Thorough understanding of the latest security principles, techniques, and trends. Exposure to cyber security, including knowledge and experience of the breadth of threat actors and depth of threat vectors available Knowledge of using digital forensic and malware analysis tools, whether that be commercial products or open source Experience Needed to Fulfil … the Role Comprehensive experience of operating within a Security Operations Centre as an L3 analyst. Experience as a threat hunter preferable Experience in operating successfully within a large complex/federated enterprise environment Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Experience of security incident management and an understanding of More ❯
Posted:

SOC Manager - Threat Hunter

Warrington, England, United Kingdom
Anson McCade
A global IT MSP is looking for an experienced SOC Incident Response & Threat Hunting Manager to join its expanding Security Operations Centre. This is a pivotal leadership role, overseeing Tier 3 Security and Incident Response Analysts while driving proactive threat hunting and cyber threat intelligence initiatives. This hands-on position combines technical depth, strategic leadership, and … Benefits Pack 10% Company Pension £6k Vehicle allowance Excellent skill up and career progression Flexible working from Day 1 Plus more Skills & Experience Proven experience leading incident response and threat hunting teams within a SOC or similar environment. Deep technical expertise in Digital Forensics and Incident Response (DFIR), with strong analytical and problem-solving skills. Skilled at translating complex More ❯
Posted:

Head of IT Security Incident and Threat Management

Chelmsley Wood, Warwickshire, United Kingdom
SSR General & Management
Head of IT Security Incident and Threat Management Package to £117k DOE + 15% Bonus + Benefits Based Birmingham This is an exciting opportunity to take a strategic leadership role at the forefront of cybersecurity. As Head of IT Security Incident and Threat Management, you will shape and lead the organization s global response to cyber threats ensuring … they stay one step ahead of emerging risks. You will have the scope to define and deliver a world-class threat intelligence and incident response strategy, working with innovative cutting-edge tools, partners, and experts. The successful candidate will lead and develop a talented in-house team, while managing the external Security Operations Centre (SOC) to ensure proactive … defence and rapid response to incidents. Key Responsibilities Develop and execute incident response and threat management strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust security practices. Manage More ❯
Employment Type: Permanent
Salary: GBP 90,000 - 110,000 Annual
Posted:

Head of IT Security Incident and Threat Management

Birmingham, Chelmsley Wood, West Midlands (County), United Kingdom
SSR General & Management
Head of IT Security Incident and Threat Management Package to £117k DOE + 15% Bonus + Benefits Based Birmingham This is an exciting opportunity to take a strategic leadership role at the forefront of cybersecurity. As Head of IT Security Incident and Threat Management, you will shape and lead the organization’s global response to cyber threats — ensuring … they stay one step ahead of emerging risks. You will have the scope to define and deliver a world-class threat intelligence and incident response strategy, working with innovative cutting-edge tools, partners, and experts. The successful candidate will lead and develop a talented in-house team, while managing the external Security Operations Centre (SOC) to ensure proactive … defence and rapid response to incidents. Key Responsibilities Develop and execute incident response and threat management strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust security practices. Manage More ❯
Employment Type: Permanent
Salary: £90000 - £110000/annum
Posted:

Global CSIRT Senior Analyst

England, United Kingdom
Hybrid / WFH Options
KPMG UK
incidents within KPMG’s Global Information Security Services (ISS) function. ISS delivers and oversees critical cybersecurity capabilities—including Security Monitoring & Response (SMR), Vulnerability Assessment & Secure Development (VASD), and Cyber Threat Intelligence (CTI)—across Global, Global Functions, and the broader KPMG network of member firms. This position offers an exciting opportunity to join a progressive and innovation-driven security More ❯
Posted:

Detection & Threat Hunt Lead Analyst - Cheltenham

Cheltenham, Gloucestershire, England, United Kingdom
Accenture
Detection & Threat Hunt Lead Analyst Cheltenham Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or more spent outside of the UK) and declaration of being a British passport holder with no dual nationalism at the point … us.” – Julie Sweet, Accenture CEO As a team As a member of the SOC Content Team, you will be responsible for contributing to the creation, deployment, and tuning of threat detection content and delivery of proactive threat hunting. You will work in close partnership with client Lead Analysts, threat intelligence teams, and other SOC functions to … help ensure that detection strategies are tailored to each client’s threat profile and security objectives. This role offers a balance of technical hands-on work, collaboration, and knowledge sharing, with a strong emphasis on continual learning and process improvement. More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

Senior SOC Analyst (Level 3)

Crawley, England, United Kingdom
Hybrid / WFH Options
InfoSec People Ltd
within a dedicated Security Operations Centre, working at the forefront of protecting high-value national assets. The successful candidate will act as a technical authority for advanced incident response, threat hunting, and security engineering, with a strong focus on the Microsoft security stack. Key Responsibilities Serve as the primary escalation point for complex incidents and lead on incident response. … Conduct in-depth threat hunting, forensic investigations, and root cause analysis. Develop, test, and optimise detection use cases, rules, and playbooks within Microsoft Sentinel and Defender. Provide mentorship and guidance to junior SOC analysts, enhancing team capability. Collaborate with IT and OT teams to address unique security requirements across CNI environments. Drive improvements in SOC operations, automation, and incident … response processes. Monitor evolving threats and integrate threat intelligence into daily operations. Ensure adherence to industry standards and compliance frameworks (NIS2, CAF, ISO 27001). Skills & Experience Required Extensive background in SOC operations, incident response, and threat hunting. Expertise with the Microsoft security stack, including: Microsoft Sentinel (SIEM/SOAR) Microsoft Defender for Endpoint, Identity, Cloud Apps More ❯
Posted:

Senior Security Engineer

Portsmouth, England, United Kingdom
Hybrid / WFH Options
Cloud People
IT outsourcing and managed services to customers across enterprise, public sector and fast growing scale ups. Its Security Practice protects clients through capabilities including Managed Detection and Response (MDR), Threat Hunting, Vulnerability Management, Penetration Testing and Incident Response, supported by a consulting led Security Advisory practice. As a Senior Security Engineer, you will be responsible for designing, implementing and … inclusion • Paid training and certification pathways with clear routes into consultancy or leadership What You’ll Be Doing • Designing, deploying and maintaining core SOC technologies including SIEM, EDR, SOAR, threat intelligence and logging infrastructure • Developing and refining detection use cases, correlation rules and analytics content • Building automation workflows and integrations through scripting or automation platforms • Collaborating with SOC … Engineering secure log ingestion pipelines across hybrid cloud and on prem environments • Supporting onboarding of new clients into the SOC to ensure correct configuration and data flow • Contributing to threat hunting and detection engineering initiatives • Maintaining documentation, diagrams and configuration standards • Mentoring junior engineers and analysts and sharing best practice What You’ll Bring • 3 to 5 years of More ❯
Posted:

Senior Incident Responder – SOC Analyst (L3)

Birmingham, England, United Kingdom
Anson McCade
and services firm – is expanding its Managed Security Operations Centre and seeking a Senior Incident Responder (L3 SOC Analyst) to take the lead on complex security incidents, investigations, and threat response. This is a hands-on, senior-level role at the sharp end of cybersecurity operations, working on major incidents across enterprise environments, guiding L1/L2 analysts, and … recommendations. Conduct static and dynamic malware analysis; reverse engineer to identify IOCs. Monitor, tune, and optimise SIEM tools Develop and refine SOC use cases, runbooks, and playbooks. Integrate emerging threat intelligence into monitoring and detection workflows. Liaise with clients, Service Delivery Managers, and technical teams to manage escalations and coordinate response. Maintain high standards of documentation, including post More ❯
Posted:

Vice President, Secure By Design SME

England, United Kingdom
MUFG Bank, Ltd
the global Information Security Standards and Procedures (ISSP) requirements and local security requirements.The department deploys, supports and monitors security solutions such as virus protection, vulnerability management, complianfce monitoring and threat/incident management activities to reduce risk. MAIN PURPOSE OF THE ROLE To lead a team of Governance Risk and Control SMEs responsible for carrying out IT Security Assessments … assurance for cybersecurity technologies, policies, standards and procedures Demonstrable proficiency in a wide range of information IT security domains such as Security Governance, Identity and Access Management, Access Controls, Threat Intelligence, Asset Management, Risk Management, Security Assessment/Testing, Security Incident Management and Vulnerability and Patch Management Understand global IT risk management structure Demonstrable experience of senior stakeholder More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Security Graduate

london, south east england, united kingdom
Hybrid / WFH Options
myGwork - LGBTQ+ Business Community
security tools, with a focus on Data Loss Prevention (DLP) technologies. You will assist in configuring, tuning, and maintaining these tools to prevent sensitive data from leaving our organization. Threat Analysis: Contribute to threat intelligence and risk analysis efforts by researching new vulnerabilities and attack vectors. You will help us stay one step ahead of potential threats. More ❯
Posted:

Adjunct Professor, Cybersecurity, Workforce (Applicant Pool )

McKinney, Texas, United States
Collin College
environmental conditions or hazards. Office environment. Little physical effort required. Requirements Associate degree or higher in any field and must hold one of the following certifications: a. Open Source Intelligence (OSINT) certification b. GIAC Open Source Intelligence (GOSI) c. Certified Threat Intelligence Analyst (CTIA) d. Certified Ethical Hacker (CEH) e. EC Council Certified Network Defender (CND More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Incident Responder - DFIR

London Area, United Kingdom
Hybrid / WFH Options
Tesco
Forensics and Incident Response (DFIR) team. You’ll play a pivotal role in investigating and responding to complex security threats across our global estate, working alongside our security operations, threat intelligence, and engineering teams. What You’ll Be Doing 🕵️ Lead Investigations : Conduct host, network, and cloud-based forensic analysis to uncover the full scope of security incidents. 🛡️ Incident … Handling : Support incident managers with root cause analysis and recommend detection and prevention strategies. ⚙️ Drive Innovation : Improve and automate DFIR workflows, collaborating across teams to enhance our security capabilities. 🔍 Threat Hunting : Lead intelligence-driven hunts to identify and escalate suspicious activity, contributing to our detection engineering efforts. What We’re Looking For 4+ years of hands-on experience More ❯
Posted:

Senior Incident Responder - DFIR

City of London, London, United Kingdom
Hybrid / WFH Options
Tesco
Forensics and Incident Response (DFIR) team. You’ll play a pivotal role in investigating and responding to complex security threats across our global estate, working alongside our security operations, threat intelligence, and engineering teams. What You’ll Be Doing 🕵️ Lead Investigations : Conduct host, network, and cloud-based forensic analysis to uncover the full scope of security incidents. 🛡️ Incident … Handling : Support incident managers with root cause analysis and recommend detection and prevention strategies. ⚙️ Drive Innovation : Improve and automate DFIR workflows, collaborating across teams to enhance our security capabilities. 🔍 Threat Hunting : Lead intelligence-driven hunts to identify and escalate suspicious activity, contributing to our detection engineering efforts. What We’re Looking For 4+ years of hands-on experience More ❯
Posted:

Senior Incident Responder

West Midlands, United Kingdom
Anson Mccade
and services firm - is expanding its Managed Security Operations Centre and seeking a Senior Incident Responder (L3 SOC Analyst) to take the lead on complex security incidents, investigations, and threat response. This is a hands-on, senior-level role at the sharp end of cybersecurity operations, working on major incidents across enterprise environments, guiding L1/L2 analysts, and … reverse engineer to identify IOCs. Monitor, tune, and optimise SIEM tools - particularly IBM QRadar , Splunk, and Microsoft Sentinel. Develop and refine SOC use cases, runbooks, and playbooks. Integrate emerging threat intelligence into monitoring and detection workflows. Liaise with clients, Service Delivery Managers, and technical teams to manage escalations and coordinate response. Maintain high standards of documentation, including post More ❯
Employment Type: Permanent
Posted:

Security Operations Specialist

City of London, London, United Kingdom
Hybrid / WFH Options
Cititec
Working knowledge of network security , including protocols, firewalls, IDS/IPS, and traffic analysis. Experience with cloud security principles in AWS, Azure, or GCP. Ability to interpret and apply threat intelligence to improve controls and detection coverage. Experience with MacOS preferred Strong communication skills — capable of articulating complex technical issues to both technical and non-technical stakeholders. Proven More ❯
Posted:

Security Operations Specialist

London Area, United Kingdom
Hybrid / WFH Options
Cititec
Working knowledge of network security , including protocols, firewalls, IDS/IPS, and traffic analysis. Experience with cloud security principles in AWS, Azure, or GCP. Ability to interpret and apply threat intelligence to improve controls and detection coverage. Experience with MacOS preferred Strong communication skills — capable of articulating complex technical issues to both technical and non-technical stakeholders. Proven More ❯
Posted:

Cyber Security Specialist

Abingdon, Oxfordshire, South East, United Kingdom
Rullion Limited
models (RBAC, ABAC), and logging standards. o Experience supporting assurance activities or government-mandated reviews (e.g. GovAssure, Secure by Design). o Ability to interpret CVEs, CVSS scores, and threat intelligence feeds. o Strong stakeholder engagement and communication skills with an ability to produce technical reports and articulate risk to non-specialists. o Excellent written and verbal communication More ❯
Employment Type: Contract
Posted:

Senior Security Engineer

Portsmouth, Hampshire, England, United Kingdom
Computappoint
Security Operations Centre (SOC), blending hands-on technical work with automation and solution design. You’ll collaborate with analysts, architects, and customers to build reliable, scalable systems that accelerate threat detection and response, all in a collaborative culture that invests in your growth, wellbeing, and career progression. Job Title: Senior Security Engineer Job Type: Permanent Salary: Up to … DOE) + Bonus Working arrangement: Hybrid Office Location: Portsmouth As a Senior Security Engineer, you will: Design, deploy, and maintain core SOC technologies (SIEM, EDR, SOAR, threat intelligence, and logging infrastructure). Develop and optimise detection use cases, correlation rules, and analytics content. Build and maintain automation workflows and integrations using automation platforms or custom scripting. Engineer secure … log ingestion pipelines across hybrid cloud and on-prem environments. Support client onboarding, threat hunting, detection engineering, and process improvements. Mentor junior engineers and maintain documentation, diagrams, and standards. Required Experience/Skills: 5 years’ experience in a SOC, security engineering, or cyber operations role. Strong hands-on experience with SIEM or EDR platforms (e.g., Microsoft Sentinel, Splunk, Defender More ❯
Employment Type: Full-Time
Salary: £71,250 - £78,500 per annum
Posted:

CLOUD SECURITY ENGINEER / SECOPS

North London, London, United Kingdom
Hybrid / WFH Options
Secure Recruitment Ltd
Partnered with a Multi-Award-Winning, Software-Based Organisation at the Forefront of Pre-Emptive Exposure Management. As a Market Leader backed by significant Venture Funding, they combine Proactive Threat Intelligence, Real Attacker Telemetry & Automated Red Teaming to Continuously Identify & Validate Real Exposure. Success in this position will enable the business to Transform Raw Intelligence into Actionable More ❯
Employment Type: Permanent, Work From Home
Salary: £90,000
Posted:
Threat Intelligence
10th Percentile
£43,000
25th Percentile
£49,875
Median
£75,000
75th Percentile
£90,000
90th Percentile
£107,880