North London, London, United Kingdom Hybrid/Remote Options
Secure Recruitment Ltd
SENIOR THREATINTELLIGENCEANALYST Fully Remote Up to £100,000 + Excellent Staff Bens + Share Scheme SECURE has Strategically Partnered with a Multi-Award-Winning, Software-Based Organisation at the Forefront of Pre-Emptive Exposure Management. As a market leader backed by significant Venture Funding, they combine proactive ThreatIntelligence, Real Attacker Telemetry & Automated … Red Teaming to Continuously Identify & Validate Real Exposure. Success in this position will enable the business to Transform Raw Intelligence into Actionable Insights that Protect Fortune 500 Companies & Critical Infrastructure Providers, helping them outrun Real-World Threats in Real-Time. Role Overview: We're looking to speak with ambitious Senior ThreatIntelligenceAnalyst to Expand Offensive … Security Capabilities around Honeypot Data Analysis. You'll Design & Deploy Detections for N-Day & 0-Day Exploits using a Global Network, Develop CTI Platforms for Real-Time Threat Analysis, Drive Rapid Reaction Efforts & Author ThreatIntelligence Reports. Ideally based in the UK, you don't need to tick every box - if you're motivated to make an More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Vanquish Technologies Limited
through implementation and ongoing support, our commitment is to provide clients with the assurance that they are valued by a company that is both attentive and impactful. Role Title: ThreatIntelligenceAnalyst Reporting Line Manager: Head of ThreatIntelligence Onsite Requirements (e.g. number of days per week onsite): 5 days Hybrid/Remote Working Policy … months Extension likelihood: Yes Maximum Daily Rate or Budget Range: 500 IR35 Status (inside/Outside/To Be Determined) Inside Experience Requirements Technology & Vendor Skillsets Required: Familiarity with threatintelligence platforms (TIPs), SIEMs, and threat data enrichment tools. Experience using Breach and Attack Simulation (BAS) platforms to build and validate threat scenarios. Strong understanding of … adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modeling. Hands-on experience with penetration testing tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera. Experience producing threat reports and briefings. Certifications Required or Preferred: Years of relevant experience: 8+ years of experience in threatintelligence, cybersecurity operations, or penetration testing. More ❯
Harrington Starr are seeking a ThreatIntelligenceAnalyst for one of global investment banking clients. The role will be joining a small, but specialist cyber security team with a focus on [providing threatintelligence services to the security operations and Engineering teams and to the business as a whole. Key accountabilities on a day to … impacting banking and investment services. Partner with Security Operations to advance detection and response strategies. Create and refine monitoring use cases across endpoint, network, cloud, and transaction systems using threat intel insights. Deliver intelligence to guide incident response, threat hunting, and forensics. Present tailored intelligence reports to technical and executive stakeholders. Key skills needed are: A … good strong technical cyber security background with recent experience in a dedicated ThreatIntelligence role A strong understanding of ThreatIntelligence tools and techniques Experience in using ThreatIntelligence Platforms (TIPs) widely used for IOCs A strong understanding of the latest trends within threatintelligence and the latest attack techniques Please send More ❯
Harrington Starr are seeking a ThreatIntelligenceAnalyst for one of global investment banking clients. The role will be joining a small, but specialist cyber security team with a focus on [providing threatintelligence services to the security operations and Engineering teams and to the business as a whole. Key accountabilities on a day to … impacting banking and investment services. Partner with Security Operations to advance detection and response strategies. Create and refine monitoring use cases across endpoint, network, cloud, and transaction systems using threat intel insights. Deliver intelligence to guide incident response, threat hunting, and forensics. Present tailored intelligence reports to technical and executive stakeholders. Key skills needed are: A … good strong technical cyber security background with recent experience in a dedicated ThreatIntelligence role A strong understanding of ThreatIntelligence tools and techniques Experience in using ThreatIntelligence Platforms (TIPs) widely used for IOCs A strong understanding of the latest trends within threatintelligence and the latest attack techniques Please send More ❯
SENIOR THREATINTELLIGENCEANALYST Fully Remote Up to £100,000 + Excellent Staff Bens + Share Scheme SECURE has Strategically Partnered with a Multi-Award-Winning, Software-Based Organisation at the Forefront of Pre-Emptive Exposure Management. As a market leader backed by significant Venture Funding, they combine proactive ThreatIntelligence, Real Attacker Telemetry & Automated More ❯
Network Threat & Vulnerability Analyst - Hybrid - Lancashire £60k to 68k 10.5% bonus 14% pension healthcare plus additional benefits. Network Threat & Vulnerability Analyst needed as part of a brand new team build in an extremely well funded growing cyber security team for this North West based enterprise level critical national infrastructure organisation. As a threat and vulnerability … analyst in this team the primary purpose of the role is to perform, threat analysis, security monitoring and some incident response to business processes comply with cyber security policy frameworks. You must have an investigative proactive mindset and be willing to grow and develop your skills. You will assist in responding to network-based incidents such as DDoS … and collaborate with network teams to implement fixes. You will need as much of the following as possible: 2 to 3 years of experience in cybersecurity operations Experience in Threat Identification. Proficiency in using SIEM tools. Experience in analysing security events and alerts to identify potential threats and incidents. Understanding of network protocols, operating systems, and cybersecurity principles. Ability More ❯
Network Threat & Vulnerability Analyst - Hybrid - Lancashire £60k to 68k 10.5% bonus 14% pension healthcare plus additional benefits. Network Threat & Vulnerability Analyst needed as part of a brand new team build in an extremely well funded growing cyber security team for this North West based enterprise level critical national infrastructure organisation. As a threat and vulnerability … analyst in this team the primary purpose of the role is to perform, threat analysis, security monitoring and some incident response to business processes comply with cyber security policy frameworks. You must have an investigative proactive mindset and be willing to grow and develop your skills. You will assist in responding to network-based incidents such as DDoS … and collaborate with network teams to implement fixes. You will need as much of the following as possible: 2 to 3 years of experience in cybersecurity operations Experience in Threat Identification. Proficiency in using SIEM tools. Experience in analysing security events and alerts to identify potential threats and incidents. Understanding of network protocols, operating systems, and cybersecurity principles. Ability More ❯
Cyber Security Analyst - Incident Response London - Hybrid | Up to £65,000 + benefits A global specialist insurer is building out its internal cyber defence capability and is seeking an experienced analyst to strengthen its Security Operations Centre. You'll join a collaborative team focused on both proactive threat hunting and live incident response, protecting a complex international … estate. This position suits someone who has started their career in a SOC environment and now works primarily in incident and threat response. The role Lead investigations into live security incidents including malware, phishing, and endpoint compromise Perform root cause analysis, containment, and recovery actions Tune detection rules and develop new use cases to improve response times Utilise Microsoft … on incident response experience Strong working knowledge of SIEM and EDR tools (Sentinel, Defender, CrowdStrike, etc.) Solid understanding of Windows, Linux, and network security principles Experience with forensic or threat analysis techniques Familiarity with MITRE ATT&CK, NIST, or similar frameworks Desirable Exposure to automation or SOAR tooling PowerShell or Python scripting skills GIAC or Microsoft security certifications This More ❯