s own distinct skillset. Candidates are not expected to meet all the skills on this job description as we are hiring specialists in cyber threat, open source intelligence, and malware. Thanks for checking out our job opening; we are excited that YOU are interested in learning more about … we’re one of the leading global Cyber Security and Risk Mitigation business… https://www.nccgroup.com/uk/The Opportunity: As a ThreatIntelligence analyst you will play a key role in our Tactical ThreatIntelligence team. You will bring experience in either Malware … and more secure against cyber threats by helping them understand the motivations of relevant actors, identifying their targets and how they operate. The Global ThreatIntelligence Team has built a very strong reputation when it comes to collecting our own data and combining this with open and commercial more »
Skelmersdale, Lancashire, North West, United Kingdom Hybrid / WFH Options
Police Digital Services
Join Police Digital Service as a NMC Cyber Intelligence and Threat Team Manager - £65,000- £70,000 The Cyber Threat Team Manager will be accountable for leading and driving the NMC Cyber Threat Team delivering national and bespoke cyber threat support. You will be proactive … You will be part of a friendly and flexible working environment where your contribution is always valued. Key Responsibilities Lead the NMC's Cyber Threat functions in coordination with the Strategic Threat Lead including the direction and coordination of day-to-day tactical and operational delivery of threatintelligence, threat hunting, vulnerability management and malware analysis. Lead the cyber threat technical response to incidents and critical vulnerabilities impacting UK Policing Work closely alongside all other cyber security functions supporting the continual improvement of wider capabilities Act as an escalation point for, and provide coaching more »
Employer: DWS Group Title: Cyber ThreatIntelligence and Vulnerability Management Specialist (VP) Location: London About DWS: Today, markets face a whole new set of pressures – but also a whole lot of opportunity too. Opportunity to innovate differently. Opportunity to invest responsibly. And opportunity to make change. Join us … ensure highly professional and productive procedures, policies and processes are in place, and aligned and agreed with relevant stakeholders. Role Details: As a Cyber ThreatIntelligence and Vulnerability Management Specialist you will (be): Lead the DWS Cyber ThreatIntelligence and Vulnerability Management capability, liaising closely with … the central Threat & Vulnerability Management function to provide relevant reports on threats to the sector; Tailor threatintelligence to the needs of a world-leading asset management firm operating across geographical regions; Provide threatintelligence to technical and non-technical stakeholders across tactical, operational, and more »
assess the exposure of assets, evaluate potential vulnerabilities, and work with cross-functional teams to implement risk mitigation strategies. You will leverage ASM tools, threatintelligence, and manual assessments to provide a comprehensive view of the organization's attack surface, ensuring ongoing protection against emerging threats. This position … Assessment Conduct regular assessments of the organization’s attack surface, including network, cloud, and application assets. Utilize ASM tools (e.g., RiskIQ, Expanse, CyCognito) and threatintelligence to identify internet-facing assets and assess their exposure to potential threats. Perform continuous asset discovery to identify shadow IT, misconfigured services … the attack surface, and mitigating identified vulnerabilities. Ensure asset owners are aware of ASM findings and provide actionable guidance for risk mitigation. Monitoring and ThreatIntelligence Integration Continuously monitor the attack surface for changes and newly discovered assets. Integrate threatintelligence to identify and assess the more »
Snoop Premium available to all colleagues Medical: Opportunity to opt in for Private Medical Insurance Bonus: Discretionary annual bonus The Role: As our Cyber Intelligence Specialist, you will proactively identify, analyse, respond, and mitigate cyber threats that pose risks to Vanquis Banking Groups cybersecurity posture. This involves monitoring security … events, conducting incident response activities, enhancing our threat detection capabilities, and ensuring compliance with policy, standards, and regulation. Your contributions will directly impact our ability to protect sensitive data, maintain business continuity, and mitigate cybersecurity risks. As a Payments Manager Cards, you will: Actively participate the delivery of services … provided by the Cyber Intelligence Centre including by not limited to Cyber ThreatIntelligence, Security Posture Management, Cyber Security Incident Response, Threat Hunting, Penetration Testing & Red Team Testing, and Cyber Risk Mitigation. Incorporate threatintelligence into CIC activities. Collaborate and assist with the investigation more »
London, England, United Kingdom Hybrid / WFH Options
Palo Alto Networks
Palo Alto Networks Implement Zero Trust, Secure your Network, Cloud workloads, Hybrid Workforce, Leverage ThreatIntelligence & Security Consulting. Cybersecurity Services & Education for CISO’s, Head of Infrastructure, Network Security Engineers, Cloud... View all jobs at Palo Alto Networks At Palo Alto Networks everything starts and ends with our … without industry regulator oversight), assumed breach assessments (red team engagements with a pre-deployed implant), ransomware readiness reviews (assessing susceptibly to modern ransomware threats), threat analysis and social-engineering assessments. Develop scripts, tools, and methodologies to automate and streamline internal processes and engagements. Examples include Terraform and Ansible, custom …/C++, C#, or Java Ability to read and use the results of mobile code, malicious code, and anti-virus software. Demonstrable experience of threat-intelligence led red teaming frameworks such as CORIE, CBEST, TIBER-EU Track record of championing innovation and improvement initiatives for your area of more »
with cross-functional teams to ensure the confidentiality, integrity, and availability of our systems and data. Sub-functions responsible for: Security Architecture Security Engineering ThreatIntelligence Identity and Access Management What you will do: Security Architecture Leadership - Develop and maintain the company's security architecture framework, ensuring alignment … and industry best practices. Engineering Oversight - Lead a team of skilled security engineers responsible for designing, implementing, and maintaining security controls across the organization. ThreatIntelligence - Review the latest cyber threats and vulnerabilities, incorporating threatintelligence into security strategies. Security Technology Roadmap - Establish and manage Security more »
one of seven practices focused on client delivery services across the Firm We are seeking a Manager level candidate with Digital Forensics, Incident Response, ThreatIntelligence, and project management experience gained in professional services. Practice Overview Ankura's Cybersecurity and Privacy Practice is a full-service suite of … or size. Our global team of over 100 professionals includes former federal law enforcement personnel, in-house security experts, Big 4 consultants, federal regulators, threat intel and dark web experts, etc. We have helped clients and partners for 10+ years across industries and geographies with the following services: Incident … Response, Intelligence, and Investigations. End Point & Managed Detection & Response. Technology, Privacy, and Cyber Risk Advisory. The EMEA Cybersecurity & Privacy practice is growing and has ambitions to expand its capabilities from a strong base in incident response, intelligence and investigations into additional proactive security and managed detection & response services. more »
setting up SecOps in a greenfield environment, this could be the role for you. Key Responsibilities: ServiceNow Implementation: Implement Security Incident Response, Vulnerability Response, ThreatIntelligence, and Configuration Compliance modules from the ground up. ITSM Modules: Experience with Incident, Problem, Change, CMDB, and Asset modules is advantageous. Catalogue … Items & Record Producers: Implement catalogue items and record producers. Security Incident Response: Configure Security Incident Response applications and build custom integrations with SIEM and threatintelligence enrichment tools. Email Integration: Develop email integrations for importing suspicious emails as security incidents (Phishing use case). Vulnerability Response: Configure Vulnerability … Security Incident Response (SIR) integration. Experience enabling and configuring SIR Workspace. Strong hands-on experience with Security Operations modules: Security Incident Response, Vulnerability Response, ThreatIntelligence, and Configuration Compliance. Proficiency in JavaScript, HTML, XML, AJAX, and other scripting languages. Experience with web services, SOAP, email, MID server, and more »
Senior Threat Detection Analyst Capability: Enterprise-Wide Technology Team: Threat Detection (SOC) Job Title: Senior Threat Detection Analyst Enterprise-Wide Technology EWT is the UK Firm’s internal technology division and is accountable for delivering a range of services to the UK Firm. Taking a holistic approach … includes gathering requirements, solution design, build and run and the execution of complex change portfolios focused on security, data, core infrastructure and business applications. Threat Detection Team The Team is an important function within Security Operations. The team play a key role in ensuring that the business IT systems … that security monitoring service is embedded into their solutions. The team is also responsible for making sure that security monitoring is aligned with cyber threat landscape and business risks on an ongoing basis. Senior Threat Detection Analyst (SOC) The person will be playing a key role in ensuring more »
without industry regulator oversight), assumed breach assessments (red team engagements with a pre-deployed implant), ransomware readiness reviews (assessing susceptibly to modern ransomware threats), threat analysis and social-engineering assessments Develop scripts, tools, and methodologies to automate and streamline internal processes and engagements - Examples include Terraform and Ansible, custom …/C++, C#, or Java Ability to read and use the results of mobile code, malicious code, and anti-virus software Demonstrable experience of threat-intelligence led red teaming frameworks such as CORIE, CBEST, TIBER-EU Track record of championing innovation and improvement initiatives for your area of … Tester (CREST CRT) GIAC Penetration Tester (GPEN) CREST Certified Simulated Attack Specialist (CCSAS) Additional Information The Team Unit 42 brings together our world-renowned threat researchers with an elite team of security consultants to create an intelligence-driven, response ready organization. The Unit 42 ThreatIntelligencemore »
Global quant fund and fintech business are now seeking a ThreatIntelligence/Vulnerability Lead to join it's growing security technology team. Out client is an elite name in the finance and technology space, with global offices in the US, Europe and Asia. They seek a Cyber … that react to markets and trading priorities. Being risk savvy and operational effective are major priorities to this security conscious firm. You will: Lead Intelligence and Vulnerability best practise Respond to operational alerts in the security space Proactive threat hunting and root cause analysis Work with the infrastructure … Design security testing or mitigation plans Work with the business to underline the latest and most critical issues You will need: Good experience industry intelligence and the latest vulnerabilities Broad knowledge of systems and platforms - Linux and Windows, and server technology Deep understanding of networking and firewall technology, storage more »
your team to identify the most critical focus areas. These include Improving incident response times, reducing false positives and other extraneous alerts and Enhancing threat detection capabilities. In this role you will analyse incident reports to understand the organisation's security posture by reviewing incident reports and identifying patterns … team Key Responsibilities : Manage service and process improvements of SOC, auditing SOC incidents, identifying new use cases and automations POC for SOC engineering team, threatintelligence analyst and Threat exposure management Act as a point of escalation for Level-2 SOC security analysts in support of information … operational tasks (tools, techniques, Procedures) in support of technologies managed by the Security Operations Centre. Document incidents from initial detection through final resolution Ensure threat management, threat modelling, identify threat vectors and develop use cases for security monitoring Make informed decisions about security investments and strategies that more »
committed to helping clients enable advanced cyber defenses that reduce risk with quantifiable results. We’re comprised of top talent from private industry, government, intelligence, and law enforcement who are specialists in threat detection, incident response, digital forensics, offensive security, risk management, and cyber resilience. As a subsidiary … impact of security incidents and breaches. Incident Analysis: Analyze and interpret forensic data to provide insights into the tactics, techniques, and procedures (TTPs) of threat actors. Evidence Preservation: Ensure the proper collection, preservation, and chain of custody of digital evidence during investigations. Malware Analysis: Analyze malware samples to understand … a trusted advisor throughout the process. Reporting: Prepare detailed incident reports, including findings, recommendations, and remediation strategies, for both technical and non-technical stakeholders. ThreatIntelligence: Stay up-to-date with the latest threatintelligence and trends to provide timely guidance and recommendations to clients. Team more »
and industry best practices. Engineering Oversight - Lead a team of skilled security engineers responsible for designing, implementing, and maintaining security controls across the organization. ThreatIntelligence – Review the latest cyber threats and vulnerabilities, incorporating threatintelligence into security strategies. Security Technology Roadmap – Establish and manage Security more »
London, England, United Kingdom Hybrid / WFH Options
Colt Technology Services Group Ltd
and industry best practices. Engineering Oversight - Lead a team of skilled security engineers responsible for designing, implementing, and maintaining security controls across the organization. ThreatIntelligence – Review the latest cyber threats and vulnerabilities, incorporating threatintelligence into security strategies. Security Technology Roadmap – Establish and manage Security more »
to opportunities for enhancing our delivery and providing additional services to organisations we work with. The Vulnerability and Exposure Manager (CTEM) will lead collecting threat information relating to technology vulnerabilities that effect BDO. This includes conducting and analyzing output from continuous security assessments/security monitoring platforms and combining … this, with relevant threatintelligence, producing risk-based and contextualized prioritization for remediation teams. Additionally, the Vulnerability and Exposure Manager (CTEM) will understand the purpose and role of breach and attack simulation tools and their role in a modern security aware organization. The role holder will utilise these … technical cyber security assurance activities Conduct vulnerability and exposure assessments using CSPM (Cloud Security Posture Management) and Vulnerability management platforms following the CTEM (Continuous Threat Exposure Management) framework Work closely with the Governance team, providing guidance and ensuring technical vulnerabilities are understood and managed against defined standards and policies more »
City of London, London, United Kingdom Hybrid / WFH Options
Akkodis
Engineer you will be responsible for handing security incidents received/escalated for the junior analysts in the team. You will aid in triaging threatintelligence from multiple sources and add contextual information to the security incident, perform additional analysis and based on the business impact will recommend … to-day checklist(s), including log review, management report scheduling & running, alert analysis, and escalation follow up Remain current on cyber security trends and intelligence (open source and commercial) in order to guide the security analysis & identification capabilities of the CSOC team Provide oversight, guidance and mentoring to L2 … Cyber Security and security operations experience Experience in managing Microsoft Sentinel, including Lighthouse Experience of onboarding, tuning, reporting and configuring SIEM solutions Experience of threatintelligence Leadership and mentoring experience and skills Understanding of low-level concepts including operating systems and networking Commercial experience in Penetration Testing and more »
City of London, London, United Kingdom Hybrid / WFH Options
Akkodis
Engineer you will be responsible for handing security incidents received/escalated for the junior analysts in the team. You will aid in triaging threatintelligence from multiple sources and add contextual information to the security incident, perform additional analysis and based on the business impact will recommend … to-day checklist(s), including log review, management report scheduling & running, alert analysis, and escalation follow up Remain current on cyber security trends and intelligence (open source and commercial) in order to guide the security analysis & identification capabilities of the CSOC team Provide oversight, guidance and mentoring to L2 … Cyber Security and security operations experience Experience in managing Microsoft Sentinel, including Lighthouse Experience of onboarding, tuning, reporting and configuring SIEM solutions Experience of threatintelligence Leadership and mentoring experience and skills Understanding of low-level concepts including operating systems and networking Commercial experience in Penetration Testing and more »
testing merges the benefits of consultant-led penetration testing with ongoing vulnerability assurance through our advanced SecurePortal. This provides clients with a continuous, living threat management system throughout the duration of the contract, rather than a single point-in-time assessment. We’re expanding our Incident Response team and … assessments and contribute to Incident Response planning, Participate in live Incident Response operations with a 24/7 - 4hr response time. Perform security assessments, threatintelligence gathering and OSINT analysis. Delivering client-facing services such as tabletop exercises, ransomware readiness assessments and IR planning. Collaborate with other departments … as as Splunk, Sentinel and EDR solutions. Familiarity with regulatory and compliance standards such as NIST, ISO 27001 AND FCA. About you: Experience in threatintelligence and analysis to support proactive IR. Experience in managing stakeholders during live incidents to minimise impacts. Excellent communication skills for stakeholder engagement. more »
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Prism Digital
from diverse backgrounds to foster a high-performing, collaborative culture. Optimize Security Tools: Manage and maintain SOC technologies, including SIEM, IDS/IPS, and threatintelligence feeds, ensuring the organization stays ahead of emerging threats. Design for Resilience: Create and improve incident management processes to ensure issues are … incident detection, response, and mitigation strategies. Technical Mastery : Proficiency in SIEM tools (Splunk, ArcSight, DataDog, or QRadar), intrusion detection/prevention systems, firewalls, and threatintelligence platforms. Certifications That Set You Apart: CISSP, CISM, GIAC, or equivalent certifications, showcasing your dedication to excellence in cybersecurity. Exceptional Leadership: Proven more »
security operations. Responsibilities: Develop and deliver SOAR solutions using platforms for workflow automation focused on security entities like firewalls, identity providers, endpoint protection, and threat intelligence. Build and enhance playbooks and workflows for Microsoft Sentinel and Splunk. Leverage tools like KQL, Python, ARM, and Bicep to create robust integrations … to automate security processes. Collaborate with cross-functional teams to implement vulnerability management tools and integrate Microsoft Defender XDR products. Support ServiceNow integrations and threatintelligence platforms like MISP. Drive innovation and continuous improvement in security operations while thriving in an agile environment. Skills/Must Have: Minimum … including playbooks, workflows, KQL, and Python scripting. Experience with ARM Templates, Bicep, and Azure Functions. Familiarity with vulnerability management tools (e.g., Tenable, Qualys) and threatintelligence platforms (e.g., MISP). Strong API integration skills (SOAP, REST). Understanding of Microsoft Defender XDR and associated security products. Nice to more »
cyber programs. Key Responsibilities: Implement and support Microsoft Zero Trust architecture, including Entra, Identity Access Management (IAM), Conditional Access, Multi-Factor Authentication (MFA), and Threat Intelligence. Manage and maintain Active Directory. Develop and utilize ThreatIntelligence strategies. Implement Data Loss Prevention (DLP) measures. Manage cloud security. Implement … a mature Microsoft 365 environment (Azure). Proven experience in implementing cyber security programs. Strong skills in Microsoft Zero Trust, IAM, Conditional Access, MFA, ThreatIntelligence, Active Directory, DLP, Cloud Security, and PAM. Experience working with global organizations. Excellent teamwork and collaboration skills. Humble and team-oriented mindset. more »
large multi-country team. This role will be responsible for the day-to-day operations, including the effective delivery of security monitoring, incident response, threatintelligence, and vulnerability management services. Responsibilities include management and development of a multi-site team of SOC analysts, including recruitment, training development, process … advancements in cybersecurity. Technically, you'll need a solid understanding of security operations processes, tools, and technologies, such as SIEM, SOAR, EDR, XDR, NDR, threatintelligence, vulnerability management, forensics, and malware analysis. A strong understanding of security frameworks, standards, and regulations, such as ISO 27001, NIST, CIS, GDPR more »
business units? You'll lead on integrating new tools, processes, and ensure best practices are followed. You'll be responsible for: - Managing incident response, threatintelligence, and vulnerability management - Integrating new tools and processes - Ensuring compliance with industry regulations You'll have experience in: - IT and Operational Technology … security - Security operations (incident response, vulnerability management, threatintelligence) - Leading security teams - Managing security incidents and service providers You'll work from their Glasgow office twice a week, and earn up to £75,000 plus 15% bonus, 10% pension contribution, and private healthcare. Please contact (url removed) to more »