Alexandria, Virginia, United States Hybrid / WFH Options
Agile Defense, Inc
minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests. Requisition Job Title: CyberThreatIntelligence Analyst IV Exempt Location: Hybrid 2x week onsite - 600 Dulany Street Alexandria, Virginia 22314 Clearance Level: Active DoD - Top Secret … Required Certification(s): • N/A SUMMARY The United States Patent and Trademark Office (USPTO), Cybersecurity Division, has a requirement to support a CyberThreatIntelligence (CTI) capability within USPTO. This support includes monitoring activities, developing cyberthreat analysis, identifying mitigation and remediation courses of … action, sharing actionable cyberthreatintelligence used in organizational IT asset protection, trending strategic cyber threats and situational awareness. A successful candidate will enable our government operational counterparts to promote the rapid analysis of national level cyber threats and incidents. The hours for the position More ❯
Job Description: Group Senior ThreatIntelligence Analyst Location: London (EC2R 7HJ)/Staines (TW18 3DZ)/Salford Quays (M50 3SP) Permanent - Hybrid Working £60-£65K depending on experience + 10% Bonus + fantastic benefits. Full time – 35 hours PW We make health happen Working in our Group function … direction of our business around the world. Role Overview The purpose of this role is to assess, analyse, provide effective, efficient and actionable strategic threatintelligence for Bupa Group, whilst also assisting Bupa's three main Market Units (ELA, BGUK, and ANZ) develop their capabilities. As a Senior … ThreatIntelligence Operations Specialist you will be reporting to the Group Head of ThreatIntelligence, and Offensive Security. You will be involved in discovering, researching, and assessing threats and adversary tradecraft, practical application of intelligence in various operational functions and initiatives. You’ll also be More ❯
We are seeking a Threat Analyst to join our rapidly growing Information Security team. This is a unique opportunity for an aspiring and motivated professional to be at the forefront of our cyber defence strategy, protecting our brand from existing and emerging threats. You will combine the expertise … of a Threat Hunter and CyberThreatIntelligence Analyst, and will work alongside our Senior Threat Analyst to build our threatintelligence and hunting capabilities from the ground up. You'll have a major input on what new tooling and services we use … and communication skills, and an appetite for complex problem solving. Seize the opportunity to join a dynamic security team, reporting to the Head of Cyber Defence, and lead the development of advanced CTI and threat hunting strategies, seamlessly integrating into our security processes and driving continuous improvements. What More ❯
We are seeking a Threat Analyst to join our rapidly growing Information Security team. This is a unique opportunity for an aspiring and motivated professional to be at the forefront of our cyber defence strategy, protecting our brand from existing and emerging threats. You will combine the expertise … of a Threat Hunter and CyberThreatIntelligence Analyst, and will work alongside our Senior Threat Analyst to build our threatintelligence and hunting capabilities from the ground up. You'll have a major input on what new tooling and services we use … and communication skills, and an appetite for complex problem solving. Seize the opportunity to join a dynamic security team, reporting to the Head of Cyber Defence, and lead the development of advanced CTI and threat hunting strategies, seamlessly integrating into our security processes and driving continuous improvements. Our More ❯
We’re looking for a Senior CyberThreatIntelligence Analyst role to join us in Reading As part of the Global Security Threat & Vulnerability Management team, the CyberThreatIntelligence team collects, processes, and analyses data to produce information an organisation can use … to understand the threats that have, will, or are currently targeting our organisation. ThreatIntelligence also provides expertise in supporting the resolution of advanced or complex security threats against Liberty Global as well as advising on best practice countermeasures and detections. The Senior CyberThreatIntelligence Analyst role will strengthen the ThreatIntelligence program by collecting, processing, analysing, and disseminating actionable intelligence. What will you be doing? Identifying information security and ThreatIntelligence requirements and oversight of delivery. Engaging with the business unit to ensure emerging information and cyber security More ❯
Get AI-powered advice on this job and more exclusive features. We are seeking a Senior Threat Analyst to join our rapidly growing Information Security team. This is a unique opportunity for a seasoned cyber security professional to be at the forefront of our cyber defence strategy … protecting our brand from existing and emerging threats. You will combine the expertise of a Threat Hunter and CyberThreatIntelligence Analyst, and have the autonomy to build our threatintelligence and hunting capabilities from the ground up. You'll have a major input … and communication skills, and an appetite for complex problem solving. Seize the opportunity to join a dynamic security team, reporting to the Head of Cyber Defence, and lead the development of advanced CTI and threat hunting strategies, seamlessly integrating into our security processes and driving continuous improvements. Our More ❯
Job Description: Lead ThreatIntelligence Analyst Primary location: Salford (M50 3SP), Staines (TW18 3DZ) or London (EC2R 7HJ) Flexible/Hybrid working options. Permanent up to £90,000 (NEG - depending on exp. & location) 10% Bonus+ fantastic benefits Full time 37.5 hours We consider all types of flexibility, including … our journey and developing yourself along the way. How you’ll help us make health happen: Collaborating closely with the newly appointed Head of ThreatIntelligence, you will be responsible for: Directing the CyberThreatIntelligence team to establish tactical and strategic responses to emerging … threats. Define, implement, and manage CyberThreat Management strategies, including MSSP vendors, contract management, and technology roadmap. Work with vendors and partners to ensure timely and impactful content and analysis, including new product development. Coordinate with Group CISO function and cross-functional teams to mitigate and avoid threats. More ❯
New role: Cyber Services Advisor Location: London (Central flexible/hybrid working) Salary: £50,000 - £65,000 Exciting opportunity to join a leading global Insurtech organisation as a key member of the ThreatIntelligence and Proactive Services capabilities. This role sits within the Cyber Insights & Analytics … function, part of the Cyber Underwriting division, supporting cyber underwriting operations across London, U.S., and global offices. The team and business has developed rapidly, and with a projected growth of 35% this year. In this role, you will work in diverse areas such as insurance, cybersecurity, and consulting … strong communication skills, an interest in cybersecurity, with an ambition to be a front-facing expert. You will work closely with the Head of Cyber Insights & Analytics, the Cyber Services Manager, and the cyber underwriters to deliver the proactive cybersecurity services, engage with internal and external stakeholders More ❯
Social network you want to login/join with: Lead ThreatIntelligence Analyst, Central London Client: Bupa Location: Central London, United Kingdom Job Category: Other EU work permit required: Yes Job Reference: 5bce59021a6a Job Views: 2 Posted: 30.03.2025 Expiry Date: 14.05.2025 Job Description: Primary location: Salford (M50 3SP … of flexibility, including locations, hours and working patterns. How you’ll help us make health happen: Collaborating closely with the newly appointed Head of ThreatIntelligence, you will be responsible for: Directing the CyberThreatIntelligence team to establish tactical and strategic responses to emerging … threats. Define, implement, and manage CyberThreat Management strategies, including MSSP vendors, contract management, and technology roadmap. Work with vendors and partners to ensure timely and impactful content and analysis, including new product development. Coordinate with Group CISO function and cross-functional teams to mitigate and avoid threats. More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
CyberThreatIntelligence Analyst Location: Huntsville, AL Work Type: Onsite Remote Work: No Job Description Work as a member of a threatintelligence team responsible for understanding how emerging cyber threats impact the client organization while conducting highly detail-oriented security threat analysis … strategies and remediation guidance. Form accurate and precise analysis and escalate it to appropriate teammates or internal teams for additional assistance or review. Provide intelligence context to support the fine-tuning of signatures. Qualifications 8+ years of experience with cybersecurity 4+ years of experience with conducting threat research … focused on nation-state, criminal, or malicious Cyber activities Experience with translating complex technical cyber events into a narrative format for technical and executive audiences Experience with the technical capabilities and limitations of the internet and online technologies, including collaborative internet tools, such as social networking sites, blogs More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Lockheed Martin
Job Number 689178BR Description: Introduction to a Career-Defining Opportunity in Cybersecurity In an era where cyber threats evolve at lightning speed and the security landscape is constantly shifting, Lockheed Martin is committed to defending against these challenges and making a significant difference for our customers. As a leader … in the field, we are seeking a highly skilled and experienced Senior Manager of Classified CyberThreat Mitigation to join our team and play a critical role in shaping the future of cybersecurity for our organization. What you'll be doing: • Lead and manage the Classified Cyber … Strategize and implement technology best practices for risk mitigation associated with analysis of security operations center alerts and cases. • Engage with internal teams and cyber/technology industry partners to ensure threats from external actors are evaluated and mitigated where appropriate. • Collaborate with engineering and other teams to drive More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Jisc
annum negotiable depending on experience + fantastic benefits! Jisc grade: TCY3 (internal use only) Hours: 35 hours per week Contract: Permanent Reports into: Senior ThreatIntelligence Engineer Location: Hybrid - A blend of working from home and your nominated hub office. We have hubs in London, Bristol, Manchester, and … software, and networking solutions. About the team: The security team, part of Group CTO, protects UK Education and Research against a wide range of cyber security threats, supporting our members and customers in improving their digital resilience. We have recently launched our nationwide security operation centre (SOC), including a … education community. Your focus will be on managing and enhancing our SIEM (Security Information and Event Management), SOAR (Security Orchestration, Automation, and Response), and threatintelligence platforms. You will also collaborate with our threatintelligence teams to develop effective methods for integrating and automating our SIEM More ❯
San Diego, California, United States Hybrid / WFH Options
Avidity Biosciences
is a key leadership role responsible for overseeing and enhancing Avidity's information security strategy, governance, risk, and compliance, with a strong emphasis on cyber operations and identity & access management (IAM). This role ensures that Avidity's security framework aligns with industry best practices, regulatory requirements (FDA, HIPAA … GxP), and business objectives. You will lead efforts in threat detection, incident response, identity and access management (IAM), and third-party risk management (TPRM), collaborating across IT, research, and compliance teams to protect Avidity's assets. This position requires a technical leader with hands-on experience in security operations … overseeing the department budget, and managing vendor relationships to ensure security policies and solutions are effectively implemented. This role will oversee cybersecurity engineers managing threat and vulnerability management, threatintelligence and hunting, insider threat, and the MSSP-managed Security Operations Center (SOC). The individual must More ❯
products are designed to enable clients to manage risk most effectively across the full FX lifecycle - whether through more efficient processing tools or market intelligence derived from the largest single source of FX executed data available to the market. Our ambition to make a positive difference starts with our … be open and forward-thinking. Job information: Functional title - VP, Incident Response Specialist Department - IT Security Corporate level - Vice President Report to - Director, Information Cyber Security Location - London What you will be doing: SME Consultancy: As part of the IT Security team, develop and implement CLS IT Strategy in … improvement. Recommend and implement process improvements to enhance detection, response and recovery capabilities. Operational: Operate and maintain controls related to SIEM, DLP, Vulnerability Management, CyberThreatIntelligence, Endpoint Protection, etc with an emphasis on cloud deployments and implementations. Conduct IT Security risk assessments for all high impact More ❯
Support the delivery of the Third-Party Risk/Vendor Management process including managing assessments and tooling. Play a key role in supporting the CyberIntelligence, Threat Detection, Crisis Preparedness and Response, Penetration Testing and Vulnerability Management efforts at the OSB. Support operational workflows by performing risk … the OSB's Security Operations capabilities. Leverage a mix of technologies (detection and prevention), processes and human capital to ensure emerging, new, and existing cyber security threats to the organisation are managed appropriately. Responsibilities Monitor external intelligence sources to research and evaluate emerging cyber security and technology … information security risk register and assist with internal and external audits relating to information security. Assist with the creation, maintenance and delivery of a cyber security awareness programme for colleagues and other stakeholders. Skills & Experience Demonstrable experience in a cyber security position (5 - 8 years) CRISC, CISM Qualifications More ❯
the CDO's efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyberthreatintelligence and vulnerability management. Collaborate with CDO analysts to identify repetitive tasks and automate them to improve operational … efficiency. Collaborate with ThreatIntelligence, Incident Response, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements as necessary. Collaborate with third-party vendors and service providers to leverage More ❯
Cambridge, Cambridgeshire, UK Hybrid / WFH Options
Trust In SODA
the CDO's efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyberthreatintelligence and vulnerability management. Collaborate with CDO analysts to identify repetitive tasks and automate them to improve operational … efficiency. Collaborate with ThreatIntelligence, Incident Response, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary. Collaborate with third-party vendors and service providers to leverage More ❯
range of experience in these positions - at the high end we are looking for deep experience defending highly contested critical assets and high-value cyber targets against advanced persistent threats and state-level actors. We have more junior roles for exceptional individuals with a proven personal interest and engagement … in cyber attack and defence, and outstanding academic and career performance even if experience is limited. Our goal is to build an entirely new level of assurance and observable rigour into the open source supply chain. We have our own estate to monitor, but more broadly our goal is … team will also contribute ideas and requirements for Canonical product security, improving the resilience and robustness of all Ubuntu customers and users subject to cyber attack. The SecOps team's mission is not only to secure Canonical, but also to contribute to the security of the wider open source More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
further. Job Title: SOC Lead Location: Hybrid (3 days in office ) About the Role We are seeking a highly skilled SOC Lead to oversee cyber incident response, threatintelligence, and vulnerability management for a leading organization. This role will act as a trusted advisor to senior leadership … ensuring a structured and effective response to cyber incidents while driving improvements in incident management processes. Key Responsibilities Lead and coordinate responses to significant cyber incidents, ensuring effective and timely resolution. Act as a subject matter expert, advising senior leadership on business impacts and risk mitigation strategies. Develop … and implement cyber incident containment plans and remediation strategies. Oversee incident investigations, reporting, and documentation to drive continuous improvement. Collaborate with ThreatIntelligence and Incident Response teams to monitor and respond to emerging threats. Ensure effective vulnerability management, prioritizing risks and coordinating remediation efforts. Provide regular technical More ❯
Immingham, Lincolnshire, United Kingdom Hybrid / WFH Options
TieTalent
offers exciting career opportunities for those looking to make an impact in the evolving energy sector. The Role We are looking for an experienced Cyber Risk Management Lead to join our central cyber security team. This role will be responsible for implementing and continuously improving our cyber … risk management framework, ensuring security governance, risk, and compliance across both Operational Technology (OT) and Information Technology (IT) domains. This role within VPI's cyber security operating model, with opportunities to work closely with regulators, senior stakeholders, and cross-functional teams. You will also support business development projects and … act as a key stakeholder in the design and implementation of cyber security policies and risk management operations. The role can be based in Immingham or London, with travel to other sites required and hybrid working, 3 days in the office. Key Responsibilities Lead cyber risk assessment activities More ❯
Support the delivery of the Third-Party Risk/Vendor Management process including managing assessments and tooling. Play a key role in supporting the CyberIntelligence, Threat Detection, Crisis Preparedness and Response, Penetration Testing and Vulnerability Management efforts at the OSB. Support operational workflows by performing risk … the OSB's Security Operations capabilities. Leverage a mix of technologies (detection and prevention), processes and human capital to ensure emerging, new, and existing cyber security threats to the organisation are managed appropriately. Responsibilities will include: Monitor external intelligence sources to research and evaluate emerging cyber security … information security risk register and assist with internal and external audits relating to information security. Assist with the creation, maintenance and delivery of a cyber security awareness programme for colleagues and other stakeholders. What You Bring: Several years of experience in a senior cybersecurity position. Preferred qualifications: CRISC, CISM More ❯
Reston, Virginia, United States Hybrid / WFH Options
Google, Inc
practical experience. 10 years of experience with Security Operations (SecOps) toolset including Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), ThreatIntelligence and Endpoint Detection and Response (EDR) tools. Experience engaging with, and presenting to, technical stakeholders and executive leaders. Ability to travel up … qualifications: Master's degree in Computer Science, Engineering, Mathematics, or a technical field. Certification in Cloud or Security Industry. Experience working in a defensive cyber operations or threatintelligence role. Knowledge of product and solution market trends in the cybersecurity industry (e.g., ransomware, attack frameworks, zero trust … also be familiar with technologies such as Security Operations (SecOps) toolset including Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), ThreatIntelligence and Endpoint Detection and Response (EDR) tools. You will present to customer and channel executives in business and technical management. Must be More ❯
Content - maintain the availability of the underlying infrastructure, develop new alerts, field parsers, models and automated playbooks, and integrate new log sources where appropriate. ThreatIntelligence & Threat Hunting - provide, develop and integrate external threatintelligence data into the team's detection capabilities; perform proactive threat … test the team's detection capabilities, develop scenario-based training, and organise purple team exercises, both in-house and with third-party providers. Insider Threat - maintain and develop the Data Loss Prevention policies in line with the company's data classification requirements, and implement exceptions for business-approved procedures … with vulnerability scanning and penetration testing tools and techniques. Qualifications: A university degree in one of the following fields is preferred (but not required): Cyber/Information Security, Digital Forensics, Ethical Hacking Computer Science, Software Development, Network Engineering Mathematics, Physics and other STEM subjects Other desirable certifications include : CISSP More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Lockheed Martin
hired, you'll receive a payment! code-extrefer Power BI Specialist - Clearance Required WHAT WE'RE DOING • Join Lockheed Martin Rotary and Mission Systems, Cyber & Intelligence, where we foster innovation and integrity. • As an Power BI Specialist, you'll be empowered to create "new realities" and pioneer solutions … of aerospace, defense, and security solutions. THE WORK TKO provides systems engineering, software development, data science and cloud development and engineering services to the Cyber Infrastructure Solutions customer. The services enable the Data Transformation, Malware Analysis, and CyberThreatIntelligence processing and sharing capabilities for the … customer, fulfilling mission objectives and offering actionable information to detect and mitigate cyber threats. The contract has several locations in Maryland and a small contingent in Texas. WHO WE ARE • Lockheed Martin is a global leader in aerospace, defense, and security solutions, committed to excellence and integrity. WHO YOU More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Lockheed Martin
you'll receive a payment! code-extrefer Senior Systems Network Administrator - Clearance Required WHAT WE'RE DOING • Join Lockheed Martin Rotary and Mission Systems, Cyber & Intelligence, where we foster innovation and integrity. • As a Senior Systems Network Administrator, you'll be empowered to create "new realities" and pioneer … of aerospace, defense, and security solutions. THE WORK TKO provides systems engineering, software development, data science and cloud development and engineering services to the Cyber Infrastructure Solutions customer. The services enable the Data Transformation, Malware Analysis, and CyberThreatIntelligence processing and sharing capabilities for the … customer, fulfilling mission objectives and offering actionable information to detect and mitigate cyber threats. The contract has several locations in Maryland and a small contingent in Texas. WHO WE ARE • Lockheed Martin is a global leader in aerospace, defense, and security solutions, committed to excellence and integrity. WHO YOU More ❯