2,459 Cybersecurity jobs in the United Kingdom
Cybersecurity Threat Intelligence Analyst
Posted 1 day ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze various threat intelligence sources to identify cyber threats.
- Research and track threat actors, their TTPs (Tactics, Techniques, and Procedures).
- Develop and maintain threat intelligence reports and briefings.
- Correlate indicators of compromise (IOCs) with known threat campaigns.
- Provide actionable intelligence to support security operations and incident response.
- Develop and implement threat models and risk assessments.
- Collaborate with security teams to enhance defensive measures.
- Utilize threat intelligence platforms and security tools effectively.
- Stay updated on emerging cyber threats and security trends.
- Contribute to the development of threat hunting capabilities.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, or a related field, or equivalent experience.
- Proven experience in threat intelligence analysis or cybersecurity operations.
- Strong understanding of cybersecurity concepts, frameworks, and threat landscapes.
- Proficiency in using threat intelligence platforms and security tools.
- Excellent analytical, research, and report-writing skills.
- Familiarity with OSINT techniques and dark web monitoring.
- Relevant certifications such as GCTI, CompTIA CySA+, or CISSP are advantageous.
Cybersecurity Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
Cybersecurity Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
Key Responsibilities:
- Collect, analyze, and disseminate cyber threat intelligence from open-source, commercial, and government intelligence feeds.
- Identify and track threat actors, campaigns, and their associated Tactics, Techniques, and Procedures (TTPs).
- Produce high-quality threat intelligence reports, briefings, and advisories for various audiences, including technical teams and senior management.
- Develop and maintain intelligence requirements and collection plans.
- Integrate threat intelligence into security tools and processes, such as SIEM, SOAR, and firewalls.
- Conduct vulnerability assessments and provide context on emerging threats relevant to the organization.
- Collaborate with internal security teams to support incident investigations and proactive threat hunting.
- Stay abreast of the latest cybersecurity threats, trends, and attack vectors.
- Build and maintain relationships with external threat intelligence communities and information sharing groups.
- Contribute to the development and refinement of threat intelligence platforms and methodologies.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field, or equivalent professional experience.
- 3-5 years of experience in cybersecurity, with a focus on threat intelligence, analysis, or security operations.
- Strong understanding of cyber threat intelligence frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain).
- Experience with threat intelligence platforms (TIPs) and security information and event management (SIEM) systems.
- Proficiency in analyzing malware, network traffic, and forensic data.
- Excellent analytical, research, and written and verbal communication skills.
- Ability to present complex technical information clearly and concisely.
- Familiarity with various operating systems and network protocols.
- Relevant certifications such as GIAC Certified Cyber Threat Intelligence (GCTI) are a plus.
- Willingness to work on-site in Aberdeen.
Cybersecurity Analyst - Threat Intelligence
Posted 6 days ago
Job Viewed
Job Description
Cybersecurity Analyst - Threat Intelligence
Posted 7 days ago
Job Viewed
Job Description
- Monitoring threat intelligence feeds, security alerts, and industry reports to identify potential cyber threats.
- Conducting in-depth analysis of malware, phishing attacks, and other cyber threats.
- Developing and maintaining threat intelligence platforms and databases.
- Producing actionable threat intelligence reports for stakeholders and incident response teams.
- Collaborating with security operations center (SOC) analysts to investigate and respond to security incidents.
- Assisting in the development and implementation of security controls and best practices.
- Conducting vulnerability assessments and penetration testing support.
- Staying current with the latest cybersecurity trends, attack vectors, and defence mechanisms.
- Contributing to the continuous improvement of the organization's security posture.
- Participating in security awareness training and education initiatives.
The ideal candidate will possess a Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field, with at least 3 years of experience in cybersecurity operations or threat intelligence. Demonstrated experience with SIEM tools, endpoint detection and response (EDR) solutions, and threat intelligence platforms is essential. Strong analytical and investigative skills, coupled with excellent written and verbal communication abilities, are required. Familiarity with scripting languages (e.g., Python) and a good understanding of networking protocols and operating systems are highly desirable. Certifications such as CompTIA Security+, CISSP, or GIAC certifications are a plus. If you are a proactive and detail-oriented cybersecurity professional dedicated to staying ahead of evolving threats, we encourage you to apply.
Cybersecurity Analyst (Threat Intelligence)
Posted 7 days ago
Job Viewed
Job Description
- Monitoring security events and alerts from various sources (SIEM, IDS/IPS, endpoint protection).
- Investigating security incidents and performing forensic analysis.
- Analyzing malware and identifying indicators of compromise (IOCs).
- Conducting threat hunting exercises to proactively identify threats within the network.
- Researching and staying abreast of the latest cybersecurity threats, trends, and technologies.
- Developing and maintaining threat intelligence reports and presentations for stakeholders.
- Recommending and implementing security controls to mitigate identified risks.
- Collaborating with incident response teams to manage and contain security breaches.
- Contributing to the development and improvement of security policies and procedures.
The ideal candidate will possess a strong background in information security and threat intelligence, with demonstrable experience in analyzing complex security data. Relevant certifications such as CISSP, GIAC, or CEH are highly desirable. Proficiency in security tools, including SIEM platforms, threat intelligence platforms, and forensic analysis tools, is essential. Excellent analytical, problem-solving, and communication skills are required to effectively convey technical information to both technical and non-technical audiences. The ability to work independently in a remote setting, manage your time effectively, and contribute positively to a team culture is paramount.
Cybersecurity Analyst - Threat Intelligence
Posted 8 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor, analyse, and interpret threat intelligence feeds, security alerts, and incident data from various sources.
- Identify emerging cyber threats, vulnerabilities, and attack vectors relevant to the organisation.
- Conduct in-depth analysis of malware, phishing campaigns, and other cyberattack techniques.
- Develop and maintain threat intelligence reports and briefings for stakeholders, including technical and executive audiences.
- Collaborate with Security Operations Centre (SOC) teams to enhance detection and response capabilities.
- Contribute to the development and implementation of proactive security measures and incident response plans.
- Research and evaluate new threat intelligence tools and technologies.
- Provide expert advice and guidance on cybersecurity best practices and threat mitigation strategies.
- Participate in incident response activities, including containment, eradication, and recovery.
- Stay updated on the latest cybersecurity trends, threats, and geopolitical events impacting the threat landscape.
- Perform vulnerability assessments and penetration testing support.
- Develop and manage security metrics and reporting dashboards.
Qualifications:
- Proven experience as a Cybersecurity Analyst, Threat Intelligence Analyst, or similar role.
- Strong understanding of cybersecurity principles, frameworks, and technologies (e.g., SIEM, IDS/IPS, firewalls, EDR).
- Experience with threat intelligence platforms (TIPs) and data sources (e.g., OSINT, dark web monitoring).
- Proficiency in analysing various types of cyber threats, including malware, phishing, ransomware, and APTs.
- Excellent analytical, critical thinking, and problem-solving skills.
- Strong written and verbal communication skills, with the ability to present complex information clearly.
- Relevant cybersecurity certifications such as CISSP, GIAC, CompTIA Security+ are a plus.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field, or equivalent practical experience.
- Ability to work independently and manage time effectively in a remote work environment.
- Familiarity with scripting languages (e.g., Python) for automation is desirable.
This is a significant opportunity for a cybersecurity professional seeking to make a real impact in a fully remote capacity, based remotely but supporting operations for our client in Derby, Derbyshire, UK . If you are passionate about staying ahead of cyber threats, apply now.
Be The First To Know
About the latest Cybersecurity Jobs in United Kingdom !
Cybersecurity Threat Intelligence Analyst
Posted 10 days ago
Job Viewed
Job Description
Your primary responsibility will be to collect, process, and analyse threat intelligence from a wide variety of sources, including open-source intelligence (OSINT), dark web monitoring, security feeds, vendor reports, and internal security tool telemetry. You will develop a deep understanding of threat actors, their tactics, techniques, and procedures (TTPs), motivations, and objectives. This involves correlating disparate pieces of information to form a comprehensive picture of the threat landscape.
Key duties include producing timely and actionable threat intelligence reports, briefings, and alerts for various internal and external stakeholders, including security operations teams, incident response, and executive leadership. You will contribute to the development and refinement of threat hunting methodologies, proactively searching for indicators of compromise (IOCs) and adversary activity within client environments. You will also support incident response activities by providing contextual information and insights into ongoing attacks.
The ideal candidate will possess a Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field, coupled with significant practical experience in cybersecurity operations or threat intelligence. Proven experience in analysing malware, network traffic, and forensic data is essential. Proficiency with threat intelligence platforms (TIPs), SIEM tools, and threat hunting frameworks is required. Strong analytical, research, and critical thinking skills are paramount, along with excellent written and verbal communication abilities to convey complex technical information effectively. Familiarity with various operating systems, networking protocols, and common attack vectors is necessary. Relevant certifications such as GCTI, CyTI, or GIAC are highly desirable. The ability to work independently, manage priorities, and collaborate effectively within a team are key attributes.
Cybersecurity Threat Intelligence Analyst (Remote)
Posted 1 day ago
Job Viewed
Job Description
Remote Cybersecurity Analyst - Threat Intelligence
Posted 2 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze global cyber threat intelligence feeds, news, and advisories.
- Identify and track emerging threats, vulnerabilities, and attack vectors relevant to client industries.
- Analyze malware, phishing campaigns, and advanced persistent threats (APTs).
- Research and profile threat actors, their tactics, techniques, and procedures (TTPs).
- Develop actionable intelligence reports and threat briefs for internal teams and clients.
- Provide strategic recommendations for improving security posture and mitigating risks.
- Collaborate with incident response and security operations teams to integrate threat intelligence.
- Utilize threat intelligence platforms and analytical tools effectively.
- Contribute to the development and refinement of threat hunting methodologies.
- Maintain awareness of the evolving threat landscape and cybersecurity trends.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field, or equivalent practical experience.
- Minimum of 4 years of experience in cybersecurity, with a focus on threat intelligence or analysis.
- In-depth understanding of cyber threats, attack methodologies, and security frameworks.
- Experience with threat intelligence platforms, SIEM tools, and malware analysis techniques.
- Proficiency in scripting languages (e.g., Python) for data analysis is a plus.
- Strong analytical, research, and critical thinking skills.
- Excellent written and verbal communication skills, with the ability to present complex information clearly.
- Ability to work independently and manage tasks effectively in a remote environment.
- Relevant certifications such as GIAC Certified Intrusion Analyst (GCIA) or Certified Threat Intelligence Analyst (CTIA) are highly desirable.