Enable job alerts via email!

Threat Hunter - National Security - Leeds

BAE

Gloucester

Hybrid

GBP 50,000 - 70,000

Full time

4 days ago
Be an early applicant

Job summary

A leading cybersecurity firm is seeking a Threat Hunter to analyze intrusions and mentor team members. This role involves developing detection analytics in cloud environments and requires solid knowledge of Azure and AWS. Candidates should have experience in security testing and threat detection. Flexible working arrangements are available.

Qualifications

  • Experience in security testing practices and techniques.
  • Knowledge of cloud platforms like Azure and AWS.
  • Strong knowledge of current security threats.

Responsibilities

  • Serve as the point of escalation for incident response.
  • Develop complex KQL analytics for detection.
  • Perform threat hunting and analytic enrichment tasks.
  • Mentor team members and share knowledge.

Skills

Security testing practices
Knowledge of Azure
Knowledge of AWS
Windows Active Directory fundamentals
Networking fundamentals
CI/CD and source control
Malware detection
Statistical methods for anomaly detection
Microsoft Sentinel/XDR
Threat hunting or SOC analyst certifications

Job description

Social network you want to login/join with:

Threat Hunter - National Security - Leeds, Gloucester

Client: BAE

Location: Gloucester, United Kingdom

Job Category: Other

-

EU work permit required: Yes

Job Reference: dbc40c959261
Job Views: 15
Posted: 12.08.2025
Expiry Date: 26.09.2025
Job Description:

BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments.

Job Title: Threat Hunter

Requisition ID: 121789

Location: Leeds - We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular role.

Grade: GG10 - GG11

Responsibilities:
  • Serve as the point of escalation for intrusion analysis, forensics, and Incident Response queries.
  • Provide root cause analysis of complex findings and anomaly-based detections.
  • Mentor team members and share knowledge via the SOC Knowledge Repository.
  • Build relationships with external SOCs and cybersecurity researchers to identify analytics and threat intelligence.
  • Develop complex KQL analytics and playbooks for detection in cloud and on-prem environments.
  • Review open-source research on threats impacting cloud services and prioritize implementation.
  • Research vulnerabilities, produce proof-of-concept exploits, and emulate adversary TTPs.
  • Review red team activities and improve detection rules.
  • Support forensic analysis and threat emulation to improve alert triage.
  • Identify gaps in SOC processes and demonstrate improvements through exercises.
  • Perform threat hunting, automation, and analytic enrichment tasks.
  • Set vision and milestones for detection capabilities and influence team requirements.
  • Adjust alert thresholds and suppressions based on signal-to-noise assessments.
  • Define threat hunting initiatives based on real-world risks.
  • Architect detection programs to reduce dwell time and optimize resources.
  • Oversee operational practices and quality reviews.
  • Lead team exercises and influence operational strategies.
  • Devise technical interview questions and evaluate candidates.
Experience:
  • Experience in security testing practices and techniques.
  • Knowledge of Azure, AWS preferred.
  • Knowledge of Windows Active Directory and fundamentals.
  • Networking fundamentals.
  • Experience with CI/CD and source control.
  • Experience in malware and anomaly detection development.
  • Use of statistical methods for anomaly detection.
  • Proficiency with Microsoft Sentinel/XDR and writing complex KQL analytics.
  • Strong knowledge of current security threats.
  • Ability to prioritize threats and assess detection effectiveness.
  • Threat hunting or SOC analyst certifications.

We embrace hybrid working, allowing flexible locations and schedules. Diversity and inclusion are core to our culture, fostering a collaborative environment where varied perspectives thrive.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs