At a Glance
- Tasks: Lead and design a cutting-edge threat hunting programme to enhance security outcomes.
- Company: Join a leading security firm focused on proactive threat intelligence.
- Benefits: Competitive salary, flexible working options, and opportunities for professional growth.
- Other info: Dynamic role with opportunities to mentor and uplift analyst capabilities.
- Why this job: Make a real impact in cybersecurity by reshaping threat hunting strategies.
- Qualifications: Extensive experience in threat hunting and strong collaboration skills required.
The predicted salary is between 70000 - 90000 ÂŁ per year.
As the Threat Hunting & Intelligence Lead, you will be a senior security specialist responsible for designing, establishing, and leading an intelligence‑led threat hunting capability across the managed security service. This role combines hands‑on technical excellence, analyst development, and client‑facing leadership to deliver proactive security outcomes beyond traditional SOC alerting. You will reshape the threat hunting programme from the ground up, defining AI enabled methodologies, telemetry requirements, and measures of success before evolving into ongoing hunting execution, coaching analysts, and acting as a trusted advisor to clients and internal stakeholders. The role blends offensive attacker‑mindset insight with deep defensive detection and response expertise, making it a key differentiator for both service delivery and pre‑sales engagements.
Key Responsibilities
- Threat Hunting Programme Development
- Design and establish a formal, repeatable threat hunting programme, including:
- Hunting methodologies and frameworks
- Hypothesis‑driven hunting models
- Tooling, data sources, and telemetry requirements
- Clear success metrics and measurable outcomes
- Define and embed how threat hunting integrates with:
- SIEM detections and detection engineering
- SOC operations and workflows
- Incident response processes
- Intelligence‑led prioritisation and use‑case development
Hands‑On Threat Hunting & Intelligence
- Conduct advanced, hands‑on threat hunts in the Microsoft Eco System primarily across:
- Endpoint (EDR/XDR)
- Identity and authentication telemetry
- Cloud platforms and SaaS environments
- SIEM and log‑based data sources
- New or improved detection cases
- Automation opportunities
- SOC operational enhancements
- Detection coverage and fidelity improvements
Analyst Coaching & Capability Uplift
- Coach and mentor SOC analysts through collaborative hunting, developing:
- Threat‑led and adversary‑focused thinking
- Strong investigative depth and analytical reasoning
- Confidence in hypothesis‑driven analysis
Technical Leadership & Collaboration
- Demonstrate deep technical expertise across:
- SIEM platforms
- EDR/XDR technologies
- Cloud security platforms
- Identity and access telemetry
- Detection Engineering teams
- Platform Automation and Engineering
- SOC leadership and incident response leads
Core Experience & Skills
- Extensive experience in threat hunting, detection engineering, or advanced SOC operations.
- Strong understanding of adversary behaviors, attack chains, and modern threat actor tradecraft.
- Deep hands‑on experience with SIEM, EDR/XDR, cloud, and identity telemetry.
- Proven ability to design and operate hypothesis‑driven hunting programmes.
- Experience translating technical findings into business‑level risk and outcomes.
- Strong collaboration and leadership skills within multi‑disciplinary security teams.
- Confident communicator.
- MSSP Background a Positive.
- Relevant certifications such as (or equivalent to): CEH, Offensive security or red team certifications, Advanced detection or threat hunting credentials.
Threat Hunting & Intelligence Lead in London employer: Avanade UK Limited Company
Contact Detail:
Avanade UK Limited Company Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Threat Hunting & Intelligence Lead in London
✨Tip Number 1
Network like a pro! Attend industry events, webinars, and meetups to connect with fellow security enthusiasts. We all know that sometimes it’s not just what you know, but who you know that can land you that dream job.
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your threat hunting projects and methodologies. This gives potential employers a taste of your hands-on experience and technical prowess.
✨Tip Number 3
Prepare for interviews by brushing up on your knowledge of the latest threat landscapes and attack techniques. We recommend practising common interview questions related to threat hunting and intelligence to boost your confidence.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, we love seeing candidates who are genuinely interested in joining our team.
We think you need these skills to ace Threat Hunting & Intelligence Lead in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Threat Hunting & Intelligence Lead role. Highlight your experience in threat hunting, detection engineering, and any relevant certifications. We want to see how your skills align with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about threat hunting and how you can contribute to our team. Be sure to mention specific experiences that demonstrate your hands-on technical excellence and leadership abilities.
Showcase Your Technical Skills: In your application, don't shy away from showcasing your technical skills. Mention your experience with SIEM platforms, EDR/XDR technologies, and cloud security. We love seeing candidates who can blend offensive and defensive security insights!
Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. It helps us keep track of applications and ensures you’re considered for the role. Plus, it’s super easy to do!
How to prepare for a job interview at Avanade UK Limited Company
✨Know Your Threat Hunting Frameworks
Before the interview, brush up on various threat hunting methodologies and frameworks. Be ready to discuss how you would design a repeatable programme and what success metrics you would implement. This shows that you’re not just familiar with the concepts but can also apply them practically.
✨Showcase Your Hands-On Experience
Prepare to share specific examples of your hands-on threat hunting experiences, especially within the Microsoft ecosystem. Highlight any advanced techniques you've used, such as applying offensive security tradecraft to uncover threats. This will demonstrate your technical expertise and problem-solving skills.
✨Communicate Like a Pro
Since this role involves client-facing responsibilities, practice explaining complex technical findings in simple, business-relevant language. Think about how you would articulate the value of proactive hunting versus reactive alerting. This will show your ability to bridge the gap between technical and non-technical stakeholders.
✨Emphasise Collaboration and Coaching
Be prepared to discuss your approach to mentoring SOC analysts and fostering a collaborative environment. Share examples of how you've uplifted team capabilities through joint hunts or training sessions. This will highlight your leadership skills and commitment to continuous improvement within the team.