Cyber Threat Intelligence Expert

Job Category: Cybersecurity

Cyber Threat Intelligence Expert – SOC | Threat Hunting | Incident Response

Salary: £80,000 – £105,000 per year (DOE)
Location: UK – Remote or Hybrid (London or Manchester preferred)
Type: Full-Time
Industry: Cybersecurity / Threat Intelligence / Information Security
Job Owner: Tariq Masood


Job Description

We are seeking a highly experienced Cyber Threat Intelligence (CTI) Expert to join a fast-growing, security-driven organization at the forefront of threat detection, hunting, and incident response.

This role is ideal for cybersecurity professionals who excel at gathering, analyzing, and operationalizing threat intelligence to proactively defend enterprise environments against evolving cyber threats.

As a senior member of the security function, you will lead intelligence-driven detection strategies, collaborate with SOC and Incident Response teams, and provide expert-level analysis of APTs, malware, and adversary tactics.


Experience

Minimum 5 years of hands-on experience in Cyber Threat Intelligence, Threat Hunting, or Incident Response roles.


Key Responsibilities

  • Collect, analyze, and interpret threat intelligence from OSINT, closed-source, and internal data feeds.
  • Produce actionable intelligence reports, threat briefs, and risk assessments for stakeholders.
  • Provide contextual intelligence to SOC operations, aiding in alert prioritization and detection tuning.
  • Identify and monitor Indicators of Compromise (IOCs) and TTPs using the MITRE ATT&CK framework.
  • Collaborate on playbook development and threat detection use cases to improve response workflows.
  • Conduct attribution, malware behavior, and campaign analysis for active threats.
  • Lead threat actor profiling across APT, cybercrime, and hacktivist ecosystems.
  • Interface with external intel-sharing networks, ISACs, and CERTs to exchange intelligence.

Required Skills

  • Proven expertise in cyber threat intelligence, threat hunting, or incident response.
  • Hands-on experience with Threat Intelligence Platforms (TIPs) such as MISP, Anomali, or ThreatConnect.
  • Strong knowledge of malware families, TTPs, and IOC tracking.
  • Experience using SIEM, SOAR, and endpoint detection solutions.
  • Working knowledge of frameworks such as MITRE ATT&CK, Cyber Kill Chain, and Diamond Model.
  • Ability to produce clear, executive-level threat intelligence reports.

Desired Skills

  • Certifications such as GCTI, GREM, GCIA, CEH, or CISSP.
  • Scripting or automation experience with Python, Bash, or PowerShell.
  • Awareness of geopolitical cyber risks and threat actor motivations.
  • Familiarity with STIX/TAXII and intel-sharing protocols.

Job Benefits

  • Competitive salary with performance-based bonus
  • Remote or hybrid working flexibility (UK-based only)
  • Private healthcare and mental wellness support
  • Funded training and certifications (SANS, GIAC, CREST, etc.)
  • 25+ days annual leave plus bank holidays
  • Pension scheme and life assurance
  • Access to cutting-edge threat intelligence tools and platforms

Education

  • BSc in Computer Science, Cybersecurity, or related discipline (preferred but not essential).

Additional Details

  • Experience Required: 5+ years in a relevant cybersecurity field
  • Work Mode: Remote or Hybrid (UK-based candidates only)
  • Sponsorship: Not considered

Apply for this position

Allowed Type(s): .pdf, .doc, .docx

Ready to Take the Next Step?

Build your high-performing team with MastarRec’s specialist recruitment solutions.