Cyber Threat Intelligence Expert – SOC | Threat Hunting | Incident Response
Salary: £80,000 – £105,000 per year (DOE)
Location: UK – Remote or Hybrid (London or Manchester preferred)
Type: Full-Time
Industry: Cybersecurity / Threat Intelligence / Information Security
Job Owner: Tariq Masood
Job Description
We are seeking a highly experienced Cyber Threat Intelligence (CTI) Expert to join a fast-growing, security-driven organization at the forefront of threat detection, hunting, and incident response.
This role is ideal for cybersecurity professionals who excel at gathering, analyzing, and operationalizing threat intelligence to proactively defend enterprise environments against evolving cyber threats.
As a senior member of the security function, you will lead intelligence-driven detection strategies, collaborate with SOC and Incident Response teams, and provide expert-level analysis of APTs, malware, and adversary tactics.
Experience
Minimum 5 years of hands-on experience in Cyber Threat Intelligence, Threat Hunting, or Incident Response roles.
Key Responsibilities
- Collect, analyze, and interpret threat intelligence from OSINT, closed-source, and internal data feeds.
 - Produce actionable intelligence reports, threat briefs, and risk assessments for stakeholders.
 - Provide contextual intelligence to SOC operations, aiding in alert prioritization and detection tuning.
 - Identify and monitor Indicators of Compromise (IOCs) and TTPs using the MITRE ATT&CK framework.
 - Collaborate on playbook development and threat detection use cases to improve response workflows.
 - Conduct attribution, malware behavior, and campaign analysis for active threats.
 - Lead threat actor profiling across APT, cybercrime, and hacktivist ecosystems.
 - Interface with external intel-sharing networks, ISACs, and CERTs to exchange intelligence.
 
Required Skills
- Proven expertise in cyber threat intelligence, threat hunting, or incident response.
 - Hands-on experience with Threat Intelligence Platforms (TIPs) such as MISP, Anomali, or ThreatConnect.
 - Strong knowledge of malware families, TTPs, and IOC tracking.
 - Experience using SIEM, SOAR, and endpoint detection solutions.
 - Working knowledge of frameworks such as MITRE ATT&CK, Cyber Kill Chain, and Diamond Model.
 - Ability to produce clear, executive-level threat intelligence reports.
 
Desired Skills
- Certifications such as GCTI, GREM, GCIA, CEH, or CISSP.
 - Scripting or automation experience with Python, Bash, or PowerShell.
 - Awareness of geopolitical cyber risks and threat actor motivations.
 - Familiarity with STIX/TAXII and intel-sharing protocols.
 
Job Benefits
- Competitive salary with performance-based bonus
 - Remote or hybrid working flexibility (UK-based only)
 - Private healthcare and mental wellness support
 - Funded training and certifications (SANS, GIAC, CREST, etc.)
 - 25+ days annual leave plus bank holidays
 - Pension scheme and life assurance
 - Access to cutting-edge threat intelligence tools and platforms
 
Education
- BSc in Computer Science, Cybersecurity, or related discipline (preferred but not essential).
 
Additional Details
- Experience Required: 5+ years in a relevant cybersecurity field
 - Work Mode: Remote or Hybrid (UK-based candidates only)
 - Sponsorship: Not considered