Threat Intelligence Expert | Cyber Threat Analysis | Security Operations
Salary: £60,000 – £90,000 per year (DOE)
Location: United Kingdom – London / Manchester / Remote (UK-based only)
Type: Full-Time
Industry: Cybersecurity / FinTech / Healthcare Technology / Government / Intelligence
Job Owner: Tariq Masood
Job Description
We are seeking an experienced and highly analytical Threat Intelligence Expert to join a leading cybersecurity team within a fast-paced enterprise environment.
You will play a key role in identifying emerging threats, analyzing adversary tactics, and translating intelligence into actionable defensive measures to safeguard the organization’s digital infrastructure.
This is a hands-on technical and investigative role—ideal for candidates with deep expertise in Cyber Threat Intelligence (CTI), Threat Hunting, OSINT, and MITRE ATT&CK frameworks.
Experience
3–7 years of experience in cyber threat intelligence, security analysis, or SOC operations.
Key Responsibilities
- Collect, analyze, and interpret threat data from internal and external intelligence sources.
- Produce actionable intelligence reports on indicators of compromise (IOCs), TTPs, and threat actor behavior.
- Monitor dark web and underground forums for organization-relevant threat activity.
- Collaborate with SOC and Incident Response teams to enrich investigations with contextual intelligence.
- Develop and maintain intelligence requirements aligned with business and security goals.
- Administer and leverage Threat Intelligence Platforms (TIPs) such as MISP, Anomali, or Recorded Future.
- Track and communicate emerging threats, vulnerabilities, and geopolitical risks.
- Map adversary behaviors to the MITRE ATT&CK framework to improve detection and response strategies.
Required Skills
- Deep understanding of cyber threat intelligence methodologies and analytical processes.
- Familiarity with frameworks including MITRE ATT&CK, STIX/TAXII, and the Diamond Model.
- Proficiency in Threat Intelligence Platforms (TIPs) and related tooling.
- Strong analytical skills to process and interpret large data sets.
- Excellent written and verbal communication for report creation and executive briefings.
- Experience using OSINT tools such as Maltego, Shodan, and SpiderFoot.
Desired Skills
- Certifications: GCTI, GCIA, GCFA, CISSP, or Security+.
- Scripting knowledge in Python or PowerShell.
- Experience in threat modeling and risk assessment methodologies.
- Understanding of APT groups, malware families, and nation-state threat actors.
- Experience working in regulated sectors (finance, healthcare, government).
Job Benefits
- Competitive salary with annual bonus opportunities
- Hybrid or remote working flexibility (UK-based)
- Company-sponsored training and certifications (SANS, GIAC, etc.)
- Private health & dental insurance
- Pension scheme and generous annual leave
- Access to cutting-edge threat intelligence tools and platforms
- Strong career development opportunities in one of cybersecurity’s fastest-growing domains
Education
- Degree preferred in Computer Science, Cybersecurity, or related discipline.
- Relevant industry certifications highly desirable.
Additional Details
- Experience Required: 3–7 years in Cyber Threat Intelligence, SOC, or related fields
- Work Mode: Hybrid / Remote (UK-based only)
- Sponsorship: Not considered