Threat Intelligence Experts

Job Category: Cybersecurity

Threat Intelligence Expert | Cyber Threat Analysis | Security Operations

Salary: £60,000 – £90,000 per year (DOE)
Location: United Kingdom – London / Manchester / Remote (UK-based only)
Type: Full-Time
Industry: Cybersecurity / FinTech / Healthcare Technology / Government / Intelligence
Job Owner: Tariq Masood


Job Description

We are seeking an experienced and highly analytical Threat Intelligence Expert to join a leading cybersecurity team within a fast-paced enterprise environment.

You will play a key role in identifying emerging threats, analyzing adversary tactics, and translating intelligence into actionable defensive measures to safeguard the organization’s digital infrastructure.

This is a hands-on technical and investigative role—ideal for candidates with deep expertise in Cyber Threat Intelligence (CTI), Threat Hunting, OSINT, and MITRE ATT&CK frameworks.


Experience

3–7 years of experience in cyber threat intelligence, security analysis, or SOC operations.


Key Responsibilities

  • Collect, analyze, and interpret threat data from internal and external intelligence sources.
  • Produce actionable intelligence reports on indicators of compromise (IOCs), TTPs, and threat actor behavior.
  • Monitor dark web and underground forums for organization-relevant threat activity.
  • Collaborate with SOC and Incident Response teams to enrich investigations with contextual intelligence.
  • Develop and maintain intelligence requirements aligned with business and security goals.
  • Administer and leverage Threat Intelligence Platforms (TIPs) such as MISP, Anomali, or Recorded Future.
  • Track and communicate emerging threats, vulnerabilities, and geopolitical risks.
  • Map adversary behaviors to the MITRE ATT&CK framework to improve detection and response strategies.

Required Skills

  • Deep understanding of cyber threat intelligence methodologies and analytical processes.
  • Familiarity with frameworks including MITRE ATT&CK, STIX/TAXII, and the Diamond Model.
  • Proficiency in Threat Intelligence Platforms (TIPs) and related tooling.
  • Strong analytical skills to process and interpret large data sets.
  • Excellent written and verbal communication for report creation and executive briefings.
  • Experience using OSINT tools such as Maltego, Shodan, and SpiderFoot.

Desired Skills

  • Certifications: GCTI, GCIA, GCFA, CISSP, or Security+.
  • Scripting knowledge in Python or PowerShell.
  • Experience in threat modeling and risk assessment methodologies.
  • Understanding of APT groups, malware families, and nation-state threat actors.
  • Experience working in regulated sectors (finance, healthcare, government).

Job Benefits

  • Competitive salary with annual bonus opportunities
  • Hybrid or remote working flexibility (UK-based)
  • Company-sponsored training and certifications (SANS, GIAC, etc.)
  • Private health & dental insurance
  • Pension scheme and generous annual leave
  • Access to cutting-edge threat intelligence tools and platforms
  • Strong career development opportunities in one of cybersecurity’s fastest-growing domains

Education

  • Degree preferred in Computer Science, Cybersecurity, or related discipline.
  • Relevant industry certifications highly desirable.

Additional Details

  • Experience Required: 3–7 years in Cyber Threat Intelligence, SOC, or related fields
  • Work Mode: Hybrid / Remote (UK-based only)
  • Sponsorship: Not considered

Apply for this position

Allowed Type(s): .pdf, .doc, .docx

Ready to Take the Next Step?

Build your high-performing team with MastarRec’s specialist recruitment solutions.