391 Threat Intelligence jobs in the United Kingdom
Threat Intelligence Expert
Posted 24 days ago
Job Viewed
Job Description
We are actively seeking an experienced Threat Intelligence Expert to join a leading cybersecurity function within a fast-paced enterprise environment. You’ll play a key role in identifying emerging threats , analysing adversary tactics , and translating intelligence into actionable security measures to protect the organization’s digital assets.
This is a hands-on technical and analytical role ideal for candidates with deep expertise in cyber threat intelligence (CTI) , threat hunting , open-source intelligence (OSINT) , and MITRE ATT&CK framework .
Job Responsibilities
Collect, analyse, and interpret threat data from internal and external intelligence sourcesProduce actionable intelligence reports on indicators of compromise (IOCs) , TTPs , and threat actor behaviourMonitor dark web and underground forums for threat actor activity relevant to the organizationCollaborate with SOC and incident response teams to provide context and enrichment during investigationsDevelop and maintain intelligence requirements aligned with business and security goalsMaintain threat intelligence platforms (TIPs) and use tools like MISP , Anomali , or Recorded Future Track and communicate emerging threats, vulnerabilities, and geopolitical risksMap adversary behaviour to the MITRE ATT&CK framework for detection improvementsRequirementsRequired Skills
Deep knowledge of cyber threat intelligence methodologies Familiarity with frameworks such as MITRE ATT&CK , STIX/TAXII , Diamond Model Proficiency in using threat intelligence platforms (TIPs) Strong analytical skills and ability to interpret large datasetsExcellent written and verbal communication skills for report writing and stakeholder updatesExperience with OSINT tools (e.g., Maltego, Shodan, SpiderFoot)9. Desired Skills
Certifications: GCTI , GCIA , GCFA , CISSP , or Security+ Programming/scripting knowledge (Python, PowerShell)Exposure to threat modelling techniques and risk assessmentsUnderstanding of APT groups , malware families , and nation-state threats Experience working in regulated environments (e.g., finance, healthcare) BenefitsJob Benefits
Competitive salary and annual bonusHybrid/remote working flexibilityCompany-sponsored certifications and training (SANS, GIAC, etc.)Private health and dental insurancePension scheme and generous annual leaveAccess to cutting-edge threat intel tools and platformsCareer development in one of the fastest-growing areas of cybersecurityThreat Intelligence Analyst - OSINT
Posted today
Job Viewed
Job Description
Threat Intelligence Analyst - OSINT
London, Cheltenham or Manchester
Thanks for checking out our job opening; we are excited that YOU are interested in learning more about NCC Group.
We are on a mission to make society a safer and more secure place. Our people are the ones who make that possible; a global community of talented individuals working together towards a safer future.
We aim to create an environment where everyone can reach their full potential. We work together, we are brilliantly creative, we embrace difference and we want you to join in our mission, to make the world safer and more secure.
Take a look at our website here to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business…
The Opportunity
As a Threat Intelligence Analyst - OSINT, you will play a pivotal role within our global threat intelligence team. Working alongside colleagues across multiple time zones, you will help make our clients safer by identifying relevant threat actors, understanding their motivations, targets, and methods, and assessing client exposure.
The Global Threat Intelligence team has built a strong reputation in collecting its own data and combining it with open and commercial sources. In this role, you will analyse cyber threats, develop actionable intelligence, and collaborate with internal stakeholders. You will also contribute to the creation and maintenance of internal tooling to enhance the work of both yourself and your fellow analysts.
Your support to the wider organisation will be critical in the development of NCC Group’s Threat Intelligence capabilities and the broader service we offer.
Key Accountabilities:
OSINT collection and analysis - analysing open-source intelligence (OSINT) from the surface, deep and dark web.
Dark web access and monitoring - Gain and maintain access to dark web resources, including forums, marketplaces, shops, and chat services, to support intelligence gathering.
Threat actor and trend monitoring - Track, document, and report on threat actors, including their tools, techniques, and procedures (TTPs), as well as emerging trends across the threat landscape.
Collaboration - Work closely with internal teams, including Threat Intelligence, DFIR, SOC, and Threat Hunting, to share insights, support investigations, and strengthen organisational capabilities.
Reporting and communication - Produce clear, actionable intelligence reports tailored to both technical and non-technical stakeholders. Contribute to internal and external communications, including.
Tooling and methodology - Maintain, refine, and optimise threat intelligence tooling and processes to improve analysis workflows. Evaluate and recommend new technologies to enhance capabilities and operational efficiency.
Continuous development - Stay up to date with the evolving threat landscape, emerging OSINT methodologies, and dark web trends. Maintain a personal development plan to support ongoing learning and growth.
Ad-hoc investigations - Support client requests for OSINT investigations with scoping, conduct investigations, and produce client reports in line with the objectives outlined in the scope.
Technical Skills:
OSINT expertise - Proven experience conducting OSINT investigations across surface, deep, and dark web sources, with the ability to maintain operational security and manage online personas.
Threat intelligence knowledge - Understanding of the intelligence cycle, threat intelligence tooling, and the use of structured analytical techniques.
Cybercrime landscape awareness - Strong knowledge of cybercrime ecosystems, threat actors, and hacking methodologies, including their tools, techniques, and procedures.
Analytical skills - Demonstrated investigative mindset, critical thinking, and attention to detail when assessing and correlating intelligence.
Technical proficiency - Experience with scripting or automation (preferably Python) to support data collection, enrichment, and analysis.
Communication skills - Excellent written and verbal communication skills to produce clear and concise reports, as well as deliver briefings tailored to both technical and non-technical audiences.
Collaboration and adaptability - Ability to work effectively with cross-functional teams (e.g. DFIR, SOC, Threat Hunting) and adapt to changing priorities in a fast-moving threat landscape.
Ways of working
Focusing on Clients and Customers.
Working as One NCC.
Always Learning.
Being Inclusive and Respectful.
Delivering Brilliantly.
Our company
At NCC Group, our mission is to create a more secure digital future. That mission underpins everything we do, from our work with our incredible clients to groundbreaking research shaping our industry. Our teams' partner with clients across a multitude of industries, delving into, securing new products, and emerging technologies, as well as solving complex security problems. As global leaders in cyber and escrow, NCC Group is a people-powered business seeking the next group of brilliant minds to join our ranks.
Our colleagues are our greatest assets, and NCC Group is committed to providing an inclusive and supportive work environment that fosters creativity, collaboration, authenticity, and accountability. We want colleagues to put down roots at NCC Group, and we offer a comprehensive benefits package, as well as opportunities for learning and development and career growth. We believe our people are at their brilliant best when they feel bolstered in all aspects of their well-being, and we offer wellness programs and flexible working arrangements to provide that vital support.
Come join us?
What do we offer in return?
We have a high-performance culture which is balanced evenly with world-class well-being initiatives and benefits:
⏰Flexible working
Financial & Investment
Pension
Life Assurance
Share Save Scheme
Maternity & Paternity leave
Threat Intelligence Analyst - OSINT
Posted today
Job Viewed
Job Description
Threat Intelligence Analyst - OSINT
London, Cheltenham or Manchester
Thanks for checking out our job opening; we are excited that YOU are interested in learning more about NCC Group.
We are on a mission to make society a safer and more secure place. Our people are the ones who make that possible; a global community of talented individuals working together towards a safer future.
We aim to create an environment where everyone can reach their full potential. We work together, we are brilliantly creative, we embrace difference and we want you to join in our mission, to make the world safer and more secure.
Take a look at our website here to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business…
The Opportunity
As a Threat Intelligence Analyst - OSINT, you will play a pivotal role within our global threat intelligence team. Working alongside colleagues across multiple time zones, you will help make our clients safer by identifying relevant threat actors, understanding their motivations, targets, and methods, and assessing client exposure.
The Global Threat Intelligence team has built a strong reputation in collecting its own data and combining it with open and commercial sources. In this role, you will analyse cyber threats, develop actionable intelligence, and collaborate with internal stakeholders. You will also contribute to the creation and maintenance of internal tooling to enhance the work of both yourself and your fellow analysts.
Your support to the wider organisation will be critical in the development of NCC Group’s Threat Intelligence capabilities and the broader service we offer.
Key Accountabilities:
OSINT collection and analysis - analysing open-source intelligence (OSINT) from the surface, deep and dark web.
Dark web access and monitoring - Gain and maintain access to dark web resources, including forums, marketplaces, shops, and chat services, to support intelligence gathering.
Threat actor and trend monitoring - Track, document, and report on threat actors, including their tools, techniques, and procedures (TTPs), as well as emerging trends across the threat landscape.
Collaboration - Work closely with internal teams, including Threat Intelligence, DFIR, SOC, and Threat Hunting, to share insights, support investigations, and strengthen organisational capabilities.
Reporting and communication - Produce clear, actionable intelligence reports tailored to both technical and non-technical stakeholders. Contribute to internal and external communications, including.
Tooling and methodology - Maintain, refine, and optimise threat intelligence tooling and processes to improve analysis workflows. Evaluate and recommend new technologies to enhance capabilities and operational efficiency.
Continuous development - Stay up to date with the evolving threat landscape, emerging OSINT methodologies, and dark web trends. Maintain a personal development plan to support ongoing learning and growth.
Ad-hoc investigations - Support client requests for OSINT investigations with scoping, conduct investigations, and produce client reports in line with the objectives outlined in the scope.
Technical Skills:
OSINT expertise - Proven experience conducting OSINT investigations across surface, deep, and dark web sources, with the ability to maintain operational security and manage online personas.
Threat intelligence knowledge - Understanding of the intelligence cycle, threat intelligence tooling, and the use of structured analytical techniques.
Cybercrime landscape awareness - Strong knowledge of cybercrime ecosystems, threat actors, and hacking methodologies, including their tools, techniques, and procedures.
Analytical skills - Demonstrated investigative mindset, critical thinking, and attention to detail when assessing and correlating intelligence.
Technical proficiency - Experience with scripting or automation (preferably Python) to support data collection, enrichment, and analysis.
Communication skills - Excellent written and verbal communication skills to produce clear and concise reports, as well as deliver briefings tailored to both technical and non-technical audiences.
Collaboration and adaptability - Ability to work effectively with cross-functional teams (e.g. DFIR, SOC, Threat Hunting) and adapt to changing priorities in a fast-moving threat landscape.
Ways of working
Focusing on Clients and Customers.
Working as One NCC.
Always Learning.
Being Inclusive and Respectful.
Delivering Brilliantly.
Our company
At NCC Group, our mission is to create a more secure digital future. That mission underpins everything we do, from our work with our incredible clients to groundbreaking research shaping our industry. Our teams' partner with clients across a multitude of industries, delving into, securing new products, and emerging technologies, as well as solving complex security problems. As global leaders in cyber and escrow, NCC Group is a people-powered business seeking the next group of brilliant minds to join our ranks.
Our colleagues are our greatest assets, and NCC Group is committed to providing an inclusive and supportive work environment that fosters creativity, collaboration, authenticity, and accountability. We want colleagues to put down roots at NCC Group, and we offer a comprehensive benefits package, as well as opportunities for learning and development and career growth. We believe our people are at their brilliant best when they feel bolstered in all aspects of their well-being, and we offer wellness programs and flexible working arrangements to provide that vital support.
Come join us?
What do we offer in return?
We have a high-performance culture which is balanced evenly with world-class well-being initiatives and benefits:
⏰Flexible working
Financial & Investment
Pension
Life Assurance
Share Save Scheme
Maternity & Paternity leave
Detection Engineer - Threat Intelligence
Posted 2 days ago
Job Viewed
Job Description
We are seeking a Senior Detection Engineer to advance our detection engineering strategy within the Enterprise Security team. This role is essential to safeguarding EA’s cloud and production environments and will directly impact our ability to detect, respond to, and prevent cyber threats at scale.
As a senior individual contributor reporting to the Director of Threat Intelligence and Detections, you will play a central role in the technical leadership of the Detection Engineering team. You’ll mentor junior engineers, help define engineering direction, and lead the development of scalable, innovative threat detection solutions—including those leveraging AI and cloud-native technologies.
This is a hybrid role and you must live within commutable distance to our Guildford office where you will need to work in the office 3 days per week.
Key Responsibilities
- Design, develop, and operationalize advanced detections across cloud, container, and on-prem environments.
- Build integrations for diverse data sources (e.g., Wiz, host telemetry, network sensors) into EA’s detection infrastructure.
- Define and implement detection lifecycle processes to ensure maturity, governance, and performance metrics.
- Lead development of AI-driven detection proof-of-concepts
- Guide peers in building scalable, maintainable detection infrastructure and tuning detection content.
- Support strategic priorities like product detection assessments, threat-led risk prioritization, and production telemetry uplift.
Minimum Qualifications
- Experience in detection engineering, security engineering, or software development with a focus on cybersecurity.
- Proven experience developing detections and integrations within SIEM platforms (e.g., Splunk, Elastic, QRadar), ideally making use of Risk Based Alerting.
- Strong skills in Python and JavaScript, with familiarity in NodeJS and Kubernetes environments.
- Familiarity with cybersecurity frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain, NIST CSF).
- Excellent communication skills with the ability to lead technical discussions and influence cross-functional partners.
Preferred Qualifications
- Experience with cloud security platforms (e.g., Wiz) and integrating their outputs into detection pipelines.
- Background in AI/ML or data science applied to cybersecurity detections.
- Deep understanding of cloud-native architectures, container security, and host-based detection.
- Experience leading PoCs or greenfield development initiatives in a complex security ecosystem.
- Demonstrated success mentoring junior engineers in a non-managerial capacity.
Senior Threat Intelligence Analyst
Posted 14 days ago
Job Viewed
Job Description
In doing so, we create life-changing innovations that impact billions of lives around the world. Microsoft is one of the largest enterprise service companies in the world.
Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity.
Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions.
The Microsoft Security organization accelerates Microsoft's mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers' heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world. Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity.
Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft's mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers' heterogeneous environments, as well as ensuring the security of our own internal estate.
Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world. The Microsoft Threat Intelligence Center (MSTIC) is recruiting experienced nation-state threat hunters - with highly honed threat intelligence analysis skills. MSTIC provides unique insight on threats to protect Microsoft and our customers and is responsible for delivering timely threat intelligence across our product and services teams. Microsoft's mission is to empower every person and every organization on the planet to achieve more.
As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day. Microsoft's mission is to empower every person and every organization on the planet to achieve more.
As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day.
Microsoft's mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.
In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day.
**Responsibilities**
As a senior threat intelligence analyst, you will track sophisticated adversaries and use your technical knowledge of adversary capabilities, infrastructure, and techniques.
You will define, develop, and implement techniques to discover and track current adversaries and identify the attacks of tomorrow.
You will produce actionable intelligence and proactively drive hunting, detection and Microsoft's threat actor understanding.
In this role you will be responsible for collaborating with stakeholders from MSTIC and key security groups across Microsoft, working in partnership with them to protect both Microsoft and Microsoft's customers.
You will strengthen existing partnerships and build new ones with key organizations to deliver benefits to Microsoft and its customers.
**Qualifications**
Experience producing actionable Threat Intelligence on advanced persistent threat actors (APTs) Experience tracking APT campaigns using industry standard models including the MITRE ATT&CK framework
Proven ability to document and communicate your analytic findings to a wide range of stakeholders ranging from technical colleagues and executive readers
Experience collaborating within the wider Threat intelligence community and working within threat intelligence sharing groups
Demonstrated deep technical expertise in analysing a wide spectrum of security telemetry, to include network traffic, application logs and host-based or Endpoint Detection and Response (EDR) data.
Expertise with cloud telemetry a plus. Hands-on experience analysing and tracking complex APT campaigns using proprietary telemetry.
Proven track record in producing actionable Threat Intelligence on advanced persistent threats (APTs) based on telemetry analysis.
Ability to quickly adapt to a rapidly evolving telemetry landscape.
Exceptional communication skills, with the ability to distil complex technical findings into clear, concise intelligence products tailored for technical audiences, non-technical colleagues and executive stakeholders.
Preferred Qualifications:
Experience working to support incident response investigations is a plus
#MSSecurity #MSTIC
Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations ( .
Senior Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
The Senior Threat Intelligence Analyst will be responsible for collecting and processing intelligence from diverse sources, including open-source intelligence (OSINT), dark web monitoring, and commercial threat feeds. You will conduct in-depth analysis of malware, attacker infrastructure, and campaign TTPs (Tactics, Techniques, and Procedures). The role involves generating regular threat reports, briefings, and alerts for various stakeholders, including technical teams and executive leadership. You will also contribute to the development of threat hunting methodologies and proactive defence strategies.
Key Responsibilities:
- Lead the collection, analysis, and dissemination of threat intelligence data from multiple sources.
- Develop and maintain advanced knowledge of current and emerging cyber threats, actors, and TTPs.
- Conduct deep-dive investigations into sophisticated threat campaigns, malware, and adversary infrastructure.
- Produce high-quality threat intelligence reports, assessments, and alerts tailored to different audiences.
- Collaborate closely with incident response, security engineering, and security operations teams to provide timely intelligence.
- Develop and refine threat hunting hypotheses and playbooks.
- Utilise threat intelligence platforms (TIPs) and security tools effectively.
- Participate in security community forums and contribute to the broader intelligence landscape.
- Mentor junior analysts and contribute to the team's overall expertise.
- Stay current with the latest cybersecurity trends, vulnerabilities, and attack vectors.
Required Qualifications:
- Bachelor's or Master's degree in Computer Science, Cybersecurity, Information Technology, or a related field, or equivalent practical experience.
- Minimum of 5 years of experience in threat intelligence, cybersecurity analysis, or incident response.
- Demonstrated expertise in analysing various types of cyber threats, including APTs, ransomware, and nation-state activity.
- Proficiency with threat intelligence tools, data analysis techniques, and malware analysis methodologies.
- Strong understanding of networking protocols, operating systems, and security technologies.
- Excellent written and verbal communication skills, with the ability to present complex information clearly and concisely.
- Experience with scripting languages (e.g., Python) for automation is a strong plus.
- Relevant certifications such as GCTI, GCIH, CISSP are highly desirable.
- Ability to work effectively in a hybrid work environment.
Senior Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Responsibilities:
- Conduct in-depth research and analysis of cyber threats and threat actors.
- Monitor and analyze OSINT, dark web, and proprietary threat intelligence feeds.
- Produce comprehensive strategic and tactical threat intelligence reports.
- Identify and assess the TTPs of advanced persistent threats (APTs) and other adversaries.
- Support threat hunting initiatives and develop detection strategies.
- Provide timely intelligence updates during ongoing security incidents.
- Collaborate with SOC, incident response, and vulnerability management teams.
- Develop and maintain relationships with external intelligence sharing communities.
- Contribute to the development and improvement of threat intelligence tools and processes.
- Stay abreast of the latest cybersecurity trends and threat vectors.
- 5+ years of experience in threat intelligence or cybersecurity analysis.
- Bachelor's degree in Cybersecurity, Computer Science, or related field.
- Strong understanding of the global threat landscape and adversary TTPs.
- Proficiency with threat intelligence platforms (TIPs) and SIEM tools.
- Experience with OSINT and dark web research methodologies.
- Excellent analytical, research, and report writing skills.
- Strong communication and collaboration abilities for remote work.
- Relevant certifications (GIAC GCTI, CISSP, etc.) are highly desirable.
- Experience with digital forensics and incident response is a plus.
Be The First To Know
About the latest Threat intelligence Jobs in United Kingdom !
Senior Threat Intelligence Analyst
Posted 1 day ago
Job Viewed
Job Description
You will play a crucial role in identifying, analysing, and disseminating actionable threat intelligence to protect the organisation and its clients from sophisticated cyber threats. This involves researching emerging threats, understanding adversary tactics, techniques, and procedures (TTPs), and translating complex technical data into clear, concise reports for various audiences.
Key Responsibilities:
- Monitor, analyse, and interpret a wide range of threat intelligence sources, including open-source intelligence (OSINT), dark web, technical feeds, and proprietary data.
- Identify, assess, and prioritise cyber threats relevant to the organisation and its industry, developing early warning indicators.
- Research and document adversary groups, their motivations, TTPs, and infrastructure.
- Develop and maintain intelligence collection requirements and processes to ensure comprehensive coverage.
- Produce high-quality threat intelligence reports, briefings, and alerts for technical and non-technical stakeholders.
- Collaborate with security operations, incident response, and engineering teams to integrate threat intelligence into defensive strategies.
- Contribute to the development and refinement of threat hunting methodologies and tools.
- Stay current with the latest cybersecurity threats, vulnerabilities, and defensive measures.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field, or equivalent practical experience.
- Minimum of 5 years of experience in information security, with a specific focus on threat intelligence, security analysis, or incident response.
- Strong understanding of threat actor methodologies, malware analysis, and network security principles.
- Proficiency with threat intelligence platforms and tools.
- Excellent analytical and critical thinking skills, with the ability to synthesise information from disparate sources.
- Superb written and verbal communication skills, with the ability to create clear and compelling intelligence products.
- Experience with scripting languages (e.g., Python) for data analysis and automation is a plus.
- Relevant certifications such as CISSP, GIAC GCTI, or similar are highly desirable.
Senior Threat Intelligence Analyst
Posted 1 day ago
Job Viewed
Job Description
Key Responsibilities:
- Conduct comprehensive research and analysis of cyber threat actors, campaigns, and malware.
- Develop and maintain threat intelligence feeds, reports, and alerts using various data sources and tools.
- Identify, track, and analyse emerging TTPs used by threat actors targeting our industry and related sectors.
- Provide timely and actionable intelligence to security operations, incident response, and vulnerability management teams.
- Collaborate with internal teams and external partners to share threat information and develop collective defence strategies.
- Develop and refine methodologies for threat hunting and proactive detection.
- Author detailed intelligence reports, presentations, and briefings for technical and executive audiences.
- Utilise a variety of intelligence platforms, tools, and open-source intelligence (OSINT) techniques.
- Contribute to the development of strategic threat assessments and roadmaps.
- Mentor junior analysts and contribute to the growth of the threat intelligence capability.
- Bachelor's degree in Cybersecurity, Computer Science, International Relations, or a related field, or equivalent experience.
- Minimum of 5 years of experience in threat intelligence analysis, cybersecurity operations, or a related discipline.
- Proven experience with threat intelligence platforms (TIPs) and analysis tools.
- Strong understanding of cyber threat actor methodologies, malware analysis, and network forensics.
- Excellent analytical and critical thinking skills with the ability to synthesize complex information.
- Demonstrated ability to write clear, concise, and actionable intelligence reports.
- Experience with OSINT techniques and tools.
- Knowledge of various threat intelligence frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain).
- Ability to work independently and as part of a remote team.
- Excellent communication and presentation skills.
- Relevant certifications such as GIAC certifications (e.g., GCTI, GCFA) are a plus.
Senior Threat Intelligence Analyst
Posted 1 day ago
Job Viewed
Job Description
Key Responsibilities:
- Collect, process, and analyze threat intelligence from various sources (OSINT, dark web, security feeds, etc.).
- Identify and track threat actors, campaigns, and emerging TTPs relevant to the organization.
- Develop and maintain knowledge bases of threat actors, malware families, and vulnerabilities.
- Produce timely and actionable threat intelligence reports for different audiences (technical, executive).
- Provide context and analysis for security incidents and potential threats.
- Support incident response efforts with relevant threat data and analysis.
- Develop and maintain relationships with external threat intelligence communities and information sharing groups.
- Evaluate and recommend new threat intelligence tools and methodologies.
- Contribute to the development of defensive strategies based on threat intelligence.
- Present threat intelligence findings and recommendations to stakeholders.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- 5+ years of experience in cybersecurity, with a specific focus on threat intelligence analysis.
- Proven experience in collecting, analyzing, and reporting on cyber threats.
- Strong understanding of attacker methodologies, malware analysis, and threat actor TTPs.
- Proficiency with threat intelligence platforms, SIEM tools, and analytical tools.
- Experience with OSINT techniques and dark web monitoring.
- Excellent analytical, research, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to produce clear and concise reports.
- Relevant certifications (e.g., GIAC, CISSP) are a plus.
- Ability to work independently and collaboratively in a team environment.