Enable job alerts via email!

Cyber Threat Intelligence Analyst

Sopra Steria Ltd

England

Hybrid

GBP 50,000 - 60,000

Full time

2 days ago
Be an early applicant

Job summary

A leading cybersecurity firm is seeking a Cyber Threat Intelligence Analyst to manage threat intelligence initiatives, working in a hybrid model from Hemel Hempstead. The ideal candidate will possess strong analytical skills and experience in threat intelligence, alongside a relevant degree. Benefits include 25 days leave, health plan, and pension options.

Benefits

25 days leave (plus buy options)
Health plan
Life assurance
Pension
Flexible benefits

Qualifications

  • Strong understanding of cybersecurity frameworks (e.g., MITRE ATT&CK) and threat analysis.
  • Excellent analytical skills with the ability to synthesize complex data.
  • Proven experience in Cyber Threat Intelligence roles.

Responsibilities

  • Develop and integrate automated threat feeds and enrichment sources.
  • Provide training and documentation on MISP for SOC staff.
  • Monitor threat sources for emerging threats and facilitate threat intelligence sharing.
  • Analyze data to identify patterns, indicators of compromise, and adversary tactics.
  • Produce monthly threat reports.
  • Collaborate during active incidents, providing real-time intelligence.
  • Study threat actor TTPs using frameworks like MITRE ATT&CK and assess their impact.
  • Track evolving threats, vulnerabilities, and attack vectors.

Skills

Analytical skills
Knowledge of threat intelligence frameworks
Collaboration across teams

Education

Bachelor’s degree in Cybersecurity, Computer Science, or related fields

Job description

We are building a Cyber Threat team. It's a great time to join us in our expansion, working with a portfolio of high-profile clients and a large client base.

Our Cyber Threat | Intelligence Analyst will be a key member of the SOC team, managing our Malware Information Sharing Platform (MISP) to deliver actionable threat intelligence. Responsibilities include monitoring, analysis, and dissemination of threat data to enhance client security. Strong analytical skills, knowledge of threat intelligence frameworks, and collaboration across teams are essential.

This role requires DV Clearance or eligibility for it.

Work arrangement is hybrid: 3 days on-site in Hemel Hempstead, 2 days remote.

Responsibilities:

  • Develop and integrate automated threat feeds and enrichment sources.
  • Provide training and documentation on MISP for SOC staff.
  • Monitor threat sources (threat feeds, OSINT, dark web, internal logs) for emerging threats and facilitate threat intelligence sharing.
  • Analyze data to identify patterns, indicators of compromise, and adversary tactics.
  • Produce monthly threat reports.
  • Collaborate during active incidents, providing real-time intelligence.
  • Study threat actor TTPs using frameworks like MITRE ATT&CK and assess their impact.
  • Track evolving threats, vulnerabilities, and attack vectors.

Qualifications:

  • Strong understanding of cybersecurity frameworks (e.g., MITRE ATT&CK) and threat analysis.
  • Excellent analytical skills with the ability to synthesize complex data.
  • Proven experience in Cyber Threat Intelligence roles.

Preferred:

  • Bachelor’s degree in Cybersecurity, Computer Science, or related fields.

If interested but unsure about your fit, please apply—we'd love to hear from you!

Details:

  • Employment Type: Permanent
  • Location: Hybrid (3 days Hemel Hempstead, 2 days remote)
  • Security Clearance: Eligible for DV clearance
  • Salary: Up to £60K
  • Benefits include 25 days leave (plus buy options), health plan, life assurance, pension, and flexible benefits
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs