Enable job alerts via email!

Cyber Threat Intelligence Analyst

Sopra Steria - UK

Hemel Hempstead

On-site

GBP 50,000 - 70,000

Full time

7 days ago
Be an early applicant

Job summary

A leading cybersecurity firm in Hemel Hempstead is seeking a Cybersecurity Analyst to develop automated feeds, monitor emerging threats, and provide threat intelligence to support security operations. The ideal candidate will have a solid grasp of cybersecurity frameworks and excellent analytical skills. This role offers a challenging environment with opportunities to handle high-profile clients and significant responsibilities.

Benefits

Referral Bonus: £1500.00

Qualifications

  • Solid grasp of cybersecurity frameworks (e.g., MITRE ATT&CK) and threat analysis methodologies.
  • Excellent analytical skills and ability to synthesize complex threat data.
  • Consistent record of working under pressure and adapting to constantly evolving threat landscapes.

Responsibilities

  • Develop and integrate automated feeds and enrichment sources.
  • Provide training sessions and documentation for SOC staff on effective usage of MISP.
  • Monitor sources for emerging threats and facilitate threat intelligence sharing.
  • Analyse data to identify patterns, indicators of compromise and adversary behaviours.
  • Produce monthly situational reports highlighting operational threats and recommendations.
  • Collaborate with SOC and incident response teams during security incidents.
  • Contribute to threat hunting initiatives with intelligence-led analysis.
  • Study threat actors’ TTPs using frameworks like MITRE ATT&CK.
  • Track and document threat trends, vulnerabilities, and attack vectors.
  • Maintain detailed documentation of all threat intelligence activities.
  • Regularly review intelligence processes to improve SOC efficiency.

Skills

Cybersecurity frameworks
Threat analysis methodologies
Analytical skills
Adaptability to evolving threats
Job description

Our Cyber team is rapidly growing and can highlight a portfolio of high profile clients, giving the opportunity to work on a large client base.

What you’ll be doing
  • Develop and integrate automated feeds and enrichment sources.
  • Providing training sessions and documentation for SOC staff on effective usage of MISP.
  • Monitor a range of sources (threat feeds, OSINT, dark web, internal logs) for emerging threats; and facilitate threat intelligence, sharing with internal teams and external partners while ensuring compliance with data sharing policies.
  • Analyse collected data to identify patterns, indicators of compromise (IOCs), and emerging adversary behaviours.
  • Produce monthly situational reports highlighting operational threats and actionable recommendations.
  • Collaborate with the SOC and incident response teams during active security incidents, providing real-time threat intelligence.
  • Contribute to threat hunting initiatives by providing intelligence-led hypotheses and analysis that guide proactive investigations.
  • Study threat actors’ tactics, techniques, and procedures (TTPs) using frameworks like MITRE ATT&CK. Evaluating the potential impact of identified threats on both internal operations and customer environments.
  • Track and document evolving threat trends, vulnerabilities, and attack vectors that could affect our operations.
  • Maintain detailed documentation of all threat intelligence activities.
  • Regularly review and refine intelligence processes, tools, and methodologies to improve overall SOC efficiency.
What you’ll bring
  • Solid grasp of cybersecurity frameworks (e.g., MITRE ATT&CK) and threat analysis methodologies.
  • Excellent analytical skills and able to synthesize complex threat data.
  • Consistent record of working under pressure and adapting to constantly evolving threat landscapes.

Referral Bonus: £1500.00

Clearance: DV Cleared or eligible

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.