Job Search and Career Advice Platform

Enable job alerts via email!

SOC Expert

MastarRec

Greater London

Hybrid

GBP 80,000 - 105,000

Full time

20 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading security organization in Greater London is seeking a highly experienced Cyber Threat Intelligence Expert to join their team. This vital role involves gathering, analyzing, and operationalizing threat data to defend against evolving cyber threats. Candidates should have proven experience in threat intelligence and tools like MISP or ThreatConnect. The position offers a competitive salary between £80,000 and £105,000, along with remote or hybrid working options, private healthcare, and funded training.

Benefits

Competitive salary and bonus package
Remote or hybrid working options
Private healthcare & mental wellness support
Funded training and certifications
25 days holiday plus bank holidays
Pension scheme and life assurance

Qualifications

  • Proven experience in cyber threat intelligence, threat hunting, or incident response.
  • Proficiency in threat intel platforms.
  • Strong knowledge of malware families, TTPs, and IOC tracking.

Responsibilities

  • Collect, analyze, and interpret threat intelligence.
  • Produce actionable intelligence reports and risk assessments.
  • Support SOC operations with threat context and priority setting.

Skills

Cyber threat intelligence
Threat hunting
Incident response
Threat intel platforms
Malware analysis
Scripting (Python, Bash, PowerShell)

Tools

MISP
ThreatConnect
SIEM tools
SOAR tools
Job description
Job Description

We are seeking a highly experienced Cyber Threat Intelligence (CTI) Expert to join a fast-growing security-driven organization at the forefront of threat detection and mitigation. This is a critical role for candidates who excel at gathering analyzing and operationalizing threat data to proactively defend enterprise environments against evolving cyber threats.

Job Responsibilities
  • Collect analyse and interpret threat intelligence from open source (OSINT) closed source and internal data feeds.
  • Produce actionable intelligence reports threat briefs and risk assessments.
  • Support SOC operations with threat context and priority setting.
  • Identify and monitor Indicators of Compromise (IOCs) and Tactics Techniques & Procedures (TTPs) using MITRE ATT&CK framework.
  • Collaborate on play book development and threat detection use cases.
  • Perform attribution and malware behavioural analysis to inform decision-making.
  • Lead threat actor profiling and campaign analysis across APT cybercrime and hacktivist groups.
  • Interface with external intel-sharing communities and CERTs.
Requirements
Required Skills
  • Proven experience in cyber threat intelligence threat hunting or incident response
  • Proficiency in threat intel platforms (e.g. MISP Anomali ThreatConnect)
  • Strong knowledge of malware families TTPs and IOC tracking
  • Experience using SIEM SOAR and endpoint detection tools
  • Working knowledge of MITRE ATT&CK Cyber Kill Chain and Diamond Model
  • Ability to produce high-quality executive-ready threat reports
Desired Skills
  • Certifications such as GCTI GREM GCIA CEH or CISSP
  • Scripting or automation experience (Python Bash PowerShell)
  • Knowledge of geopolitical cyber risk and threat actor motivations
  • Familiarity with intel sharing standards (STIX / TAXII)
Benefits
  • Competitive salary and bonus package
  • Remote or hybrid working options
  • Private healthcare & mental wellness support
  • Funded training and certifications (SANS GIAC CREST etc.)
  • 25 days holiday bank holidays
  • Pension scheme and life assurance
Required Skills :

Required Skills In-depth knowledge of ISO 27001 NIST CSF GDPR and risk management frameworks Experience performing security risk assessments internal audits and compliance reviews Strong understanding of cybersecurity controls regulatory mandates and business risk alignment Excellent client communication stakeholder management and reporting skills Familiarity with GRC platforms (e.g. RSA Archer ServiceNow GRC LogicGate) Desired Skills Certifications such as CISM CRISC ISO 27001 Lead Auditor or similar Experience working with financial services healthcare or SaaS industries Understanding of emerging regulations (e.g. DORA NIS2 AI Act) Cloud compliance knowledge (e.g. CSA CCM AWS / Azure / GCP compliance) Familiarity with SOC 2 PCI DSS HIPAA frameworks

Employment Type : Full Time

Vacancy : 1

Yearly Salary Salary : 80000 - 105000

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.