Cyber Threat Intelligence Analyst – SOC
Contract Details
Duration: 12-month project
Working Model: Hybrid – 2–3 days onsite per week
Start: ASAP / flexible
Join the World of Cyber Security
We are currently seeking an experiencedCyber Threat Intelligence (CTI) Analystto join a highly skilledSecurity Operations Center (SOC)environment on a12-month project. This is an excellent opportunity to work at the core of cyber defence, supporting a broad internal stakeholder community with actionable intelligence and strategic insight.
The SOC consists of several specialist teams working together to detect, analyse, and respond to cyber threats, including Cyber Threat Intelligence, Use Case Design, Security Analysts (T1–T3), and the Cyber Security Incident Response Team (CSIRT).
Your Role
As aCyber Threat Intelligence Analyst, you will deliver high-quality intelligence on threats and threat actors, assess risks to the IT environment, and contribute directly to strengthening security controls and detection capabilities.
Your responsibilities will include:
Researching and analysing emerging cyber threats relevant to the organisation
Identifying and profiling threat actors, campaigns, and adversary behaviour
Producing and presenting CTI reports to the wider cybersecurity community
Supporting threat hunting activities and detection use case development
Analysing adversary tactics and identifying defensive gaps
Recommending improvements to security architecture and controls
Reviewing and interpreting internal and external threat intelligence sources
Collaborating closely with the Group CERT and SOC stakeholders
Key Skills & Experience
Strong experience in cyber threat intelligence and threat impact assessment
Background in use case design, correlation rules, or detection engineering
Hands‐on experience with SIEM, log management, EDR/EPP tools
Strong log analysis skills, including regex and natural language queries
Understanding of network traffic analysis and packet capture
Solid knowledge of encryption and cryptography
Familiarity with frameworks such asMITRE ATT&CK, Kill Chain, or Diamond Model(highly desirable)
Ideal Profile
Passionate about cyber security and threat intelligence
Strong analytical and research capabilities
Comfortable engaging with both technical and non‐technical stakeholders
Able to translate complex threat data into clear, actionable insights
Proactive, collaborative, and service‐oriented mindset
If you are looking to make a tangible impact in a mature SOC environment and enjoy working at the intersection of intelligence, detection, and incident response, we would be keen to hear from you.
#J-18808-Ljbffr