£550 Per day
Outside
Hybrid
Bath
Summary: The Cyber Threat Intelligence Analyst role involves supporting a sensitive national-security programme by identifying, analyzing, and reporting on cyber threats to government systems and critical infrastructure. The position requires active SC clearance and focuses on delivering actionable intelligence in a secure environment. The analyst will collaborate with various teams to enhance defensive and strategic decision-making. This is a 12-month hybrid position based in Bath, offering a competitive day rate.
Key Responsibilities:
- Collect, analyse and assess cyber threat intelligence from technical, human, open-source and classified sources
- Monitor and analyse threat actor activity, including TTPs, malware, campaigns and infrastructure
- Produce high-quality intelligence reports, briefings and threat assessments for technical and non-technical stakeholders
- Support incident response and SOC teams with timely, contextual intelligence
- Maintain and develop threat intelligence repositories, playbooks and knowledge bases
- Contribute to strategic, operational and tactical intelligence outputs
- Brief senior stakeholders and security leadership as required
- Ensure handling of data complies with security, legal and governance frameworks
Key Skills:
- Proven experience in a Cyber Threat Intelligence, Cyber Security, or Intelligence Analysis role
- Strong understanding of cyber threat actors, attack vectors, and threat landscapes
- Experience analysing malware, phishing, APT activity or cyber campaigns
- Familiarity with common CTI frameworks and standards (eg MITRE ATT&CK, Kill Chain, Diamond Model)
- Experience producing clear, actionable intelligence reporting
- Ability to assess confidence, credibility, and risk within intelligence products
- Comfortable working in highly classified/restricted environments
Salary (Rate): £550 daily
City: Bath
Country: United Kingdom
Working Arrangements: hybrid
IR35 Status: outside IR35
Seniority Level: Mid-Level
Industry: IT
Role: Cyber Threat Intelligence Analyst
Location: Bath (Hybrid working)
Duration: 12 Months
Day rate: £550 Outside IR35
Active SC clearance required - preferably DV clearance
Role Overview
We are seeking a highly capable Cleared Cyber Threat Intelligence (CTI) Analyst to support a sensitive national-security programme. The role focuses on identifying, analysing and reporting on cyber threats posed to government systems, critical national infrastructure and strategic interests.
You will operate in a highly secure environment, working closely with security operations, incident response, risk, and technical teams to deliver actionable intelligence that supports defensive and strategic decision-making.
Key Responsibilities
- Collect, analyse and assess cyber threat intelligence from technical, human, open-source and classified sources
- Monitor and analyse threat actor activity, including TTPs, malware, campaigns and infrastructure
- Produce high-quality intelligence reports, briefings and threat assessments for technical and non-technical stakeholders
- Support incident response and SOC teams with timely, contextual intelligence
- Maintain and develop threat intelligence repositories, playbooks and knowledge bases
- Contribute to strategic, operational and tactical intelligence outputs
- Brief senior stakeholders and security leadership as required
- Ensure handling of data complies with security, legal and governance frameworks
Required Skills & Experience
- Proven experience in a Cyber Threat Intelligence, Cyber Security, or Intelligence Analysis role
- Strong understanding of cyber threat actors, attack vectors, and threat landscapes
- Experience analysing malware, phishing, APT activity or cyber campaigns
- Familiarity with common CTI frameworks and standards (eg MITRE ATT&CK, Kill Chain, Diamond Model)
- Experience producing clear, actionable intelligence reporting
- Ability to assess confidence, credibility, and risk within intelligence products
- Comfortable working in highly classified/restricted environments
Desirable Experience
- Background in UK defence, intelligence, law enforcement, or national security organisations
- Experience with CTI platforms and tooling (eg MISP, ThreatQ, Anomali, OpenCTI)
- Technical knowledge of network security, cloud environments, or malware analysis
- Experience supporting strategic or policy-level decision-making