Cyber Threat Intelligence Analyst

Cyber Threat Intelligence Analyst

Posted Today by Jobserve

£550 Per day
Outside
Hybrid
Bath

Summary: The Cyber Threat Intelligence Analyst role involves supporting a sensitive national-security programme by identifying, analyzing, and reporting on cyber threats to government systems and critical infrastructure. The position requires active SC clearance and focuses on delivering actionable intelligence in a secure environment. The analyst will collaborate with various teams to enhance defensive and strategic decision-making. This is a 12-month hybrid position based in Bath, offering a competitive day rate.

Key Responsibilities:

  • Collect, analyse and assess cyber threat intelligence from technical, human, open-source and classified sources
  • Monitor and analyse threat actor activity, including TTPs, malware, campaigns and infrastructure
  • Produce high-quality intelligence reports, briefings and threat assessments for technical and non-technical stakeholders
  • Support incident response and SOC teams with timely, contextual intelligence
  • Maintain and develop threat intelligence repositories, playbooks and knowledge bases
  • Contribute to strategic, operational and tactical intelligence outputs
  • Brief senior stakeholders and security leadership as required
  • Ensure handling of data complies with security, legal and governance frameworks

Key Skills:

  • Proven experience in a Cyber Threat Intelligence, Cyber Security, or Intelligence Analysis role
  • Strong understanding of cyber threat actors, attack vectors, and threat landscapes
  • Experience analysing malware, phishing, APT activity or cyber campaigns
  • Familiarity with common CTI frameworks and standards (eg MITRE ATT&CK, Kill Chain, Diamond Model)
  • Experience producing clear, actionable intelligence reporting
  • Ability to assess confidence, credibility, and risk within intelligence products
  • Comfortable working in highly classified/restricted environments

Salary (Rate): £550 daily

City: Bath

Country: United Kingdom

Working Arrangements: hybrid

IR35 Status: outside IR35

Seniority Level: Mid-Level

Industry: IT

Detailed Description From Employer:

Role: Cyber Threat Intelligence Analyst

Location: Bath (Hybrid working)

Duration: 12 Months

Day rate: £550 Outside IR35

Active SC clearance required - preferably DV clearance

Role Overview

We are seeking a highly capable Cleared Cyber Threat Intelligence (CTI) Analyst to support a sensitive national-security programme. The role focuses on identifying, analysing and reporting on cyber threats posed to government systems, critical national infrastructure and strategic interests.

You will operate in a highly secure environment, working closely with security operations, incident response, risk, and technical teams to deliver actionable intelligence that supports defensive and strategic decision-making.

Key Responsibilities

  • Collect, analyse and assess cyber threat intelligence from technical, human, open-source and classified sources
  • Monitor and analyse threat actor activity, including TTPs, malware, campaigns and infrastructure
  • Produce high-quality intelligence reports, briefings and threat assessments for technical and non-technical stakeholders
  • Support incident response and SOC teams with timely, contextual intelligence
  • Maintain and develop threat intelligence repositories, playbooks and knowledge bases
  • Contribute to strategic, operational and tactical intelligence outputs
  • Brief senior stakeholders and security leadership as required
  • Ensure handling of data complies with security, legal and governance frameworks

Required Skills & Experience

  • Proven experience in a Cyber Threat Intelligence, Cyber Security, or Intelligence Analysis role
  • Strong understanding of cyber threat actors, attack vectors, and threat landscapes
  • Experience analysing malware, phishing, APT activity or cyber campaigns
  • Familiarity with common CTI frameworks and standards (eg MITRE ATT&CK, Kill Chain, Diamond Model)
  • Experience producing clear, actionable intelligence reporting
  • Ability to assess confidence, credibility, and risk within intelligence products
  • Comfortable working in highly classified/restricted environments

Desirable Experience

  • Background in UK defence, intelligence, law enforcement, or national security organisations
  • Experience with CTI platforms and tooling (eg MISP, ThreatQ, Anomali, OpenCTI)
  • Technical knowledge of network security, cloud environments, or malware analysis
  • Experience supporting strategic or policy-level decision-making