Cyber Threat Intelligence Analyst

Cyber Threat Intelligence Analyst

Posted 1 week ago by Experis IT

£550 Per day
Outside
Hybrid
Bath, UK

Summary: The Cyber Threat Intelligence Analyst role involves supporting a national-security programme by identifying, analyzing, and reporting on cyber threats to government systems and critical infrastructure. The position requires active security clearance and entails collaboration with various teams to deliver actionable intelligence. The role is hybrid, based in Bath, and has a duration of 12 months. The day rate for this position is £550 and is classified as outside IR35.

Key Responsibilities:

  • Collect, analyse and assess cyber threat intelligence from technical, human, open-source and classified sources
  • Monitor and analyse threat actor activity, including TTPs, malware, campaigns and infrastructure
  • Produce high-quality intelligence reports, briefings and threat assessments for technical and non-technical stakeholders
  • Support incident response and SOC teams with timely, contextual intelligence
  • Maintain and develop threat intelligence repositories, playbooks and knowledge bases
  • Contribute to strategic, operational and tactical intelligence outputs
  • Brief senior stakeholders and security leadership as required
  • Ensure handling of data complies with security, legal and governance frameworks

Key Skills:

  • Proven experience in a Cyber Threat Intelligence, Cyber Security, or Intelligence Analysis role
  • Strong understanding of cyber threat actors, attack vectors, and threat landscapes
  • Experience analysing malware, phishing, APT activity or cyber campaigns
  • Familiarity with common CTI frameworks and standards (eg MITRE ATT&CK, Kill Chain, Diamond Model)
  • Experience producing clear, actionable intelligence reporting
  • Ability to assess confidence, credibility, and risk within intelligence products
  • Comfortable working in highly classified/restricted environments

Salary (Rate): £550 daily

City: Bath

Country: UK

Working Arrangements: hybrid

IR35 Status: outside IR35

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

Role: Cyber Threat Intelligence Analyst

Location: Bath (Hybrid working)

Duration: 12 Months

Day rate: £550 Outside IR35

Active SC clearance required - preferably DV clearance

Role Overview

We are seeking a highly capable Cleared Cyber Threat Intelligence (CTI) Analyst to support a sensitive national-security programme. The role focuses on identifying, analysing and reporting on cyber threats posed to government systems, critical national infrastructure and strategic interests.

You will operate in a highly secure environment, working closely with security operations, incident response, risk, and technical teams to deliver actionable intelligence that supports defensive and strategic decision-making.

Key Responsibilities

  • Collect, analyse and assess cyber threat intelligence from technical, human, open-source and classified sources
  • Monitor and analyse threat actor activity, including TTPs, malware, campaigns and infrastructure
  • Produce high-quality intelligence reports, briefings and threat assessments for technical and non-technical stakeholders
  • Support incident response and SOC teams with timely, contextual intelligence
  • Maintain and develop threat intelligence repositories, playbooks and knowledge bases
  • Contribute to strategic, operational and tactical intelligence outputs
  • Brief senior stakeholders and security leadership as required
  • Ensure handling of data complies with security, legal and governance frameworks

Required Skills & Experience

  • Proven experience in a Cyber Threat Intelligence, Cyber Security, or Intelligence Analysis role
  • Strong understanding of cyber threat actors, attack vectors, and threat landscapes
  • Experience analysing malware, phishing, APT activity or cyber campaigns
  • Familiarity with common CTI frameworks and standards (eg MITRE ATT&CK, Kill Chain, Diamond Model)
  • Experience producing clear, actionable intelligence reporting
  • Ability to assess confidence, credibility, and risk within intelligence products
  • Comfortable working in highly classified/restricted environments

Desirable Experience

  • Background in UK defence, intelligence, law enforcement, or national security organisations
  • Experience with CTI platforms and tooling (eg MISP, ThreatQ, Anomali, OpenCTI)
  • Technical knowledge of network security, cloud environments, or malware analysis
  • Experience supporting strategic or policy-level decision-making