Cyber Threat Intelligence Specialist – SC Cleared

Cyber Threat Intelligence Specialist – SC Cleared

Posted 1 day ago by 1758090903

£650 Per day
Inside
Hybrid
Hatfield

Summary: A leading Independent IT Infrastructure and Services Consultancy is seeking a Cyber Threat Intelligence Specialist for an initial 3-month contract. The role requires valid SC Clearance and involves hybrid working arrangements based in Hatfield. The specialist will be responsible for threat intelligence platform maintenance, cyber threat analysis, and incident response support, among other duties.

Key Responsibilities:

  • Threat Intelligence Platform (TIP) Maintenance
  • Cyber Threat Analysis & Dissemination
  • Dark Web Monitoring
  • Programme Alignment
  • Incident Response Support

Key Skills:

  • 5–6 years in Threat Intelligence
  • Strong pattern recognition and threat assessment
  • Excellent verbal and written English; stakeholder engagement
  • Experience with TIPs, OSINT tools, threat modelling
  • Familiarity with MITRE ATT&CK, Kill Chain, NIST CSF 2.0
  • Knowledge of CIS, NIST, ISO 27001, Cyber Essentials, GDPR
  • Ability to produce high-quality intelligence products

Salary (Rate): £650 per day

City: Hatfield

Country: United Kingdom

Working Arrangements: hybrid

IR35 Status: inside IR35

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

A leading Independent IT Infrastructure and Services Consultancy is looking for a Cyber Threat Intelligence Specialist

3-month contract initially
Based in Hatfield (Hybrid)
Valid SC Clearance required
Inside IR35

Core Responsibilities

  • Threat Intelligence Platform (TIP) Maintenance
  • Own and optimise the TIP and related tools.
  • Enhance threat detection and response capabilities.
  • Leverage internal data and tooling for intelligence opportunities.
  • Cyber Threat Analysis & Dissemination
  • Identify and assess threats from various sources.
  • Monitor geopolitical events for cyber impact.
  • Engage in intelligence communities and sharing initiatives.
  • Provide intelligence-led recommendations and briefings.
  • Respond to internal intelligence requests.
  • Communicate assessments clearly to stakeholders.
  • Collaborate with SOC and other security teams.
  • Direct threat hunting operations based on hypotheses.
  • Dark Web Monitoring
  • Monitor and analyse dark web activity relevant to the organisation.
  • Programme Alignment
  • Collect Priority Intelligence Requirements (PIRs).
  • Track intelligence activities against PIRs.
  • Report service quality against KPIs.
  • Incident Response Support
  • Provide out-of-hours support when required.

Knowledge & Skills

  • Experience: 5–6 years in Threat Intelligence.
  • Analysis: Strong pattern recognition and threat assessment.
  • Communication: Excellent verbal and written English; stakeholder engagement.
  • Tools: TIPs, OSINT tools, threat modelling.
  • Frameworks: MITRE ATT&CK, Kill Chain, NIST CSF 2.0.
  • Standards: CIS, NIST, ISO 27001, Cyber Essentials, GDPR.
  • Documentation: High-quality intelligence products for varied audiences.

Desirable Attributes
Industry certifications (e.g., CISSP, CISM).
Strong presentation and moderation skills.
Organised, with good time management.
Experience in shaping Threat Modelling programmes.