Negotiable
Inside
Remote
United Kingdom
Summary: The Cyber Threat Analyst role involves analyzing threat actors and their campaigns, focusing on the VM/NBS sector and relevant technologies. The position requires collaboration with various teams to produce threat briefs and simulate attacks, while maintaining awareness of current threat landscapes. The role is remote and classified as inside IR35, indicating a contract position.
Key Responsibilities:
- Track and profile threat actors relevant to VM / NBS sector, technology stack, and geopolitical exposure.
- Analyse TTPs using frameworks like MITRE ATT&CK to produce threat actor behavioural assessments.
- Maintain current awareness of active threat campaigns, malware development, exploit trends, and infrastructure usage.
- Serve as an embedded intelligence point-of-contact for red teamers, threat hunters, and detection engineering teams.
- Produce threat briefs, attack simulation guidance, and threat actor prioritisation tailored to internal detection and testing use cases.
- Collaborate in designing adversary emulation scenarios and proactive threat hunting playbooks based on threat actor intelligence.
- Map potential attack paths by using internal context with external threat intelligence.
- Identify likely threat actor ingress routes and lateral movement paths based on observed adversary capabilities and internal exposure points.
- Support development of detection rules, correlation logic, and security control tuning using threat intelligence inputs.
- Collaborate with red and blue teams to simulate, measure and close visibility gaps across the kill chain.
Key Skills:
- Experience with threat actor analysis and profiling.
- Knowledge of TTPs and frameworks like MITRE ATT&CK.
- Familiarity with threat campaigns, malware, and exploit trends.
- Ability to produce threat briefs and simulation guidance.
- Collaboration skills with red and blue teams.
- Understanding of attack path mapping and detection rule development.
Salary (Rate): undetermined
City: undetermined
Country: United Kingdom
Working Arrangements: remote
IR35 Status: inside IR35
Seniority Level: undetermined
Industry: IT
Role - Cyber Threat Analyst
Location - Remote, UK
Type - Contract (Inside IR35)
Job Description:
- Threat Actor and Campaign Analysis
- Track and profile threat actors relevant to VM / NBS sector, technology stack, and geopolitical exposure.
- Analyse TTPs using frameworks like MITRE ATT&CK to produce threat actor behavioural assessments.
- Maintain current awareness of active threat campaigns, malware development, exploit trends, and infrastructure usage.
- Operational Stakeholder Support
- Serve as an embedded intelligence point-of-contact for red teamers, threat hunters, and detection engineering teams.
- Produce threat briefs, attack simulation guidance, and threat actor prioritisation tailored to internal detection and testing use cases.
- Collaborate in designing adversary emulation scenarios and proactive threat hunting playbooks based on threat actor intelligence.
- Map potential attack paths by using internal context with external threat intelligence.
- Attack Path Mapping
- Identify likely threat actor ingress routes and lateral movement paths based on observed adversary capabilities and internal exposure points.
- Support development of detection rules, correlation logic, and security control tuning using threat intelligence inputs.
- Collaborate with red and blue teams to simulate, measure and close visibility gaps across the kill chain.