Negotiable
Outside
Hybrid
London Area, United Kingdom
Summary: The Senior Threat Intelligence Analyst will focus on monitoring the threat landscape to identify emerging cyber threats and support various cybersecurity operations. The role requires collaboration with multiple teams to contextualize and operationalize threat intelligence, utilizing frameworks like MITRE ATT&CK. Proficiency in threat intelligence platforms and a solid understanding of malware and threat actor groups are essential. This position is predominantly remote but requires occasional office presence in London.
Key Responsibilities:
- Monitor the threat landscape to identify emerging cyber threats, vulnerabilities, and adversary tactics, techniques, and procedures (TTPs).
- Support threat hunting, incident response, and vulnerability management with relevant threat context and attribution.
- Perform adversary tracking and contribute to the development of threat models using frameworks such as MITRE ATT&CK, Diamond Model, and Kill Chain.
- Collaborate with SOC, IR, Red Team, and Vulnerability Management teams to contextualize and operationalize threat intelligence.
Key Skills:
- Expertise in threat intelligence, cybersecurity operations, or related functions.
- Proficiency with threat intelligence platforms (e.g. MISP, ThreatConnect, Recorded Future, Anomali).
- Solid understanding of common malware, threat actor groups, APT campaigns, and geopolitical threats.
- Familiarity with STIX/TAXII, YARA, Sigma, and IOC/TTP formats.
- Deep knowledge of the MITRE ATT&CK framework and cyber kill chain methodology.
Salary (Rate): undetermined
City: London
Country: United Kingdom
Working Arrangements: hybrid
IR35 Status: outside IR35
Seniority Level: undetermined
Industry: IT
Skills
- Expertise in threat intelligence, cybersecurity operations, or related functions.
- Proficiency with threat intelligence platforms (e.g. MISP, ThreatConnect, Recorded Future, Anomali).
- Solid understanding of common malware, threat actor groups, APT campaigns and geopolitical threats.
- Familiarity with STIX/TAXII, YARA, Sigma, and IOC/TTP formats.
- Deep knowledge of the MITRE ATT&CK framework and cyber kill chain methodology.
The Role
- Monitor the threat landscape to identify emerging cyber threats, vulnerabilities and adversary tactics, techniques and procedures (TTPs).
- Support threat hunting, incident response and vulnerability management with relevant threat context and attribution.
- Perform adversary tracking and contribute to the development of threat models using frameworks such as MITRE ATT&CK, Diamond Model, and Kill Chain.
- Collaborate with SOC, IR, Red Team and Vulnerability Management teams to contextualise and operationalise threat intelligence.
**This role is predominantly remote but requires flexibility to come into the London office as and when required**