Threat Intelligence Analyst
Threat Intelligence Analyst

Threat Intelligence Analyst

Manchester Full-Time 24000 - 36000 £ / year (est.) No home office possible
M

At a Glance

  • Tasks: Investigate security alerts and incidents, using Microsoft Sentinel and KQL to enhance detection.
  • Company: Join a rapidly growing MSSP in Manchester, making a real impact in cybersecurity.
  • Benefits: Enjoy hybrid working, clear progression opportunities, and investment in training and tools.
  • Why this job: Be part of a supportive SOC team and tackle diverse threat landscapes.
  • Qualifications: Experience with Microsoft Sentinel and KQL is essential; familiarity with attack techniques is a plus.
  • Other info: Interviews are happening soon, so apply now to secure your spot!

The predicted salary is between 24000 - 36000 £ per year.

Maxwell Bond have engaged with an MSSP in the Manchester area that are looking for a Threat Analyst to join their team. We’re looking for somebody that has recent experience with Microsoft Sentinel (1-2 years) and KQL skills. The company is growing and hiring at a quick rate, really exciting time to join them as they expand.

You will be in the Manchester based office ideally once per week, sometimes maybe once every two weeks.

What you’ll be doing:

  • Investigating and responding to security alerts and incidents escalated by the L1 team
  • Using Microsoft Sentinel as your primary SIEM platform, leveraging KQL to hunt, analyse, and improve detection
  • Tuning Sentinel rules, creating workbooks and queries to enhance visibility and reduce false positives
  • Working with clients across different sectors, helping them understand threats and improve their security posture
  • Collaborating with Threat Intelligence and Engineering teams to strengthen detection and response capabilities

What we’re looking for:

  • Solid experience working with Microsoft Sentinel in a live SOC environment
  • Strong knowledge and hands-on ability with KQL (Kusto Query Language)
  • Understanding of attack techniques (MITRE ATT&CK, etc.) and incident response workflows
  • Comfortable working across different client environments and adapting to varied threat landscapes
  • Previous experience in an MSSP or managed services environment is an advantage

Job details:

  • Salary up to £30,000
  • Hybrid working – once a week in the office
  • Clear progression opportunities and exposure to a wide range of threat landscapes
  • Work as part of a supportive, growing SOC team with real investment in tooling and training

If you're ready to take the next step in your threat analysis career and want to be part of a team that makes a real difference, apply now. We’re expecting a large amount of interest in this role with interviews taking place towards the end of the week, please apply now to be considered or alternatively contact Dan Rowland at Maxwell Bond on 0161 840 1021 or dan.rowland@maxwellbond.co.uk

Threat Intelligence Analyst employer: Maxwell Bond

Join a dynamic MSSP in Manchester as a Threat Intelligence Analyst, where you'll be part of a supportive and rapidly growing SOC team. With a strong focus on employee development, you will have clear progression opportunities and the chance to work with cutting-edge tools in a hybrid working environment. This is an exciting opportunity to make a meaningful impact while collaborating with diverse clients to enhance their security posture.
M

Contact Detail:

Maxwell Bond Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Threat Intelligence Analyst

✨Tip Number 1

Familiarise yourself with Microsoft Sentinel and KQL by exploring online resources and tutorials. This will not only boost your confidence but also demonstrate your commitment to mastering the tools that are crucial for the role.

✨Tip Number 2

Engage with the cybersecurity community through forums or social media platforms. Networking with professionals in the field can provide insights into the latest trends and challenges, which you can discuss during interviews.

✨Tip Number 3

Prepare to discuss real-world scenarios where you've used Microsoft Sentinel or KQL. Having specific examples ready will help you illustrate your problem-solving skills and practical experience during the interview.

✨Tip Number 4

Research the company’s recent projects and initiatives in threat intelligence. Showing that you understand their work and how you can contribute will set you apart from other candidates.

We think you need these skills to ace Threat Intelligence Analyst

Experience with Microsoft Sentinel
Proficiency in KQL (Kusto Query Language)
Knowledge of SIEM technologies
Understanding of MITRE ATT&CK framework
Incident response workflows
Ability to investigate and respond to security alerts
Experience in a live SOC environment
Client-facing communication skills
Ability to tune detection rules and create workbooks
Adaptability to varied threat landscapes
Collaboration with Threat Intelligence teams
Problem-solving skills in cybersecurity contexts
Attention to detail in threat analysis

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights your experience with Microsoft Sentinel and KQL. Use specific examples from your previous roles to demonstrate your skills in a live SOC environment.

Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for threat analysis and your understanding of the role. Mention your familiarity with attack techniques and incident response workflows, as these are key aspects of the job.

Highlight Relevant Experience: In your application, emphasise any previous work in an MSSP or managed services environment. This will show that you can adapt to varied threat landscapes and work across different client environments.

Show Enthusiasm for Growth: Express your excitement about joining a growing team and your eagerness to contribute to their mission. Mention how you look forward to collaborating with Threat Intelligence and Engineering teams to enhance detection and response capabilities.

How to prepare for a job interview at Maxwell Bond

✨Showcase Your Microsoft Sentinel Experience

Make sure to highlight your hands-on experience with Microsoft Sentinel during the interview. Be prepared to discuss specific instances where you've used it in a live SOC environment, as this will demonstrate your practical knowledge and ability to contribute from day one.

✨Demonstrate KQL Proficiency

Since KQL is a key requirement for this role, be ready to explain your familiarity with Kusto Query Language. You might even want to prepare a few examples of queries you've written or how you've used KQL to enhance detection capabilities in previous roles.

✨Understand Threat Landscapes

Familiarise yourself with various attack techniques, especially those outlined in the MITRE ATT&CK framework. Being able to discuss these techniques and how they relate to incident response workflows will show that you have a solid understanding of the threats you may encounter.

✨Prepare for Client Interaction Scenarios

As the role involves working with clients across different sectors, think about how you would communicate complex security concepts to non-technical stakeholders. Prepare examples of past experiences where you've successfully explained threats or security measures to clients.

Threat Intelligence Analyst
Maxwell Bond
M
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>