At a Glance
- Tasks: Hunt for cyber threats and analyse adversary behaviour in a dynamic environment.
- Company: Join a global tech powerhouse with a strong focus on cyber security.
- Benefits: Competitive salary, excellent benefits, and extensive training opportunities.
- Why this job: Make a real impact in cyber defence while working with cutting-edge technologies.
- Qualifications: Experience in threat hunting and cyber defence, ideally with SIEM platforms.
- Other info: Collaborate with top professionals in a mature cyber defence organisation.
The predicted salary is between 50000 - 65000 £ per year.
Location: Berkshire (On-site)
Salary: Competitive (dependent on experience) + excellent benefits & training
Security Clearance: Ideally SC Cleared or eligible for SC (UK Nationals only)
Company Overview
An exciting opportunity to join a global technology powerhouse with a highly regarded cyber security capability supporting mission-critical environments across multiple industries. Cyber security sits at the heart of the organisation's operations, with sustained investment in people, tooling, threat intelligence, and continuous professional development. The security function operates at a mature level, bringing together blue team, red team, threat hunting, and collaborative purple-team practices to proactively defend against real-world adversaries.
Role Overview
As a Cyber Threat Detection Analyst, you will play a hands-on role within an advanced cyber defence function, focused on proactive threat hunting, adversary behaviour analysis, and high-fidelity threat detection across enterprise environments. This role goes beyond reactive alert handling. You will actively hunt for malicious activity using telemetry, SIEM data, and threat intelligence, develop hypotheses based on MITRE ATT&CK Tactics, Techniques, and Procedures (TTPs), and support incident management and response activities when threats are identified. We are open to experienced SOC Analysts where threat hunting, investigations, and proactive detection have formed a significant part of their role, and who are looking to further develop in a more hunting-led environment. This position is well suited to analysts who enjoy thinking like an attacker, have worked alongside or supported red team or purple team activities, and want to deepen their expertise in threat detection and detection engineering.
Skills & Experience We're Seeking
- Experience in threat hunting, cyber threat detection, SOC, blue team, or cyber defence environments, with ideally around five years hands-on experience.
- Strong hands-on experience using SIEM platforms, including: Microsoft Sentinel (KQL), Splunk (SPL), Elastic Security / Kibana (KQL, ESQL).
- Practical and operational understanding of MITRE ATT&CK, attacker techniques, and adversary tradecraft.
- Experience working with Indicators of Compromise (IOCs) and threat intelligence feeds.
- Solid experience across the security event lifecycle, including detection, investigation, and incident management.
- Hands-on experience with EDR / XDR technologies such as Microsoft Defender, CrowdStrike, SentinelOne, or Carbon Black.
- Strong knowledge of networking fundamentals (TCP/IP, DNS, HTTP/S, firewalls, VPNs, proxy technologies).
- Experience analysing telemetry from Windows, Linux, identity, endpoint, and network sources.
- Strong analytical mindset with the ability to clearly communicate findings, impact, and risk.
Key Responsibilities
- Conduct proactive threat hunting activities across log, endpoint, and network telemetry to identify suspicious, stealthy, or previously unknown threats.
- Develop and execute hunt hypotheses aligned to MITRE ATT&CK TTPs, adversary behaviours, and emerging threat intelligence.
- Write, refine, and optimise SIEM queries using KQL, SPL, Elastic / ESQL, and Kibana Query Language.
- Perform IOC analysis, enrichment, and validation, integrating internal and external threat intelligence sources.
- Lead investigations from initial detection through scoping, root cause analysis, and impact assessment.
- Support incident management and incident response activities, including containment, remediation, escalation, and lessons learned.
- Collaborate closely with SOC teams, incident responders, red teams, and purple teams to validate detections and improve defensive coverage.
- Contribute to detection logic improvements, use-case development, and continuous enhancement of hunting methodologies.
- Produce clear investigation write-ups, timelines, and recommendations for technical and non-technical stakeholders.
Particularly Interested In Candidates With
- Experience supporting or collaborating with Red Team or Purple Team exercises.
- Exposure to adversary emulation, attack simulation, detection validation, or detection engineering.
- Experience working in regulated, high-security, or mission-critical environments.
- Background in advanced SOC functions with a strong emphasis on investigation and threat hunting.
Security Certifications (Highly Beneficial)
- SANS / GIAC certifications, including but not limited to: GCIH - Incident Handler, GCIA - Intrusion Analyst, GCED - Enterprise Defender, GCTI - Cyber Threat Intelligence, GMON - Continuous Monitoring, GDAT - Defending Advanced Threats, GCAT - Advanced Threat Intelligence, OSCP or equivalent offensive security qualifications.
- CREST certifications, such as: CREST Practitioner Intrusion Analyst (CPIA), CREST Registered Intrusion Analyst (CRIA), CREST Certified Threat Intelligence Analyst (CCTIA), CREST Certified Blue Team Professional (CCBTP).
- Microsoft SC-200 or related detection and response certifications.
- Other recognised cyber security or threat intelligence credentials.
Why Join?
- Threat-hunting-led role within a mature cyber defence organisation.
- Exposure to real adversary behaviour, Red Team activity, and advanced attack scenarios.
- Competitive salary with an excellent benefits package.
- Significant investment in training, certifications, and long-term career progression.
- Opportunity to work alongside experienced Blue, Red, and Purple Team professionals.
Don't delay - apply now via the link below.
Cyber Threat Detection Analyst - SANS / GIAC employer: Adecco
Contact Detail:
Adecco Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Threat Detection Analyst - SANS / GIAC
✨Tip Number 1
Network, network, network! Get out there and connect with people in the cyber security field. Attend meetups, webinars, or conferences. You never know who might have a lead on your dream job!
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your threat hunting projects or any cool scripts you've written. This gives potential employers a taste of what you can do beyond just a CV.
✨Tip Number 3
Prepare for interviews by brushing up on your technical knowledge and soft skills. Practice common interview questions related to threat detection and incident response. We want you to shine when it’s your turn to impress!
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen. Plus, we love seeing candidates who are proactive about their job search!
We think you need these skills to ace Cyber Threat Detection Analyst - SANS / GIAC
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Cyber Threat Detection Analyst role. Highlight your experience in threat hunting, SIEM platforms, and any relevant certifications like SANS or GIAC. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber security and how your background makes you a great fit for our team. Don't forget to mention any hands-on experience with red or purple team activities!
Showcase Your Analytical Skills: In your application, be sure to showcase your analytical mindset. Provide examples of how you've tackled complex problems in previous roles, especially those related to incident management and threat detection. We love seeing how you think like an attacker!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, it shows us you're serious about joining our awesome team!
How to prepare for a job interview at Adecco
✨Know Your MITRE ATT&CK
Familiarise yourself with the MITRE ATT&CK framework and be ready to discuss how you've applied it in your previous roles. Prepare examples of how you've developed hypotheses based on TTPs and how that led to successful threat detection.
✨Showcase Your SIEM Skills
Be prepared to demonstrate your hands-on experience with SIEM platforms like Microsoft Sentinel or Splunk. Think of specific instances where you wrote or optimised queries using KQL or SPL, and be ready to explain the impact of your work.
✨Communicate Clearly
As a Cyber Threat Detection Analyst, you'll need to communicate findings effectively. Practice explaining complex technical concepts in simple terms, as you'll likely need to present your findings to both technical and non-technical stakeholders.
✨Collaborate and Contribute
Highlight your experience working with SOC teams, red teams, or purple teams. Be ready to discuss how you've collaborated on investigations or detection logic improvements, and show your enthusiasm for contributing to a team-oriented environment.