At a Glance
- Tasks: Lead the creation of a new Cyber Threat Intelligence function and strategy.
- Company: Join a global leader in aviation and travel, shaping the future of cybersecurity.
- Benefits: Enjoy hybrid work, internal mobility, and a learning budget for personal growth.
- Why this job: Make a real impact in a high-profile role with strategic ownership and growth potential.
- Qualifications: Experience in cyber threat intelligence, strong communication skills, and relevant certifications required.
- Other info: Collaborate with top-tier partners and influence long-term threat strategies.
The predicted salary is between 43200 - 72000 £ per year.
A high-impact greenfield role with a global aviation and travel leader, this is an opportunity to shape the CTI capability from the ground up. We’re supporting a well-established organisation in their search for a Cyber Threat Intelligence Manager to define and lead threat intel strategy across a complex, multi-entity environment.
The Role: As CTI Manager, you’ll be responsible for:
- Designing and building a greenfield CTI function to support proactive threat detection and strategic decision-making
- Developing a threat intelligence strategy aligned with business risks and SOC priorities
- Collaborating with a newly selected MSSP to integrate threat feeds, TTPs, and IOCs into detection and response workflows
- Defining intelligence requirements, deliverables, and reporting outputs across OpCos and leadership teams
- Supporting SOC and CIRT operations through contextualised intelligence and threat actor profiling
- Leading external threat sharing partnerships with ISACs, intel vendors, and government bodies
- Building the business case for scaling an internal CTI team over time
What They’re Looking For:
- Proven experience in cyber threat intelligence or security operations (SOC, CIRT, threat hunting)
- Strong understanding of TTPs, IOCs, threat actor profiling, and threat modelling frameworks (e.g. MITRE ATT&CK)
- Hands-on experience with threat intel tooling and platforms (e.g. MISP, Anomali, Recorded Future)
- Ability to convert raw threat data into actionable insights and strategic recommendations
- Strong communication skills – able to brief technical and non-technical stakeholders, including exec leadership
- Relevant certifications (e.g. CTIA, GCTI, CISSP, GCIH) and/or a background in intelligence analysis
Why It’s Worth Considering:
- A greenfield opportunity with real strategic ownership and future growth scope
- Work across a high-profile, multinational enterprise with critical global infrastructure
- Influence both operational response and long-term threat strategy
- Internal mobility, learning budget, and exposure to a major MSSP integration
Cyber Threat Intelligence Manager employer: Adeptis Group
Contact Detail:
Adeptis Group Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Threat Intelligence Manager
✨Tip Number 1
Familiarise yourself with the latest trends in cyber threat intelligence. Follow industry leaders on social media and engage with their content to stay updated. This will not only enhance your knowledge but also give you talking points during interviews.
✨Tip Number 2
Network with professionals in the cyber security field, especially those who have experience in CTI roles. Attend relevant conferences or webinars to make connections and learn from their experiences, which can provide insights that may help you stand out.
✨Tip Number 3
Demonstrate your hands-on experience with threat intel tools by participating in online forums or contributing to open-source projects. This practical exposure can be a great conversation starter and show your commitment to the field.
✨Tip Number 4
Prepare to discuss how you would approach building a CTI function from scratch. Think about the challenges you might face and how you would address them, as this will showcase your strategic thinking and problem-solving skills during the interview.
We think you need these skills to ace Cyber Threat Intelligence Manager
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in cyber threat intelligence and security operations. Emphasise your understanding of TTPs, IOCs, and threat modelling frameworks, as these are crucial for the role.
Craft a Compelling Cover Letter: In your cover letter, express your enthusiasm for building a greenfield CTI function. Discuss how your previous experiences align with the responsibilities outlined in the job description, particularly in developing threat intelligence strategies.
Showcase Relevant Certifications: List any relevant certifications such as CTIA, GCTI, CISSP, or GCIH prominently in your application. These credentials will demonstrate your commitment and expertise in the field of cyber threat intelligence.
Prepare for Technical Questions: Anticipate technical questions related to threat intel tooling and platforms. Be ready to discuss your hands-on experience with tools like MISP, Anomali, or Recorded Future, and how you've used them to convert raw data into actionable insights.
How to prepare for a job interview at Adeptis Group
✨Showcase Your Strategic Vision
As a Cyber Threat Intelligence Manager, it's crucial to demonstrate your ability to design and build a CTI function. Be prepared to discuss your vision for the role and how you would align the threat intelligence strategy with business risks and SOC priorities.
✨Highlight Relevant Experience
Make sure to emphasise your proven experience in cyber threat intelligence or security operations. Discuss specific examples of how you've successfully implemented threat detection strategies or collaborated with MSSPs in the past.
✨Communicate Effectively
Strong communication skills are essential for this role. Practice explaining complex technical concepts in a way that non-technical stakeholders can understand. Be ready to provide examples of how you've briefed executive leadership on threat intelligence matters.
✨Demonstrate Hands-On Knowledge
Familiarity with threat intel tooling and platforms is key. Be prepared to discuss your hands-on experience with tools like MISP or Recorded Future, and how you've used them to convert raw threat data into actionable insights.