At a Glance
- Tasks: Lead the creation of a new Cyber Threat Intelligence function and strategy.
- Company: Join a global leader in aviation and travel, shaping their cyber security landscape.
- Benefits: Enjoy hybrid work, internal mobility, and a learning budget for personal growth.
- Why this job: Make a real impact in a high-profile role with strategic ownership and future growth potential.
- Qualifications: Experience in cyber threat intelligence, strong communication skills, and relevant certifications required.
- Other info: Opportunity to influence both operational response and long-term threat strategy.
The predicted salary is between 48000 - 72000 £ per year.
A high-impact greenfield role with a global aviation and travel leader, this is an opportunity to shape the CTI capability from the ground up. We’re supporting a well-established organisation in their search for a Cyber Threat Intelligence Manager to define and lead threat intel strategy across a complex, multi-entity environment.
The Role: As CTI Manager, you’ll be responsible for:
- Designing and building a greenfield CTI function to support proactive threat detection and strategic decision-making
- Developing a threat intelligence strategy aligned with business risks and SOC priorities
- Collaborating with a newly selected MSSP to integrate threat feeds, TTPs, and IOCs into detection and response workflows
- Defining intelligence requirements, deliverables, and reporting outputs across OpCos and leadership teams
- Supporting SOC and CIRT operations through contextualised intelligence and threat actor profiling
- Leading external threat sharing partnerships with ISACs, intel vendors, and government bodies
- Building the business case for scaling an internal CTI team over time
What They’re Looking For:
- Proven experience in cyber threat intelligence or security operations (SOC, CIRT, threat hunting)
- Strong understanding of TTPs, IOCs, threat actor profiling, and threat modelling frameworks (e.g. MITRE ATT&CK)
- Hands-on experience with threat intel tooling and platforms (e.g. MISP, Anomali, Recorded Future)
- Ability to convert raw threat data into actionable insights and strategic recommendations
- Strong communication skills – able to brief technical and non-technical stakeholders, including exec leadership
- Relevant certifications (e.g. CTIA, GCTI, CISSP, GCIH) and/or a background in intelligence analysis
Why It’s Worth Considering:
- A greenfield opportunity with real strategic ownership and future growth scope
- Work across a high-profile, multinational enterprise with critical global infrastructure
- Influence both operational response and long-term threat strategy
- Internal mobility, learning budget, and exposure to a major MSSP integration
Cyber Threat Intelligence Manager employer: Adeptis Group
Contact Detail:
Adeptis Group Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Threat Intelligence Manager
✨Tip Number 1
Network with professionals in the cyber threat intelligence field. Attend industry conferences, webinars, and local meetups to connect with others who are already in similar roles. This can help you gain insights into the latest trends and potentially lead to referrals.
✨Tip Number 2
Stay updated on the latest threat intelligence tools and platforms. Familiarise yourself with MISP, Anomali, and Recorded Future, as these are commonly used in the industry. Demonstrating your knowledge of these tools during interviews can set you apart from other candidates.
✨Tip Number 3
Prepare to discuss your experience with threat actor profiling and threat modelling frameworks like MITRE ATT&CK. Be ready to provide examples of how you've applied these concepts in previous roles, as this will showcase your practical understanding of the field.
✨Tip Number 4
Highlight your communication skills by preparing to explain complex technical concepts in simple terms. Practice articulating your thoughts clearly, as you'll need to engage with both technical and non-technical stakeholders in this role.
We think you need these skills to ace Cyber Threat Intelligence Manager
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in cyber threat intelligence and security operations. Emphasise your understanding of TTPs, IOCs, and threat modelling frameworks, as well as any hands-on experience with threat intel tools.
Craft a Compelling Cover Letter: In your cover letter, express your enthusiasm for the role and the opportunity to shape a greenfield CTI function. Discuss how your skills align with the company's needs and your vision for developing a threat intelligence strategy.
Showcase Relevant Certifications: List any relevant certifications such as CTIA, GCTI, CISSP, or GCIH prominently in your application. This demonstrates your commitment to the field and enhances your credibility as a candidate.
Prepare for Technical Questions: Anticipate technical questions related to threat intelligence, SOC operations, and threat actor profiling during the interview process. Be ready to discuss specific examples of how you've converted raw threat data into actionable insights.
How to prepare for a job interview at Adeptis Group
✨Showcase Your Strategic Vision
As a Cyber Threat Intelligence Manager, it's crucial to demonstrate your ability to design and build a CTI function. Be prepared to discuss your vision for the role and how you would align the threat intelligence strategy with business risks and SOC priorities.
✨Highlight Relevant Experience
Make sure to emphasise your proven experience in cyber threat intelligence or security operations. Discuss specific examples of your hands-on experience with threat intel tooling and platforms, as well as your understanding of TTPs, IOCs, and threat modelling frameworks.
✨Communicate Effectively
Strong communication skills are essential for this role. Practice explaining complex technical concepts in a way that is accessible to both technical and non-technical stakeholders. Be ready to provide examples of how you've successfully briefed executive leadership in the past.
✨Prepare for Collaboration
This role involves collaborating with various teams and external partners. Be prepared to discuss your experience in building partnerships, particularly with MSSPs, ISACs, and government bodies. Highlight any successful collaborations that have led to improved threat detection and response.