Threat Analyst in London

Threat Analyst in London

London Full-Time 50000 - 65000 € / year (est.) Home office (partial)
Deepstreamtech

At a Glance

  • Tasks: Analyse cyber threats and provide actionable insights to enhance security operations.
  • Company: Join NTT DATA, a leader in cybersecurity with a focus on innovation.
  • Benefits: Flexible hybrid work model, competitive salary, and opportunities for professional growth.
  • Other info: Collaborate with experts and contribute to high-impact cybersecurity initiatives.
  • Why this job: Make a real impact in the fight against cyber threats while working with cutting-edge technology.
  • Qualifications: Proficiency in threat intelligence platforms and scripting; relevant certifications preferred.

The predicted salary is between 50000 - 65000 € per year.

Requirements

  • Strong proficiency with threat intelligence platforms like MISP, ThreatConnect, or Anomali.
  • Deep familiarity with MITRE ATT&CK framework, dark web monitoring techniques, and attack simulation techniques.
  • Demonstrated skills in cyber threat modeling, malware reverse engineering, and API-triggered automation.
  • Certifications Preferred: CREST CPTIA, GCTI, MITRE ATT&CK CTI or related.
  • Must meet UK SC Clearance eligibility guidelines.
  • Advanced scripting capabilities (Python, PowerShell preferred).
  • Bachelor’s Degree in Cybersecurity, International Relations, or Intelligence Studies strongly preferred.
  • Direct experience working in government, military, or intelligence organizations advantageous.
  • Experience identifying and neutralizing Advanced Persistent Threats (APTs) in target environments.

What the job involves

As a Threat Intelligence Analyst at NTT DATA, you’ll utilize your expertise to collect, analyze, and report on cyber threats, enabling our clients to proactively defend against attack campaigns and adversarial actions. You will play a crucial role in interpreting the threat landscape, providing actionable insights, and integrating intelligence into advanced security operations. This role, within our UK Security Practice, provides the opportunity to contribute to high-impact cybersecurity initiatives while working flexibly across a hybrid work model.

Threat Intelligence Analysis and Collection

  • Research, track, and analyze Indicators of Compromise (IOCs) and threat actor profiles using sources that include open-source (OSINT), dark web forums, government feeds, and commercial intelligence platforms.
  • Conduct detailed analysis of Threat Actor Tactics, Techniques, and Procedures (TTPs) and malware.
  • Deliver actionable intelligence insights to enhance detection, prevention, and response embedded within the threat lifecycle.
  • Maintain up-to-date geopolitical knowledge influencing the cyber threat landscape.

Threat Assessment and Reporting

  • Develop and deliver weekly threat briefs, annual landscape overviews, and ad-hoc risk signals for both technical and non-technical audiences.
  • Produce detailed reports based on industry-specific campaigns or identified vulnerability patterns.
  • Communicate emerging threats to relevant technical stakeholders, influencing rapid mitigation strategy formulation.

Intelligence Integration and Technology Alignment

  • Integrate threat intelligence feeds (TIPs) into platforms like SIEM or SOAR, prioritizing automation workflows where required.
  • Refine search prevention frameworks using custom threat correlation rules.
  • Collaborate directly with SOC teams to enhance real-time detection and response capabilities.

Monitoring Threat Campaigns and Emerging Techniques

  • Track and assess malware campaigns, underground forums, and marketplaces to identify emerging attack vectors.
  • Analyze threat data to produce predictive insights about probable trends and future adversarial strategies.
  • Provide targeted support to incident response teams with contextualized intelligence.

Stakeholder Collaboration and Communication

  • Brief clients and internal teams about current threat landscapes and risks relevant to their operations.
  • Contribute to cross-functional threat modeling, risk assessment workshops, and proactive planning.
  • Represent NTT DATA at external security forums and intelligence-sharing communities.

Success Metrics (6–12 Months)

  • Deliver minimum 15 intelligence reports/month, meeting a quality accuracy benchmark above 95%.
  • Reduce detection and response times by 25% via improved monitoring techniques.
  • Establish three new high-quality threat detection models with technical playbooks per quarter.

Threat Analyst in London employer: Deepstreamtech

At NTT DATA, we pride ourselves on being an exceptional employer, particularly for our Threat Analysts who thrive in a dynamic and innovative environment. Our hybrid work model promotes flexibility while fostering a collaborative culture that values continuous learning and professional growth, supported by access to cutting-edge tools and resources. With a commitment to impactful cybersecurity initiatives, employees can expect to engage in meaningful work that directly contributes to the safety and security of our clients.

Deepstreamtech

Contact Detail:

Deepstreamtech Recruiting Team

StudySmarter Expert Advice🤫

We think this is how you could land Threat Analyst in London

Tip Number 1

Network like a pro! Attend cybersecurity meetups, webinars, and conferences to connect with industry professionals. You never know who might have the inside scoop on job openings or can refer you directly.

Tip Number 2

Show off your skills! Create a portfolio showcasing your threat analysis projects, reports, or any relevant work. This gives potential employers a taste of what you can bring to the table beyond just your CV.

Tip Number 3

Don’t be shy about reaching out! If you see a job that excites you, drop a message to someone in the company on LinkedIn. A friendly introduction can go a long way in getting your foot in the door.

Tip Number 4

Apply through our website! We love seeing candidates who take the initiative. Plus, it’s a great way to ensure your application gets into the right hands quickly.

We think you need these skills to ace Threat Analyst in London

Threat Intelligence Platforms (MISP, ThreatConnect, Anomali)
MITRE ATT&CK Framework
Dark Web Monitoring Techniques
Attack Simulation Techniques
Cyber Threat Modelling
Malware Reverse Engineering
API-Triggered Automation

Some tips for your application 🫡

Show Off Your Skills:Make sure to highlight your experience with threat intelligence platforms and the MITRE ATT&CK framework. We want to see how your skills align with what we’re looking for, so don’t hold back!

Tailor Your Application:Customise your CV and cover letter to reflect the specific requirements of the Threat Analyst role. Use keywords from the job description to show us you’ve done your homework and understand what we need.

Be Clear and Concise:When writing your application, keep it straightforward and to the point. We appreciate clarity, so make sure your experience and qualifications shine through without unnecessary fluff.

Apply Through Our Website:We encourage you to submit your application directly through our website. It’s the best way for us to receive your details and ensures you’re considered for the role as quickly as possible!

How to prepare for a job interview at Deepstreamtech

Know Your Threat Intelligence Tools

Make sure you’re well-versed in threat intelligence platforms like MISP, ThreatConnect, or Anomali. Brush up on how these tools work and be ready to discuss your experience with them during the interview. It’s a great way to show you’re not just familiar but also proficient.

Master the MITRE ATT&CK Framework

Familiarise yourself with the MITRE ATT&CK framework inside out. Be prepared to explain how you’ve applied it in past roles or projects. This will demonstrate your understanding of threat actor tactics and how they can be countered effectively.

Showcase Your Scripting Skills

If you have advanced scripting capabilities, especially in Python or PowerShell, make sure to highlight them. Prepare examples of how you’ve used these skills for automation or threat modelling. This could set you apart from other candidates.

Communicate Clearly and Confidently

Since you'll need to deliver reports and briefings, practice explaining complex concepts in simple terms. Think about how you would communicate emerging threats to both technical and non-technical audiences. Clear communication is key in this role!