At a Glance
- Tasks: Hunt for cyber threats and build detection rules using Microsoft tools.
- Company: Award-winning employee-owned Microsoft Partner with a strong culture.
- Benefits: Competitive salary, bonuses for certifications, and flexible working options.
- Why this job: Join a supportive team and make a real impact in cybersecurity.
- Qualifications: 2-3 years in threat intelligence and hands-on experience with Microsoft Sentinel.
- Other info: Enjoy a personal gadget budget and opportunities for continuous learning.
The predicted salary is between 50000 - 60000 Β£ per year.
Award-Winning Employee-Owned Microsoft Partner | Scotland | Β£50-60k + Benefits
Edinburgh HQ (office 1 or 2 days per month) - very flexible for the right person.
I'm recruiting for one of Scotland's most respected Microsoft Partners - an employee-owned company (since 2019) where culture genuinely matters and people stay for years, not months.
They're looking for a Threat Intelligence Analyst to join their Security team, working across a diverse client base from financial services to enterprise organisations.
THE ROLE
- Proactive threat hunting using Microsoft Sentinel & Defender XDR
- Building detection rules with KQL and enriching threat intel feeds
- Investigating IOCs and mapping adversary TTPs (MITRE ATT&CK)
- CLIENT-FACING: Presenting threat briefings and translating risks into business impact
- Collaborating with SOC analysts, incident response, and engineering teams
YOU'LL NEED
- 2-3 years in threat intelligence/threat hunting
- Hands-on with Microsoft Sentinel & Defender XDR (essential)
- MITRE ATT&CK framework knowledge
- Client presentation skills - comfortable with technical & non-technical audiences
- Python/scripting is a bonus
WHY THIS COMPANY STANDS OUT
- Β£50-60k + annual bonuses for every MS certification you achieve
- Employee-owned since 2019 - you become a co-owner automatically (no shares to buy!)
- Personal "gadget budget" + genuine learning opportunities
- Knowledge-sharing culture - conferences, internal sessions, cutting-edge tech
- Low turnover - people genuinely stay because of the culture
- Home broadband paid, bike-to-work scheme, Costco membership
- Holiday buy/sell scheme + flexible working
Cyber Threat Intelligence Analyst employer: Euro Projects Recruitment - Engineering, Manufacturing & Technology
Contact Detail:
Euro Projects Recruitment - Engineering, Manufacturing & Technology Recruiting Team
StudySmarter Expert Advice π€«
We think this is how you could land Cyber Threat Intelligence Analyst
β¨Tip Number 1
Network like a pro! Reach out to current employees at the company through LinkedIn or industry events. A friendly chat can give you insider info and might just get your foot in the door.
β¨Tip Number 2
Show off your skills! Prepare a mini presentation on a recent threat intelligence project you've worked on. This will not only demonstrate your expertise but also your ability to communicate complex ideas to different audiences.
β¨Tip Number 3
Get familiar with their tools! Brush up on Microsoft Sentinel and Defender XDR before your interview. Being able to discuss your hands-on experience with these tools will definitely impress them.
β¨Tip Number 4
Apply through our website! Itβs the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who take that extra step to connect directly with us.
We think you need these skills to ace Cyber Threat Intelligence Analyst
Some tips for your application π«‘
Tailor Your CV: Make sure your CV is tailored to the Cyber Threat Intelligence Analyst role. Highlight your experience with Microsoft Sentinel, Defender XDR, and any relevant threat intelligence work. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about threat hunting and how you can contribute to our team. Donβt forget to mention your client-facing experience and how you can translate technical risks into business impact.
Show Off Your Skills: If you've got hands-on experience with KQL or the MITRE ATT&CK framework, make sure to showcase that in your application. We love seeing candidates who can demonstrate their technical prowess and problem-solving abilities!
Apply Through Our Website: We encourage you to apply through our website for a smoother process. It helps us keep track of your application and ensures you donβt miss out on any important updates. Plus, we love seeing applications come directly from our site!
How to prepare for a job interview at Euro Projects Recruitment - Engineering, Manufacturing & Technology
β¨Know Your Tools Inside Out
Make sure youβre well-versed in Microsoft Sentinel and Defender XDR. Brush up on how to build detection rules with KQL, as this will likely come up in your interview. Being able to discuss your hands-on experience confidently will show that you're ready to hit the ground running.
β¨Understand the MITRE ATT&CK Framework
Familiarise yourself with the MITRE ATT&CK framework, as itβs crucial for mapping adversary tactics, techniques, and procedures (TTPs). Be prepared to discuss how you've applied this knowledge in previous roles or projects, as it demonstrates your analytical skills and understanding of threat intelligence.
β¨Practice Your Presentation Skills
Since the role involves client-facing responsibilities, practice presenting technical information in a way that non-technical audiences can understand. You might be asked to explain complex concepts during the interview, so having a few examples ready will help you shine.
β¨Show Your Passion for Learning
This company values continuous learning, so highlight any relevant certifications or courses youβve completed. Discuss your personal 'gadget budget' ideas or how you stay updated with the latest trends in cybersecurity. This will show that youβre not just looking for a job, but are genuinely interested in growing within the field.