Threat Intelligence Manager in Manchester
Threat Intelligence Manager

Threat Intelligence Manager in Manchester

Manchester Full-Time 70000 - 90000 £ / year (est.) No home office possible
Foregenix

At a Glance

  • Tasks: Lead the development of threat intelligence capabilities for advanced security services.
  • Company: Join a cutting-edge cybersecurity firm focused on resilience and innovation.
  • Benefits: Competitive salary, flexible working options, and opportunities for professional growth.
  • Other info: Collaborative environment with a focus on continuous improvement and team spirit.
  • Why this job: Make a real impact by translating threats into actionable intelligence for clients.
  • Qualifications: 5+ years in threat intelligence with strong analytical and leadership skills.

The predicted salary is between 70000 - 90000 £ per year.

Purpose: You will lead the development and delivery of threat intelligence capabilities that directly support advanced offensive security services, including Red Team and Adversary Emulation engagements. Your mission is to identify, analyse, and translate real-world threat actor behaviour into actionable intelligence that enables realistic, threat-led security testing and strengthens our clients’ resilience. You will ensure operational excellence and team readiness for all client engagements, working closely with internal teams (Offensive Security, CRS, and Sales) to deliver integrated cybersecurity solutions. This includes defining relevant threat scenarios, identifying priority targets, and mapping adversary Tactics, Techniques, and Procedures (TTPs) to support structured, intelligence-driven engagements.

As a senior cybersecurity specialist, you will combine analytical depth with strategic thinking, ensuring that intelligence outputs are not only accurate but also operationally relevant. You will act as the bridge between intelligence and execution, enabling Red Team activities to reflect real-world threats, supporting new services and delivering meaningful insights into defensive effectiveness.

To succeed in this role:

  • You will lead and mentor the Threat Intelligence team, defining priorities, methodologies, and outputs aligned with offensive security and resilience testing objectives.
  • You will ensure intelligence outputs are relevant, timely, and aligned with client industries, threat profiles, and regulatory expectations (e.g. financial services, TIBER/CBEST contexts).
  • You will build strong collaboration with Red Team operators, enabling the design of realistic attack scenarios based on real-world threat actors and campaigns.
  • You will build trust with clients through accurate, insightful, and well-communicated findings.
  • You will proactively research emerging threats, vulnerabilities, and exploitation techniques to keep our services relevant and effective.
  • You will manage challenges with confidence, prioritising effectively and ensuring alignment across multiple engagements.
  • You will provide clear, structured intelligence outputs that can be consumed by both technical teams and senior stakeholders.
  • You will embody the team spirit that defines us: everyone has a voice, and everyone can help shape the future of the company.

In this role, you will:

  • Lead the collection, analysis, and production of threat intelligence across multiple sources, including OSINT, commercial feeds, and internal research.
  • Identify and analyse relevant threat actors, campaigns, and TTPs, with a focus on those targeting client industries (e.g. financial services, government, critical infrastructure).
  • Translate threat intelligence into actionable outputs, including threat profiles, adversary emulation scenarios, and attack pathways.
  • Map threat actor behaviours to frameworks such as MITRE ATT&CK to support structured Red Team planning and execution.
  • Work closely with Red Team operators to define engagement scenarios, objectives, and attack narratives aligned with real-world threats.
  • Support the design and delivery of threat-led testing engagements (e.g. CBEST, TIBER), ensuring intelligence inputs meet regulatory expectations.
  • Produce high-quality intelligence reports, briefings, and supporting materials for both internal teams and clients.
  • Maintain and continuously improve intelligence workflows, tooling, and knowledge bases.
  • Collaborate with CRS, Offensive Security, and Sales teams to support integrated service delivery and client engagement.
  • Contribute to the development of internal methodologies and frameworks for intelligence-led security testing.

You are expected to bring:

  • Proven experience (5+ years) leading and mentoring a Threat Intelligence team or a highly relevant security function (e.g., Adversary Emulation, Incident Response). This must include establishing and managing the complete Threat Intelligence Life Cycle, from defining and executing against Priority Intelligence Requirements (PIRs) to generating finished intelligence products.
  • Direct experience supporting threat-led testing frameworks (e.g., CBEST, TIBER) in regulated sectors (finance, government, healthcare).
  • Deep technical understanding of adversary Tactics, Techniques, and Procedures (TTPs) across the modern attack lifecycle (initial access, lateral movement, persistence, and exploitation).
  • Proven ability to perform deep-dive analysis on complex threats, including malware family tracking and campaign attribution and hands-on experience focusing intelligence gathering and analysis on complex environments such as Kubernetes, Docker, or serverless functions.
  • Hands-on experience evaluating, implementing, and managing dedicated Threat Intelligence Platforms (TIPs) and integrating various commercial and open source OSINT, and internal intelligence feeds.
  • Expertise in security operations, threat detection methodologies, and managing defensive platforms (SIEM, EDR, SOAR).
  • Exposure to or direct experience with reverse engineering malware and defensive tool bypasses to inform intelligence gathering and improve detection methods.
  • Advanced understanding of security frameworks (e.g., MITRE ATT&CK).
  • Proficiency in at least one scripting (e.g., Python) and one programming language (e.g., C#, Java) for custom tooling, automation, and large-scale data manipulation.
  • Exceptional communication and report writing skills, with the proven ability to influence C-level stakeholders and translate technical findings into clear business risk.
  • Active interest in the offensive security and/or threat intelligence community.
  • Advanced level of English.

Advantageous Competencies:

  • Formal validation through relevant industry certifications, specifically CREST CCTIM (CREST Certified Threat Intelligence Manager, SANS GIAC Cyber Threat Intelligence (GCTI)).
  • Background in offensive security, penetration testing, or Red Teaming.
  • Experience in MSSP and SOC, or incident response.
  • Exposure to or practical experience leveraging AI/ML techniques for advanced threat detection, intelligence automation, or understanding adversarial AI use cases (e.g., prompt injection or evasion).

Please note we only accept docs in PDF format.

Threat Intelligence Manager in Manchester employer: Foregenix

As a leading player in the cybersecurity sector, we pride ourselves on fostering a collaborative and innovative work culture that empowers our employees to excel. Our Threat Intelligence Manager role offers not only competitive benefits and opportunities for professional growth but also the chance to work alongside industry experts in a dynamic environment located in a vibrant city. Join us to make a meaningful impact in the field of cybersecurity while enjoying a supportive atmosphere that values every team member's voice.
Foregenix

Contact Detail:

Foregenix Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Threat Intelligence Manager in Manchester

✨Tip Number 1

Network like a pro! Get out there and connect with folks in the cybersecurity scene. Attend meetups, webinars, or conferences related to threat intelligence. You never know who might have the inside scoop on job openings or can put in a good word for you.

✨Tip Number 2

Show off your skills! Create a portfolio that highlights your threat intelligence projects, reports, or any relevant research you've done. This will give potential employers a taste of what you can bring to the table and set you apart from the crowd.

✨Tip Number 3

Don’t just apply blindly! Tailor your approach for each role. Research the company’s recent projects or challenges in threat intelligence and mention how your experience aligns with their needs. This shows you’re genuinely interested and not just sending out generic applications.

✨Tip Number 4

Leverage our website! We’ve got loads of resources and job listings specifically for roles like Threat Intelligence Manager. Make sure to check it out regularly and apply directly through us for the best chance at landing that dream job!

We think you need these skills to ace Threat Intelligence Manager in Manchester

Threat Intelligence Life Cycle Management
Adversary Emulation
Incident Response
Threat-led Testing Frameworks (CBEST, TIBER)
Tactics, Techniques, and Procedures (TTPs)
Deep-Dive Threat Analysis
Threat Intelligence Platforms (TIPs)
Security Operations
Threat Detection Methodologies
SIEM, EDR, SOAR Management
Reverse Engineering Malware
Security Frameworks (MITRE ATT&CK)
Scripting (Python)
Programming (C#, Java)
Communication and Report Writing Skills

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the Threat Intelligence Manager role. Highlight your experience with threat intelligence, offensive security, and any relevant frameworks like MITRE ATT&CK. We want to see how your skills align with our mission!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about threat intelligence and how you can contribute to our team. Be sure to mention specific experiences that relate to the job description.

Showcase Your Communication Skills: Since you'll be influencing C-level stakeholders, it's crucial to demonstrate your exceptional communication skills. Use clear and concise language in your application materials, and don't shy away from showcasing your report writing abilities.

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re keen on joining our team at StudySmarter!

How to prepare for a job interview at Foregenix

✨Know Your Threat Actors

Before the interview, dive deep into the latest threat actor behaviours and tactics. Familiarise yourself with real-world examples relevant to the sectors you’ll be working in, like finance or government. This will not only show your expertise but also your proactive approach to understanding the landscape.

✨Showcase Your Analytical Skills

Prepare to discuss specific instances where you've translated complex threat intelligence into actionable insights. Use the STAR method (Situation, Task, Action, Result) to structure your responses, highlighting how your analysis led to successful outcomes in previous roles.

✨Collaboration is Key

Emphasise your experience working with cross-functional teams, especially Red Team operators. Be ready to share examples of how you’ve collaborated to design realistic attack scenarios or improve intelligence workflows, showcasing your ability to bridge the gap between intelligence and execution.

✨Communicate Clearly

Practice explaining technical concepts in a way that’s accessible to non-technical stakeholders. Prepare a few examples of reports or briefings you’ve created, focusing on how you tailored your communication to different audiences. This will demonstrate your exceptional communication skills and your ability to influence at all levels.

Threat Intelligence Manager in Manchester
Foregenix
Location: Manchester

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>