At a Glance
- Tasks: Hunt cyber threats and analyse data to protect clients.
- Company: Join Quorum, a leading Microsoft Partner in Scotland.
- Benefits: Competitive salary, private healthcare, and paid training opportunities.
- Why this job: Make a real impact in cybersecurity while growing your skills.
- Qualifications: 2-3 years in threat intelligence and strong analytical skills.
- Other info: Enjoy a collaborative culture with a focus on work-life balance.
The predicted salary is between 28800 - 48000 £ per year.
Overview
Hunt threats. Shape intelligence. Make a real impact.
Quorum is one of Scotland's largest Microsoft Partners and a Microsoft Direct Cloud Solutions Provider (CSP). As we continue to grow our security services, we're looking for a Threat Intelligence Analyst to join our expert team on a permanent basis.
In this role, you’ll be at the frontline of cyber defence — proactively identifying, analysing, and mitigating threats through intelligence-led investigations and advanced threat hunting. You’ll combine deep technical skills with the ability to clearly communicate risk and impact to both technical teams and clients.
Just as importantly, you’ll be supported at every stage of your career. At Quorum, training and development aren’t buzzwords — they’re a promise. We invest heavily in our people and even reward you financially for the Microsoft accreditations you achieve.
Key Responsibilities- Threat Hunting & Analysis: Conduct proactive threat hunts based on hypotheses and real-world attack scenarios. Investigate Indicators of Compromise (IOCs) and adversary TTPs. Leverage threat intelligence feeds, OSINT, and commercial platforms to enrich detection. Develop and maintain detection rules across SIEM and EDR platforms.
- Threat Intelligence Management: Collect, validate, and analyse threat data from multiple sources. Monitor emerging threats, vulnerabilities, and attack trends. Produce high-quality, actionable intelligence for internal teams and clients.
- Client Engagement & Reporting: Deliver clear, concise threat intelligence briefings. Create tailored reports for strategic, operational, and technical audiences. Translate complex technical findings into meaningful business impact.
- Collaboration & Continuous Improvement: Work closely with SOC analysts, incident responders, and engineering teams. Contribute to playbooks, automation, and threat-hunting maturity. Participate in service reviews and governance meetings.
- 2–3 years’ experience in threat intelligence and/or threat hunting.
- Strong understanding of MITRE ATT&CK, malware analysis, and adversary behaviour.
- Hands-on experience with Microsoft Sentinel, Defender XDR, and threat intelligence platforms.
- Proficiency in KQL, Python, or similar scripting/query languages.
- Excellent communication skills — comfortable presenting to clients.
- Analytical, detail-driven mindset with the ability to manage multiple investigations.
- Passion for cybersecurity and a desire to keep learning.
Quorum is an Employee-Owned Scottish company delivering custom technology solutions, infrastructure consultancy, and managed services to organisations ranging from major financial institutions to small businesses. We’re proud of our low staff turnover, collaborative culture, and genuine focus on work-life balance.
Our Benefits Include- Highly competitive salary.
- Contributory pension.
- Private healthcare.
- Buy & sell holidays.
- Paid home broadband.
- Annual personal technical training budget.
- Paid Microsoft certifications plus annual bonus for accreditations.
- Award-winning Family Friendly Working policies.
- And yes — we really are a nice bunch of people to work with.
Ready to apply? If you eat, sleep, and breathe technology — and want to build your threat intelligence career in a supportive, forward-thinking environment — we’d love to hear from you. Apply today and help us stay one step ahead of the threat.
Threat Intelligence Analyst in Edinburgh employer: Grupo Orsa
Contact Detail:
Grupo Orsa Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Threat Intelligence Analyst in Edinburgh
✨Tip Number 1
Network like a pro! Get out there and connect with folks in the cybersecurity field. Attend meetups, webinars, or even local events. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your threat hunting projects or any relevant work. This gives potential employers a taste of what you can do and sets you apart from the crowd.
✨Tip Number 3
Prepare for interviews by brushing up on your technical knowledge and communication skills. Practice explaining complex concepts in simple terms, as you'll need to convey risk and impact clearly to both tech teams and clients.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are genuinely interested in joining our team at Quorum.
We think you need these skills to ace Threat Intelligence Analyst in Edinburgh
Some tips for your application 🫡
Tailor Your CV: Make sure your CV reflects the skills and experiences that match the Threat Intelligence Analyst role. Highlight your experience with threat hunting, analysis, and any relevant tools like Microsoft Sentinel or Defender XDR.
Craft a Compelling Cover Letter: Use your cover letter to tell us why you're passionate about cybersecurity and how your background makes you a great fit for our team. Be sure to mention specific projects or achievements that showcase your analytical skills.
Showcase Your Communication Skills: Since you'll be translating complex findings into business impact, it's crucial to demonstrate your communication skills in your application. Use clear and concise language, and consider including examples of past presentations or reports you've created.
Apply Through Our Website: We encourage you to apply directly through our website. This way, we can ensure your application gets the attention it deserves, and you can easily keep track of your application status!
How to prepare for a job interview at Grupo Orsa
✨Know Your Threat Landscape
Before the interview, dive deep into current cyber threats and trends. Familiarise yourself with the MITRE ATT&CK framework and recent high-profile breaches. This will not only show your passion for cybersecurity but also demonstrate your proactive approach to threat intelligence.
✨Showcase Your Technical Skills
Be ready to discuss your hands-on experience with tools like Microsoft Sentinel and Defender XDR. Prepare examples of how you've used KQL or Python in past roles to analyse threats or automate processes. Real-world scenarios will make your skills stand out.
✨Communicate Clearly
Practice explaining complex technical concepts in simple terms. Since you'll need to present findings to clients and non-technical teams, being able to translate jargon into actionable insights is crucial. Consider doing mock presentations to refine this skill.
✨Engage with the Team
Quorum values collaboration, so be prepared to discuss how you've worked with SOC analysts or incident responders in the past. Highlight any contributions to playbooks or service reviews, as this shows your commitment to continuous improvement and teamwork.