Threat Intelligence Analyst

Threat Intelligence Analyst

Southampton Entry level 35000 - 40000 £ / year (est.) Home office (partial)
Go Premium
H

At a Glance

  • Tasks: Monitor dark web threats and produce actionable intelligence reports.
  • Company: Leading Managed Security Services Provider with a focus on cyber defence.
  • Benefits: Hybrid working, professional development, and pathways to industry certifications.
  • Why this job: Join a dynamic team and make a real impact in cybersecurity.
  • Qualifications: Experience in cyber investigations and strong OSINT skills required.
  • Other info: Exciting opportunities for career growth in a fast-paced environment.

The predicted salary is between 35000 - 40000 £ per year.

🚨 Hiring Now: Junior Threat Intelligence Analyst (SC Cleared) 🚨

Are you passionate about uncovering emerging threats, monitoring the dark web, and staying one step ahead of advanced cyber adversaries?

We’re looking for a Threat Intelligence Analyst to join our growing team within a leading

Managed Security Services Provider (MSSP).

You’ll play a vital role in monitoring and analysing the global threat landscape, working closely with offensive cyber, detection engineering, and incident response teams to deliver actionable intelligence that protects our clients.

✨ What’s in it for you?

  • Build expertise across multiple cyber domains — including offensive security, digital forensics, and malware analysis.
  • Get hands-on exposure to a wide variety of intelligence challenges, from dark web monitoring to strategic reporting.
  • Directly shape client security posture by delivering high-impact, actionable threat intelligence.

🔎 What you’ll be doing:

  • Monitoring dark/deep web activity to identify threats, breaches, and IOCs.
  • Performing OSINT investigations to support incident response, threat hunting, and attribution.
  • Producing clear, actionable intelligence reports for technical and non-technical audiences.
  • Collaborating with SOC, red team, and incident response functions.
  • Analysing adversary TTPs using MITRE ATT&CK and other frameworks.
  • Delivering threat assessments, briefings, and dashboards to clients.

✅ What we’re looking for:

  • Experience in CTI or cyber investigations (MSSP, SOC, or intel-led environment).
  • Strong OSINT skills with tools like Maltego, SpiderFoot, Shodan, Recon-ng.
  • Excellent report writing and communication skills.
  • Knowledge of threat actor motivations, malware types, and cybercrime ecosystems.
  • Familiarity with frameworks like MITRE ATT&CK, Diamond Model, Kill Chain.
  • Eligible for SC Clearance and working towards (or open to) CREST CPTIA/CRTIA.

💡 Benefits:

  • Hybrid working model.
  • Access to professional development across offensive, defensive, and forensic disciplines.
  • Pathways to industry-recognised certifications (CREST, SANS, etc.).

💷 Salary: £35,000 – £40,000

Threat Intelligence Analyst employer: Hamilton Barnes 🌳

Join a dynamic Managed Security Services Provider where your passion for cybersecurity will thrive. With a hybrid working model and a strong emphasis on professional development, you'll have the opportunity to build expertise across various cyber domains while directly impacting client security. Our collaborative work culture fosters growth and innovation, making it an ideal environment for those looking to advance their careers in threat intelligence.
H

Contact Detail:

Hamilton Barnes 🌳 Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Threat Intelligence Analyst

✨Tip Number 1

Network like a pro! Reach out to current employees in the field, attend industry events, and join relevant online communities. The more connections you make, the better your chances of landing that dream job.

✨Tip Number 2

Show off your skills! Create a portfolio or blog where you can share your insights on threat intelligence, OSINT investigations, or any projects you've worked on. This not only demonstrates your expertise but also makes you stand out to potential employers.

✨Tip Number 3

Prepare for interviews by brushing up on your knowledge of frameworks like MITRE ATT&CK and familiarising yourself with common threats. Practice articulating your thoughts clearly, especially when explaining complex concepts to non-technical audiences.

✨Tip Number 4

Don’t forget to apply through our website! We’re always on the lookout for passionate individuals who want to make a difference in the cyber world. Plus, it’s a great way to ensure your application gets the attention it deserves.

We think you need these skills to ace Threat Intelligence Analyst

Threat Intelligence Analysis
Dark Web Monitoring
OSINT Investigations
Report Writing
Communication Skills
Knowledge of Threat Actor Motivations
Malware Analysis
Cybercrime Ecosystems
Familiarity with MITRE ATT&CK
Experience in Cyber Investigations
Use of Tools like Maltego, SpiderFoot, Shodan, Recon-ng
Collaboration with SOC and Incident Response Teams
Analytical Skills
Ability to Deliver Actionable Intelligence

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the Threat Intelligence Analyst role. Highlight your experience in CTI or cyber investigations, and don’t forget to mention any tools you’ve used like Maltego or Shodan. We want to see how your skills match what we’re looking for!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about uncovering threats and how your background makes you a great fit for our team. Keep it engaging and relevant to the job description – we love a good story!

Show Off Your Report Writing Skills: Since excellent report writing is key for this role, consider including a sample of your work or summarising a past project where you produced actionable intelligence reports. This will give us a taste of your communication skills and attention to detail.

Apply Through Our Website: We encourage you to apply through our website for a smoother application process. It’s the best way for us to receive your application directly and ensures you don’t miss out on any important updates from our team!

How to prepare for a job interview at Hamilton Barnes 🌳

✨Know Your Threat Landscape

Before the interview, dive deep into the current threat landscape. Familiarise yourself with recent cyber incidents and trends, especially those relevant to the company’s focus. This will not only show your passion but also your proactive approach to understanding the field.

✨Master Your Tools

Make sure you’re well-versed in the OSINT tools mentioned in the job description, like Maltego and Shodan. Be prepared to discuss how you've used these tools in past experiences or hypothetical scenarios. Demonstrating practical knowledge can set you apart from other candidates.

✨Communicate Clearly

Since you'll be producing reports for both technical and non-technical audiences, practice explaining complex concepts in simple terms. During the interview, try to articulate your thoughts clearly and concisely, showcasing your communication skills.

✨Show Your Collaborative Spirit

Highlight any experience you have working in teams, especially in a SOC or MSSP environment. Discuss how you’ve collaborated with different functions like incident response or red teams. This will demonstrate that you’re a team player who can contribute to a collaborative work culture.

Threat Intelligence Analyst
Hamilton Barnes 🌳
Location: Southampton
Go Premium

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

H
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>