At a Glance
- Tasks: Monitor dark web threats and produce actionable intelligence reports.
- Company: Leading Managed Security Services Provider with a focus on cyber defence.
- Benefits: Hybrid working, professional development, and pathways to industry certifications.
- Why this job: Join a dynamic team and make a real impact in cybersecurity.
- Qualifications: Experience in cyber investigations and strong OSINT skills required.
- Other info: Exciting opportunities for career growth in a fast-paced environment.
The predicted salary is between 35000 - 40000 £ per year.
🚨 Hiring Now: Junior Threat Intelligence Analyst (SC Cleared) 🚨
Are you passionate about uncovering emerging threats, monitoring the dark web, and staying one step ahead of advanced cyber adversaries?
We’re looking for a Threat Intelligence Analyst to join our growing team within a leading
Managed Security Services Provider (MSSP).
You’ll play a vital role in monitoring and analysing the global threat landscape, working closely with offensive cyber, detection engineering, and incident response teams to deliver actionable intelligence that protects our clients.
✨ What’s in it for you?
- Build expertise across multiple cyber domains — including offensive security, digital forensics, and malware analysis.
- Get hands-on exposure to a wide variety of intelligence challenges, from dark web monitoring to strategic reporting.
- Directly shape client security posture by delivering high-impact, actionable threat intelligence.
🔎 What you’ll be doing:
- Monitoring dark/deep web activity to identify threats, breaches, and IOCs.
- Performing OSINT investigations to support incident response, threat hunting, and attribution.
- Producing clear, actionable intelligence reports for technical and non-technical audiences.
- Collaborating with SOC, red team, and incident response functions.
- Analysing adversary TTPs using MITRE ATT&CK and other frameworks.
- Delivering threat assessments, briefings, and dashboards to clients.
✅ What we’re looking for:
- Experience in CTI or cyber investigations (MSSP, SOC, or intel-led environment).
- Strong OSINT skills with tools like Maltego, SpiderFoot, Shodan, Recon-ng.
- Excellent report writing and communication skills.
- Knowledge of threat actor motivations, malware types, and cybercrime ecosystems.
- Familiarity with frameworks like MITRE ATT&CK, Diamond Model, Kill Chain.
- Eligible for SC Clearance and working towards (or open to) CREST CPTIA/CRTIA.
💡 Benefits:
- Hybrid working model.
- Access to professional development across offensive, defensive, and forensic disciplines.
- Pathways to industry-recognised certifications (CREST, SANS, etc.).
💷 Salary: £35,000 – £40,000
Threat Intelligence Analyst employer: Hamilton Barnes 🌳
Contact Detail:
Hamilton Barnes 🌳 Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Threat Intelligence Analyst
✨Tip Number 1
Network like a pro! Reach out to current employees in the field, attend industry events, and join relevant online communities. The more connections you make, the better your chances of landing that dream job.
✨Tip Number 2
Show off your skills! Create a portfolio or blog where you can share your insights on threat intelligence, OSINT investigations, or any projects you've worked on. This not only demonstrates your expertise but also makes you stand out to potential employers.
✨Tip Number 3
Prepare for interviews by brushing up on your knowledge of frameworks like MITRE ATT&CK and familiarising yourself with common threats. Practice articulating your thoughts clearly, especially when explaining complex concepts to non-technical audiences.
✨Tip Number 4
Don’t forget to apply through our website! We’re always on the lookout for passionate individuals who want to make a difference in the cyber world. Plus, it’s a great way to ensure your application gets the attention it deserves.
We think you need these skills to ace Threat Intelligence Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Threat Intelligence Analyst role. Highlight your experience in CTI or cyber investigations, and don’t forget to mention any tools you’ve used like Maltego or Shodan. We want to see how your skills match what we’re looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about uncovering threats and how your background makes you a great fit for our team. Keep it engaging and relevant to the job description – we love a good story!
Show Off Your Report Writing Skills: Since excellent report writing is key for this role, consider including a sample of your work or summarising a past project where you produced actionable intelligence reports. This will give us a taste of your communication skills and attention to detail.
Apply Through Our Website: We encourage you to apply through our website for a smoother application process. It’s the best way for us to receive your application directly and ensures you don’t miss out on any important updates from our team!
How to prepare for a job interview at Hamilton Barnes 🌳
✨Know Your Threat Landscape
Before the interview, dive deep into the current threat landscape. Familiarise yourself with recent cyber incidents and trends, especially those relevant to the company’s focus. This will not only show your passion but also your proactive approach to understanding the field.
✨Master Your Tools
Make sure you’re well-versed in the OSINT tools mentioned in the job description, like Maltego and Shodan. Be prepared to discuss how you've used these tools in past experiences or hypothetical scenarios. Demonstrating practical knowledge can set you apart from other candidates.
✨Communicate Clearly
Since you'll be producing reports for both technical and non-technical audiences, practice explaining complex concepts in simple terms. During the interview, try to articulate your thoughts clearly and concisely, showcasing your communication skills.
✨Show Your Collaborative Spirit
Highlight any experience you have working in teams, especially in a SOC or MSSP environment. Discuss how you’ve collaborated with different functions like incident response or red teams. This will demonstrate that you’re a team player who can contribute to a collaborative work culture.