Threat Intelligence Analyst

Threat Intelligence Analyst

Fareham Full-Time 35000 - 40000 £ / year (est.) No home office possible
Go Premium
H

At a Glance

  • Tasks: Monitor dark web activity and analyse global threats to protect clients.
  • Company: Leading Managed Security Services Provider with a focus on innovation.
  • Benefits: Hybrid working, professional development, and pathways to industry certifications.
  • Why this job: Join a dynamic team and make a real impact in cybersecurity.
  • Qualifications: Experience in cyber investigations and strong OSINT skills required.
  • Other info: Exciting opportunities for career growth and skill enhancement.

The predicted salary is between 35000 - 40000 £ per year.

Hiring Now: Junior Threat Intelligence Analyst (SC Cleared)

Increase your chances of reaching the interview stage by reading the complete job description and applying promptly.

Are you passionate about uncovering emerging threats, monitoring the dark web, and staying one step ahead of advanced cyber adversaries?

We’re looking for a Threat Intelligence Analyst to join our growing team within a leading

Managed Security Services Provider (MSSP).

You’ll play a vital role in monitoring and analysing the global threat landscape, working closely with offensive cyber, detection engineering, and incident response teams to deliver actionable intelligence that protects our clients.

What’s in it for you?

  • Build expertise across multiple cyber domains — including offensive security, digital forensics, and malware analysis.
  • Get hands-on exposure to a wide variety of intelligence challenges, from dark web monitoring to strategic reporting.
  • Directly shape client security posture by delivering high-impact, actionable threat intelligence.

What you’ll be doing:

  • Monitoring dark/deep web activity to identify threats, breaches, and IOCs.
  • Performing OSINT investigations to support incident response, threat hunting, and attribution.
  • Producing clear, actionable intelligence reports for technical and non-technical audiences.
  • Collaborating with SOC, red team, and incident response functions.
  • Analysing adversary TTPs using MITRE ATT&CK and other frameworks.
  • Delivering threat assessments, briefings, and dashboards to clients.

What we’re looking for:

  • Experience in CTI or cyber investigations (MSSP, SOC, or intel-led environment).
  • Strong OSINT skills with tools like Maltego, SpiderFoot, Shodan, Recon-ng.
  • Excellent report writing and communication skills.
  • Knowledge of threat actor motivations, malware types, and cybercrime ecosystems.
  • Familiarity with frameworks like MITRE ATT&CK, Diamond Model, Kill Chain.
  • Eligible for SC Clearance and working towards (or open to) CREST CPTIA/CRTIA.

Benefits:

  • Hybrid working model.
  • Access to professional development across offensive, defensive, and forensic disciplines.
  • Pathways to industry-recognised certifications (CREST, SANS, etc.).

Salary: £35,000 – £40,000

Threat Intelligence Analyst employer: Hamilton Barnes?

Join a dynamic Managed Security Services Provider (MSSP) that prioritises employee growth and development in the ever-evolving field of cyber security. With a hybrid working model and access to industry-recognised certifications, you will have the opportunity to build expertise across multiple domains while collaborating with skilled professionals in a supportive work culture. This role not only allows you to make a significant impact on client security but also fosters a passion for continuous learning and innovation in a rapidly changing landscape.
H

Contact Detail:

Hamilton Barnes? Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Threat Intelligence Analyst

✨Tip Number 1

Network like a pro! Reach out to current employees in the field, attend industry events, and join relevant online communities. The more connections you make, the better your chances of landing that interview.

✨Tip Number 2

Show off your skills! Create a portfolio or blog where you can share your insights on threat intelligence, OSINT investigations, or even your thoughts on the latest cyber threats. This will demonstrate your passion and expertise to potential employers.

✨Tip Number 3

Prepare for interviews by brushing up on your knowledge of frameworks like MITRE ATT&CK and familiarising yourself with common tools used in the industry. Being able to discuss these topics confidently will set you apart from other candidates.

✨Tip Number 4

Don’t forget to apply through our website! We’re always on the lookout for passionate individuals who want to make a difference in the cyber world. Your dream job could be just a click away!

We think you need these skills to ace Threat Intelligence Analyst

Threat Intelligence Analysis
Dark Web Monitoring
OSINT Investigations
Report Writing
Communication Skills
Collaboration
Adversary TTP Analysis
MITRE ATT&CK Framework
Maltego
SpiderFoot
Shodan
Recon-ng
Knowledge of Cybercrime Ecosystems
Incident Response Support
Cyber Investigations

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights your experience in CTI or cyber investigations. We want to see how your skills align with the role, so don’t be shy about showcasing your OSINT skills and any relevant tools you've used.

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to express your passion for uncovering threats and your understanding of the cyber landscape. We love seeing genuine enthusiasm, so let your personality come through!

Showcase Your Report Writing Skills: Since you'll be producing intelligence reports, it's crucial to demonstrate your report writing abilities. Include examples of past reports or summaries that show you can communicate complex information clearly to both technical and non-technical audiences.

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re keen on joining our team!

How to prepare for a job interview at Hamilton Barnes?

✨Know Your Threat Landscape

Before the interview, brush up on the latest trends in cyber threats and vulnerabilities. Familiarise yourself with current events related to cyber security, especially those involving the dark web. This will not only show your passion for the field but also demonstrate your proactive approach to staying informed.

✨Master Your Tools

Make sure you’re comfortable discussing the OSINT tools mentioned in the job description, like Maltego and Shodan. Be prepared to share specific examples of how you've used these tools in past experiences. This will highlight your practical skills and readiness to contribute from day one.

✨Communicate Clearly

Since you'll be producing reports for both technical and non-technical audiences, practice explaining complex concepts in simple terms. During the interview, aim to articulate your thoughts clearly and concisely, showcasing your excellent communication skills that are crucial for this role.

✨Familiarise with Frameworks

Get to grips with frameworks like MITRE ATT&CK and the Diamond Model. Be ready to discuss how you’ve applied these frameworks in your previous work or studies. Showing that you can analyse adversary TTPs using these models will set you apart as a knowledgeable candidate.

Threat Intelligence Analyst
Hamilton Barnes?
Go Premium

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

H
  • Threat Intelligence Analyst

    Fareham
    Full-Time
    35000 - 40000 £ / year (est.)

    Application deadline: 2027-09-29

  • H

    Hamilton Barnes?

Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>