At a Glance
- Tasks: Monitor dark web activity and analyse global threats to protect clients.
- Company: Leading Managed Security Services Provider with a focus on innovation.
- Benefits: Hybrid working, professional development, and pathways to industry certifications.
- Why this job: Join a dynamic team and make a real impact in cybersecurity.
- Qualifications: Experience in cyber investigations and strong OSINT skills required.
- Other info: Exciting opportunities for career growth and skill enhancement.
The predicted salary is between 35000 - 40000 £ per year.
Hiring Now: Junior Threat Intelligence Analyst (SC Cleared)
Increase your chances of reaching the interview stage by reading the complete job description and applying promptly.
Are you passionate about uncovering emerging threats, monitoring the dark web, and staying one step ahead of advanced cyber adversaries?
We’re looking for a Threat Intelligence Analyst to join our growing team within a leading
Managed Security Services Provider (MSSP).
You’ll play a vital role in monitoring and analysing the global threat landscape, working closely with offensive cyber, detection engineering, and incident response teams to deliver actionable intelligence that protects our clients.
What’s in it for you?
- Build expertise across multiple cyber domains — including offensive security, digital forensics, and malware analysis.
- Get hands-on exposure to a wide variety of intelligence challenges, from dark web monitoring to strategic reporting.
- Directly shape client security posture by delivering high-impact, actionable threat intelligence.
What you’ll be doing:
- Monitoring dark/deep web activity to identify threats, breaches, and IOCs.
- Performing OSINT investigations to support incident response, threat hunting, and attribution.
- Producing clear, actionable intelligence reports for technical and non-technical audiences.
- Collaborating with SOC, red team, and incident response functions.
- Analysing adversary TTPs using MITRE ATT&CK and other frameworks.
- Delivering threat assessments, briefings, and dashboards to clients.
What we’re looking for:
- Experience in CTI or cyber investigations (MSSP, SOC, or intel-led environment).
- Strong OSINT skills with tools like Maltego, SpiderFoot, Shodan, Recon-ng.
- Excellent report writing and communication skills.
- Knowledge of threat actor motivations, malware types, and cybercrime ecosystems.
- Familiarity with frameworks like MITRE ATT&CK, Diamond Model, Kill Chain.
- Eligible for SC Clearance and working towards (or open to) CREST CPTIA/CRTIA.
Benefits:
- Hybrid working model.
- Access to professional development across offensive, defensive, and forensic disciplines.
- Pathways to industry-recognised certifications (CREST, SANS, etc.).
Salary: £35,000 – £40,000
Threat Intelligence Analyst employer: Hamilton Barnes?
Contact Detail:
Hamilton Barnes? Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Threat Intelligence Analyst
✨Tip Number 1
Network like a pro! Reach out to current employees in the field, attend industry events, and join relevant online communities. The more connections you make, the better your chances of landing that interview.
✨Tip Number 2
Show off your skills! Create a portfolio or blog where you can share your insights on threat intelligence, OSINT investigations, or even your thoughts on the latest cyber threats. This will demonstrate your passion and expertise to potential employers.
✨Tip Number 3
Prepare for interviews by brushing up on your knowledge of frameworks like MITRE ATT&CK and familiarising yourself with common tools used in the industry. Being able to discuss these topics confidently will set you apart from other candidates.
✨Tip Number 4
Don’t forget to apply through our website! We’re always on the lookout for passionate individuals who want to make a difference in the cyber world. Your dream job could be just a click away!
We think you need these skills to ace Threat Intelligence Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience in CTI or cyber investigations. We want to see how your skills align with the role, so don’t be shy about showcasing your OSINT skills and any relevant tools you've used.
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to express your passion for uncovering threats and your understanding of the cyber landscape. We love seeing genuine enthusiasm, so let your personality come through!
Showcase Your Report Writing Skills: Since you'll be producing intelligence reports, it's crucial to demonstrate your report writing abilities. Include examples of past reports or summaries that show you can communicate complex information clearly to both technical and non-technical audiences.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re keen on joining our team!
How to prepare for a job interview at Hamilton Barnes?
✨Know Your Threat Landscape
Before the interview, brush up on the latest trends in cyber threats and vulnerabilities. Familiarise yourself with current events related to cyber security, especially those involving the dark web. This will not only show your passion for the field but also demonstrate your proactive approach to staying informed.
✨Master Your Tools
Make sure you’re comfortable discussing the OSINT tools mentioned in the job description, like Maltego and Shodan. Be prepared to share specific examples of how you've used these tools in past experiences. This will highlight your practical skills and readiness to contribute from day one.
✨Communicate Clearly
Since you'll be producing reports for both technical and non-technical audiences, practice explaining complex concepts in simple terms. During the interview, aim to articulate your thoughts clearly and concisely, showcasing your excellent communication skills that are crucial for this role.
✨Familiarise with Frameworks
Get to grips with frameworks like MITRE ATT&CK and the Diamond Model. Be ready to discuss how you’ve applied these frameworks in your previous work or studies. Showing that you can analyse adversary TTPs using these models will set you apart as a knowledgeable candidate.