Cyber Threat Intelligence Expert – SOC | Threat Hunting | Incident Response in City of London
Cyber Threat Intelligence Expert – SOC | Threat Hunting | Incident Response

Cyber Threat Intelligence Expert – SOC | Threat Hunting | Incident Response in City of London

City of London Full-Time 60000 - 80000 £ / year (est.) Home office (partial)
Go Premium
M

At a Glance

  • Tasks: Analyse and operationalise threat data to defend against cyber threats.
  • Company: Fast-growing security-driven organisation leading in threat detection.
  • Benefits: Competitive salary, remote work options, private healthcare, and funded training.
  • Why this job: Join a critical role in shaping cybersecurity and making a real impact.
  • Qualifications: Experience in cyber threat intelligence and proficiency in threat intel platforms.
  • Other info: Dynamic environment with opportunities for professional growth and development.

The predicted salary is between 60000 - 80000 £ per year.

We are seeking a highly experienced Cyber Threat Intelligence (CTI) Expert to join a fast-growing, security-driven organization at the forefront of threat detection and mitigation. This is a critical role for candidates who excel at gathering, analysing, and operationalising threat data to proactively defend enterprise environments against evolving cyber threats.

Job Responsibilities

  • Collect, analyse, and interpret threat intelligence from open source (OSINT), closed source, and internal data feeds.
  • Produce actionable intelligence reports, threat briefs, and risk assessments.
  • Support SOC operations with threat context and priority setting.
  • Identify and monitor Indicators of Compromise (IOCs) and Tactics, Techniques & Procedures (TTPs) using the MITRE ATT&CK framework.
  • Collaborate on play-book development and threat detection use cases.
  • Perform attribution and malware behavioural analysis to inform decision-making.
  • Lead threat actor profiling and campaign analysis across APT, cybercrime, and hacktivist groups.
  • Interface with external intel-sharing communities and CERTs.

Required Skills

  • Proven experience in cyber threat intelligence, threat hunting, or incident response.
  • Proficiency in threat intel platforms (e.g., MISP, Anomali, ThreatConnect).
  • Strong knowledge of malware families, TTPs, and IOC tracking.
  • Experience using SIEM, SOAR, and endpoint detection tools.
  • Working knowledge of MITRE ATT&CK, Cyber Kill Chain, and Diamond Model.
  • Ability to produce high-quality, executive-ready threat reports.

Desired Skills

  • Certifications such as GCTI, GREM, GCIA, CEH, or CISSP.
  • Knowledge of geopolitical cyber risk and threat actor motivations.
  • Familiarity with intel sharing standards (STIX/TAXII).

Benefits

  • Competitive salary and bonus package.
  • Remote or hybrid working options.
  • Private healthcare & mental wellness support.
  • Funded training and certifications (SANS, GIAC, CREST, etc.).

Cyber Threat Intelligence Expert – SOC | Threat Hunting | Incident Response in City of London employer: MastarRec

Join a dynamic and innovative organisation in London that prioritises security and employee development. As a Cyber Threat Intelligence Expert, you will benefit from a competitive salary, flexible working arrangements, and comprehensive healthcare support, all while contributing to cutting-edge threat detection initiatives. With a strong emphasis on continuous learning through funded training and certifications, this role offers a unique opportunity for professional growth in a collaborative and forward-thinking environment.
M

Contact Detail:

MastarRec Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Cyber Threat Intelligence Expert – SOC | Threat Hunting | Incident Response in City of London

Tip Number 1

Network like a pro! Get out there and connect with folks in the cyber threat intelligence space. Attend meetups, webinars, or even online forums. You never know who might have the inside scoop on job openings or can put in a good word for you.

Tip Number 2

Show off your skills! Create a portfolio showcasing your threat intelligence reports, analyses, or any relevant projects. This gives potential employers a taste of what you can do and sets you apart from the crowd.

Tip Number 3

Don’t just apply anywhere—target your applications! Research companies that align with your values and expertise in cyber threat intelligence. Tailor your approach to each one, highlighting how you can contribute to their specific needs.

Tip Number 4

Apply through our website! We’ve got loads of opportunities waiting for you. Plus, applying directly shows your enthusiasm and commitment to joining our team. Let’s get you started on this exciting journey!

We think you need these skills to ace Cyber Threat Intelligence Expert – SOC | Threat Hunting | Incident Response in City of London

Cyber Threat Intelligence
Threat Hunting
Incident Response
Data Analysis
Open Source Intelligence (OSINT)
Threat Context and Priority Setting
Indicators of Compromise (IOCs)
Tactics, Techniques & Procedures (TTPs)
MITRE ATT&CK Framework
Malware Behavioural Analysis
Threat Actor Profiling
SIEM Tools
SOAR Tools
Endpoint Detection Tools
Threat Reporting

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the Cyber Threat Intelligence role. Highlight your experience in threat hunting, incident response, and any relevant certifications. We want to see how your skills match what we're looking for!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber security and how your background makes you a perfect fit for our team. Keep it concise but impactful – we love a good story!

Showcase Your Technical Skills: Don’t forget to mention your proficiency with threat intel platforms and tools like SIEM and SOAR. We’re keen on candidates who can hit the ground running, so make sure we know what you bring to the table!

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you don’t miss out on any important updates. Plus, we love seeing applications come in through our own channels!

How to prepare for a job interview at MastarRec

Know Your Threat Landscape

Before the interview, dive deep into current cyber threats and trends. Familiarise yourself with recent incidents and how they relate to the role. This will not only show your passion but also your proactive approach to threat intelligence.

Master the MITRE ATT&CK Framework

Since the job involves using the MITRE ATT&CK framework, make sure you can discuss it confidently. Be prepared to explain how you've applied it in past roles, and think of specific examples where it helped you identify or mitigate threats.

Prepare Actionable Intelligence Reports

Bring a sample of an actionable intelligence report you've created in the past. This will demonstrate your ability to produce high-quality reports and give the interviewers insight into your analytical skills and attention to detail.

Showcase Collaboration Skills

Highlight your experience working with SOC teams and external intel-sharing communities. Be ready to discuss how you've collaborated on playbook development or threat detection use cases, as teamwork is crucial in this role.

Cyber Threat Intelligence Expert – SOC | Threat Hunting | Incident Response in City of London
MastarRec
Location: City of London
Go Premium

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>