At a Glance
- Tasks: Analyse and operationalise threat data to defend against cyber threats.
- Company: Fast-growing security-driven organisation leading in threat detection.
- Benefits: Competitive salary, remote work options, private healthcare, and funded training.
- Why this job: Join a critical role in shaping cybersecurity and making a real impact.
- Qualifications: Experience in cyber threat intelligence and proficiency in threat intel platforms.
- Other info: Dynamic environment with opportunities for professional growth and development.
The predicted salary is between 60000 - 80000 £ per year.
We are seeking a highly experienced Cyber Threat Intelligence (CTI) Expert to join a fast-growing, security-driven organization at the forefront of threat detection and mitigation. This is a critical role for candidates who excel at gathering, analysing, and operationalising threat data to proactively defend enterprise environments against evolving cyber threats.
Job Responsibilities
- Collect, analyse, and interpret threat intelligence from open source (OSINT), closed source, and internal data feeds.
- Produce actionable intelligence reports, threat briefs, and risk assessments.
- Support SOC operations with threat context and priority setting.
- Identify and monitor Indicators of Compromise (IOCs) and Tactics, Techniques & Procedures (TTPs) using the MITRE ATT&CK framework.
- Collaborate on play-book development and threat detection use cases.
- Perform attribution and malware behavioural analysis to inform decision-making.
- Lead threat actor profiling and campaign analysis across APT, cybercrime, and hacktivist groups.
- Interface with external intel-sharing communities and CERTs.
Required Skills
- Proven experience in cyber threat intelligence, threat hunting, or incident response.
- Proficiency in threat intel platforms (e.g., MISP, Anomali, ThreatConnect).
- Strong knowledge of malware families, TTPs, and IOC tracking.
- Experience using SIEM, SOAR, and endpoint detection tools.
- Working knowledge of MITRE ATT&CK, Cyber Kill Chain, and Diamond Model.
- Ability to produce high-quality, executive-ready threat reports.
Desired Skills
- Certifications such as GCTI, GREM, GCIA, CEH, or CISSP.
- Knowledge of geopolitical cyber risk and threat actor motivations.
- Familiarity with intel sharing standards (STIX/TAXII).
Benefits
- Competitive salary and bonus package.
- Remote or hybrid working options.
- Private healthcare & mental wellness support.
- Funded training and certifications (SANS, GIAC, CREST, etc.).
Cyber Threat Intelligence Expert – SOC | Threat Hunting | Incident Response in City of London employer: MastarRec
Contact Detail:
MastarRec Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Threat Intelligence Expert – SOC | Threat Hunting | Incident Response in City of London
✨Tip Number 1
Network like a pro! Get out there and connect with folks in the cyber threat intelligence space. Attend meetups, webinars, or even online forums. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your threat intelligence reports, analyses, or any relevant projects. This gives potential employers a taste of what you can do and sets you apart from the crowd.
✨Tip Number 3
Don’t just apply anywhere—target your applications! Research companies that align with your values and expertise in cyber threat intelligence. Tailor your approach to each one, highlighting how you can contribute to their specific needs.
✨Tip Number 4
Apply through our website! We’ve got loads of opportunities waiting for you. Plus, applying directly shows your enthusiasm and commitment to joining our team. Let’s get you started on this exciting journey!
We think you need these skills to ace Cyber Threat Intelligence Expert – SOC | Threat Hunting | Incident Response in City of London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Cyber Threat Intelligence role. Highlight your experience in threat hunting, incident response, and any relevant certifications. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber security and how your background makes you a perfect fit for our team. Keep it concise but impactful – we love a good story!
Showcase Your Technical Skills: Don’t forget to mention your proficiency with threat intel platforms and tools like SIEM and SOAR. We’re keen on candidates who can hit the ground running, so make sure we know what you bring to the table!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you don’t miss out on any important updates. Plus, we love seeing applications come in through our own channels!
How to prepare for a job interview at MastarRec
✨Know Your Threat Landscape
Before the interview, dive deep into current cyber threats and trends. Familiarise yourself with recent incidents and how they relate to the role. This will not only show your passion but also your proactive approach to threat intelligence.
✨Master the MITRE ATT&CK Framework
Since the job involves using the MITRE ATT&CK framework, make sure you can discuss it confidently. Be prepared to explain how you've applied it in past roles, and think of specific examples where it helped you identify or mitigate threats.
✨Prepare Actionable Intelligence Reports
Bring a sample of an actionable intelligence report you've created in the past. This will demonstrate your ability to produce high-quality reports and give the interviewers insight into your analytical skills and attention to detail.
✨Showcase Collaboration Skills
Highlight your experience working with SOC teams and external intel-sharing communities. Be ready to discuss how you've collaborated on playbook development or threat detection use cases, as teamwork is crucial in this role.