SOC Expert in Manchester

SOC Expert in Manchester

Manchester Full-Time No home office possible
M

Job Description<\/b>
<\/p>

We are seeking a highly experienced Cyber Threat Intelligence (CTI) Expert<\/b> to join a fast -growing, security -driven organization at the forefront of threat detection and mitigation. This is a critical role for candidates who excel at gathering, analysing, and operationalizing threat data to proactively defend enterprise environments against evolving cyber threats.
<\/p>

You will lead intelligence -driven detection strategies, collaborate with SOC and incident response teams, and provide expert -level analysis of APTs, malware, and attack patterns.
<\/p>

Job Responsibilities<\/b>
<\/p>

  • Collect, analyse, and interpret threat intelligence from open source (OSINT), closed source, and internal data feeds.
    <\/li>
  • Produce actionable intelligence reports, threat briefs, and risk assessments.
    <\/li>
  • Support SOC operations with threat context and priority setting.
    <\/li>
  • Identify and monitor Indicators of Compromise (IOCs) and Tactics, Techniques & Procedures (TTPs) using MITRE ATT&CK framework.
    <\/li>
  • Collaborate on play book development and threat detection use cases.
    <\/li>
  • Perform attribution and malware behavioural analysis to inform decision -making.
    <\/li>
  • Lead threat actor profiling and campaign analysis across APT, cybercrime, and hacktivist groups.
    <\/li>
  • Interface with external intel -sharing communities and CERTs.
    <\/li><\/ul>

    <\/div><\/span>

    Requirements<\/h3>Required Skills<\/b><\/p>Proven experience in cyber threat intelligence, threat hunting, or incident response<\/li>Proficiency in threat intel platforms (e.g., MISP, Anomali, ThreatConnect)<\/li>Strong knowledge of malware families, TTPs, and IOC tracking<\/li>Experience using SIEM, SOAR, and endpoint detection tools<\/li>Working knowledge of MITRE ATT&CK, Cyber Kill Chain, and Diamond Model<\/li>Ability to produce high -quality, executive -ready threat reports<\/li><\/ul><\/div>9. Desired Skills<\/b><\/p>Certifications such as GCTI, GREM, GCIA, CEH, or CISSP<\/li>Scripting or automation experience (Python, Bash, PowerShell)<\/li>Knowledge of geopolitical cyber risk and threat actor motivations<\/li>Familiarity with intel sharing standards (STIX/TAXII)<\/li><\/ul><\/div><\/span>Benefits<\/h3>Job Benefits<\/b><\/p>Competitive salary and bonus package<\/li>Remote or hybrid working options<\/li>Private healthcare & mental wellness support<\/li>Funded training and certifications (SANS, GIAC, CREST, etc.)<\/li>25+ days holiday + bank holidays<\/li>Pension scheme and life assurance<\/li><\/ul><\/div><\/span>

M

Contact Detail:

MastarRec Recruiting Team