At a Glance
- Tasks: Lead a team in delivering complex threat monitoring projects for high-profile clients.
- Company: Moonshot, a forward-thinking organisation focused on social impact and diversity.
- Benefits: 30 days annual leave, private healthcare, mental health support, and generous parental leave.
- Why this job: Make a real difference by tackling online threats and supporting vulnerable communities.
- Qualifications: 3-5 years in analysis, project management skills, and technical fluency with OSINT tools.
- Other info: Join a dynamic team with a commitment to diversity and impactful work.
The predicted salary is between 46000 - 55000 £ per year.
Moonshot believes that marginalised people in society — including minority ethnic people, people from working class backgrounds, women, Disabled and LGBTQIA+ people — must be centred in the work we do. We strongly encourage applications from people with these identities or who are members of other communities who are currently underrepresented in our workforce. We know a diverse workforce will enable us to understand drivers behind violent extremism and online harms in an in-depth way and do better work to counter them. Candidates will be expected to undertake and pass a police check and additional checks for security clearance at an SC level - typically a minimum of three years’ continuous UK residency within the past five years.
About the role: Moonshot is recruiting a manager to coordinate delivery of a series of complex threat monitoring projects supporting high-profile clients. In this role, you will be responsible for supporting a team of analysts and to ensure that project delivery schedules are communicated effectively and delivered. You will also be expected to work to advance our research methodologies including working directly with Moonshot’s product engineering team to optimise existing methods and develop new technical solutions.
Your responsibilities will include:
- Operational Delivery & Team Leadership
- Manage day-to-day delivery operations across the threat monitoring portfolio.
- Assign analyst tasking and balance workloads to ensure coverage across multiple clients.
- Develop and maintain delivery schedules across varying cadences (daily, weekly, monthly, ad-hoc).
- Ability to write intelligence reports to a high standard.
- Provide guidance and feedback to analysts (team of 5) to maintain high analytical standards.
- Troubleshoot operational issues and elevate project risks appropriately.
- Coordinate rapid-response reporting when threats meet escalation thresholds.
- Technical Operations & Tool Management
- Coordinate day-to-day communication between analysts and Product Engineering team.
- Translate analyst operational needs into clear technical requirements for Product Engineering team.
- Support testing and validation of new collectors, models, and tool features.
- Troubleshoot technical issues with OSINT collectors and internal monitoring tools.
- Coordinate setup and maintenance of client-specific dashboards and monitoring configurations.
- Ensure analysts have functioning technical capabilities to conduct investigations.
- Stay current on tool capabilities and support training of analysts on technical features.
- Process Development & Standards
- Contribute to development of standard operating procedures and team policies (e.g., monitoring workflows, analyst safety protocols, escalation procedures).
- Support development and refinement of threat classification taxonomies and assessment methodologies.
- Develop quality assurance processes, templates, and style guides for intelligence reporting.
- Document technical procedures and delivery workflows.
- Identify process gaps and implement operational improvements.
- Stakeholder Coordination
- Translate complex technical and analytical findings into clear, actionable intelligence.
- Support coordination with legal and law enforcement partners on high-priority threats requiring intervention.
- Present findings to internal stakeholders and participate in client briefings.
- Work collaboratively across technical and analytical team members.
Essential:
- 3-5 years professional experience conducting analysis and investigations using open-source research, social media monitoring, and OSINT methods.
- Demonstrated experience using OSINT collection tools, social media monitoring platforms, or intelligence analysis software.
- Project management or delivery coordination experience managing multiple concurrent workstreams or clients.
- Strong technical aptitude with ability to quickly learn new tools and technical systems.
- Excellent analytical writing and editing skills with attention to detail and quality standards.
- Experience developing or contributing to analytical standards, SOPs, or process documentation.
- Ability to work under pressure in a fast-paced, high-operational-tempo environment.
- Strong organisational skills and ability to balance competing priorities.
- Excellent interpersonal and communication skills across technical and non-technical audiences.
- Ability to handle sensitive content including threats, harassment, abuse, and explicit material.
- Willingness to be on-call and occasionally work outside regular hours in response to incidents.
Desirable:
- Experience coordinating between analytical teams and technical/engineering teams.
- Background in threat assessment, risk analysis, or intelligence production.
- Experience managing or mentoring junior analysts.
- Familiarity with AI/ML models for content classification or threat detection.
- Understanding of major social media platforms, their technical features, and data access methods.
- Background in protective intelligence, threat management, or corporate security operations.
Benefits:
- 30 days' paid annual leave, excluding bank holidays.
- Private healthcare package with access to specialist mental health cover, including coverage for partners and children.
- Employee Assistance Programme providing access to mental health support.
- Generous maternity and paternity leave: 26 weeks paid maternity leave, 8 weeks paid paternity leave.
- All permanent employees are granted share options upon employment.
Salary: £46,000 - £55,000 (depending on skills and experience).
Threat Intelligence Manager employer: Moonshot
Contact Detail:
Moonshot Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Threat Intelligence Manager
✨Tip Number 1
Network like a pro! Reach out to people in the industry, attend events, and connect on LinkedIn. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Prepare for interviews by researching the company and its values. Understand their mission around diversity and inclusion, and be ready to discuss how your background and experiences align with their goals.
✨Tip Number 3
Showcase your skills through practical examples. Be ready to talk about specific projects you've managed or tools you've used, especially those related to OSINT and threat monitoring. This will help you stand out as a candidate.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen. Plus, we love seeing candidates who are proactive about their job search.
We think you need these skills to ace Threat Intelligence Manager
Some tips for your application 🫡
Tailor Your Application: Make sure to customise your CV and cover letter for the Threat Intelligence Manager role. Highlight your experience with OSINT tools and project management, and don’t forget to mention any relevant work with diverse teams or communities.
Showcase Your Writing Skills: Since you'll be writing intelligence reports, it’s crucial to demonstrate your analytical writing skills. Use clear, concise language in your application and provide examples of past reports or documents you've created that showcase your attention to detail.
Be Authentic: We value diversity and want to see the real you! Don’t hesitate to share your unique experiences and perspectives in your application. This is your chance to stand out and show how your background can contribute to our mission.
Apply Through Our Website: For the best chance of success, make sure to apply directly through our website. It’s the easiest way for us to keep track of your application and ensures you’re considered for the role!
How to prepare for a job interview at Moonshot
✨Know Your Stuff
Make sure you’re well-versed in OSINT tools and methods. Brush up on your knowledge of social media monitoring platforms and be ready to discuss how you've used them in past roles. This will show that you’re not just familiar with the technical side but can also apply it effectively.
✨Showcase Your Leadership Skills
As a Threat Intelligence Manager, you'll be leading a team. Prepare examples of how you've successfully managed teams or projects in the past. Highlight your ability to balance workloads and ensure timely delivery, as this is crucial for the role.
✨Communicate Clearly
You’ll need to translate complex findings into actionable intelligence. Practice explaining technical concepts in simple terms. This will demonstrate your communication skills and your ability to work with both technical and non-technical audiences.
✨Be Ready for Scenario Questions
Expect questions about how you would handle specific threats or operational issues. Think through potential scenarios related to threat monitoring and be prepared to discuss your approach to troubleshooting and escalation. This will show your problem-solving skills and readiness for high-pressure situations.