At a Glance
- Tasks: Lead a team in delivering complex threat monitoring projects for high-profile clients.
- Company: Moonshot, a forward-thinking organisation focused on diversity and inclusion.
- Benefits: 30 days annual leave, private healthcare, mental health support, and share options.
- Other info: Dynamic role with opportunities for professional growth and collaboration.
- Why this job: Make a real impact by countering online threats and supporting diverse communities.
- Qualifications: 3-5 years in analysis, project management, and OSINT tools experience required.
The predicted salary is between 46000 - 55000 € per year.
Moonshot believes that marginalised people in society — including minority ethnic people, people from working class backgrounds, women, Disabled and LGBTQIA+ people — must be centred in the work we do. We strongly encourage applications from people with these identities or who are members of other communities who are currently underrepresented in our workforce. We know a diverse workforce will enable us to understand drivers behind violent extremism and online harms in an in-depth way and do better work to counter them. Candidates will be expected to undertake and pass a police check and additional checks for security clearance at an SC level - typically a minimum of three years’ continuous UK residency within the past five years.
About the role: Moonshot is recruiting a manager to coordinate delivery of a series of complex threat monitoring projects supporting high-profile clients. In this role, you will be responsible for supporting a team of analysts and to ensure that project delivery schedules are communicated effectively and delivered. You will also be expected to work to advance our research methodologies including working directly with Moonshot’s product engineering team to optimise existing methods and develop new technical solutions.
Your responsibilities will include:
- Operational Delivery & Team Leadership
- Manage day-to-day delivery operations across the threat monitoring portfolio.
- Assign analyst tasking and balance workloads to ensure coverage across multiple clients.
- Develop and maintain delivery schedules across varying cadences (daily, weekly, monthly, ad-hoc).
- Ability to write intelligence reports to a high standard.
- Provide guidance and feedback to analysts (team of 5) to maintain high analytical standards.
- Troubleshoot operational issues and elevate project risks appropriately.
- Coordinate rapid-response reporting when threats meet escalation thresholds.
- Technical Operations & Tool Management
- Coordinate day-to-day communication between analysts and Product Engineering team.
- Translate analyst operational needs into clear technical requirements for Product Engineering team.
- Support testing and validation of new collectors, models, and tool features.
- Troubleshoot technical issues with OSINT collectors and internal monitoring tools.
- Coordinate setup and maintenance of client-specific dashboards and monitoring configurations.
- Ensure analysts have functioning technical capabilities to conduct investigations.
- Stay current on tool capabilities and support training of analysts on technical features.
- Process Development & Standards
- Contribute to development of standard operating procedures and team policies (e.g., monitoring workflows, analyst safety protocols, escalation procedures).
- Support development and refinement of threat classification taxonomies and assessment methodologies.
- Develop quality assurance processes, templates, and style guides for intelligence reporting.
- Document technical procedures and delivery workflows.
- Identify process gaps and implement operational improvements.
- Stakeholder Coordination
- Translate complex technical and analytical findings into clear, actionable intelligence.
- Support coordination with legal and law enforcement partners on high-priority threats requiring intervention.
- Present findings to internal stakeholders and participate in client briefings.
- Work collaboratively across technical and analytical team members.
Essential:
- 3-5 years professional experience conducting analysis and investigations using open-source research, social media monitoring, and OSINT methods.
- Demonstrated experience using OSINT collection tools, social media monitoring platforms, or intelligence analysis software.
- Project management or delivery coordination experience managing multiple concurrent workstreams or clients.
- Strong technical aptitude with ability to quickly learn new tools and technical systems.
- Excellent analytical writing and editing skills with attention to detail and quality standards.
- Experience developing or contributing to analytical standards, SOPs, or process documentation.
- Ability to work under pressure in a fast-paced, high-operational-tempo environment.
- Strong organisational skills and ability to balance competing priorities.
- Excellent interpersonal and communication skills across technical and non-technical audiences.
- Ability to handle sensitive content including threats, harassment, abuse, and explicit material.
- Willingness to be on-call and occasionally work outside regular hours in response to incidents.
Desirable:
- Experience coordinating between analytical teams and technical/engineering teams.
- Background in threat assessment, risk analysis, or intelligence production.
- Experience managing or mentoring junior analysts.
- Familiarity with AI/ML models for content classification or threat detection.
- Understanding of major social media platforms, their technical features, and data access methods.
- Background in protective intelligence, threat management, or corporate security operations.
Benefits:
- 30 days' paid annual leave, excluding bank holidays.
- Private healthcare package with access to specialist mental health cover, including coverage for partners and children.
- Employee Assistance Programme providing access to mental health support.
- Generous maternity and paternity leave: 26 weeks paid maternity leave, 8 weeks paid paternity leave.
- All permanent employees are granted share options upon employment.
Salary: £46,000 - £55,000 (depending on skills and experience).
Threat Intelligence Manager - Talent Pool employer: Moonshot
Moonshot is an exceptional employer that prioritises diversity and inclusion, creating a supportive work environment for individuals from marginalised communities. With a strong focus on employee well-being, we offer generous benefits such as 30 days of paid annual leave, private healthcare, and extensive parental leave, alongside opportunities for professional growth in a dynamic and impactful role. Our collaborative culture encourages innovation and the development of cutting-edge solutions to address complex global challenges, making it a rewarding place to advance your career in threat intelligence.
StudySmarter Expert Advice🤫
We think this is how you could land Threat Intelligence Manager - Talent Pool
✨Tip Number 1
Network like a pro! Reach out to people in the industry, attend events, and connect on LinkedIn. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Prepare for interviews by researching the company and its values. Understand their mission around diversity and inclusion, and be ready to discuss how your background and experiences align with that.
✨Tip Number 3
Showcase your skills! Bring examples of your past work, especially any projects related to threat intelligence or OSINT methods. This will help you stand out and demonstrate your expertise.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen. Plus, we love seeing candidates who are proactive about their job search.
We think you need these skills to ace Threat Intelligence Manager - Talent Pool
Some tips for your application 🫡
Be Yourself:When you're writing your application, let your personality shine through! We want to get to know the real you, so don’t be afraid to share your unique experiences and perspectives.
Tailor Your Application:Make sure to customise your application for the Threat Intelligence Manager role. Highlight your relevant experience with OSINT tools and project management, and show us how you can contribute to our mission at Moonshot.
Showcase Your Skills:Use specific examples to demonstrate your analytical writing and technical skills. We love seeing how you've tackled challenges in the past, especially in high-pressure situations!
Apply Through Our Website:We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for this exciting opportunity!
How to prepare for a job interview at Moonshot
✨Know Your Stuff
Make sure you brush up on your knowledge of OSINT tools and methods. Familiarise yourself with the latest trends in threat intelligence and be ready to discuss how you've used these tools in past roles. This will show that you're not just a manager but also technically fluent.
✨Showcase Your Leadership Skills
Prepare examples of how you've successfully managed teams and projects in high-pressure environments. Highlight your experience in balancing workloads and ensuring timely delivery of client projects. This will demonstrate your ability to lead the Threat Monitoring team effectively.
✨Communicate Clearly
Practice translating complex technical concepts into simple, actionable insights. You’ll need to communicate effectively with both analysts and the Product Engineering team, so being able to convey your thoughts clearly is crucial. Consider doing mock interviews to refine this skill.
✨Emphasise Your Adaptability
Be ready to discuss how you've handled operational challenges in the past. Moonshot values candidates who can adapt quickly to changing circumstances, so share specific examples of how you've navigated unexpected issues while maintaining high standards.