At a Glance
- Tasks: Analyse cyber threats and develop actionable intelligence to enhance security operations.
- Company: Join a leading cyber services organisation with a focus on innovation and collaboration.
- Benefits: Enjoy flexible working, generous holiday allowance, and community volunteering opportunities.
- Other info: Dynamic team environment with excellent career growth and learning opportunities.
- Why this job: Make a real impact in cyber defence while working with cutting-edge technology.
- Qualifications: Experience in cyber threat intelligence and strong analytical skills required.
The predicted salary is between 55000 - 65000 ÂŁ per year.
The purpose of this role is to strengthen the organisation’s cyber defence capabilities by generating high‑quality, actionable threat intelligence that informs detection, response, and strategic decision‑making. The position exists to proactively identify, analyse, and communicate emerging threats, including adversary behaviours, malware, and infrastructure, while ensuring intelligence outputs are operationally relevant, technically robust, and aligned to business and security priorities. Operating across the full intelligence lifecycle, the role transforms complex technical findings into meaningful insights for both technical and non‑technical stakeholders, enabling the organisation to anticipate adversary activity, enhance detection engineering, support incident response, and advance intelligence‑led security operations. The role also contributes to continuous improvement through research, tooling development, collaboration with wider security teams, and active participation in the broader threat intelligence community.
Key Responsibilities
- Threat Intelligence Analysis and Research: Identify, track, and document threat actors, their TTPs, infrastructure, and indicators of compromise across the full intelligence lifecycle. Monitor and analyse Command and Control (C2) infrastructures, malicious domains, and emerging campaigns, providing context‑rich assessments that combine technical findings with geopolitical and regional context. Map observed threat activity to established frameworks (e.g., MITRE ATT&CK) and produce structured intelligence outputs using formats such as STIX/TAXII. Conduct technical analysis of malware samples to support intelligence assessments, including static and dynamic analysis to extract configurations, identify capabilities, and attribute activity to known threat actors. Stay current with the evolving threat landscape, proactively identifying emerging threats, novel attack vectors, and shifts in adversary tradecraft.
- Documentation and Reporting: Produce high‑quality finished intelligence products, including threat actor profiles, campaign analyses, and technical advisories, suitable for both technical and non‑technical audiences. Document and report on malware behaviour, TTPs, and indicators derived from technical analysis, leveraging internal TIP tooling to generate and disseminate IoCs. Contribute to external communications through blog posts, conference presentations, or published research that highlights significant threat intelligence findings. Respond to Requests for Information (RFIs) from internal and external stakeholders, delivering timely, actionable intelligence.
- Tool Development and Detection: Develop and maintain detection signatures such as YARA rules based on malware analysis and threat research. Identify network and host‑based detection opportunities. Manage and optimise threat intelligence platforms, sources, and feeds to improve analysis efficiency and intelligence output quality. Develop scripts and tooling to support analysis workflows, including automation of intelligence collection, enrichment, or dissemination tasks. Evaluate and recommend new tools or platforms to strengthen the team's analytical capabilities.
- Collaboration and Information Sharing: Support and mentor other analysts within the GTI team, providing guidance on analytical tradecraft and technical methodology. Work closely with DFIR and SOC teams to provide threat context, malware insights, and intelligence support during investigations and incidents. Generate detection leads from intelligence and malware analysis, maintaining a structured handoff process. Contribute to intelligence‑led threat hunting by producing targeted threat assessments and hypotheses for the threat hunting team, and maintaining a feedback loop on findings. Partner with external partners, information‑sharing communities, and industry forums to maintain situational awareness and contribute to collective defence.
Skills, Knowledge & Expertise
- Core Skills and Experience: Demonstrated experience in Cyber Threat Intelligence analysis with a strong understanding of the intelligence lifecycle, including experience in threat actor tracking, APT research, and C2 infrastructure analysis. Strong understanding of networking protocols (e.g., TCP/IP, DNS) and how adversaries leverage network infrastructure. Familiarity with frameworks such as MITRE ATT&CK and structured intelligence formats, including STIX/TAXII. Experience supporting or interfacing with DFIR and SOC teams in an operational capacity. Understanding of offensive security reconnaissance and attacker methodologies.
- Desirable Skills and Experience: Experience performing triage‑level malware analysis, including behavioural analysis, sandbox detonation, and basic static analysis. Exposure to reverse engineering tools is beneficial but not essential. Experience developing YARA rules and other detection signatures based on technical analysis. Familiarity with programming or scripting languages such as Python for developing analysis tools, automation, and data processing. Experience with threat intelligence platforms such as OpenCTI, MISP, or similar. Exposure to geopolitical risk analysis and its impact on the cyber threat landscape. Track record of published research, blog posts, or conference presentations in the threat intelligence domain.
Qualifications (desired but not required): Certifications such as SANS FOR578 (Cyber Threat Intelligence), CREST Threat Intelligence Analyst (CRTIA), GREM, or equivalent.
Ways of working: Focusing on Clients and Customers. Working as One NCC. Always Learning. Being Inclusive and Respectful. Delivering Brilliantly.
Job Benefits:
- Flexible Working: Balance your work and personal life with our flexible working options.
- Generous Holiday Allowance: Enjoy 25 days of holiday, plus bank holidays, with the option to buy up to 5 additional days of annual leave.
- Medicash & Critical Illness Scheme Financial & Investment Benefits: Enjoy peace of mind with our Pension, Life Assurance, and Share Save Scheme.
- Community & Volunteering Programmes: Make a difference in your community with our volunteering opportunities.
- Green Car Scheme: Drive green and save money with our eco‑friendly car scheme.
- Cycle Scheme: Stay fit and healthy with our cycle‑to‑work scheme.
- Special Time Off: Take time off for those big moments in life, like getting married/entering into a civil partnership, becoming a grandparent, and welcoming home a new pet.
- Family Planning: Benefit from our generous maternity and paternity leave, as well as time off and support for those undergoing fertility treatments.
Senior Analyst - Tactical Intelligence in Manchester employer: NCC Group plc
Contact Detail:
NCC Group plc Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior Analyst - Tactical Intelligence in Manchester
✨Tip Number 1
Network like a pro! Reach out to folks in the industry on LinkedIn or at events. A friendly chat can lead to opportunities that aren’t even advertised yet.
✨Tip Number 2
Show off your skills! Create a portfolio or blog where you share your insights on threat intelligence. This not only showcases your expertise but also gets you noticed by potential employers.
✨Tip Number 3
Prepare for interviews by practising common questions and scenarios related to cyber threat intelligence. We recommend doing mock interviews with friends or mentors to boost your confidence.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive!
We think you need these skills to ace Senior Analyst - Tactical Intelligence in Manchester
Some tips for your application 🫡
Tailor Your Application: Make sure to customise your CV and cover letter for the Senior Analyst role. Highlight your experience in cyber threat intelligence and how it aligns with the job description. We want to see how your skills can strengthen our cyber defence capabilities!
Showcase Your Skills: Don’t just list your skills; demonstrate them! Use specific examples from your past work that show your understanding of the intelligence lifecycle and your ability to produce actionable insights. We love seeing real-world applications of your expertise.
Be Clear and Concise: When writing your application, keep it clear and to the point. Avoid jargon unless necessary, and make sure your key achievements stand out. We appreciate straightforward communication that gets right to the heart of your qualifications.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, you’ll find all the details about the role and our company culture there!
How to prepare for a job interview at NCC Group plc
✨Know Your Threat Landscape
Before the interview, dive deep into the current cyber threat landscape. Familiarise yourself with recent high-profile attacks and emerging threats. This will not only show your passion for the field but also help you discuss relevant examples during the interview.
✨Master the Intelligence Lifecycle
Make sure you understand the full intelligence lifecycle and can articulate how you've applied it in past roles. Be ready to discuss specific instances where your analysis led to actionable insights or improved security measures.
✨Showcase Your Technical Skills
Prepare to demonstrate your technical expertise, especially in areas like malware analysis and detection signature development. Bring examples of YARA rules or scripts you've created, and be ready to explain your thought process behind them.
✨Engage with Real-World Scenarios
Expect scenario-based questions that assess your analytical skills and decision-making. Practice articulating how you would approach identifying and responding to a new threat, using frameworks like MITRE ATT&CK to structure your response.