At a Glance
- Tasks: Join our Cyber Threat team to analyse and share actionable threat intelligence.
- Company: Be part of a growing company serving high-profile clients in cybersecurity.
- Benefits: Enjoy hybrid work, 25 days leave, health plan, life assurance, and flexible benefits.
- Why this job: Make a real impact on client security while collaborating with talented professionals.
- Qualifications: Strong analytical skills and knowledge of cybersecurity frameworks required; degree preferred.
- Other info: DV Clearance eligibility is necessary; apply even if unsure about your fit!
The predicted salary is between 43200 - 72000 £ per year.
We are building a Cyber Threat team. It\’s a great time to join us in our expansion, working with a portfolio of high-profile clients and a large client base.
Our Cyber Threat | Intelligence Analyst will be a key member of the SOC team, managing our Malware Information Sharing Platform (MISP) to deliver actionable threat intelligence. Responsibilities include monitoring, analysis, and dissemination of threat data to enhance client security. Strong analytical skills, knowledge of threat intelligence frameworks, and collaboration across teams are essential.
This role requires DV Clearance or eligibility for it.
Work arrangement is hybrid: 3 days on-site in Hemel Hempstead, 2 days remote.
Responsibilities:
- Develop and integrate automated threat feeds and enrichment sources.
- Provide training and documentation on MISP for SOC staff.
- Monitor threat sources (threat feeds, OSINT, dark web, internal logs) for emerging threats and facilitate threat intelligence sharing.
- Analyze data to identify patterns, indicators of compromise, and adversary tactics.
- Produce monthly threat reports.
- Collaborate during active incidents, providing real-time intelligence.
- Study threat actor TTPs using frameworks like MITRE ATT&CK and assess their impact.
- Track evolving threats, vulnerabilities, and attack vectors.
Qualifications:
- Strong understanding of cybersecurity frameworks (e.g., MITRE ATT&CK) and threat analysis.
- Excellent analytical skills with the ability to synthesize complex data.
- Proven experience in Cyber Threat Intelligence roles.
Preferred:
- Bachelor’s degree in Cybersecurity, Computer Science, or related fields.
If interested but unsure about your fit, please apply—we\’d love to hear from you!
Details:
- Employment Type: Permanent
- Location: Hybrid (3 days Hemel Hempstead, 2 days remote)
- Security Clearance: Eligible for DV clearance
- Salary: Up to £60K
- Benefits include 25 days leave (plus buy options), health plan, life assurance, pension, and flexible benefits
#J-18808-Ljbffr
Cyber Threat Intelligence Analyst employer: Sopra Steria Ltd
Contact Detail:
Sopra Steria Ltd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Threat Intelligence Analyst
✨Tip Number 1
Familiarise yourself with the Malware Information Sharing Platform (MISP) and its functionalities. Understanding how to manage and utilise MISP effectively will give you a significant edge during interviews, as it’s a key responsibility of the role.
✨Tip Number 2
Stay updated on the latest trends in cyber threats and vulnerabilities. Being able to discuss recent incidents or emerging threats will demonstrate your passion for the field and your proactive approach to threat intelligence.
✨Tip Number 3
Network with professionals in the cybersecurity community, especially those involved in threat intelligence. Engaging in discussions or attending relevant events can provide insights and connections that may help you stand out as a candidate.
✨Tip Number 4
Prepare to showcase your analytical skills by discussing specific examples of how you've identified patterns or indicators of compromise in past roles. This will highlight your experience and ability to contribute to the team effectively.
We think you need these skills to ace Cyber Threat Intelligence Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in Cyber Threat Intelligence. Focus on your analytical skills, knowledge of cybersecurity frameworks like MITRE ATT&CK, and any previous roles that involved threat analysis or incident response.
Craft a Compelling Cover Letter: In your cover letter, express your enthusiasm for the role and the company. Mention specific experiences that demonstrate your ability to manage threat intelligence and collaborate with teams. Highlight your understanding of the responsibilities listed in the job description.
Showcase Relevant Skills: When filling out your application, ensure you emphasise your strong analytical skills and experience with tools like MISP. Provide examples of how you've monitored threat sources and produced reports in past roles.
Proofread Your Application: Before submitting, carefully proofread your application materials. Check for any spelling or grammatical errors, and ensure that all information is clear and concise. A polished application reflects your attention to detail, which is crucial in cybersecurity.
How to prepare for a job interview at Sopra Steria Ltd
✨Know Your Cybersecurity Frameworks
Familiarise yourself with key cybersecurity frameworks, especially MITRE ATT&CK. Be prepared to discuss how you have applied these frameworks in your previous roles and how they relate to the responsibilities of the Cyber Threat Intelligence Analyst position.
✨Demonstrate Analytical Skills
Showcase your analytical skills by preparing examples of how you've synthesised complex data in past experiences. Highlight specific instances where your analysis led to actionable insights or improved security measures.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your ability to respond to real-time threats. Think about how you would monitor threat sources and collaborate during active incidents, and be ready to articulate your thought process.
✨Emphasise Collaboration Experience
Since collaboration is key in this role, prepare to discuss your experience working with cross-functional teams. Share examples of how you’ve effectively communicated threat intelligence and trained others on tools like MISP.