Salary: 60,000 - 60,000 GBP per year Requirements:
* I must hold or be eligible for DV Clearance.
* A solid grasp of cybersecurity frameworks (e.g., MITRE ATT&CK) and threat analysis methodologies.
* Excellent analytical skills with the ability to synthesize complex threat data.
* A consistent record of working under pressure and adapting to constantly evolving threat landscapes.
* A bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or a related field (or equivalent experience) is preferred but not mandatory.
Responsibilities:
* I will develop and integrate automated feeds and enrichment sources.
* I will provide training sessions and documentation for SOC staff on the effective usage of the Malware Information Sharing Platform (MISP).
* I will monitor a range of sources (threat feeds, OSINT, dark web, internal logs) for emerging threats.
* I will facilitate threat intelligence sharing with internal teams and external partners while ensuring compliance with data sharing policies.
* I will analyze collected data to identify patterns, indicators of compromise (IOCs), and emerging adversary behaviors.
* I will produce monthly situational reports highlighting operational threats and actionable recommendations.
* I will collaborate with the SOC and incident response teams during active security incidents, providing real-time threat intelligence.
* I will contribute to threat hunting initiatives by providing intelligence-led hypotheses and analysis that guide proactive investigations.
* I will study threat actors' tactics, techniques, and procedures (TTPs) using frameworks like MITRE ATT&CK.
* I will evaluate the potential impact of identified threats on internal operations and customer environments.
* I will track and document evolving threat trends, vulnerabilities, and attack vectors that could affect our operations.
* I will maintain detailed documentation of all threat intelligence activities.
* I will regularly review and refine intelligence processes, tools, and methodologies to improve overall SOC efficiency.
Technologies:
* Support
* Security
* Web
More:
Our Cyber team is rapidly growing, highlighting a portfolio of high-profile clients that provide the opportunity to work on a large client base. As a Cyber Threat Intelligence Analyst, I will be a critical member of the SOC team, delivering actionable operational and tactical threat intelligence. The office is based in Hemel Hempstead. We offer a permanent employment type with a salary of up to £60K and benefits, including 25 days of annual leave with the option to buy additional days, a health cash plan, life assurance, a pension, and a generous flexible benefits fund.
At Sopra Steria, we design, develop, and deploy digital solutions for Central Government clients, making a real difference in their goal of National Security. We support professional development, coach and mentor our colleagues, and foster a culture where employees feel valued and supported. We take pride in our work for the customer, consistently achieving high customer satisfaction rates. If you're interested in this role but unsure if your skills align with our needs, I encourage you to apply—we would love to hear from you!