Role: Cyber Threat Intelligence Analyst
Location: Bath (Hybrid working)
Duration: 12 Months
Day rate: £550 Outside IR35
Active SC clearance required - preferably DV clearance
Role Overview
We are seeking a highly capable Cleared Cyber Threat Intelligence (CTI) Analyst to support a sensitive national‑security programme. The role focuses on identifying, analysing and reporting on cyber threats posed to government systems, critical national infrastructure and strategic interests.
You will operate in a highly secure environment, working closely with security operations, incident response, risk, and technical teams to deliver actionable intelligence that supports defensive and strategic decision‑making.
Key Responsibilities
- Collect, analyse and assess cyber threat intelligence from technical, human, open‑source and classified sources
- Monitor and analyse threat actor activity, including TTPs, malware, campaigns and infrastructure
- Produce high‑quality intelligence reports, briefings and threat assessments for technical and non‑technical stakeholders
- Support incident response and SOC teams with timely, contextual intelligence
- Maintain and develop threat intelligence repositories, playbooks and knowledge bases
- Contribute to strategic, operational and tactical intelligence outputs
- Brief senior stakeholders and security leadership as required
- Ensure handling of data complies with security, legal and governance frameworks
Required Skills & Experience
- Proven experience in a Cyber Threat Intelligence, Cyber Security, or Intelligence Analysis role
- Strong understanding of cyber threat actors, attack vectors, and threat landscapes
- Experience analysing malware, phishing, APT activity or cyber campaigns
- Familiarity with common CTI frameworks and standards (e.g. MITRE ATT&CK, Kill Chain, Diamond Model)
- Experience producing clear, actionable intelligence reporting
- Ability to assess confidence, credibility, and risk within intelligence products
- Comfortable working in highly classified / restricted environments
Desirable Experience
- Background in UK defence, intelligence, law enforcement, or national security organisations
- Experience with CTI platforms and tooling (e.g. MISP, ThreatQ, Anomali, OpenCTI)
- Technical knowledge of network security, cloud environments, or malware analysis
- Experience supporting strategic or policy‑level decision‑making