CrawlJobs Logo

Senior Cyber Threat Intelligence Analyst

outsource-uk.co.uk Logo

Outsource UK

Location Icon

Location:
United Kingdom , Preston

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

27.03 - 36.30 GBP / Hour

Job Description:

BAE Systems is seeking a skilled Cyber Threat Intelligence Practitioner to support tactical and operational cyber threat intelligence activities across the organisation. In this role, you will take ownership of defined geographic or thematic areas of responsibility, producing high‑quality intelligence that enables proactive cyber defence. Working closely with cyber operations, collections teams, and external partners, you will help ensure BAE Systems remains intelligence‑led, threat‑aware, and resilient in an evolving cyber landscape.

Job Responsibility:

  • Produce operational and tactical cyber threat intelligence reports tailored to technical and senior audiences
  • Monitor the cyber threat landscape, including OSINT, dark web sources, internal telemetry, and external intelligence feeds
  • Investigate threat actors, campaigns, and tactics, techniques, and procedures (TTPs) to identify indicators of compromise
  • Provide timely intelligence support during security incidents, aiding containment and remediation efforts
  • Deliver threat briefings to internal stakeholders and trusted external partners
  • Support Requests for Information (RFIs) and Intelligence Requirements (IRs) in collaboration with CTI collections teams
  • Advise on organisational Cyber Threat Levels based on intelligence assessments
  • Act as a trusted advisor, translating complex intelligence into clear, actionable insight

Requirements:

  • Strong experience within a Cyber Threat Intelligence (CTI) discipline
  • A solid understanding of cyber threat actors, geopolitics, and global threat activity
  • Awareness of intelligence disciplines such as OSINT, SIGINT, HUMINT, and their application
  • Knowledge of structured analytical techniques and intelligence best practice
  • Experience applying MITRE ATT&CK / D3FEND / ENGAGE frameworks in an operational context
  • Clearance: BPSS + SC + UK EYES

Additional Information:

Job Posted:
May 14, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Senior Cyber Threat Intelligence Analyst

Cyber Threat Deputy Lead

AnaVation is seeking a Cyber Threat Deputy Team Lead to join our team and suppor...
Location
Location
United States , Reston
Salary
Salary:
Not provided
anavationllc.com Logo
AnaVation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI Clearance
  • Bachelor’s degree in relevant field and 8-10 years of experience related to specific functional area (May substitute Master’s degree in lieu of 2 years of experience)
  • CompTIA Security+ or equivalent IAT Level II and currently hold or able to obtain CSSP Analyst certification (such as CySA+ or equivalent)
  • Managing/Leading small team
  • Experience working with reporting, automation, and visualization systems to provide situational awareness and making recommendations to improve cyber threat intelligence and fusion capabilities
  • Experience creating, reviewing, and delivering finished intelligence products
  • Experience working collaboratively with staff at all experience levels to deliver short-term, medium-term, and long-term commitments
Job Responsibility
Job Responsibility
  • Supervise the creation of analytical products based on cyber threat intelligence and analysis to clearly document significant cyber-attacks or the discovery of new vulnerabilities
  • Coaching, mentoring, and guiding the efforts of 6-8 team members with collectively building higher value fusion products, expanding effective lines of communication, briefing senior and very senior customer leadership, and leaning on the active edge of information flow
  • Supervise 6-8 members conducting research and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to US and DoD information networks
  • Analyze network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent
  • Develop technical solutions to complex problems
  • Exercises considerable latitude in determining objectives and approaches to assignment
What we offer
What we offer
  • Generous cost sharing for medical insurance for the employee and dependents
  • 100% company paid dental insurance for employees and dependents
  • 100% company paid long-term and short term disability insurance
  • 100% company paid vision insurance for employees and dependents
  • 401k plan with generous match and 100% immediate vesting
  • Competitive Pay
  • Generous paid leave and holiday package
  • Tuition and training reimbursement
  • Life and AD&D Insurance
  • Fulltime
Read More
Arrow Right

Senior Acquisition Intelligence Support contractor

MAINSAIL Group is looking for an experienced Intelligence & Cyber Analyst to joi...
Location
Location
United States , Hanscom AFB
Salary
Salary:
Not provided
mainsailgroupinc.com Logo
MAINSAIL Group
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Top Secret/SCI Clearance and U.S. Citizenship required for all applicants
  • Bachelor’s degree and 15 years of experience in intelligence support to acquisition programs
  • Advanced knowledge of DoD, USAF, AFLCMC and private-sector acquisition principles, guidance, Executive Orders, regulations and procedures relevant to intelligence support to major Defense acquisition efforts
  • Knowledge of cyber threats and intelligence tracking and assessments of such threats, as they may impact SAOC mission areas
  • Experience supporting a range of DoD acquisition activities through various stages of the Defense Acquisition cycle
  • Possess the knowledge and mindset to play a key “forward leaning” support role as a senior contractor
  • The ability to effectively communicate in both written and verbal forms on highly technical topics
Job Responsibility
Job Responsibility
  • Contribute to and address specific SAOC program intelligence requirements while assessing the impact of technically advanced threat and security support issues to reduce program and operational risks
  • Work with SAOC Cyber team to assess cyber threats to SAOC mission areas and assist in developing solutions to such threats
  • Team with program offices, product centers, and the Intelligence Community (IC) to provide system engineering and technical analysis level inputs in support of major acquisition decisions
  • Provide acquisition intelligence technical and analytical support as outlined in annual Intel Support Taskings from AFLCMC/IN and external PEO customers
  • Review, tailor and analyze Threat Assessments relevant to the SAOC mission areas
  • Review, tailor and analyze System Threat Analysis Reports (STAR) and Validated On-Line Life-Cycle Threats (VOLTS) to the SAOC mission areas
  • Review, tailor and analyze ISR dependencies and Requirements that will support the SAOC mission areas
  • Review, tailor and analyze cross-program analyses, including external programs that impact SAOC subsystems and capabilities
  • Support technical Adversary Cyber Threat Assessments (ACTA) relevant to the SAOC mission areas
  • Support technical Intelligence supportability analyses for the SAOC mission areas
  • Fulltime
Read More
Arrow Right

Intelligence Intermediate Analyst

CSIS GSIC Intelligence Intermediate Analyst role responsible for executing threa...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least two to five years or relevant academic experience
  • Previous experience with private sector organization preferred
  • Analytic experience related to intelligence analysis, geopolitical risk, cyber threat intelligence analysis, statistical/data analysis
  • Ability to conduct effective qualitative and quantitative intelligence analysis
  • Knowledge of threat assessment and risk management strategies
  • Ability to participate in high-stakes incident and crisis response efforts
  • Effective communication and coordination skills for cross-functional teams
  • Ability to provide professional briefing to executives and stakeholders
  • Expertise in Windows and Microsoft Office products
  • Excellent communication and presentation skills
Job Responsibility
Job Responsibility
  • Execute threat intelligence monitoring and response, workplace violence, and traveler assistance day-to-day operations
  • Maintain effective interaction models with all CSIS anchors for timely incident notification
  • Collaborate with CSIS Strategic Intelligence analysts
  • Function as subject matter expert on physical security and geopolitical threats
  • Produce intelligence analytical assessments
  • Produce presentations and brief intelligence assessments to senior leadership
  • Identify intelligence gaps and coordinate with relevant teams
  • Maintain key CSIS GSIC performance indicators
  • Complete appropriate training
  • Train and mentor others
What we offer
What we offer
  • Paid Parental Leave Policy
  • Financial well-being support
  • Work-life balance programs
  • Generous paid time off packages
  • Extensive on-the-job training
  • Exposure to senior leaders
  • Professional development opportunities
  • Volunteerism opportunities
  • Fulltime
Read More
Arrow Right

Intelligence Intermediate Analyst

CSIS GSIC Intelligence Intermediate Analyst role responsible for executing threa...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least two to five years or relevant academic experience
  • Previous experience with private sector organization preferred
  • Analytic experience related to intelligence analysis, geopolitical risk, cyber threat intelligence analysis, statistical/data analysis
  • Ability to conduct effective qualitative and quantitative intelligence analysis
  • Knowledge of threat assessment and risk management strategies
  • Ability to participate in high-stakes incident and crisis response efforts
  • Effective communication and coordination skills for cross-functional teams
  • Ability to provide professional briefing to executives and stakeholders
  • Expertise in Windows and Microsoft Office products
  • Excellent communication and presentation skills
Job Responsibility
Job Responsibility
  • Execute threat intelligence monitoring and response, workplace violence, and traveler assistance day-to-day operations
  • Maintain effective interaction models with all CSIS anchors to ensure timely incident notification and coordination
  • Collaborate closely with CSIS Strategic Intelligence analysts
  • Function as subject matter expert on physical security and broader geopolitical threats
  • Deliver all-source intelligence analytical assessments to inform decision making
  • Apply theory and methods to collect, organize, analyze, interpret, and summarize information
  • Produce presentations and brief intelligence assessments to senior leadership
  • Identify intelligence gaps and coordinate with relevant teams
  • Maintain key CSIS GSIC performance indicators
  • Complete appropriate training
What we offer
What we offer
  • Paid Parental Leave Policy
  • Resources to meet unique needs
  • Empowerment for healthy decisions
  • Financial well-being planning
  • Work-life balance programs
  • Generous paid time off packages
  • Extensive on-the-job training
  • Exposure to senior leaders
  • Traditional learning opportunities
  • Volunteerism opportunities
  • Fulltime
Read More
Arrow Right

Senior Threat Intelligence Analyst

To deliver timely, actionable threat intelligence that enables the organization ...
Location
Location
Finland , Espoo
Salary
Salary:
5600.00 - 6500.00 EUR / Month
iceye.com Logo
ICEYE
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven experience (5+ years) in information security, threat intelligence, national CERT/CSIRT, intelligence, or law enforcement environments
  • Extensive hands-on experience (minimum 4 years) using threat intelligence platforms (e.g. MISP) and analysis frameworks such as MITRE ATT&CK in a customer-facing or operational role
  • Strong capability in analyzing infrastructure-related threats and conducting open-source, deep web, and dark web research
  • Demonstrated expertise in utilizing STIX/TAXII feeds and automated intelligence sharing solutions
  • Solid understanding of the Finnish Cyber Security Act (NIS2), GDPR, and applicable local regulations
  • Industry-recognized certifications such as GIAC Cyber Threat Intelligence (GCTI) or equivalent
  • Excellent English communication skills, with the ability to translate complex threat intelligence into actionable insights for diverse audiences
Job Responsibility
Job Responsibility
  • Integrating actionable threat intelligence into SOC, incident response, and vulnerability management workflows to improve detection and response effectiveness
  • Analyzing malicious infrastructure, malware, and adversary artifacts to extract high-fidelity IOCs and map TTPs using frameworks such as MITRE ATT&CK
  • Enabling threat detection, attribution, and information sharing through the effective use of threat intelligence platforms, STIX/TAXII feeds, and automated intelligence sharing mechanisms
  • Producing and disseminating clear, timely operational and tactical intelligence products, including threat briefings, reports, and summaries tailored to technical teams and senior leadership
  • Providing expert intelligence support during major security incidents by correlating external threat data with internal telemetry
  • Enhancing threat hunting activities by supplying contextual intelligence that identifies emerging threats and suspicious behaviors within the environment
  • Delivering actionable cyber resilience recommendations based on threat intelligence and OSINT analysis, aligned with regulatory and legal requirements
What we offer
What we offer
  • Occupational healthcare, occupational, and accident insurance
  • A yearly benefit budget to spend as you wish (i.e. on sport, transport, bike benefit, wellness, lunch, etc.)
  • Phone subscription with iPhone of choice
  • Relocation support (i.e. flight tickets, accommodation, relocation agency support)
  • Time for self-development, research, training, conferences, or certification schemes
  • Inspiring and collaborating offices and silent workspaces enable you to focus
  • Fulltime
Read More
Arrow Right

Cyber Intelligence Operations Analyst

Amentum has an opportunity for a highly qualified Cyber Intelligence Operations ...
Location
Location
United States , Wahiawa
Salary
Salary:
165000.00 - 185000.00 USD / Year
amentum.com Logo
Amentum
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in computer science, Information Security, Cybersecurity, Intelligence/International Studies, or related field
  • Minimum of 4 years of experience in intelligence analysis with a focus on cyber threats or operations
  • Proficiency in intelligence analysis tools and techniques, such as data visualization, link analysis, and threat modeling
  • Familiarity with Intelligence inputs to MDMP, JPP, and the Joint Targeting Cycle
  • Active Top-Secret Clearance with SCI eligibility and current CI Polygraph
  • US Citizenship is required to obtain a Top-Secret Clearance
Job Responsibility
Job Responsibility
  • Conduct in-depth analysis of cyber threat intelligence, including emerging malware, vulnerabilities, and attack vectors
  • Collect, evaluate, and fuse intelligence from diverse sources, including open-source intelligence (OSINT), signals intelligence (SIGINT), human intelligence (HUMINT), and technical intelligence (TECHINT). Identify correlations and patterns to enhance situational awareness and predictive analysis
  • Assess the potential impact of cyber threats on network infrastructure and operations. Collaborate with cyber defense teams to develop and implement mitigation strategies and countermeasures
  • Provide intelligence support during cyber incident response activities, including analysis of indicators of compromise (IOCs), attribution of cyber-attacks, and identification of adversary tactics, techniques, and procedures (TTPs)
  • Prepare and deliver clear and concise intelligence products, including reports, briefings, and presentations, for a diverse audience, including senior leadership, operational stakeholders, and technical teams
  • Foster collaboration and information sharing with internal and external stakeholders, including other intelligence agencies, law enforcement, industry partners, and allied nations, to enhance cyber threat awareness and response capabilities
  • Stay abreast of emerging cyber threats, technologies, and methodologies through continuous research and professional development. Contribute to the development of new analytical techniques, tools, and processes to improve intelligence analysis and cyber defense capabilities
  • Conduct target system analysis to support entity of interest for offensive cyberspace operations, coordinate for intelligence production and analysis to support advance technical development for offensive operations
  • Execute collection management drawing subordinate unit intelligence requirements and overseeing their progress through the various means of collection to resolve intelligence gaps
  • Develop Targets through Advanced Target development to achieve vetted and validated COCOM level targets for mission package execution
What we offer
What we offer
  • Health, dental, and vision insurance
  • Paid time off and holidays
  • Retirement benefits (including 401(k) matching)
  • Educational reimbursement
  • Parental leave
  • Employee stock purchase plan
  • Tax-saving options
  • Disability and life insurance
  • Pet insurance
  • Fulltime
Read More
Arrow Right

Senior Threat Researcher, Unit 42

As a member of the Unit 42 National Security Team (NATSEC), you will work with a...
Location
Location
United States , Washington, DC
Salary
Salary:
139600.00 - 225775.00 USD / Year
paloaltonetworks.it Logo
Palo Alto Networks Italia
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active Top Secret Clearance (TS/SCI) with Polygraph
  • Bachelor of Science/Master of Science in Computer Science, Computer Engineering, or a related field
  • OR 5+ years of equivalent experience as a cleared cyber threat intelligence analyst
  • Proficiency in a programming or scripting language such as Python, C, or C++
  • Strong knowledge of cyber security threat actors, particularly their tactics, techniques, procedures (TTPs), and tooling
  • Experience leveraging netflow, passive DNS, IP registration, and malware telemetry to form comprehensive threat assessments
  • U.S. citizenship is required for this position
  • Must reside within a local commuting distance to Washington, DC, to support on-site requirements
Job Responsibility
Job Responsibility
  • Provide timely and actionable intelligence to support customer intelligence requirements
  • Leverage global datasets (e.g., netflow, malware, passive DNS, geospatial intelligence) to track malicious cyber actors, their infrastructure, and campaigns
  • Proactively collaborate and exchange information with a global team of threat intelligence analysts to analyze and develop coverage for emerging threats
  • Develop and present strategic threat assessments tailored to customer needs and intelligence gaps
  • Communicate effectively with product engineering teams to improve detection efficacy in our ecosystem of products
  • Challenge existing assumptions by curiously investigating threat actor TTPs to produce unique and predictive intelligence
  • Simplify complex technical findings into clear, concise reports for a variety of audiences
  • Fulltime
Read More
Arrow Right

Cyber Threat Intelligence Analyst

The Intelligence Lead Analyst is a senior level professional responsible for dri...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 6-10 years of relevant experience
  • Working knowledge in one or more of the following areas: Advanced Persistent Threat, Third Party Risks/Threats, Cybercrime, Extremist Groups and Cyber Terrorists, Hacktivism, Distributed Denial of Service attacks, Fraud, Malware, Mobile Threats
  • Consistently demonstrates clear and concise written and verbal communication
  • Proven influencing and relationship management skills
  • Proven analytical skills
  • Bachelor’s degree/University degree or equivalent experience
  • Master’s degree preferred
Job Responsibility
Job Responsibility
  • Analyze regional threat data and determine a correlation if any, to existing intelligence requirements
  • Monitor and research cyber threats with a direct or indirect impact to the Citi brand
  • Research and identify malicious activity by performing post-mortem analysis on logs, traffic flows, and other activities
  • Conduct intrusion analyses to ascertain the impact of an attack, and develop mitigation techniques for future attacks
  • Evaluate networks and programs to assess potential weaknesses and points of entry
  • Analyze and present to senior leadership discovered patterns to forecast future cyber-attacks and their potential impact
  • Liaise with intelligence communities, law enforcement, industry partners, peer financial institutions, and information sharing communities
  • Triage, process, analyze, and disseminate intelligence alerts, reports, and briefings
  • Appropriately assess risk when business decisions are made, demonstrating particular consideration for the firm's reputation and safeguarding Citigroup, its clients and assets, by driving compliance with applicable laws, rules and regulations, adhering to Policy, applying sound ethical judgment regarding personal behavior, conduct and business practices, and escalating, managing and reporting control issues with transparency.
  • Fulltime
Read More
Arrow Right