CrawlJobs Logo

Strategic Cyber Threat Intelligence Analyst

barclays.co.uk Logo

Barclays

Location Icon

Location:
United Kingdom , Knutsford

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

Join Barclays as a Strategic Cyber Threat Intelligence Analyst and help build a new strategic function within a global team of analysts across the UK, US, and India. In this role, you will deliver forward-looking threat analysis, identify emerging risks, and produce high-quality intelligence reports and presentations for senior stakeholders. You will use strong research and analytical skills to interpret data, assess trends, and provide meaningful context to evolving threats. Prior experience in a Cyber Threat Intelligence team is essential, as you will play a critical role in supporting threat mitigation, intelligence sharing, and strengthening Barclays’ resilience in an increasingly complex cyber landscape.

Job Responsibility:

  • Deliver forward-looking threat analysis, identify emerging risks, and produce high-quality intelligence reports and presentations for senior stakeholders
  • Use strong research and analytical skills to interpret data, assess trends, and provide meaningful context to evolving threats
  • Play a critical role in supporting threat mitigation, intelligence sharing, and strengthening Barclays’ resilience
  • Management of security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cyber security incidents, and provide a prompt response to restore normal operations with minimised system damage
  • Identification of emerging cyber security threats, attack techniques and technologies to detect/prevent incidents, and collaborate with networks and conferences to gain industry knowledge and expertise
  • Management and analysis of security information and event management systems to collect, correlate and analyse security logs, events and alerts/potential threats
  • Triage of data loss prevention alerts to identify and prevent sensitive data for being exfiltrated from the banks network
  • Management of cyber security incidents including remediation & driving to closure

Requirements:

  • Understanding of Cyber Threat Intelligence and its role in protecting organisations, including how it supports strategic decision-making and overall cybersecurity priorities
  • Ability to understand and clearly explain the Strategic impact of Cybersecurity on the financial sector, with awareness of relevant geopolitical factors influencing security risks
  • Strong communication skills, including the ability to prepare and deliver high-quality written reports, PowerPoint presentations, executive summaries, and threat briefings
  • Proven ability to write for executive audiences, demonstrating strong strategic thinking, analytical capabilities, and research skills
  • Prior experience in a Cyber Threat Intelligence team is essential

Nice to have:

  • Solid understanding of the financial sector threat landscape, including cybercrime trends and the ransomware ecosystem
  • Knowledge of common attack vectors and threat actor tactics, techniques, and procedures (TTPs) targeting large enterprises
  • Understanding of key security controls and how they mitigate threats across the attack surface, from perimeter (external) defences to endpoints, cloud and virtual environments, and identity security
  • Experience working with threat intelligence platforms
What we offer:
  • Competitive holiday allowance
  • Life assurance
  • Private medical care
  • Pension contribution

Additional Information:

Job Posted:
April 10, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Strategic Cyber Threat Intelligence Analyst

Intelligence Intermediate Analyst

CSIS GSIC Intelligence Intermediate Analyst role responsible for executing threa...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least two to five years or relevant academic experience
  • Previous experience with private sector organization preferred
  • Analytic experience related to intelligence analysis, geopolitical risk, cyber threat intelligence analysis, statistical/data analysis
  • Ability to conduct effective qualitative and quantitative intelligence analysis
  • Knowledge of threat assessment and risk management strategies
  • Ability to participate in high-stakes incident and crisis response efforts
  • Effective communication and coordination skills for cross-functional teams
  • Ability to provide professional briefing to executives and stakeholders
  • Expertise in Windows and Microsoft Office products
  • Excellent communication and presentation skills
Job Responsibility
Job Responsibility
  • Execute threat intelligence monitoring and response, workplace violence, and traveler assistance day-to-day operations
  • Maintain effective interaction models with all CSIS anchors for timely incident notification
  • Collaborate with CSIS Strategic Intelligence analysts
  • Function as subject matter expert on physical security and geopolitical threats
  • Produce intelligence analytical assessments
  • Produce presentations and brief intelligence assessments to senior leadership
  • Identify intelligence gaps and coordinate with relevant teams
  • Maintain key CSIS GSIC performance indicators
  • Complete appropriate training
  • Train and mentor others
What we offer
What we offer
  • Paid Parental Leave Policy
  • Financial well-being support
  • Work-life balance programs
  • Generous paid time off packages
  • Extensive on-the-job training
  • Exposure to senior leaders
  • Professional development opportunities
  • Volunteerism opportunities
  • Fulltime
Read More
Arrow Right

Intelligence Intermediate Analyst

CSIS GSIC Intelligence Intermediate Analyst role responsible for executing threa...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least two to five years or relevant academic experience
  • Previous experience with private sector organization preferred
  • Analytic experience related to intelligence analysis, geopolitical risk, cyber threat intelligence analysis, statistical/data analysis
  • Ability to conduct effective qualitative and quantitative intelligence analysis
  • Knowledge of threat assessment and risk management strategies
  • Ability to participate in high-stakes incident and crisis response efforts
  • Effective communication and coordination skills for cross-functional teams
  • Ability to provide professional briefing to executives and stakeholders
  • Expertise in Windows and Microsoft Office products
  • Excellent communication and presentation skills
Job Responsibility
Job Responsibility
  • Execute threat intelligence monitoring and response, workplace violence, and traveler assistance day-to-day operations
  • Maintain effective interaction models with all CSIS anchors to ensure timely incident notification and coordination
  • Collaborate closely with CSIS Strategic Intelligence analysts
  • Function as subject matter expert on physical security and broader geopolitical threats
  • Deliver all-source intelligence analytical assessments to inform decision making
  • Apply theory and methods to collect, organize, analyze, interpret, and summarize information
  • Produce presentations and brief intelligence assessments to senior leadership
  • Identify intelligence gaps and coordinate with relevant teams
  • Maintain key CSIS GSIC performance indicators
  • Complete appropriate training
What we offer
What we offer
  • Paid Parental Leave Policy
  • Resources to meet unique needs
  • Empowerment for healthy decisions
  • Financial well-being planning
  • Work-life balance programs
  • Generous paid time off packages
  • Extensive on-the-job training
  • Exposure to senior leaders
  • Traditional learning opportunities
  • Volunteerism opportunities
  • Fulltime
Read More
Arrow Right

Senior Threat Researcher, Unit 42

As a member of the Unit 42 National Security Team (NATSEC), you will work with a...
Location
Location
United States , Washington, DC
Salary
Salary:
139600.00 - 225775.00 USD / Year
paloaltonetworks.it Logo
Palo Alto Networks Italia
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active Top Secret Clearance (TS/SCI) with Polygraph
  • Bachelor of Science/Master of Science in Computer Science, Computer Engineering, or a related field
  • OR 5+ years of equivalent experience as a cleared cyber threat intelligence analyst
  • Proficiency in a programming or scripting language such as Python, C, or C++
  • Strong knowledge of cyber security threat actors, particularly their tactics, techniques, procedures (TTPs), and tooling
  • Experience leveraging netflow, passive DNS, IP registration, and malware telemetry to form comprehensive threat assessments
  • U.S. citizenship is required for this position
  • Must reside within a local commuting distance to Washington, DC, to support on-site requirements
Job Responsibility
Job Responsibility
  • Provide timely and actionable intelligence to support customer intelligence requirements
  • Leverage global datasets (e.g., netflow, malware, passive DNS, geospatial intelligence) to track malicious cyber actors, their infrastructure, and campaigns
  • Proactively collaborate and exchange information with a global team of threat intelligence analysts to analyze and develop coverage for emerging threats
  • Develop and present strategic threat assessments tailored to customer needs and intelligence gaps
  • Communicate effectively with product engineering teams to improve detection efficacy in our ecosystem of products
  • Challenge existing assumptions by curiously investigating threat actor TTPs to produce unique and predictive intelligence
  • Simplify complex technical findings into clear, concise reports for a variety of audiences
  • Fulltime
Read More
Arrow Right

Threat Simulation Analyst

We're looking for a Threat Simulation Analyst to join our Group CISO team. You'l...
Location
Location
United Kingdom , London
Salary
Salary:
Not provided
legalandgeneral.com Logo
LegalAndGeneral
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong understanding of Strategic, Operational and Tactical threat intelligence
  • A current understanding of cyber security incidents and how they could be practised within exercises to test the resilience of L&G
  • Experience in the creation and implementation of short-term and long-term plans for developing a programme of exercises
  • Threat intelligence and/or Information Technology industry certification (CREST, SANS or equivalent) would be great
  • Prior experience of delivering tabletop exercises or crisis simulations would be a huge plus!
Job Responsibility
Job Responsibility
  • Developing threat simulation exercises and scheduling quarterly (at least) exercises with all Group Business Units
  • Reviewing threat intelligence, data and trends and creating CSIRT exercises that support the development of mitigations
  • Developing and creating metrics by which progress of the threat simulation exercises can be demonstrated
  • Leading regular reviews with internal stakeholders to obtain and ensure that current and possible threats are exercised to best practice
  • Conducting threat intelligence research utilising open source, paid, community and national feeds to monitor and assess current and emerging threats that could pose a risk to L&G
  • Coordinating with other security and operational teams to ensure any threat assessments and actions are progressed as required
  • Producing written or verbal threat intelligence artifacts as required, identifying trends within physical security, cyber security or geo-politics
  • Defining, developing and delivering processes and systems to ensure a consistent and good level of service that means divisions can comply with all regulatory and security requirements
What we offer
What we offer
  • The opportunity to participate in our annual, performance -related bonus plan and valuable share schemes
  • Generous pension contribution
  • Life assurance
  • Healthcare Plan (permanent employees only)
  • At least 25 days holiday, plus public holidays, 26 days after 2 years’ service. There’s also the option to buy and sell holiday
  • Competitive family leave
  • Participate in our electric car scheme, which offers employees the option to hire a brand-new electric car through tax efficient salary sacrifice (permanent employees only)
  • There are the many discounts we offer – both for our own products and at a range of high street stores and online
  • In 2023, some of our workspaces were redesigned. Our offices are great spaces to connect and collaborate and have your wellbeing at the heart
  • Fulltime
Read More
Arrow Right

Global Head of Threat Intelligence

This is one of FS-ISAC’s most influential leadership positions. As Global Head o...
Location
Location
United States , Reston, VA
Salary
Salary:
Not provided
fsisac.com Logo
FS-ISAC
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 10+ years of cyber threat intelligence experience (financial sector preferred)
  • 5+ years leading global teams, with proven ability to inspire, mentor, and unite diverse talent
  • Deep knowledge of cyber threat actors (state-sponsored, criminal, insider) and their tactics, techniques, and procedures
  • Strong communicator with executive presence — able to translate technical insights into strategic action
  • Experience collaborating with government, law enforcement, and international partners
  • Exceptional writing, public speaking, and media skills
  • Eligible to obtain/maintain a Top Secret (TS/SCI) clearance (sponsorship provided if needed)
  • Based in, or able to relocate to, the Washington, D.C. metro area
Job Responsibility
Job Responsibility
  • Lead and continuously evolve FS-ISAC’s global threat intelligence program
  • Manage, mentor, and unite a globally distributed team of intelligence analysts
  • Oversee the collection, analysis, and dissemination of actionable threat intelligence
  • Represent FS-ISAC externally with members, partners, policymakers, and media
  • Collaborate with technology teams to advance intelligence tools and platforms
  • Engage with law enforcement, intelligence community, and global stakeholders
  • Provide forward-looking insights on emerging threats, geopolitical triggers, and industry implications
  • Serve as FS-ISAC’s expert voice at summits, conferences, and member forums
What we offer
What we offer
  • Competitive compensation
  • Relocation support
  • Clearance sponsorship
  • Fulltime
Read More
Arrow Right

Cybersecurity Manager - Detection and Response

Microsoft Incident Response – the Detection and Response Team (DART) – part of t...
Location
Location
United Kingdom , Multiple Locations
Salary
Salary:
Not provided
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field
  • OR Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field and several years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection and several years of experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
  • OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field and several years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection OR equivalent experience
  • Many years of people management and/or informal/indirect team leadership experience
  • Strong analytic, qualitative, and quantitative reasoning skills
  • Track record of successfully managing a technical business group and maintaining consistent growth
  • Recognized as a strategic leader who can hire, retain and motivate diverse quality talent
  • Experience leading both a services organization and product development function
  • Develop business strategy and provide technical thought leadership
  • Manage customer engagements escalations to ensure customer satisfaction
Job Responsibility
Job Responsibility
  • People Management: Responsible for mentoring, managing and leading a team of cyber security analysts, engineers, developers, leads and incident managers
  • Managers deliver success through empowerment and accountability by modeling, coaching, and caring
  • Strategic Initiatives: Secure partner relationships and work closely with internal product and services groups as well as co-delivering with Microsoft’s Partner ecosystem
  • Develop and mentor individual contributors through open communication, training and development opportunities and performance management processes
  • Develop and maintain objectives, metrics and KPIs supporting the department’s strategic direction and continuously improve incident response technical capabilities
  • Communicate complex and technical issues to diverse audiences, verbally and in writing, in an easily understood, authoritative, and actionable manner
  • Present to a wide range and size of audiences from IT Pro, to CxO, to business decision makers
  • Technical leadership and executive presence to establish Trusted Technical Advisor to influence senior decision makers to mature and promote customer’s security posture across the overall technology landscape
  • Drive investigative teams to exhaust all investigative leads in the expectation of discovering novel attacker techniques
  • Investigate and research these techniques, and partner with threat intelligence and security engineering to drive security tooling and product enhancements
  • Fulltime
Read More
Arrow Right

Cybersecurity Landscape Analyst

This is an outward-facing intelligence and analysis role. The Cybersecurity Land...
Location
Location
United States , San Francisco; Washington, DC
Salary
Salary:
178200.00 - 320000.00 USD / Year
openai.com Logo
OpenAI
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Significant experience (typically 5+ years) in cybersecurity intelligence, strategic threat analysis, trust & safety, or national-level cyber risk assessment
  • Deep familiarity with cyber threat actors, intrusion tradecraft, vulnerability exploitation trends, and cybercrime ecosystems
  • Experience translating external threat reporting and OSINT into structured risk assessments and executive guidance
  • Comfortable using adversarial thinking and foresight methodologies (e.g., horizon scanning, scenario planning, red-teaming) to explore emerging threat vectors
  • Can clearly distinguish between intelligence analysis and operational security work, and work effectively across that boundary
  • Excellent, credible communicator capable of distilling complex cyber threat dynamics into crisp, decision-relevant insights
  • Currently hold or are eligible for a U.S. security clearance
Job Responsibility
Job Responsibility
  • Monitor and interpret the evolving cyber threat landscape
  • Conduct structured external research and adversarial analysis
  • Translate external signals into strategic risk context for cross-functional teammates
  • Support product and ecosystem readiness
  • Represent OpenAI in sensitive external engagements
What we offer
What we offer
  • Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts
  • Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)
  • 401(k) retirement plan with employer match
  • Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)
  • Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees
  • 13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)
  • Mental health and wellness support
  • Employer-paid basic life and disability coverage
  • Annual learning and development stipend to fuel your professional growth
  • Daily meals in our offices, and meal delivery credits as eligible
  • Fulltime
Read More
Arrow Right

Security Analyst - Investigator (Financial Threats)

The Integrity, Investigations, Intelligence and Events (i3E) teams at Meta are d...
Location
Location
United States , Bellevue
Salary
Salary:
167000.00 - 233000.00 USD / Year
meta.com Logo
Meta
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 8+ years work experience performing security investigations in government, intelligence, cyber security, journalism and/or private sector organizations
  • Demonstrated subject matter expertise in large-scale scam/fraud operations
  • Experience leveraging SQL, OSINT, and network security concepts in an investigative context
  • Adept at developing multi-source, evidence-based findings and communicating them to different stakeholders and leadership team
  • Experience working on high-impact threats under compressed timelines
  • Experience prioritizing and executing with minimal direction or oversight
  • Bachelors Degree in Computer Science, Data Engineering, Cyber Security or related field or equivalent technical work experience
Job Responsibility
Job Responsibility
  • Investigate sophisticated scammer behaviors to understand how abuse manifests on Meta’s platforms and the wider information ecosystem using a variety of tooling/techniques including innovative deployment of AI solutions where appropriate
  • Lead a portfolio of investigative research to include identifying abuse trends, understanding adversarial behavior, and designing/driving forward-looking enforcement strategies to mitigate harm
  • Leverage expert knowledge/experience in the field of fraud and scams in the application of this work
  • Own end-to-end complex scam investigations and partner directly with Policy, Ops, Engineering, Product, and Legal teams to translate findings into scaled mitigations
  • Proactively hunt for threats and undetected abuse by leveraging internal data sets, open-source intelligence, and third-party private intelligence
  • Analyze qualitative and quantitative data to advance investigations, quantify trends and support findings with clear, concise evidence
  • Take a lead role in developing and refining investigative techniques, analytic methodologies, intelligence processes, and tools
  • Synthesize abuse telemetry and qualitative insights into decision-ready assessments and recommendations that drive prioritization and result in concrete mitigations across investigations, engineering, policy, and product teams
  • Apply operational rigor to investigations, analysis, and programs while looking for strategic improvement opportunities
  • This role may involve exposure to graphic and/or objectionable content including but not limited to graphic images, videos and writings, offensive or derogatory language, and other potential objectionable material, i.e. child exploitation, graphic violence, self-injury, animal abuse, and other content which may be considered offensive or disturbing
What we offer
What we offer
  • bonus
  • equity
  • benefits
  • Fulltime
Read More
Arrow Right