Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Cyber Threat Intelligence Analyst – SOC
12-Month Project | Hybrid (2–3 Days Onsite per Week)
Join the World of Cyber Security
We are currently seeking an experienced Cyber Threat Intelligence (CTI) Analyst to join a highly skilled Security Operations Center (SOC) environment on a 12-month project. This is an excellent opportunity to work at the core of cyber defence, supporting a broad internal stakeholder community with actionable intelligence and strategic insight.
The SOC consists of several specialist teams working together to detect, analyse, and respond to cyber threats, including Cyber Threat Intelligence, Use Case Design, Security Analysts (T1–T3), and the Cyber Security Incident Response Team (CSIRT).
Your Role
As a Cyber Threat Intelligence Analyst, you will deliver high-quality intelligence on threats and threat actors, assess risks to the IT environment, and contribute directly to strengthening security controls and detection capabilities.
Your responsibilities will include:
- Researching and analysing emerging cyber threats relevant to the organisation
- Identifying and profiling threat actors, campaigns, and adversary behaviour
- Producing and presenting CTI reports to the wider cybersecurity community
- Supporting threat hunting activities and detection use case development
- Analysing adversary tactics and identifying defensive gaps
- Recommending improvements to security architecture and controls
- Reviewing and interpreting internal and external threat intelligence sources
- Collaborating closely with the Group CERT and SOC stakeholders
Key Skills & Experience
- Strong experience in cyber threat intelligence and threat impact assessment
- Background in use case design, correlation rules, or detection engineering
- Hands-on experience with SIEM, log management, EDR/EPP tools
- Strong log analysis skills, including regex and natural language queries
- Understanding of network traffic analysis and packet capture
- Solid knowledge of encryption and cryptography
- Familiarity with frameworks such as MITRE ATT&CK, Kill Chain, or Diamond Model (highly desirable)
Ideal Profile
- Passionate about cyber security and threat intelligence
- Strong analytical and research capabilities
- Comfortable engaging with both technical and non-technical stakeholders
- Able to translate complex threat data into clear, actionable insights
- Proactive, collaborative, and service-oriented mindset
Contract Details
- Duration: 12-month project
- Working Model: Hybrid – 2–3 days onsite per week
- Start: ASAP / flexible
If you are looking to make a tangible impact in a mature SOC environment and enjoy working at the intersection of intelligence, detection, and incident response, we would be keen to hear from you.
Key Skills
Ranked by relevanceReady to apply?
Join Skillfinder International and take your career to the next level!
Application takes less than 5 minutes

