National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Threat Intelligence Analyst

Talion Cyber Security
Wakefield
4 days ago
Create job alert

Get AI-powered advice on this job and more exclusive features.
Talion Cyber Security provided pay range This range is provided by Talion Cyber Security. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more.
Base pay range Direct message the job poster from Talion Cyber Security
A Managed Security Service Provider (MSSP) with a wealth of experience that enables organisations to protect their business estate from cyber-security attacks. We help organisations of all sizes build cyber-security capabilities and maintain compliance through practical Consulting and Managed Services. We blend together best-of-breed technologies to provide real time 24×7 monitoring, triage, remediation, threat assessment, vulnerability management, and Professional Services that give our clients peace of mind that they are protected. Our services include, 24x7 security monitoring from our UK based SOC, Threat Intelligence, and Security Orchestration services, all underpinned by our in-house detection content and SIEM platform management. Our customers can choose to take all or any one of our services, depending on their needs at the time, which makes Talion a flexible security provider that is able to these robust services to small businesses as well as we do to the largest multi-national organisations.
About the Role
Talion is looking for a talented individual to join our Threat Intelligence Team as a Threat Intelligence Analyst. This is a early career role, where the right candidate, whilst ideally having some understanding or experience of Cyber Security, must have a strong work ethic and a desire to become an expert in the field of Threat Intelligence and Vulnerablity Management.
The successful applicant will have responsibilities within the Threat Intelligence team in a number of areas key to the delivery of service to our customers.
To support Talion’s Threat Intelligence team towards investigations. This will include researching and identify potential cyber threats, determining client risk levels, and producing Threat Intelligence bulletins and analytical reports for a variety of audiences. Great written communication is critical in order to analyse and summarise vast amounts of information into a useful consumable format.
To oversee the daily operational delivery of Talion’s Vulnerability Management service. This includes items such as responding to service requests, managing scheduled and tactical scanning and report curation, including leveraging Threat Intelligence expertise to deliver revised re-prioritisation of vulnerabilities and provide additional context to clients.
As you progress within the role, you may be asked to present findings in front of internal colleagues as well as client contacts, so the ability to translate technical indicators to all levels of the business is crucial. Therefore, good verbal communication is also very important.
Being in possession of an analytical mindset and effective problem-solving skills are essential. When serious threats are identified, you will work closely with other teams within our security practice to identify appropriate solutions. You must be passionate about technology, and able to learn the ropes of new security solutions rapidly.
Qualifications
A degree or industry-recognised certification in intelligence or cybersecurity, or equivalent experience/knowledge of the fundamentals of cyber security.
An understanding of cyber threat analysis and tracking advanced threat actors to create accurate actionable, and clear assessments regarding on-going and emerging threats to customers.
Knowledge of and/or previous practice working with OSINT (open-source intelligence) tools and techniques.
Deadline and detail oriented.
Able to collect, analyse, and interpret qualitative and quantitative data from various sources including extracting indicators and exercising critical thinking in assessing the threat.
Comfortable speaking technically with analysts and strategically with senior executives.
Experience producing well-researched concise reports and presentations tailored to a variety of audiences.
Able to manage competing priorities and work efficiently under pressure.
Inquisitive, high energy, and eager to win.
Coding experience is a plus, comfort with new technology a must.
Preferred skills
Identifying real-time, actionable information regarding Cyber Threat Actors and the malware techniques they employ.
Leveraging a variety of internal and external tools and sources to identify threats, assess risks, and produce reports including internal sources, 3rd-party, OSINT etc.
Provide analysis on the threat landscape from a wide range of internal and external intelligence and data sources.
Support in continuously improving our security detection content by monitoring the threat landscape for new techniques which can be developed.
Provide useful threat-based context to our security analysts.
Maintain detailed threat profiles on adversaries of interest covering their tactics, techniques and procedures, intent, goals, and strategic objectives.
Oversee the mapping of Threat Actors and rules against the MITRE ATT&CK model.
Presenting information to clients at regular meetings to outline the latest threat activity to them, highlighting points of note and proactive measures they can take.
Establish liaisons with external agencies, authorities, and threat intelligence sharing communities.
Organise and deliver contracted outputs of our Vulnerability Management Service such as curated reporting, the set up and scheduling of scanning, responding to services requests and providing advice regarding prioritisation of vulnerability remediation in a manner which meets expected service quality levels.
Manage patching platforms and the output of scans.
Have good written and verbal communication skills to be able to translate information into effective, structured and straightforward remediation for the client.
Be able to collaborate and work closely with broader security operation teams to oversee remediation efforts.
Experience in cybersecurity frameworks and methodologies.
Familiarity with security tools and technologies.
Ability to work in a fast-paced environment.
Equal Opportunity Statement
We are committed to diversity and inclusivity and providing a working environment for everyone to thrive.
Seniority level Seniority level Entry level
Employment type Employment type Full-time
Job function Job function Information Technology
Industries Computer and Network Security
Referrals increase your chances of interviewing at Talion Cyber Security by 2x
Sign in to set job alerts for “Threat Intelligence Analyst” roles. We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr

Related Jobs

View all jobs

Threat Intelligence Analyst

Senior Threat Intelligence Analyst

Incident Response Analyst

Incident Response Analyst

Cyber Security Analyst

Cyber Security Analyst

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

LinkedIn Profile Checklist for Cybersecurity Jobs: 10 Tweaks to Supercharge Recruiter Engagement

In the ever-evolving realm of cybersecurity, having a LinkedIn profile that reflects both your technical prowess and threat-hunting acumen is vital. Organisations are on the lookout for professionals skilled in penetration testing, incident response, security architecture and compliance. With hiring managers scanning dozens of profiles daily, your profile needs to not just rank in searches but convey your expertise in safeguarding digital assets. This step-by-step LinkedIn for cybersecurity jobs checklist offers ten practical tweaks to supercharge recruiter engagement. Whether you’re an aspiring security analyst, a seasoned penetration tester or a chief information security officer aiming for board-level roles, these actionable optimisations will sharpen your LinkedIn presence and position you as a top infosec candidate.

Part-Time Study Routes That Lead to Cyber Security Jobs: Evening Courses, Bootcamps & Online Masters

The frequency and sophistication of cyber-attacks have exploded in recent years, making cyber security one of the UK’s most in-demand skill sets. From safeguarding NHS patient data to defending FTSE 100 financial systems, organisations across sectors require qualified professionals—penetration testers, security analysts, incident responders and security architects—to protect critical infrastructure. Yet many professionals cannot pause their careers to upskill full time. Fortunately, an ecosystem of part-time learning pathways—evening courses, intensive bootcamps and flexible online master’s programmes—enables you to learn cyber security while working. This comprehensive guide explores every route: foundational CPD, immersive bootcamps, accredited online MScs, plus funding options, planning strategies and a real-world case study. Whether you’re an IT support technician, a software developer or a compliance manager aiming to pivot into security, you’ll discover how to build expertise at your own pace.

The Ultimate Assessment-Centre Survival Guide for Cyber Security Jobs in the UK

Assessment centres for cyber security positions in the UK are designed to mirror real-world threat landscapes and test both your technical acumen and soft skills under pressure. Across multiple stages—psychometric assessments, penetration testing exercises, incident response group tasks, case studies, interviews and even informal networking breaks—employers assess your ability to identify vulnerabilities, collaborate in high-stakes scenarios and communicate effectively. This guide walks you through each component, equipping you to stand out and secure your next role in cyber defence.