Threat Intelligence Manager

BT Group
Bristol
4 months ago
Applications closed

Related Jobs

View all jobs

Cyber Threat Intelligence Analyst

Field & Partner Marketing Manager – Cybersecurity UK

Senior Cyber Threat Intelligence Analyst

Senior Cybersecurity Programme Manager

SOC Manager

Head of Security Operations - FTSE 100

What you’ll be doing

Leading a multiskilled team of intelligence specialists to deliver operational outcomes Represent BT as the Subject Matter Expert on Cyber Threat Intelligence; delivering outputs to customers, CISOs, staff and Cyber Security community.  Managing intelligence and threat hunting responsibilities as a core part of the incident response team to investigate and respond to security incidents. Maintain high levels of awareness of the latest threat intelligence and cybersecurity trends to fill the role of CTI SME within wide range of Security engagements. Leading collaboration activities with internal teams across the organisation in order to provide further internal understanding of potential adversaries and attack vectors. Delivery of verbal presentations and threat briefs, in-person and virtually, to internal and external stakeholders at all seniority levels. Relationship management within the wider Information Security and Intelligence community. Representation of BT in a wide range of for a to drive impactful collaboration across the Telco and National Security communities. This includes direct engagement with NCSC and the NCA. Ownership of Vendor relationships - driving effective integration and usage of vendor platforms, in order to drive best value and effect for BT. Developing the skills and knowledge of your team as CTI practitioners Shaping the development of CTI and threat hunting capability within BT. Senior intelligence practitioner for the team able to share best practice and oversight of intelligence outputs to ensure the highest quality. Ensuring that BT takes a threat led approach to cyber security with intelligence having a demonstrable impact on security decision making at all levels of the organisation.

Who are we looking for?

Skills/Experience

Must Have

Proven experience in leading threat intelligence teams and managing technical staff. Track record of delivering measurable impact from intelligence  Holds current relevant professional qualifications in Intelligence and/or Information Security (e.g. CREST CTIM)– or willing to work towards Strong knowledge of cybersecurity principles, threat landscapes, and attack vectors. Experience of building intelligence coverage of sophisticated nation state threats Knowledge of intelligence tooling Excellent analytical and problem-solving skills. Excellent oral and written communication skills  Proactive approach to team management and supporting cross department initiatives Demonstrable experience of proactive, operational delivery in a fast-paced security environment Knowledge and understanding of current security threats, threat models, frameworks and common mitigations Demonstrable management skills, with an ability to communicate effectively and develop staff. Intelligence reporting SME able to deliver high quality products and maintain standards and quality across the team.

Nice to Have

Knowledge of commercial intelligence platforms Experience within another Telecommunications/CNI environment Network analysis skills Experience in generating threat intelligence from technical data sources

Benefits

At BT, we entertain, educate, and empower millions of people every single day. We’re a brand built on connecting people – whether that’s friends, family, businesses, or communities. Working here, you’ll receive an attractive salary and a range of competitive benefits, but – more than that – you’ll be joining an ambitious organisation with a culture of togetherness, collaboration, and inclusivity, that takes a genuine and proactive interest in your progress and development.

Competitive salary 10% on target bonus BT Pension scheme, minimum 5% Employee contribution, BT contribution 10% 25 days annual leave (not including bank holidays), increasing with service Huge range of flexible benefits including cycle to work, healthcare, season ticket loan World-class training and development opportunities Option to join BT Shares Saving schemes. Discounted broadband, mobile and TV packages Access to 100’s of retail discounts including the BT shop

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.