×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Threat Analyst

Job in Birmingham, West Midlands, B1, England, UK
Listing for: hackajob
Full Time position
Listed on 2026-03-07
Job specializations:
  • IT/Tech
    Cybersecurity
Job Description & How to Apply Below

Overview

hackajob is collaborating with NTT DATA UK to connect them with exceptional tech professionals for this role. We’re a business with a global reach that empowers local teams, and we undertake hugely exciting work that is genuinely changing the world. Our advanced portfolio of consulting, applications, business process, cloud, and infrastructure services will allow you to achieve great things by working with brilliant colleagues and clients on exciting projects.

Our inclusive work environment prioritises mutual respect, accountability, and continuous learning for all our people. This approach fosters collaboration, well-being, growth, and agility, leading to a more diverse, innovative, and competitive organisation. We are also proud to share that we have a range of Inclusion Networks such as: the Women’s Business Network, Cultural and Ethnicity Network, LGBTQ+ & Allies Network, Neurodiversity Network and the Parent Network.

For more information on Diversity, Equity and Inclusion please :
Creating Inclusion Together at NTT DATA UK | NTT DATA

Core Responsibilities
  • Threat Intelligence Analysis and Collection
  • Research, track, and analyze Indicators of Compromise (IOCs) and threat actor profiles using sources that include open-source (OSINT), dark web forums, government feeds, and commercial intelligence platforms.
  • Conduct detailed analysis of Threat Actor Tactics, Techniques, and Procedures (TTPs) and malware.
  • Deliver actionable intelligence insights to enhance detection, prevention, and response embedded within the threat lifecycle.
  • Maintain up-to-date geopolitical knowledge influencing the cyber threat landscape.
  • Threat Assessment and Reporting
  • Develop and deliver weekly threat briefs, annual landscape overviews, and ad-hoc risk signals for both technical and non-technical audiences.
  • Produce detailed reports based on industry-specific campaigns or identified vulnerability patterns.
  • Communicate emerging threats to relevant technical stakeholders, influencing rapid mitigation strategy formulation.
  • Intelligence Integration and Technology Alignment
  • Integrate threat intelligence feeds (TIPs) into platforms like SIEM or SOAR, prioritizing automation workflows where required.
  • Refine search prevention frameworks using custom threat correlation rules.
  • Collaborate directly with SOC teams to enhance real-time detection and response capabilities.
  • Monitoring Threat Campaigns and Emerging Techniques
  • Track and assess malware campaigns, underground forums, and marketplaces to identify emerging attack vectors.
  • Analyze threat data to produce predictive insights about probable trends and future adversarial strategies.
  • Provide targeted support to incident response teams with contextualized intelligence.
  • Stakeholder Collaboration and Communication
  • Brief clients and internal teams about current threat landscapes and risks relevant to their operations.
  • Contribute to cross-functional threat modeling, risk assessment workshops, and proactive planning.
  • Represent NTT DATA at external security forums and intelligence-sharing communities.
  • Demonstrated skills in cyber threat modeling, malware reverse engineering, and API-triggered automation.
  • Certifications and Technical Proficiency
  • Certifications Preferred: CREST CPTIA, GCTI, MITRE ATT&CK CTI or related.
  • Must meet UK SC Clearance eligibility guidelines.
  • Advanced scripting capabilities (Python, Power Shell preferred).
Preferred Qualifications
  • Batchelor’s Degree in Cybersecurity, International Relations, or Intelligence Studies strongly preferred.
  • Direct experience working in government, military, or intelligence organizations advantageous.
  • Experience identifying and neutralizing Advanced Persistent Threats (APTs) in target environments.
Success Metrics (6–12 Months)
  • Deliver minimum 15 intelligence reports/month, meeting a quality accuracy benchmark above 95%.
  • Reduce detection and response times by 25% via improved monitoring techniques.
  • Establish three new high-quality threat detection models with technical playbooks per quarter.

We offer a range of tailored benefits that support your physical, emotional, and financial wellbeing. Our Learning and Development team ensure that there are continuous…

Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary