Threat Intelligence Analyst

Exciting opportunity to join North Starr’s prestigious end user organisation client in a new greenfield role. We are looking for someone with a strong background in threat investigations, coupled with a strong technical security operations background Role will be based in Berkshire

Day to day duties include:


  • Monitoring of alerts generated by our SIEM and other 3rd party monitoring
  • Identifying potential attack vectors & indicators of compromise
  • Reviewing of systems & networks whilst considering threat indicators
  • Automating the analysis of systems across the estate
  • Designing and implementing of signatures used to detect and prevent threats
  • Documenting and reporting of findings to management
  • Handling of incident response situations


The successful candidate should have:


  • 5 years experience in a technical security role with at leats 2 years in a threat intelligence role.
  • h platforms, supported by a solid understanding of networking
  • Ability to conduct investigations, combining best practice and critical thinking
  • Experience in incident response, malware analysis, or forensics
  • Excellent attention to detail with proven communication, documentation & reporting skills
  • Any of the following certifications would be advantageous :
    • CCNA CyberOps, CySA+
    • CCNA R&S, Security+, Network+, A+


Please send your CV ASAP for this hugely exciting opportunity.