Company
GCS
Location
London
Company Size
51-200 employees
Salary
Competitive salary dependent on experienceAbout the job
The Senior Cyber Threat Intelligence Analyst role at GCS is designed for candidates with 7–10 years of experience in Cyber Threat Intelligence (CTI) who are hands-on with Threat Intelligence Platforms (TIPs). The role requires deploying, configuring, operating, and optimizing TIP solutions such as Anomali, ThreatConnect, MISP/OpenCTI, Recorded Future, Intel 471, and Group-IB, including managing data models, ingestion pipelines, API connectors, enrichment workflows, and workflow customization. The analyst will perform tactical, operational, and strategic threat analysis, validate and enrich IOCs, TTPs, malware families, and threat actor information, map intelligence to MITRE ATT&CK and organizational risk, and support incident response, SOC, detection engineering, and vulnerability management teams with actionable intelligence. Additional responsibilities include designing automation workflows, integrating TIP data with SIEM, SOAR, EDR, and other systems, optimizing scoring and prioritization logic, ensuring platform governance, data quality, and adherence to standards, and mentoring junior analysts. The position emphasizes collaboration between analysts and engineers, creating SOPs and workflow documentation, and contributing to platform architecture and AI-driven enhancements. Required skills include strong Python scripting, API and JSON handling, data ingestion pipelines, cloud-based TIP deployments (AWS/Azure/GCP), and a strong understanding of threat actor behavior and malware analysis. Preferred certifications include SANS GCTI/FOR578, ArcX Cyber Threat Intelligence, CTIA, and MITRE ATT&CK Defender (MAD). The role provides relocation bonus, visa sponsorship, and medical cover, and requires candidates to be authorized to work in the UK.
Apply For this Job