As a contract Threat Intelligence, you are hired to research, analyse, and operationalise intelligence about the threat actors, campaigns, and techniques that pose risks to an organisation's security, enabling the security team to be proactive in its defences rather than purely reactive to incidents. The work involves collecting and processing threat data from open source, commercial, and closed intelligence feeds, producing finished intelligence reports that contextualise threats for technical and executive audiences, supporting incident response teams with relevant threat context, mapping adversary behaviours to the MITRE ATT&CK framework, and integrating threat intelligence into security tooling including SIEM detection rules, threat hunting workflows, and vulnerability prioritisation processes.
Threat Intelligence contractors are expected to have deep knowledge of the threat landscape relevant to the client's industry and the analytical skills to derive actionable intelligence from large and diverse data sources. Experience using threat intelligence platforms such as Recorded Future, Mandiant Advantage, ThreatConnect, or MISP for managing intelligence collections and producing intelligence products is widely expected. Proficiency in applying MITRE ATT&CK to describe and detect adversary behaviour, and knowledge of the intelligence collection requirements and production processes that underpin a mature threat intelligence programme, is expected at senior level. The ability to research and profile specific threat actor groups, including tracking their tooling, infrastructure, and targeting patterns over time, is a key analytical skill. For roles focused on operational threat intelligence, experience integrating intelligence feeds into SIEM rules, vulnerability management prioritisation, and incident response playbooks is expected alongside the research and analytical capabilities.