HomeJobsLondonCyber Threat Intelligence Specialist
Back to all jobs
⚡ Source: ReedRef: 56858105

Cyber Threat Intelligence Specialist

Appcast Enterprise·London·Posted 3 days ago
🟢 Permanent
Tailor my CV for this job — Free

Job description

Original text imported from Reed

Cyber Threat Intelligence Specialist

Permanent

Location: London, Selby, Northampton, Glasgow or Ipswich

About the role: 

We’re looking for a Cyber Threat Intelligence Specialist to join our Cyber Security function in a pivotal role as we continue to advance Drax’ cyber resilience.

As a Cyber Threat Intelligence Analyst, you’ll produce high quality cyber threat intelligence that identifies, analyses and communicates threats, vulnerabilities and emerging trends to Drax’s IT, OT and cloud environments.

You’ll support vulnerability management by assessing exploitability, impact and likelihood, and advising on prioritisation. You’ll also develop and maintain threat actor profiles, campaigns, TTP assessments and intelligence reports for a range of diverse audiences.

Key accountabilities include:

  • Provide intelligence inputs into incident response, including threat enrichment, contextual analysis and post incident reporting.
  • Translate technical intelligence into clear, actionable guidance for Security, IT, OT and leadership teams.
  • Collaborate with wider security teams to ensure intelligence informs strategic planning, roadmaps and security controls.
  • Enhance CTI capabilities, including tooling, automation, collection sources and analytical processes to improve intelligence quality and efficiency.

Who we are

We’re not just talking about making a difference, we’re making it happen. We generate dispatchable, renewable power and create stable energy in an uncertain world. Building on our proud heritage, we have ambition to become the global leader in sustainable biomass and carbon removals.

You’ll be joining our teams of practical doers, future thinkers and business champions. We’re enabling a zero carbon, lower cost energy future for all, and working hard to decarbonise the planet for generations to come.

Who we’re looking for: 

To be successful in this role you’ll be able to demonstrate the following:

  • Previous experience producing or analysing cyber threat intelligence in a security or enterprise environment.
  • Experienced in contributing to incident response via threat enrichment or analysis.
  • Demonstrable experience of hands-on use of CTI/OSINT tools and creating intelligence products for varied audiences.
  • Understanding of cyber threat landscapes, threat actors and TTPs (e.g., MITRE ATT&CK, Diamond Model) coupled with knowledge of vulnerability management principles and how threats apply across IT, OT and cloud environments.
  • Ability to produce concise intelligence reports and prioritise relevant threats.
  • Clear written and verbal communication suited to both technical and non-technical audiences.

Rewards and benefits:

As you help us to shape the future, we’ve shaped our rewards and benefits to help you thrive and support your lifestyle. If successful in this role you’ll get:

  • A discretionary bonus depending on company performance
  •  Private Healthcare
  •  SAYE (Sharesave): discretionary scheme from time to time
  • Personal accident cover
  • Group personal pension plan where we’ll pay up to 10%
  • Holiday 25 days plus bank holidays
  • Reimbursement of the cost of your annual membership of one relevant and appropriate professional body

We’re committed to making a tangible impact on the climate challenge we all face. Drax is where your individual purpose can work alongside your career drive. We work as part of a team that shares a passion for doing what’s right for the future. With Drax you can shape your career and a future for generations to come.

Together, we make it happen.

At Drax, we’re committed to fostering an environment where everyone feels valued and respected, regardless of their role. To make this a reality, we actively work to better represent the communities we operate in, foster inclusion, and establish fair processes. Through these actions, we build the trust needed for all colleagues at Drax to contribute their perspectives and talents, no matter their background.

How to apply:

Think this role’s for you? Click the ‘apply now’ button to begin your Drax journey!

If you want to find out more about Drax, check out our LinkedIn page to see our latest news.  

We understand that you may have some additional questions about the role. If you’d like to have a confidential chat to discuss the role in more detail, please email  

SpeedCV AI

Key skills

AI-extracted from the job advert

Must-have skills
Cyber Threat Intelligence (CTI)OSINT toolsMITRE ATT&CK frameworkDiamond ModelIncident responseVulnerability managementTTP analysisIT/OT/Cloud security
Nice-to-have
Security automationThreat huntingCritical infrastructure securityEnergy sector experience
Soft skills
CommunicationAnalytical thinkingCollaborationStrategic planningPrioritisationTechnical writing
SpeedCV AI

Application advice

5 AI-generated recommendations to maximise your chances.

1

⭐ Highlight your MITRE ATT&CK and Diamond Model expertise prominently as these frameworks are specifically mentioned in the role requirements

2

📊 Quantify your CTI impact: 'Produced 45 threat intelligence reports reducing incident response time by 32%'

3

🔍 Emphasise OSINT tool proficiency and mention specific platforms you've used for threat hunting and analysis

4

⚡ Showcase cross-environment experience spanning IT, OT and cloud security as Drax operates across these domains

5

🎯 Demonstrate your ability to translate technical intelligence for diverse audiences from SOC analysts to C-suite executives

NEW
AI SpeedCV

Suggested CV bullets

3 bullets our AI drafted for this specific advert, mirroring its ATS keywords.

How to tailor your CV

Add these 3 bullets under your most recent experience:

  • Produced 65 cyber threat intelligence reports using MITRE ATT&CK framework, reducing mean time to threat identification by 28% across IT and OT environments
  • Led threat actor profiling for 12 APT groups targeting energy infrastructure, delivering Diamond Model assessments that informed £2.1M security investment decisions
  • Enhanced incident response capabilities through threat enrichment analysis, supporting 89 security incidents with contextual intelligence that reduced containment time by 35%

Free to copy — tailoring requires a 30-sec CV upload.

NEW
AI cover letter

Your cover letter is ready

We've drafted a cover letter for Appcast Enterprise. Preview the opening, then unlock the full personalised version.

Letter preview — tailored to Appcast Enterprise

Dear Hiring Manager,

Drax's commitment to cyber resilience in critical energy infrastructure aligns perfectly with my cyber threat intelligence expertise — particularly your focus on MITRE ATT&CK frameworks and cross-environment threat analysis spanning IT, OT and cloud domains.

My background in producing actionable threat intelligence reports, conducting threat actor profiling using Diamond Model methodology, and supporting incident response through threat enrichment positions me well for this role. I have extensive experience translating complex technical intelligence into strategic guidance for diverse stakeholders.

Get my personalised letter — free

Free signup, no card needed. Export to PDF/Word requires a £1.99 trial (14 days).

SpeedCV exclusive
SpeedCV AI

Interview questions

10 questions generated from this advert.

Technical

  • How would you use the MITRE ATT&CK framework to analyse a sophisticated APT campaign targeting critical infrastructure?
  • Describe your approach to threat actor profiling and how you would track TTPs across multiple campaigns
  • What OSINT tools and techniques would you use to gather intelligence on emerging ransomware groups?
  • How do you assess the exploitability and business impact of vulnerabilities in OT environments?
  • Explain how you would integrate threat intelligence into an organisation's vulnerability management programme

Behavioural

  • Tell me about a time when you had to communicate complex threat intelligence to non-technical stakeholders
  • Describe a situation where your threat analysis directly influenced an organisation's security strategy
  • Give an example of when you had to prioritise multiple high-priority threats with limited resources
  • Tell me about a challenging incident response where your threat enrichment made a critical difference
  • Describe how you've collaborated with different teams to improve overall cyber resilience
SpeedCV AINEW

STAR answer examples

Model answers using the Situation-Task-Action-Result framework. Adapt to your own experience.

1Question

Tell me about a time when you had to communicate complex threat intelligence to non-technical stakeholders

During a sophisticated supply chain attack targeting our manufacturing partners, I needed to brief the executive team on the threat landscape. The situation involved a nation-state actor using zero-day exploits across 8 supplier networks. I created a visual threat assessment using traffic light indicators, translating technical TTPs into business risk language. I presented the £3.2M potential impact alongside 3 prioritised mitigation options. The action resulted in immediate board approval for enhanced supplier security requirements and a 15% increase in our threat intelligence budget. This approach became our standard template for executive briefings.
2Question

Describe a situation where your threat analysis directly influenced an organisation's security strategy

I identified an emerging ransomware group specifically targeting energy companies through spear-phishing campaigns. The task was to assess our vulnerability and recommend strategic changes. I analysed 23 similar attacks using MITRE ATT&CK mapping and discovered a common exploitation path through legacy SCADA systems. I produced a comprehensive threat assessment showing 67% of our OT infrastructure was vulnerable. My recommendations led to a £1.8M OT security modernisation programme and implementation of network segmentation. Six months later, we successfully defended against the same threat actor, validating the strategic investment.

Similar jobs

View all