Skip to main content
Stem recruitment specialists

Find your future role

Job title

Cyber Threat Analyst

Ref no. BHN560129
Location Crawley, England
Start date ASAP
Job type Permanent
Job status Closed

Job summary

As a Cyber Threat and Vulnerability Analyst, you will support the Cyber Security Operations Lead in identifying and mitigating security vulnerabilities understanding associated risks, and developing strategies to protect our critical infrastructure

Key skills required for this role

Cyber Threat Intelligence, CTI, Digital forensics, OWASP 10,SANS, MITRE ATT&CK, vulnerability research, malware analysis, STiX, Cyber Kill Chain, Diamond Model, vulnerability scanning, Qualys, Nessus, OpenVAS, Kenna, Rapid7, CRTIA, CRTIM, CEH, CCSP


Are you passionate about defending critical infrastructure from cyber threats? Do you possess expertise in IT security, incident response, threat intelligence, and vulnerability management?

Job description

Your efforts will minimize the risk of business disruption, reputational damage, and customer impact from cyber incidents.

This is a permanent job opportunity situated in Crawley, West Sussex, offering a hybrid working arrangement.

Key Responsibilities:

  • Collect, review, and assess cyber threat intelligence from various sources.
  • Develop and maintain internal vulnerability management policies, standards, and procedures.
  • Collect, review, correlate and assess cyber threat intelligence and advisories from multiple sources to identify potential risks and vulnerabilities to identify relevant countermeasures.
  • Develop and maintain internal vulnerability management policies, standards and procedures that underpin the vulnerability management lifecycle.
  • Plan and coordinate regular cyber security penetration testing and vulnerability scanning activities.
  • Support a program of cyber security improvements affecting our technical, procedural, and policy-based security arrangements.


  • 3 years of experience in IT security, including incident response, threat intelligence, vulnerability management, penetration testing, and ethical hacking in an enterprise environment.
  • Practical experience with vulnerability scanning and management, systems such as Qualys, Nessus, OpenVAS, Kenna, Rapid7
  • Certification in one or more of the following is desirable: CRTIA, CRTIM, CEH, CCSP.
  • Understanding of security frameworks and methodologies, such as OWASP 10, SANS TOP 25, MITRE ATT&CK.
  • Practical experience with vulnerability scanning and management systems, such as Qualys, Nessus, OpenVAS, Kenna, Rapid7.
  • Knowledge of active cyber security threats and actors.

Matchtech is a STEM Recruitment Specialist, with over 35 years’ experience

Learn more about Matchtech

Let us find jobs for you