cover image
Accenture UK & Ireland

SOC - Cyber Threat Intelligence Analyst

On site

London, United kingdom

Junior

Full Time

03-03-2026

Share this job:

Skills

Leadership Creativity Data Analysis Incident Response Forensics Research Training

Job Specifications

Role: SOC - Cyber Threat Intelligence Specialist

Location: London

Salary: Competitive salary and package dependent on experience

Career Level: Consultant

Please Note: Any offer of employment is subject to satisfactory BPSS and the candidate being granted a level of security clearance which typically requires 10 years continuous UK address history, usually including no periods of 30 consecutive days or more spent outside of the UK, and a declaration of being a British passport holder with no dual nationalism at the point of application.

Note: The above information relates to a specific client requirement.

About Accenture Cyber Intelligence (ACI) 

ACI is a global team spanning 13 countries and speaking more than 30 languages. We deliver high quality intelligence analysis, cyber insights, and critical services that help clients achieve their strategic goals. Our people are our strength; we value creativity and entrepreneurship. We invest in new ideas, automate where we can, and work with powerful tools and data to drive innovation. Above all, we take an ego free, client focused approach to guiding organisations through the cyber landscape.

We believe in inclusion and diversity and supporting the whole person. Our core values comprise of Stewardship, Best People, Client Value Creation, One Global Network, Respect for the Individual and Integrity. Year after year, Accenture is recognized worldwide not just for business performance but for inclusion and diversity too.

“Across the globe, one thing is universally true of the people of Accenture: We care deeply about what we do and the impact we have with our clients and with the communities in which we work and live. It is personal to all of us.” – Julie Sweet, Accenture CEO

Role Description 

The Threat Intelligence Specialist focuses on threat hunting, detection engineering, threat intelligence, and adversary profiling to strengthen the SOC’s ability to detect and respond to enduring and emerging threats. They will develop detection logic, signatures, and threat hunting guidance to enable the identification of threat activity. They will support security incident management, providing expertise and insight into threat actor tradecraft, tooling, and infrastructure to drive investigative actions. They are a research-minded threat intelligence professional with experience of analysing and tracking threat campaigns, adversary tooling, and infrastructure. They stay abreast of the latest threats, recognize the value of intelligence, and believe it should drive operations. They are a motivated team member who is always willing to lend a hand, mentor a colleague, or increase our global team’s awareness by sharing your knowledge and approaches with others. They are productive, easy to work with, and understand that adherence to a good process is key to excellence.

Key Responsibilities

Support the execution of proactive threat hunts across IT and OT environments using hypothesis-driven approaches.

Analyse threat intelligence feeds, IOCs, and TTPs to identify relevant threats

Develop and maintain an internal threat knowledge base aligned with MITRE ATT&CK.

Provide contextual intelligence and adversary insights to SOC analysts during investigations.

Track threat actor campaigns targeting the organisation’s sector.

Collaborate with the Security Content Engineer to translate threat intelligence into actionable detections.

Produce periodic threat landscape reports and briefings for SOC leadership

Contribute to red team/blue team exercises and purple teaming initiatives.

Role Requirements

Degree or equivalent qualifications, preferably relating to politics, intelligence, information technology or information security OR equivalent knowledge through apprenticeship, vocational training or employment.

Experience: 4–7 years in threat intelligence, threat hunting, or incident response.

The following skills and experience are essential for this role:

Proficient in using threat intelligence, data analysis or technical analysis tools and platforms 

Proficient in tracking adversary infrastructure, intrusions, and malware campaign activity 

Proficient with frameworks such as MITRE ATT&CK in intelligence reporting 

Experience communicating current and emerging threats, key trends, and potential impact  

Experience in developing custom detection signatures, SIEM rules or Enterprise Detection and Response (EDR) queries (e.g., Sigma, KQL, Suricata signatures, Yara rules)

Experience conducting or supporting the delivery of proactive threat hunting

Experience conducting focused research as part of a team and independently 

Experience delivering threat intelligence to a range of customer needs 

Desired skills:

Exposure to malware reverse engineering, network intrusion analysis, host intrusion analysis, log analysis, vulnerability research or digital forensics

Understanding of geopolitics and awareness of how it can shape hostile cyber activity

Certifications (pr

About the Company

Accenture is a leading global professional services company that helps the world’s leading businesses, governments and other organisations build their digital core, optimise their operations, accelerate revenue growth and enhance citizen services—creating tangible value at speed and scale. We are a talent- and innovation-led company with approximately 799,000 people serving clients in more than 120 countries. Technology is at the core of change today, and we are one of the world’s leaders in helping drive that change, with s... Know more