 
        Overview Vanquish Tech specializes in customized technology solutions designed to empower businesses of all sizes. Unlike conventional providers, we offer adaptable solutions tailored to the evolving needs of our clients, recognizing that businesses are dynamic entities. Our team is committed to delivering efficiency, innovation, and dedication to our clients ever-changing environments. We strive to revolutionize the market with trustworthy and cutting-edge solutions. Beyond mere provision, we accompany our clients through every phase of their technological journey, ensuring alignment with their specific business objectives. From initial qualification processes to comprehensive assessments, we prioritize a deep understanding of our clients needs. What truly distinguishes us is our unwavering dedication to client experience. We dont just deliver solutions; we strive to make a meaningful impact. We value personal connections and ensure that every client, irrespective of size, feels valued. From project inception through implementation and ongoing support, our commitment is to provide clients with the assurance that they are valued by a company that is both attentive and impactful. Role Title: Threat Intelligence Analyst Reporting Line Manager: Head of Threat Intelligence Onsite Requirements (e.g. number of days per week onsite): 5 days Hybrid/Remote Working Policy: onsite Main Location of Work: London Additional Locations: Travel Requirements (e.g. Domestic/international, frequency) Contract Details Preferred Start Date: ASAP Length of placement / Initial Term: 6-12 months Extension likelihood: Yes Maximum Daily Rate or Budget Range: 500 IR35 Status (inside / Outside / To Be Determined) Inside Experience Requirements Technology & Vendor Skillsets Required: Familiarity with threat intelligence platforms (TIPs), SIEMs, and threat data enrichment tools. Experience using Breach and Attack Simulation (BAS) platforms to build and validate threat scenarios. Strong understanding of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modeling. Hands-on experience with penetration testing tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera. Experience producing threat reports and briefings. Certifications Required or Preferred: Years of relevant experience: 8 years of experience in threat intelligence, cybersecurity operations, or penetration testing. Proven ability to collaborate across technical teams, including Red/Blue teams and SO Industry Experience Required or Preferred: Key Soft Skills (e.g Communication, leadership, stakeholder management): Analytical and detail-oriented with a strong sense of curiosity. Collaborative and team-focused, with a proactive approach to cross-functional engagement. Able to work independently and manage multiple priorities in a fast-paced environment. High integrity and discretion when handling sensitive information. Strong cultural awareness and ability to work effectively in a global organization. A calm approach, with the ability to perform well under pressure Role Responsibilities Primary Responsibilities / Deliverables: Monitor and analyze the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organizations business and technology environment. Collaborate with Red Team, Blue Team, and Penetration Testing teams to integrate threat intelligence into testing scenarios using Breach & Attack Simulation (BAS) platforms and enhance defensive strategies. Act as a liaison between threat intelligence and offensive security teams to ensure alignment on threat modeling and adversary simulation exercises. Support threat hunting activities by providing contextual intelligence and working alongside hunt team members. Conduct threat modeling of threat actors, including their capabilities, motivations, and potential impact. Leverage the MITRE ATT&CK framework to map threat actor behaviors and support detection engineering. Develop and maintain threat profiles, attack surface assessments, and adversary emulation plans. Collaborate with global stakeholders across regions (Japan, EMEA, Americas, APAC, India) to align threat intelligence requirements, deliverables, and operational priorities. Deliver timely, high-quality threat briefings and risk assessments to operational stakeholders. Drive continuous improvement of threat intelligence processes, tooling, and automation. Participate in incident response investigations, providing threat context and attribution support. Maintain awareness of global regulatory and compliance requirements related to threat intelligence and offensive security operations. Key Projects or Initiatives: Level of Autonomy: (e.g independent contributor, team-based, leadership) Threat Intelligence Analyst will play a critical role in identifying, analyzing, and communicating cyber threats to support proactive defense strategies. Leveraging the knowledge and background in penetration testing, the Analyst will act as a key liaison between the Threat Intelligence team and Red/Blue teams, facilitating collaboration and ensuring threat insights are operationalized effectively.