Technical Content Editor – Cyber Threat Intelligence

Location: London or Remote
Duration: Permanent, full time role

The Technical Content Editor is a crucial role within our Intelligence Monitoring capability. It is a multi-disciplined role suited to a seasoned IT or IT Security professional ideally with either an Intelligence analysis background or experience supporting an intelligence function.
The role primarily supports the fast publishing of Threat Alerts to our clients via our Threat Intelligence Platform, 'ThreatMatch' and more widely supporting the contextualised analysis of Threat Actor activity and industry events.
As well as offering a level of technical and quality assurance to our products, the feedback pushed back into the analysts is vital to their continued development. The role is relatively fast paced, due to KPIs supporting the timeliness of material being published.
The preference would be for the candidate to be in London, however, remote options are available for the right candidate. Should the role become remote, ad-hoc travel to the London office to support team events, activities and training would be required.


  • At least 5 years of experience in a number of IT or IT Security roles
  • Understanding of multiple industries ideally including Financial Services, Government and Critical Infrastructure
  • Able to take technical information and clearly communicate this to multiple audiences
  • Able to translate cyber/security risk into business risk
  • Ability to write in a clear and concise manner, taking often long and technical information and turning it into short analysis
  • Experience in open source collection, use of online tools, experience querying internal databases of information in support of investigative efforts.
  • Professional experience writing short and long form reporting to a specified, technical writing style.

Preferred Experience

  • Operated in or support either a TI or CTI role/capability
  • Knowledge of STIX and MITRE ATT&CK
  • Familiarity with major cognitive bias types, and the ability to identify those cognitive biases when researching.
  • A high level of professionalism, focus, and emotional maturity.
  • Prior employment in a SOC/Operations Centre, or experience with Incident Response, network intrusion, penetration testing, malware analysis, or other related Information Security functions would be helpful
  • Experience with Threat Intelligence Platforms such as MISP or OpenCTI.

Additional Skills

  • Strong verbal communicator
  • Experience guiding and supporting junior colleagues
  • Foreign language speakers, especially Dutch, Russian, Farsi, Dari, Mandarin, Chinese, Japanese and Arabic

If you're interested in joining our team, email your CV and let us know why you think you're a good fit.


Get in touch