Skip to main content

Threat Intelligence / Operations Lead – SC Cleared – Inside IR35

On Site : 1
Contract Rate : 500
Contract Job : 1
Salary range high : 550
Salary range low : 500

Threat Intelligence / Operations Lead – SC Cleared – Inside IR35

  • London
  • Contract
  • Consulting
  • GBP500 - 550 per year

Threat Intelligence / Operations Lead – SC Cleared – Inside IR35

SR2 are working with a key consultancy client who are looking for a Threat Intelligence & Threat Operations Lead to drive the threat-led direction of a intelligence-focused SOC supporting a critical national security programme. This is a high-impact leadership role requiring a blend of hands-on expertise, stakeholder influence, and strategic vision.

The successful candidate will be responsible for embedding a threat-informed detection strategy across operational, tactical, and strategic levels—guiding both current delivery and future capability uplift. Working within a multi-tenant environment under a federated SOC structure, you will have direct influence on shaping priorities, upskilling the team, and integrating threat intelligence with SOC output at scale.

Key Responsibilities

  • Provide strategic leadership across threat intelligence and threat operations, ensuring alignment with wider organisational risk appetite and threat posture.
  • Lead the definition and execution of threat modelling and detection priorities, including mapping to MITRE ATT&CK and other relevant frameworks.
  • Act as the technical authority and thought leader for intelligence-led detection within a growing multi-tenant SOC, managing ~2TB/day log ingestion.
  • Translate complex threat actor behaviours and geopolitical risks into actionable detection strategies.
  • Oversee the development and continual refinement of Splunk-based detection logic in coordination with engineering and analyst teams.
  • Advise senior stakeholders on emerging threats, operational risks, and strategic mitigation opportunities.
  • Mentor and upskill SOC analysts and content developers, elevating threat understanding across the team.
  • Contribute to longer-term planning around how threat intelligence and detection capabilities evolve as the service scales into a future strategic SOC.

Essential Experience

  • Proven track record in leading threat intelligence or threat operations functions within a SOC or cyber defence capability.
  • Experience operating in a strategic advisory capacity, influencing senior decision-makers across government or highly regulated sectors.
  • Deep understanding of cyber threats, actor TTPs, and the integration of threat intelligence into detection and response processes.
  • Expertise in developing threat-informed detection strategies using frameworks such as MITRE ATT&CK, Cyber Kill Chain, etc.
  • Familiarity with SIEM platforms—Splunk strongly preferred—and understanding of detection logic lifecycle.
  • Strong interpersonal and communication skills; capable of engaging confidently with technical and non-technical stakeholders.
  • Active SC clearance.

Role Context

  • The team supports a federated SOC environment operating beneath a centralised national SOC.
  • You’ll join at a time of transformation, as the service scales from interim delivery into a long-term strategic capability.
  • This is a highly visible role with scope to shape the future operating model, define detection priorities, and mentor future leaders within the SOC function.
Upload your CV/resume or any other relevant file. Max. file size: 4MB.


You can apply to this job and others using your online profile. Click the link below to submit your online profile and email your application to this employer.