Threat intelligence THIN
Developing and sharing actionable insights on current and potential security threats to the success or integrity of an organisation.
Revision notes
Updates for SFIA 9
- Theme(s) influencing the updates for this skill: Making SFIA easier to consume (enhance readability/guidance/descriptions).
- You can move to SFIA 9 when you are ready - SFIA 8 skill descriptions will still be available to use.
- Previous SFIA assessments or skills mapping are not impacted by this change.
Guidance notes
Activities may include, but are not limited to:
- gathering data from a variety of open or proprietary intelligence sources
- processing and classifying threat data to make it useful and actionable by others
- packaging the data for use by consumers of the information
- enabling the use of the data automatically by security tools
- providing threat intelligence to help others mitigate vulnerabilities or to respond to security incidents
- collaborating with internal teams and external partners to enhance threat detection capabilities
- analysing trends in cyber threats to predict future attack vectors
- developing threat intelligence frameworks and methodologies.
Understanding the responsibility levels of this skill
Where lower levels are not defined...
- Specific tasks and responsibilities are not defined because the skill requires a higher level of autonomy, influence, and complexity in decision-making than is typically expected at these levels. You can use the essence statements to understand the generic responsibilities associated with these levels.
Where higher levels are not defined...
- Responsibilities and accountabilities are not defined because these higher levels involve strategic leadership and broader organisational influence that goes beyond the scope of this specific skill. See the essence statements.
Developing skills and demonstrating responsibilities related to this skill
The defined levels show the incremental progression in skills and responsibilities.
Where lower levels are not defined...
You can develop your knowledge and support others who do have responsibility in this area by:
- Learning key concepts and principles related to this skill and its impact on your role
- Performing related skills (see the related SFIA skills)
- Supporting others who are performing higher level tasks and activities
Where higher levels are not defined...
- You can progress by developing related skills which are better suited to higher levels of organisational leadership.
Click to learn why SFIA skills are not defined at all 7 levels.
Show/hide extra descriptions and levels.
Levels of responsibility for this skill
2 | 3 | 4 | 5 | 6 |
Level 1
Threat intelligence: Level 2
Contributes to routine threat intelligence gathering tasks.
Monitors and detects potential security threats and escalates in accordance with relevant procedures and standards.
Threat intelligence: Level 3
Performs routine threat intelligence gathering tasks.
Transforms collected information into a data format that can be used for operational security activities.
Cleans and converts quantitative information into consistent formats.
Threat intelligence: Level 4
Collates and analyses information for threat intelligence requirements from a variety of sources.
Contributes to reviewing, ranking and categorising qualitative threat intelligence information.
Creates threat intelligence reports.
Evaluates the value, usefulness and impact of threat intelligence sources.
Threat intelligence: Level 5
Plans and manages threat intelligence activities.
Identifies the most impactful threat categories and types of information that can help defend against them. Reviews, ranks and categorises qualitative threat intelligence information.
Provides expert advice on threat intelligence activities.
Leads the production and editing of threat intelligence reports that enhance the intelligence production workflow. Distributes information and obtains feedback about the value, usefulness and impact of the data.
Threat intelligence: Level 6
Sets direction, plans and leads the organisation’s approach to threat intelligence, including the use of suppliers.
Identifies requirements for threat intelligence based on the assets to be protected and the types of intelligence that can help protect those assets.
Engages with and influences relevant stakeholders to communicate results of research and the required response.
Ensures quality and accuracy of threat intelligence information. Reviews threat intelligence capabilities.