Skip to content
site-logo

FEDIP Job Profiles

  • Home
  • About
  • All Job Roles
  • Submit Feedback
  • News
  • FAQs

SFIA Skills: Threat Intelligence (THIN)

Threat modelling (THIN) (Level 6)

Uses threat intelligence to develop attack trees.

Threat intelligence gathering (THIN) (Level 6)

Reviews threat intelligence capabilities. Sets direction, plans and leads the organisation’s approach for threat intelligence, including use of suppliers.

Threat modelling (THIN) (Level 4)

Undertakes routine threat modelling tasks. Analyses the significance and implication of process intelligence to identify trends, potential threat sources and their capabilities.

Threat intelligence gathering (THIN) (Level 4)

Performs threat intelligence gathering tasks. Collates and analyses information for threat intelligence requirements from a variety of sources.

Source evaluation (THIN) (Level 4)

Evaluates the value, usefulness and impact of sources of threat intelligence sources.

Reporting (THIN) (Level 4)

Creates threat intelligence reports

Information review (THIN) (Level 4)

Contributes to reviewing, ranking and categorising qualitative threat intelligence information.

Advice (THIN) (Level 4)

Provides advice on threat intelligence activities to help others understand and mitigate vulnerabilities or to respond to security incidents.

Threat modelling (THIN) (Level 5)

Conducts complex threat modelling tasks. Predicts and prioritises threats to an organisation and their methods of attack.

Threat intelligence gathering (THIN) (Level 5)

Plans and manages threat intelligence activities. Identifies which are the most impactful threat categories and the types of information that can help defend against them.

Source evaluation (THIN) (Level 5)

Distributes information and obtains feedback about the value, usefulness and impact of the data.

Reporting (THIN) (Level 5)

Leads production and editing of threat intelligence reports that enhance the intelligence production workflow.

Information review (THIN) (Level 5)

Reviews, ranks and categorises qualitative threat intelligence information.

Advice (THIN) (Level 5)

Provides expert advice on threat intelligence activities and to help others mitigate vulnerabilities or to respond to security incidents.

Threat modelling (THIN) (Level 3)

Conducts basic modelling of threats based on gathered intelligence.

Threat intelligence gathering (THIN) (Level 3)

Performs routine threat intelligence gathering tasks. Interprets detected security threats to identify actionable insights.

Reporting (THIN) (Level 3)

Transforms collected information into data that can be used for operational security activities.

Information review (THIN) (Level 3)

Cleans and converts quantitative information into consistent formats that can be used for operational security activities.

Threat modelling (THIN) (Level 2)

Assists in threat modelling activities based on intelligence gathered.

Threat intelligence gathering (THIN) (Level 2)

Contributes to routine threat intelligence gathering tasks. Monitors and detects security threats and escalates in accordance with relevant procedures and standards.

Information review (THIN) (Level 2)

Assists with the cleaning and conversion of information gathered into consistent formats for use in operational security activities.

Cyber threat understanding (THIN)(Level 5)

Maintains an understanding of the local threat environment and applies this knowledge to inform and provide context for wider activities. Uses local threat information in decision-making and planning.

Job Families

  • IT Operations (47)
    • Application Operations Engineer (6)
    • End User Computing Engineer (5)
    • Infrastructure Engineer (5)
    • Infrastructure Operations Engineer (5)
    • Service Transition Manager (4)
    • Service Desk Manager (4)
    • IT Service Manager (4)
    • Command and Control Centre Manager (4)
    • Business Relationship Manager (3)
    • Change and Release Manager (3)
    • Incident Manager (2)
    • Problem Manager (2)
  • User Centred Design (37)
    • User Researcher (6)
    • Service Designer (6)
    • Interaction Designer (6)
    • Graphic Designer (6)
    • Content Designer (6)
    • Accessibility Specialist (4)
    • Technical Writer (2)
    • Content Strategist (1)
  • Architecture (27)
    • Solutions Architect (5)
    • Technical Architect (5)
    • Enterprise Architect (4)
    • Business Architect (4)
    • Security Architect (3)
    • Network Architect (3)
    • Data Architect (3)
  • Software Development (24)
    • Software Developer (9)
    • Development Operations Engineer​​ (9)
    • Frontend ​Developer​ (6)
  • Data (16)
    • Data Engineer (5)
    • Data Analyst (5)
    • Data Scientist (4)
    • Analytics Engineer (4)
    • Data Ethicist (2)
  • Product and Delivery (21)
    • Business Analyst (6)
    • Product Manager (5)
    • Delivery Manager (4)
    • Digital Portfolio Manager (4)
    • Service Owner (1)
    • Programme Delivery Manager (1)
  • Quality Assurance Testing (10)
    • Quality Assurance Testing (QAT) Analyst (4)
    • Test Engineer (4)
    • Test Manager (2)
  • Cyber Security (10)
    • Cyber Security Specialist (Governance Risk and Compliance) (4)
    • Cyber Security Specialist (Operations) (4)
    • Cyber Security Analyst (2)
  • Information Governance (6)
    • Information Governance Officers​ (3)
    • Information Governance Manager​​s (2)
    • Data Protection Officer​​ (1)
  • Patient Services (4)
    • Records and Information Manager​​ (4)
    • Clinical Coding (0)
  • Digital Leadership Roles (4)
    • CxIO (1)
    • Chief Audit Officer (1)
    • Chief Information Officer (1)
    • Chief Technology Officer (1)
  • Clinical Informatics (2)
    • Clinical Informatician​ (2)
  • Knowledge Management (0)
  • Learning and Development (0)
FEDIP logo

The Federation for Informatics Professionals in Health and Care

Registered in England and Wales No. 10639143

email: info@fedip.org

Copyright © 2025 All Rights Reserved FEDIP | Use of cookies | Legal notices
Registered in England and Wales No. 10639143

website by Sarah Scriven