Senior Threat Hunting Analyst

Senior Threat Hunting Analyst

London Full-Time 43200 - 72000 £ / year (est.) No home office possible
L

At a Glance

  • Tasks: Lead proactive threat hunts and develop cutting-edge hunting techniques.
  • Company: LSEG is a global leader in financial markets infrastructure and data.
  • Benefits: Enjoy a dynamic work environment with opportunities for growth and learning.
  • Why this job: Join a mission-driven team focused on cybersecurity and making a real impact.
  • Qualifications: Experience in cyber security operations and proficiency in security tools required.
  • Other info: We value diversity and are an equal opportunities employer.

The predicted salary is between 43200 - 72000 £ per year.

Senior Threat Hunting Analyst

Apply locations London, United Kingdom time type Full time posted on Posted 2 Days Ago job requisition id R0100172

LSEGCyber security operations is a central function employing people, process and technology to proactively prevent, detect and respond to cyber security incidents. Security operations spans multiple pillars including cyber threat intelligence, cyber threat detection, data loss prevention, cyber incident response and cyber threat hunting.

This role sits within the cyber threat hunting pillar and is responsible for driving a proactive hunt based approach to cyber defense, leveraging large disparate data sets, analytical techniques and leveraging of deep subject matter expertise across a broad range of disciplines to help identify rare, unknown and anomalous behaviours.

Key Responsibilities

  1. Perform intelligence led proactive threat hunts across the estate, utilising a range of tooling available, and focusing hunts on relevant behavioural tactics, techniques, and procedures (TTPs) identified as potential threats to the organisation.
  2. Contribute to detection engineering initiatives by identifying opportunities for, and implementation of new detections as an output of threat hunts completed.
  3. Support other functions within security operations by responding to hunt requests and by applying your expertise in advanced actors and TTPs for ongoing incidents, working closely with our incident responders.
  4. Research new attack behaviours and TTPs used by threat actors, leading to new hunting and detection opportunities.
  5. Assist in the development and maturity of the threat hunting process and team through development of cutting edge hunting techniques and introduction of automation into the threat hunting process.
  6. Develop threat hunting hypothesis in collaboration with the threat intelligence team, helping to track relevant threat actors, campaigns and emerging threats and the TTPs they use.
  7. Cross-train and mentor wider analyst team in the development of threat hunting.
  8. Represent threat hunting to the wider information security team, and to the wider business, including senior stakeholders, through reporting, presentations and knowledge sharing sessions.

Technical / job functional knowledge

  1. Experience within cyber security operations as either an incident responder, threat hunter, threat intelligence analyst, or similar role.
  2. Extensive experience in various security tooling across endpoint, cloud and network, including XDR/EDR technology, SIEM, AWS CloudTrail, Azure Sentinel, IDS/IPS.
  3. Proficiency in multiple query languages such as Splunk or KQL, with an ability to manipulate and analyse large data sets.
  4. Expertise in formulating threat hunting hypotheses and working with available data sets to determine conclusions.
  5. Solid understanding of current TTPs used by threat actors and an ability to replicate behaviours in a lab environment to generate telemetry.
  6. Direct experience working with the Mitre ATT&CK Framework or similar, with an ability to utilise the framework to identify detection gaps for threat hunting.
  7. Strong competence being able to quickly respond to emerging threats, showcasing an ability to develop and perform hunts, while working under strict deadlines.

Personal skills and capabilities

  1. Able to operate autonomously and identify opportunities to deliver impactful results.
  2. Curiosity and a desire to gain knowledge.
  3. Ability to work in a fast-paced environment, whilst remaining calm under pressure.
  4. Strong verbal and written communication and collaboration skills.
  5. Preferred competence with one or more programming/scripting languages, such as Python, Go, Rust or similar.
  6. Previous experience working with automation pipelines, and utilising Jupyter notebooks.

LSEG is a leading global financial markets infrastructure and data provider. Our purpose is driving financial stability, empowering economies and enabling customers to create sustainable growth.

We are proud to be an equal opportunities employer. This means that we do not discriminate on the basis of anyone’s race, religion, colour, national origin, gender, sexual orientation, gender identity, gender expression, age, marital status, veteran status, pregnancy or disability, or any other basis protected under applicable law.

#J-18808-Ljbffr

Senior Threat Hunting Analyst employer: London Stock Exchange Group

At LSEG, we pride ourselves on being an exceptional employer, offering a dynamic work environment in the heart of London that fosters innovation and collaboration. Our commitment to employee growth is evident through continuous learning opportunities and mentorship programs, ensuring that our team members thrive in their careers while contributing to cutting-edge cyber security initiatives. Join us to be part of a diverse and inclusive culture where your expertise in threat hunting will make a meaningful impact on global financial stability.
L

Contact Detail:

London Stock Exchange Group Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Senior Threat Hunting Analyst

✨Tip Number 1

Familiarize yourself with the latest TTPs used by threat actors. This knowledge will not only help you in your threat hunting but also demonstrate your expertise during interviews.

✨Tip Number 2

Engage with the cyber security community through forums and social media. Sharing insights and learning from others can enhance your understanding and keep you updated on emerging threats.

✨Tip Number 3

Practice using various security tools and query languages like Splunk or KQL. Hands-on experience will give you confidence and make you stand out as a candidate.

✨Tip Number 4

Prepare to discuss your previous experiences in threat hunting and incident response. Be ready to share specific examples of how you've identified and mitigated threats in the past.

We think you need these skills to ace Senior Threat Hunting Analyst

Cyber Security Operations
Threat Hunting
Incident Response
Threat Intelligence Analysis
XDR/EDR Technology
SIEM
AWS CloudTrail
Azure Sentinel
IDS/IPS
Splunk
KQL
Data Analysis
Mitre ATT&CK Framework
Threat Hunting Hypotheses Formulation
Automation Techniques
Programming/Scripting Languages (Python, Go, Rust)
Jupyter Notebooks
Strong Communication Skills
Collaboration Skills
Ability to Work Under Pressure
Curiosity and Desire to Learn

Some tips for your application 🫡

Understand the Role: Make sure you fully understand the responsibilities and requirements of the Senior Threat Hunting Analyst position. Tailor your application to highlight relevant experiences and skills that align with the job description.

Highlight Relevant Experience: In your CV and cover letter, emphasize your experience in cyber security operations, particularly in threat hunting, incident response, or threat intelligence. Use specific examples to demonstrate your expertise with security tools and methodologies.

Showcase Technical Skills: Clearly outline your proficiency in query languages like Splunk or KQL, and any programming or scripting languages you know. Mention your familiarity with the Mitre ATT&CK Framework and how you've applied it in previous roles.

Communicate Effectively: Since strong communication skills are essential for this role, ensure your application is well-written and free of errors. Use clear and concise language to convey your thoughts, and consider including examples of how you've effectively communicated complex information in the past.

How to prepare for a job interview at London Stock Exchange Group

✨Showcase Your Technical Expertise

Be prepared to discuss your experience with various security tools and technologies, such as XDR/EDR, SIEM, and cloud services. Highlight specific instances where you've utilized these tools in threat hunting or incident response.

✨Demonstrate Your Analytical Skills

Expect to be asked about how you formulate threat hunting hypotheses. Be ready to explain your thought process and provide examples of how you've analyzed large data sets to identify anomalies or potential threats.

✨Familiarize Yourself with the Mitre ATT&CK Framework

Since this role involves identifying detection gaps using the Mitre ATT&CK Framework, make sure you understand its structure and how it applies to threat hunting. Prepare to discuss how you've used it in past roles.

✨Communicate Clearly and Confidently

Strong communication skills are essential for this position. Practice explaining complex technical concepts in a clear and concise manner, as you may need to present findings to senior stakeholders or collaborate with other teams.

Senior Threat Hunting Analyst
London Stock Exchange Group
L
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>