At a Glance
- Tasks: Lead proactive threat hunts and develop detection strategies to combat cyber threats.
- Company: Join LSEG, a global leader in financial markets infrastructure and data.
- Benefits: Enjoy a dynamic work environment with opportunities for growth and learning.
- Why this job: Make a real impact in cybersecurity while collaborating with experts in the field.
- Qualifications: Experience in cybersecurity operations and proficiency in security tools and query languages required.
- Other info: We value diversity and are committed to equal opportunities for all applicants.
The predicted salary is between 43200 - 72000 £ per year.
Senior Threat Hunting Analyst
Apply locations London, United Kingdom time type Full time posted on Posted 7 Days Ago job requisition id R0100166
LSEGCyber security operations is a central function employing people, process and technology to proactively prevent, detect and respond to cyber security incidents. Security operations spans multiple pillars including cyber threat intelligence, cyber threat detection, data loss prevention, cyber incident response and cyber threat hunting.
This role sits within the cyber threat hunting pillar and is responsible for driving a proactive hunt based approach to cyber defense, leveraging large disparate data sets, analytical techniques and leveraging of deep subject matter expertise across a broad range of disciplines to help identify rare, unknown and anomalous behaviours.
Key Responsibilities
- Perform intelligence led proactive threat hunts across the estate, utilising a range of tooling available, and focusing hunts on relevant behavioural tactics, techniques, and procedures (TTPs) identified as potential threats to the organisation.
- Contribute to detection engineering initiatives by identifying opportunities for, and implementation of new detections as an output of threat hunts completed.
- Support other functions within security operations by responding to hunt requests and by applying your expertise in advanced actors and TTPs for ongoing incidents, working closely with our incident responders.
- Research new attack behaviours and TTPs used by threat actors, leading to new hunting and detection opportunities.
- Assist in the development and maturity of the threat hunting process and team through development of cutting edge hunting techniques and introduction of automation into the threat hunting process.
- Develop threat hunting hypothesis in collaboration with the threat intelligence team, helping to track relevant threat actors, campaigns and emerging threats and the TTPs they use.
- Cross-train and mentor wider analyst team in the development of threat hunting.
- Represent threat hunting to the wider information security team, and to the wider business, including senior stakeholders, through reporting, presentations and knowledge sharing sessions.
Technical / Job Functional Knowledge
- Experience within cyber security operations as either an incident responder, threat hunter, threat intelligence analyst, or similar role.
- Extensive experience in various security tooling across endpoint, cloud and network, including XDR/EDR technology, SIEM, AWS CloudTrail, Azure Sentinel, IDS/IPS.
- Proficiency in multiple query languages such as Splunk or KQL, with an ability to manipulate and analyse large data sets.
- Expertise in formulating threat hunting hypotheses and working with available data sets to determine conclusions.
- Solid understanding of current TTPs used by threat actors and an ability to replicate behaviours in a lab environment to generate telemetry.
- Direct experience working with the Mitre ATT&CK Framework or similar, with an ability to utilise the framework to identify detection gaps for threat hunting.
- Strong competence being able to quickly respond to emerging threats, showcasing an ability to develop and perform hunts, while working under strict deadlines.
Personal Skills and Capabilities
- Able to operate autonomously and identify opportunities to deliver impactful results.
- Curiosity and a desire to gain knowledge.
- Ability to work in a fast-paced environment, whilst remaining calm under pressure.
- Strong verbal and written communication and collaboration skills.
- Preferred competence with one or more programming/scripting languages, such as Python, Go, Rust or similar.
- Previous experience working with automation pipelines, and utilising Jupyter notebooks.
LSEG is a leading global financial markets infrastructure and data provider. Our purpose is driving financial stability, empowering economies and enabling customers to create sustainable growth.
Our purpose is the foundation on which our culture is built. Our values of Integrity, Partnership , Excellence and Change underpin our purpose and set the standard for everything we do, every day.
We are proud to be an equal opportunities employer. This means that we do not discriminate on the basis of anyone’s race, religion, colour, national origin, gender, sexual orientation, gender identity, gender expression, age, marital status, veteran status, pregnancy or disability, or any other basis protected under applicable law.
#J-18808-Ljbffr
Senior Threat Hunting Analyst employer: London Stock Exchange Group
Contact Detail:
London Stock Exchange Group Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior Threat Hunting Analyst
✨Tip Number 1
Familiarize yourself with the latest TTPs used by threat actors. This knowledge will not only help you in interviews but also demonstrate your proactive approach to threat hunting.
✨Tip Number 2
Engage with the cyber security community through forums or social media. Networking can provide insights into current trends and may even lead to referrals for the position.
✨Tip Number 3
Showcase your experience with relevant security tools and programming languages during discussions. Being able to speak confidently about your hands-on experience can set you apart from other candidates.
✨Tip Number 4
Prepare to discuss specific examples of how you've contributed to threat detection initiatives in the past. Real-world scenarios can illustrate your problem-solving skills and expertise effectively.
We think you need these skills to ace Senior Threat Hunting Analyst
Some tips for your application 🫡
Understand the Role: Make sure to thoroughly read the job description for the Senior Threat Hunting Analyst position. Understand the key responsibilities and required skills, especially those related to threat hunting techniques and tools.
Tailor Your CV: Customize your CV to highlight relevant experience in cyber security operations, particularly in threat hunting, incident response, and the use of security tooling. Emphasize your proficiency with query languages and any experience with the Mitre ATT&CK Framework.
Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for cyber security and your understanding of the role. Mention specific experiences where you have successfully conducted threat hunts or contributed to detection engineering initiatives.
Showcase Your Technical Skills: In your application, clearly outline your technical skills, including any programming or scripting languages you are proficient in. Highlight your experience with automation pipelines and data analysis, as these are crucial for the role.
How to prepare for a job interview at London Stock Exchange Group
✨Showcase Your Technical Expertise
Be prepared to discuss your experience with various security tools and technologies, such as XDR/EDR, SIEM, and cloud services. Highlight specific instances where you've utilized these tools in threat hunting or incident response.
✨Demonstrate Your Analytical Skills
Prepare to explain how you formulate threat hunting hypotheses and analyze large data sets. Use examples from your past work to illustrate your ability to identify anomalies and respond to emerging threats effectively.
✨Familiarize Yourself with the Mitre ATT&CK Framework
Since this role involves identifying detection gaps using the Mitre ATT&CK Framework, ensure you understand its structure and how it applies to threat hunting. Be ready to discuss how you've used it in previous roles.
✨Communicate Clearly and Confidently
Strong communication skills are essential for this position. Practice explaining complex technical concepts in a clear and concise manner, as you'll need to present findings to both technical and non-technical stakeholders.