At a Glance
- Tasks: Lead proactive threat hunts and develop detection strategies to combat cyber threats.
- Company: Join LSEG, a trusted global financial markets infrastructure and data provider.
- Benefits: Enjoy a dynamic work environment with opportunities for growth and learning.
- Why this job: Make a real impact in cybersecurity while collaborating with experts in a fast-paced setting.
- Qualifications: Experience in cybersecurity operations and proficiency in security tools and query languages required.
- Other info: LSEG values diversity and is an equal opportunities employer.
The predicted salary is between 43200 - 72000 £ per year.
LSEG
LSEG is your trusted global financial markets infrastructure and data provider. Discover how we deliver value for our customers.
LSEG Cyber security operations is a central function employing people, process and technology to proactively prevent, detect and respond to cyber security incidents. Security operations spans multiple pillars including cyber threat intelligence, cyber threat detection, data loss prevention, cyber incident response and cyber threat hunting.
This role sits within the cyber threat hunting pillar and is responsible for driving a proactive hunt based approach to cyber defense, leveraging large disparate data sets, analytical techniques and leveraging of deep subject matter expertise across a broad range of disciplines to help identify rare, unknown and anomalous behaviours.
Key Responsibilities
- Perform intelligence led proactive threat hunts across the estate, utilising a range of tooling available, and focusing hunts on relevant behavioural tactics, techniques, and procedures (TTPs) identified as potential threats to the organisation.
- Contribute to detection engineering initiatives by identifying opportunities for, and implementation of new detections as an output of threat hunts completed.
- Support other functions within security operations by responding to hunt requests and by applying your expertise in advanced actors and TTPs for ongoing incidents, working closely with our incident responders.
- Research new attack behaviours and TTPs used by threat actors, leading to new hunting and detection opportunities.
- Assist in the development and maturity of the threat hunting process and team through development of cutting edge hunting techniques and introduction of automation into the threat hunting process.
- Develop threat hunting hypothesis in collaboration with the threat intelligence team, helping to track relevant threat actors, campaigns and emerging threats and the TTPs they use.
- Cross-train and mentor wider analyst team in the development of threat hunting.
- Represent threat hunting to the wider information security team, and to the wider business, including senior stakeholders, through reporting, presentations and knowledge sharing sessions.
Technical / job functional knowledge
- Experience within cyber security operations as either an incident responder, threat hunter, threat intelligence analyst, or similar role.
- Extensive experience in various security tooling across endpoint, cloud and network, including XDR/EDR technology, SIEM, AWS CloudTrail, Azure Sentinel, IDS/IPS.
- Proficiency in multiple query languages such as Splunk or KQL, with an ability to manipulate and analyse large data sets.
- Expertise in formulating threat hunting hypotheses and working with available data sets to determine conclusions.
- Solid understanding of current TTPs used by threat actors and an ability to replicate behaviours in a lab environment to generate telemetry.
- Direct experience working with the Mitre ATT&CK Framework or similar, with an ability to utilise the framework to identify detection gaps for threat hunting.
- Strong competence being able to quickly respond to emerging threats, showcasing an ability to develop and perform hunts, while working under strict deadlines.
Personal skills and capabilities
- Able to operate autonomously and identify opportunities to deliver impactful results.
- Curiosity and a desire to gain knowledge.
- Ability to work in a fast-paced environment, whilst remaining calm under pressure.
- Strong verbal and written communication and collaboration skills.
- Preferred competence with one or more programming/scripting languages, such as Python, Go, Rust or similar.
- Previous experience working with automation pipelines, and utilising Jupyter notebooks.
#J-18808-Ljbffr
Senior Threat Hunting Analyst employer: LSEG
Contact Detail:
LSEG Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior Threat Hunting Analyst
✨Tip Number 1
Familiarize yourself with the latest TTPs used by threat actors. This knowledge will not only help you in your interviews but also demonstrate your proactive approach to threat hunting.
✨Tip Number 2
Engage with the cyber security community through forums and social media. Sharing insights and learning from others can enhance your understanding of current trends and tools, making you a more attractive candidate.
✨Tip Number 3
Showcase your experience with specific security tools mentioned in the job description, like XDR/EDR technology or SIEM. Being able to discuss your hands-on experience with these tools can set you apart from other candidates.
✨Tip Number 4
Prepare to discuss your approach to developing threat hunting hypotheses. Be ready to share examples of how you've identified and responded to threats in the past, as this will highlight your analytical skills and expertise.
We think you need these skills to ace Senior Threat Hunting Analyst
Some tips for your application 🫡
Understand the Role: Make sure to thoroughly read the job description for the Senior Threat Hunting Analyst position. Understand the key responsibilities and required skills, especially focusing on threat hunting techniques and tools mentioned.
Highlight Relevant Experience: In your CV and cover letter, emphasize your experience in cyber security operations, particularly in threat hunting or incident response. Mention specific tools and technologies you have worked with, such as XDR/EDR, SIEM, and any programming languages like Python.
Showcase Your Skills: Demonstrate your analytical skills and ability to work with large data sets. Provide examples of how you've formulated threat hunting hypotheses and contributed to detection engineering initiatives in previous roles.
Tailor Your Application: Customize your application materials to reflect the language and requirements outlined in the job description. Use keywords related to TTPs, Mitre ATT&CK Framework, and automation to ensure your application stands out.
How to prepare for a job interview at LSEG
✨Showcase Your Technical Expertise
Be prepared to discuss your experience with various security tools and technologies, such as XDR/EDR, SIEM, and cloud services. Highlight specific instances where you've utilized these tools in threat hunting or incident response.
✨Demonstrate Your Analytical Skills
Expect to be asked about how you formulate threat hunting hypotheses. Be ready to explain your thought process and the analytical techniques you use to analyze large data sets and identify anomalies.
✨Familiarize Yourself with the MITRE ATT&CK Framework
Since this role involves identifying detection gaps using the MITRE ATT&CK Framework, make sure you understand its structure and how it applies to threat hunting. Prepare examples of how you've used it in past roles.
✨Communicate Effectively
Strong communication skills are essential for this position. Practice explaining complex technical concepts in a clear and concise manner, as you may need to present findings to senior stakeholders or collaborate with other teams.