At a Glance
- Tasks: Join a team to enhance cyber defences and respond to security incidents.
- Company: Leading financial services firm with a focus on cybersecurity.
- Benefits: Excellent overall package, hybrid work model, and career development opportunities.
- Other info: Collaborative culture with opportunities to work on cutting-edge security technologies.
- Why this job: Make a real impact in defending against cyber threats in a dynamic environment.
- Qualifications: 3+ years in detection engineering, incident response, or threat hunting; strong security tooling experience.
The predicted salary is between 60000 - 80000 € per year.
Join a leading financial services client as a Cyber Threat Specialist (Blue Team) and help strengthen a critical Threat Detection & Response function. You will be a key member of the Threat Detection & Response team, focusing on defensive security across complex, business-critical environments. Working closely with engineering, infrastructure and security teams, you will help design, implement and optimise high-fidelity detections, investigate incidents, and contribute to continuous improvement of cyber defences.
What you’ll be doing:
- Deliver hands-on detection engineering, incident response, threat hunting, security engineering and threat intelligence activities.
- Investigate and respond to security incidents across host, identity, email, SaaS and cloud workloads.
- Use and tune security tooling such as EDR, DLP, SIEM and SOAR to improve detection and response effectiveness.
- Apply frameworks such as MITRE ATT&CK and the cyber kill chain to map, detect and disrupt attacker tradecraft.
- Leverage offensive tooling (Kali, Cobalt Strike, Metasploit, Bloodhound, Mimikatz, etc.) to understand and defend against real-world attack techniques.
- Contribute to secure architectures across networks, operating systems and cloud platforms.
What we’re looking for:
- Minimum of 3 years’ hands-on experience in at least two of: detection engineering, incident response, digital forensics, security operations, threat hunting, threat intelligence, with exposure to the others.
- Strong experience with security tooling: EDR, DLP, SIEM, SOAR.
- Solid background in threat investigation and incident response.
- Good understanding of MITRE ATT&CK, cyber kill chain and common attacker tradecraft.
- Familiarity with offensive tools such as Kali, Cobalt Strike, Metasploit, Bloodhound, Mimikatz.
- Strong knowledge of networking and security protocols (TCP/IP, HTTPS, DNS, firewalls, proxies).
- Experience with Windows and Linux/Unix (Kubernetes exposure a plus).
- Scripting or programming skills in Bash, Python or PowerShell.
- Exposure to CI/CD tools and cloud platforms (e.g. Ansible Tower, Bitbucket, Pipelines, Azure).
- Understanding of secure network architectures and related technologies.
How to apply:
If you’re interested and think you align with this opportunity, please apply with an updated CV.
Cyber Threat Specialist in London employer: McCabe & Barton
Join a dynamic and innovative financial services firm in London as a Cyber Threat Specialist, where you will be part of a collaborative team dedicated to enhancing cyber defences in a hybrid work environment. The company offers an excellent overall package, fostering a culture of continuous learning and professional growth, while providing access to cutting-edge security tools and technologies. With a strong commitment to employee development and a focus on meaningful contributions to the security landscape, this role presents a unique opportunity to make a significant impact in a critical sector.
StudySmarter Expert Advice🤫
We think this is how you could land Cyber Threat Specialist in London
✨Tip Number 1
Network like a pro! Attend industry meetups, webinars, or conferences related to cyber security. Engaging with professionals in the field can lead to valuable connections and even job opportunities that aren't advertised.
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your projects, especially those involving detection engineering or incident response. This gives potential employers a tangible look at what you can do.
✨Tip Number 3
Prepare for interviews by brushing up on common scenarios in threat detection and incident response. Practise explaining your thought process and how you would tackle real-world problems using tools like EDR and SIEM.
✨Tip Number 4
Don’t forget to apply through our website! We’ve got loads of opportunities waiting for talented individuals like you. Plus, it’s a great way to ensure your application gets the attention it deserves.
We think you need these skills to ace Cyber Threat Specialist in London
Some tips for your application 🫡
Tailor Your CV:Make sure your CV is tailored to the Cyber Threat Specialist role. Highlight your experience in detection engineering, incident response, and any relevant security tooling you've worked with. We want to see how your skills align with what we're looking for!
Showcase Your Skills:Don’t just list your skills; demonstrate them! Use specific examples from your past experiences that showcase your hands-on work with EDR, DLP, SIEM, and SOAR tools. This helps us understand how you can contribute to our team.
Be Clear and Concise:Keep your application clear and to the point. Avoid jargon unless it’s relevant to the role. We appreciate straightforward communication, so make it easy for us to see your qualifications without sifting through fluff.
Apply Through Our Website:We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re keen on joining our team!
How to prepare for a job interview at McCabe & Barton
✨Know Your Tools
Make sure you’re familiar with the security tools mentioned in the job description, like EDR, DLP, and SIEM. Be ready to discuss how you've used these tools in past roles and any specific incidents where they helped you detect or respond to threats.
✨Understand the Frameworks
Brush up on MITRE ATT&CK and the cyber kill chain. You might be asked to explain how these frameworks apply to real-world scenarios, so think of examples where you’ve used them to map out attacker tradecraft or improve detection capabilities.
✨Showcase Your Incident Response Skills
Prepare to talk about your experience with incident response and threat hunting. Have a couple of specific incidents in mind that highlight your problem-solving skills and how you contributed to improving security measures after an incident.
✨Demonstrate Your Scripting Knowledge
If you have scripting or programming skills, be ready to discuss how you’ve applied them in your work. Whether it’s Bash, Python, or PowerShell, having concrete examples of how you’ve automated tasks or improved processes will set you apart.