At a Glance
- Tasks: Join our team to analyse cyber threats and help clients stay secure.
- Company: S-RM, a leading global intelligence and cyber security consultancy.
- Benefits: Enjoy flexible working, generous holiday, and comprehensive health benefits.
- Other info: Collaborative environment with opportunities for professional growth.
- Why this job: Make a real impact in the fast-paced world of cyber security.
- Qualifications: Strong analytical skills and a passion for cyber threats are essential.
The predicted salary is between 36000 - 60000 £ per year.
S-RM is a global intelligence and cyber security consultancy. Since 2005, we have helped some of the most demanding clients in the world solve some of their toughest information security challenges. We are committed to developing sharp, curious, driven individuals who think critically, solve complex problems, and achieve success. Work is about the lives and careers it helps build. We invest in our people's wellbeing, learning, and ideas every day.
Our Cyber Security division is the fastest-growing part of S-RM. The cyber sector is always evolving, and our Incident Response and Managed Services practices are in more demand than ever. We build a team to meet this challenge, quick to respond, innovate, and improve. We empower ideas and offer support across the team with no bureaucracy.
Cyber Threat Intelligence (CTI) is an integral part of our Incident Response (IR) and Managed Services practices. As a CTI analyst you will be a critical part of our wider cyber team's success. You will work across the full intelligence cycle to help our clients respond and recover from security incidents, and stay ahead of evolving threats, including:
- Threat Actor Intelligence: Track developments in the ransomware and cybercrime ecosystem, write and update profiles on key threat actors shared with clients and externally as thought leadership.
- Threat Actor Engagement: Monitor leak sites and negotiation portals across our global IR cases, inform case leads of regular developments, and research attestations on sanctions exposure for threat actors.
- Dark Web Monitoring: Use threat intelligence platforms to conduct targeted research on the dark web, set up and deliver regular monitoring engagements, and assist with renewals.
- Technical IOC Management: Collate technical indicators of compromise from across our global IR team, enrich and classify them, and disseminate to improve operational effectiveness.
- Incident Data Collection and Analysis: Ensure accuracy and consistency of incident data from IR engagements, manage the dataset, and analyze to produce reporting on trends and insights for presentations, events, and training.
- CTI-led Analysis: Conduct in-depth investigations with strong threat intelligence component, and draft client-facing reports.
- Blockchain Analysis: Trace ransom payments to identify sanctions exposure or compliance risks, and draft findings for clients.
- Thought Leadership: Contribute to public write-ups and presentations on new vulnerabilities, trends, and threat actor techniques.
- Domain Expertise Development: Grow cyber expertise and share it with the wider team through internal initiatives and programs.
- Business Development Support: Cultivate and manage close relationships with external partners, share intelligence, and identify business development opportunities.
Other features of the role include a variety of casework, a range of opportunities, and flexible working practices to support high-pressure incident work while maintaining work/life balance.
We are looking for candidates with the following qualifications and experience:
- Excellent written and verbal communication skills to produce clear, concise reports.
- Strong analytical and problem-solving skills, working with incomplete, ambiguous, or conflicting information.
- Understanding of foundational cyber concepts such as common attack vectors, security terminology, and threat actor motivations.
- Understanding of core intelligence concepts, lifecycle, requirements gathering, and tactical/operational/strategic outputs.
- A demonstrated interest in cyber threats, particularly financially motivated activity such as ransomware and extortion.
Preferred skills include an academic or professional background in research-focused disciplines (Political Science, Intelligence Studies, Criminology, Cybersecurity, Computer Science, Data Science), familiarity with cybersecurity fundamentals, threat actor TTPs, IOCs, and frameworks such as MITRE ATT&CK, ability to contextualize findings into business-relevant assessments, and experience with OSINT and/or Threat Intelligence platforms (VirusTotal, Shodan, MISP, Recorded Future).
Personal attributes should include an investigative mindset and enthusiasm for investigations, exceptional attention to detail when examining indicators and adversary behaviours, a collaborative mindset and willingness to work across teams, the ability to thrive under pressure, prioritise multiple tasks, and meet deadlines, and being a self-starter who demonstrates initiative and ownership.
Relevant industry certifications are not required, but certifications such as GCTI, GCFA, SSCP, or Security+ are beneficial.
Benefits include 23 days holiday per year, plus public holidays (+1 day for every year of service up to a maximum of 30 days), hybrid working and flexible working hours, matching pension contribution up to 7% (up to a maximum of 14% combined) and financial education, life insurance 4× annual salary, fertility treatment leave – 5 days per cycle per year, maternity leave – 26 weeks full pay, 13 weeks half pay, paternity leave – 6 weeks full pay, medical insurance (taxable benefit) for you and family, virtual GP for you and your family members that live in the same household, EAP programme for you and immediate family, and free access to the world-famous mindfulness app.
Application process: We want to get to know you and see if we're a good fit. Our process is responsive and respects your time. It includes initial screening of your application by our recruiting team, an interview to assess baseline technical skills, and an interview to discuss your previous experience, broader competencies, and suitability for the role.
Analyst, Cyber Threat Intelligence in London employer: S-RM
Contact Detail:
S-RM Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Analyst, Cyber Threat Intelligence in London
✨Tip Number 1
Network like a pro! Reach out to folks in the cyber security field, especially those at S-RM. A friendly chat can open doors and give you insights that a job description just can't.
✨Tip Number 2
Prepare for your interviews by diving deep into current cyber threats and trends. Show us you’re not just reading the news but actively engaging with the material. We love candidates who are genuinely curious!
✨Tip Number 3
Don’t underestimate the power of follow-ups! After an interview, drop a quick thank-you note. It shows your enthusiasm and keeps you fresh in our minds as we make decisions.
✨Tip Number 4
Apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re serious about joining our team at S-RM.
We think you need these skills to ace Analyst, Cyber Threat Intelligence in London
Some tips for your application 🫡
Tailor Your Application: Make sure to customise your CV and cover letter for the Analyst, Cyber Threat Intelligence role. Highlight your relevant skills and experiences that align with what we’re looking for, especially in cyber threats and analytical abilities.
Show Off Your Communication Skills: Since excellent written communication is key for this role, ensure your application is clear and concise. Use straightforward language and structure your documents well to demonstrate your ability to produce professional reports.
Demonstrate Your Passion: We love candidates who are genuinely interested in cyber threats and intelligence. Share any personal projects, research, or experiences that showcase your enthusiasm for the field in your application.
Apply Through Our Website: Don’t forget to submit your application through our website! It’s the best way for us to receive your details and ensures you’re considered for the role. Plus, it shows you’re keen on joining our team!
How to prepare for a job interview at S-RM
✨Know Your Cyber Basics
Before the interview, brush up on foundational cyber concepts and common attack vectors. Being able to discuss these topics confidently will show that you understand the core of what S-RM does and how you can contribute.
✨Showcase Your Analytical Skills
Prepare to demonstrate your analytical and problem-solving skills. Think of examples where you've worked with incomplete or conflicting information and how you navigated those challenges. This will highlight your ability to thrive in a fast-paced environment.
✨Familiarise Yourself with Threat Intelligence Tools
If you have experience with OSINT and threat intelligence platforms like VirusTotal or Shodan, be ready to discuss it. If not, do some research on these tools and their applications in cyber threat intelligence to show your proactive interest.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your investigative mindset and attention to detail. Practice articulating your thought process when analysing indicators or adversary behaviours, as this will demonstrate your critical thinking abilities.