At a Glance
- Tasks: Join our Cyber Defence team to tackle real-world cyber threats and enhance security.
- Company: S&P Global, a leader in essential intelligence and analytics.
- Benefits: Health coverage, flexible time off, continuous learning, and family-friendly perks.
- Why this job: Make a significant impact in cybersecurity while working with cutting-edge technology.
- Qualifications: 3+ years in information security with strong analytical and communication skills.
- Other info: Dynamic work environment with opportunities for career growth and global collaboration.
The predicted salary is between 55000 - 65000 ÂŁ per year.
As a Cyber Incident Response Analyst, you will be part of the Cyber Defence team that develops and oversees the company’s security program, ensuring S&P Global is protected from existing and emerging threats. In close partnership with Security Operations and Threat Intelligence, you will detect, analyze, and decisively respond to security incidents, enrich investigations with timely intelligence, and help drive proactive defences. While based in the UK, you will support response and intelligence needs globally.
Candidates should have a genuine interest in cyber security and a strong grasp of attacker tactics, techniques, and procedures (TTPs). This role requires a detail‑oriented, critical thinker who understands how adversaries exploit systems, networks, and people—and how to respond. Experience applying threat intelligence to investigations and to improve detections is highly desirable.
Primary Responsibilities- Coordinate and triage response to cybersecurity events and conduct forensic analysis across endpoints, networks, cloud, and SaaS.
- Integrate threat intelligence into investigations (e.g., enrich IOCs, map activity to MITRE ATT&CK, identify likely threat actors/TTPs, and assess potential impact).
- Understand the threat landscape through collaboration with industry peers, FS-ISAC, trust groups, and commercial/open‑source intelligence, translating insights into actionable recommendations.
- Develop, maintain, and operationalize Incident Response playbooks and SOPs; include PIRs (Priority Intelligence Requirements), collection plans, and feedback loops to refine detections.
- Work closely with the SOC to investigate incidents and deliver containment, remediation, and root cause analysis; produce high‑quality intel‑informed incident reports.
- Create and tune detections (e.g., SIEM/SOAR, EDR) using intelligence signals (TTPs, behaviors, YARA/Sigma where applicable).
- Produce and present consumable intelligence outputs (e.g., flash alerts, threat overviews, executive briefs) tailored to technical and non‑technical stakeholders.
- Contribute to vulnerability/threat surfacing (e.g., emerging CVEs, exploit trends) and advise on risk‑based prioritization.
- Deliver actionable incident and hunting metrics to management; assess detection coverage and recommend improvements.
- Follow the end‑to‑end incident response lifecycle and support post‑incident lessons learned with intelligence‑driven enhancements.
- Build an understanding of key S&P technology, systems, and business practices to contextualize threats and drive pragmatic defenses.
- Participate in information‑sharing activities (e.g., FS-ISAC submissions) in line with TLP and legal/compliance requirements.
- Working knowledge of common cyber attacks, tools, and attacker tradecraft; ability to map activity to MITRE ATT&CK and articulate likely TTPs.
- Demonstrated experience handling security events in critical environments and applying intelligence to accelerate triage and response.
- Experience analyzing system, application, and cloud/SaaS logs to investigate security and operational issues; comfort enriching with IOCs and behaviours.
- Hands‑on experience with a SIEM (Splunk preferred) for investigations, alert creation, reporting, and threat hunting.
- Ability to produce clear, actionable intel and incident reports, including executive‑ready summaries and visuals.
- Familiarity with threat intel workflows: collection planning, source evaluation, indicator lifecycle, PIRs, TLP, and feedback loops to detections.
- Experience with one or more TIPs or intel data sources (e.g., MISP, OpenCTI, Recorded Future) and STIX/TAXII concepts.
- 3+ years of information security experience with a focus on incident response, threat hunting, or threat intelligence.
- Excellent communication skills for varied business and technical audiences; strong presentation skills.
- Comfortable working in a fast‑paced environment; passion for cyber security.
- Advanced knowledge of network protocols (TCP/IP, HTTP) and operating systems.
- Experience in the financial services industry.
- Familiarity with threat hunting techniques (hypothesis‑driven, ATT&CK‑aligned, behavior‑based).
- Windows and Linux administration tools and concepts.
- Understanding of threat actors and the cybercrime ecosystem, including initial access vectors, monetization paths, and supply‑chain/SaaS attack patterns.
- Exposure to malware/TTP analysis at a functional level (family identification, persistence/discovery behaviors) and creation of detections (e.g., Sigma/YARA) is a plus.
- Experience producing finished intelligence products (tactical through executive) and briefing senior stakeholders.
- Relevant certifications (e.g., GCTI, GCFA/GCFR, GCIH, FOR578) or equivalent experience.
- Familiarity with information‑sharing standards and practices (FS‑ISAC, TLP) and legal/compliance considerations.
- Knowledge of cloud provider threat models and telemetry (AWS, Azure, GCP, M365/SaaS).
- Second language and/or geopolitical awareness for actor context is a plus.
Senior CIRT / Threat Intel Analyst in London employer: S&P Global Inc.
Contact Detail:
S&P Global Inc. Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior CIRT / Threat Intel Analyst in London
✨Tip Number 1
Network like a pro! Reach out to folks in the cyber security field, especially those already at S&P Global. A friendly chat can open doors and give you insider info on the role.
✨Tip Number 2
Show off your skills in interviews! Prepare to discuss specific incidents you've handled, how you applied threat intelligence, and the outcomes. Real-life examples will make you stand out.
✨Tip Number 3
Stay updated on the latest trends in cyber security. Being able to discuss current threats and how they relate to the role will show your passion and knowledge during interviews.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re serious about joining the team.
We think you need these skills to ace Senior CIRT / Threat Intel Analyst in London
Some tips for your application 🫡
Show Your Passion for Cyber Security: When writing your application, let your enthusiasm for cyber security shine through! We want to see that you genuinely care about the field and understand the latest threats and trends. Share any relevant experiences or projects that highlight your interest.
Tailor Your Application: Make sure to customise your CV and cover letter for this role. Highlight your experience with incident response, threat intelligence, and any specific tools mentioned in the job description. We love seeing how your skills align with what we’re looking for!
Be Clear and Concise: Keep your application straightforward and to the point. Use clear language and avoid jargon unless it’s relevant to the role. We appreciate well-structured applications that make it easy for us to see your qualifications and fit for the position.
Apply Through Our Website: Don’t forget to submit your application through our official website! This ensures that your application gets to the right place and is considered promptly. Plus, it’s the best way to stay updated on your application status.
How to prepare for a job interview at S&P Global Inc.
✨Know Your TTPs
Make sure you brush up on your knowledge of attacker tactics, techniques, and procedures (TTPs). Be ready to discuss how these apply to real-world scenarios and how you would respond to specific threats. This shows that you not only understand the theory but can also apply it practically.
✨Showcase Your Experience
Prepare to share specific examples from your past experiences where you've successfully handled security events or applied threat intelligence. Use the STAR method (Situation, Task, Action, Result) to structure your answers, making it easier for the interviewer to see your impact.
✨Familiarise with MITRE ATT&CK
Since mapping activities to the MITRE ATT&CK framework is crucial for this role, ensure you can articulate how you would use it in investigations. Bring examples of how you've used this framework in previous roles to enhance your responses during the interview.
✨Prepare for Technical Questions
Expect technical questions related to SIEM tools, incident response playbooks, and threat intel workflows. Brush up on your knowledge of common cyber attacks and be ready to discuss how you would create detections or respond to incidents using your technical skills.