Cyber Security Incident Response & Threat Intelligence Analyst
Cyber Security Incident Response & Threat Intelligence Analyst

Cyber Security Incident Response & Threat Intelligence Analyst

Full-Time 36000 - 60000 ÂŁ / year (est.) No home office possible
Go Premium
T

At a Glance

  • Tasks: Investigate cyber incidents and lead response efforts to protect digital assets.
  • Company: Join a leading insurance firm dedicated to cybersecurity excellence.
  • Benefits: Competitive salary, flexible working options, and opportunities for professional growth.
  • Why this job: Make a real impact in the fight against cyber threats while developing your skills.
  • Qualifications: Experience in cybersecurity incident response and strong analytical skills required.
  • Other info: Dynamic team environment with 24/7 operations and mentorship opportunities.

The predicted salary is between 36000 - 60000 ÂŁ per year.

Cyber Security Incident Response & Threat Intelligence Analyst

Team Overview The Cyber Security Operations Team is responsible for monitoring, detecting, and responding to cyber threats across Thomas Millers estate. We ensure the protection of digital assets and safeguard confidentiality, integrity and availability of systems. Working in a fast‑paced environment, the SOC provides 24/7 vigilance, rapid incident response, vulnerability oversight and actionable threat intelligence to reduce cyber risk.

Who Are We Looking For

We are seeking a Cyber Security Incident Response & Threat Intelligence Analyst to strengthen our SOC capability. The successful candidate will focus primarily on incident response while also supporting threat intelligence analysis. This hybrid role ensures we can both react quickly to active threats and proactively reduce risk exposure through continuous threat monitoring and remediation efforts. The ideal candidate will have an in‑depth understanding of the overall security landscape, be experienced in cyber security incident response, with a keen ability to detect and respond to complex security incidents, tuning detection systems to spot attacker Tactics, Techniques, and Procedures (TTPs).

Responsibilities

  • Respond to and investigate cyber security incidents, including malware outbreaks, phishing attempts, insider threats and handle digital forensics.
  • Continuously improve our monitoring systems\’ detection and response capabilities as well as processes, procedures, and playbooks.
  • Lead Incident Response efforts when dealing with confirmed security incidents.
  • Automate analysis and response steps to reduce manual toil.
  • Help prioritise the creation of new SOC use cases to ensure optimum ROI for engineering effort.
  • Monitor security alerts and suspicious activities from a variety of SOC tools.
  • Utilise Microsoft security tools such as Microsoft Defender for Endpoint, Microsoft 365 Defender, and Azure Security Centre to detect, respond to, and mitigate security incidents.
  • Perform root cause analysis to determine how breaches or incidents occurred and implement long‑term prevention strategies.
  • Collaborate with other IT and security teams to address vulnerabilities and strengthen security posture.
  • Conduct post‑incident analysis to identify areas for improvement and lessons learned.
  • Maintain detailed records of security incidents, including incident timelines, analysis, and resolutions.
  • Plan and execute monitoring system architectural changes.
  • Communicate effectively at multiple levels of sensitivity and multiple audiences.
  • Recognise, adopt and install the best practices in security engineering fields throughout the organisation: development, cryptography, network security, security operations, incident response, security intelligence.
  • Gather, analyse and disseminate threat intelligence from internal and external sources.
  • Provide intelligence‑driven recommendations for improved SOC detection and controls.

Technical Skills

  • Hands‑on experience with vulnerability management tools (e.g., Nessus, Qualys, Rapid7).
  • Familiarity with threat intelligence platforms (e.g., Recorded Future, ThreatConnect, Mandiant).
  • Experience with SOC tools such as SIEM (e.g., Splunk, IBM QRadar, ArcSight, Rapid7), Endpoint Detection and Response (EDR) (e.g., CrowdStrike, Carbon Black, SentinelOne, ArcSight), Intrusion Detection/Prevention Systems (IDS/IPS).
  • Experience with Web Gateway and Web Proxy tools (e.g., Blue Coat, Zscaler, Forcepoint, Palo Alto).
  • Strong knowledge of operating systems (Windows, Linux) and network protocols.
  • Proficiency in analysing packet captures (Wireshark, tcpdump).
  • Experience with cloud security monitoring (AWS, Azure, GCP).
  • Knowledge of incident management frameworks like N, MITRE ATT&CK.

Education and Experience

  • Bachelor’s Degree in Cyber Security, Information Technology, or a related field.
  • 3–5 years of experience in SOC operations, incident response, threat intelligence, or similar roles within a SOC environment.
  • Hands‑on experience responding to security incidents using SIEM and EDR tools.
  • In‑depth knowledge of networking, security principles, and threat detection methodologies.
  • Demonstrated ability to handle complex incident investigations and document findings effectively.
  • Practical experience in network‑ and host‑based digital forensics across multiple operating systems.
  • In‑depth experience working with a variety of monitoring tools, including SIEM, endpoint security, intrusion detection/prevention, packet analysis, CASB and SOAR.
  • Knowledge of open security testing standards and projects, including OWASP and the MITRE ATT&CK Matrix.
  • Strong organizational skills and attention to detail.
  • Excellent written communication skills, with a focus on translating technically complex issues into simple, easy‑to‑understand concepts for non‑technical stakeholders.

Preferred Qualifications

  • Industry certifications such as CISSP, GIAC (GCIH, GCIA, GCTI).
  • Experience with forensic investigations, malware analysis and reverse engineering.
  • Familiarity with regulatory frameworks (e.g., GDPR, PCI DSS) and their impact on incident procedures.
  • Experience with advanced persistent threat (APT) detection and mitigation.
  • Ability to work in a24/7 on‑call incident response environment.
  • Excellent communication skills, with the ability to clearly document incidents and provide post‑incident reports to non‑technical stakeholders.
  • Experience leading the deployment of a major SIEM platform (Splunk, QRadar, Sentinel, ArcSight, etc.) and/or EDR platform (CrowdStrike, Defender for Endpoint, Cybereason, etc.).
  • 5+ years of experience in cyber security and adjacent fields such as systems engineering, network management, cloud security, and/or application security.
  • 2+ years in a security engineering position or 2+ years of scripting/coding experience with one or more languages.
  • Relevant industry certifications, a degree in cyber security or adjacent fields, or cyber security boot camps.
  • Experience in Python, PowerShell, Bash.
  • Experience with an Infrastructure as Code tool like Terraform.
  • Familiarity with cloud platforms like AWS, Azure, GCP.

#J-18808-Ljbffr

Cyber Security Incident Response & Threat Intelligence Analyst employer: Thomas Miller

At Thomas Miller, we pride ourselves on being an exceptional employer, offering a dynamic work culture that fosters collaboration and innovation within our Cyber Security Operations Team. Our commitment to employee growth is evident through continuous training opportunities and mentorship, ensuring that you can advance your career while making a meaningful impact in safeguarding our digital assets. Located in a vibrant area, we provide a supportive environment where your contributions are valued, and you can thrive in a fast-paced, rewarding role focused on cyber security.
T

Contact Detail:

Thomas Miller Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Cyber Security Incident Response & Threat Intelligence Analyst

✨Tip Number 1

Network, network, network! Get out there and connect with folks in the cyber security field. Attend meetups, webinars, or even online forums. You never know who might have a lead on your dream job!

✨Tip Number 2

Show off your skills! Create a portfolio or GitHub repository showcasing your projects, incident response scenarios, or threat intelligence analyses. This gives potential employers a taste of what you can do beyond just a CV.

✨Tip Number 3

Prepare for interviews like a pro! Research common interview questions for cyber security roles and practice your responses. Be ready to discuss your experience with tools like SIEM and EDR, and how you've handled incidents in the past.

✨Tip Number 4

Don’t forget to apply through our website! We’re always on the lookout for passionate individuals to join our team. Plus, it’s a great way to ensure your application gets seen by the right people.

We think you need these skills to ace Cyber Security Incident Response & Threat Intelligence Analyst

Incident Response
Threat Intelligence Analysis
Cyber Security
Vulnerability Management
SIEM Tools (Splunk, IBM QRadar, ArcSight)
EDR Tools (CrowdStrike, Carbon Black, SentinelOne)
Malware Analysis
Digital Forensics
Network Security
Operating System Security (Windows, Linux)
Packet Analysis (Wireshark, TCPDump)
Scripting Languages (Python, Bash, PowerShell)
Cloud Security Monitoring (AWS, Azure, GCP)
Knowledge of NIST and MITRE ATT&CK
Strong Communication Skills

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the Cyber Security Incident Response & Threat Intelligence Analyst role. Highlight relevant experience, especially in incident response and threat intelligence, and don’t forget to mention any specific tools you’ve used that are listed in the job description.

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber security and how your skills align with our needs. Be sure to mention any unique experiences that set you apart from other candidates.

Showcase Your Technical Skills: We want to see your technical prowess! Make sure to include any hands-on experience with SIEM, EDR tools, and vulnerability management tools. If you've got scripting skills, shout about them too – they’re super valuable for this role!

Apply Through Our Website: Don’t forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re keen on joining our team at StudySmarter!

How to prepare for a job interview at Thomas Miller

✨Know Your Stuff

Make sure you brush up on your technical knowledge, especially around incident response and threat intelligence. Be ready to discuss specific tools like SIEM and EDR platforms, as well as your experience with vulnerability management tools. The more you can demonstrate your expertise, the better!

✨Showcase Your Problem-Solving Skills

Prepare to share examples of how you've handled complex security incidents in the past. Think about specific challenges you faced, the steps you took to resolve them, and the outcomes. This will show that you can think on your feet and lead incident response efforts effectively.

✨Communicate Clearly

Since you'll be collaborating with various teams, practice explaining technical concepts in a way that's easy for non-technical stakeholders to understand. Being able to communicate effectively at multiple levels is crucial, so consider how you would present your findings from a recent incident.

✨Stay Curious and Engaged

Demonstrate your passion for cyber security by discussing recent trends or threats you've been following. Show that you're proactive about learning and improving your skills. This mindset is key in a fast-paced environment where threats are constantly evolving.

Cyber Security Incident Response & Threat Intelligence Analyst
Thomas Miller
Go Premium

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

T
  • Cyber Security Incident Response & Threat Intelligence Analyst

    Full-Time
    36000 - 60000 ÂŁ / year (est.)
  • T

    Thomas Miller

    200-500
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>