Enable job alerts via email!

Cyber Threat Hunting Program Lead | London, UK

Tradeweb Markets

London

On-site

GBP 80,000 - 110,000

Full time

4 days ago
Be an early applicant

Job summary

A global financial technology firm in London seeks a Cyber Threat Hunter to lead their threat hunting efforts. The ideal candidate will have extensive cybersecurity experience, a strong background in leadership, and be skilled in threat detection methodologies. Responsibilities include developing threat hunting strategies and managing a team to enhance the firm's cyber defense posture.

Qualifications

  • 8+ years of experience in cybersecurity, with at least 3 years in a leadership role.
  • Proven expertise in hypothesis-driven threat hunting methodologies.
  • Strong familiarity with MITRE ATT&CK and cyber kill chain.

Responsibilities

  • Develop and lead a comprehensive cyber threat hunting program.
  • Build a team of cyber threat hunters and set clear objectives.
  • Drive strategic alignment with incident response and SOC teams.

Skills

Threat hunting methodologies
Behavioral analysis
Incident response
Communication skills
Technical leadership

Education

Bachelor's degree in Computer Science or Cybersecurity

Tools

SIEM
EDR/XDR
Network forensics tools

Job description

Job Description

Tradeweb is a global leader in electronic trading for rates, credit, equities, and money markets. As financial markets become increasingly interconnected, our technology enables efficient, multi-asset trading on a global scale. We serve more than 3,000 clients in more than 85 countries, including many of the world's largest banks, asset managers, hedge funds, insurers, corporations, and wealth managers.

Creative collaboration and sharp client focus have helped fuel our organic growth. We facilitated average daily trading volume (ADV) of more than $2.2 trillion over the past four fiscal quarters, topping $2.5 trillion in ADV for the first quarter of 2025.

Since our IPO in 2019, Tradeweb has completed four acquisitions and doubled our revenues - and 2024 was our 25th consecutive year of record revenues.

Tradeweb is a great place to work, recognized in 2024 by Forbes as one of America's Best Companies (2024) and by U.S. News & World Report as one of the Best Financial Services Companies to Work For.

Tradeweb Markets LLC ("Tradeweb") is proud to be an EEO Minorities/Females/Protected Veterans/Disabled/Affirmative Action Employer.

Mission: Move first and never stop. Collaborate with clients to create and build solutions that drive efficiency, connectivity, and transparency in electronic trading.

https://www.dol.gov/ofccp/regs/compliance/posters/pdf/eeopost.pdf

Group Details

To capitalize on our success and continued growth plans we are seeking a technical, results-driven individual to lead our global cyber threat hunting program. The ideal candidate will be hands on, experienced with leading global threat hunting and purple team functions within Tradeweb's complex, global environments. The role will also have an opportunity to work with subject matter experts not only within security, but across infrastructure, network, development, and business teams.

We look to hire people who are comfortable in working with minimal supervision as part of a team that has consistently delivered ground-breaking and innovative solutions in one of the most exciting and fast-moving areas of the of the financial markets. We need people who can prioritize and effectively communicate complex security issues to non-technical team members. We would prefer someone who has security operations experience in the Financial Industry or with a government/military background, who can meet with our internal partners and present reports with confidence.

Job Responsibilities

  • Develop and lead a comprehensive cyber threat hunting program, leveraging behavioral analytics, advanced telemetry, and cyber threat intelligence to proactively detect and disrupt sophisticated threat actors targeting Tradeweb.
  • Build a team of cyber threat hunters, setting clear objectives, establishing priorities, and ensuring effective execution of hypothesis-driven hunts across diverse data sources (e.g., endpoint, network, identity, and application telemetry).
  • Drive strategic alignment with incident response, threat intelligence, SOC, and detection engineering teams,ensuring seamless integration of hunting insights into detection content, response playbooks, and threat models.
  • Establish hunt operations cadence and lifecycle management, including hypothesis development, data source validation, hunting execution, results documentation, and feedback into detection and prevention pipelines.
  • Serve as a key incident response partner, providing investigative support during high-priority incidents and contributing adversary context and investigative findings that inform containment and remediation efforts.
  • Continuously refine the threat hunting methodology, incorporating MITRE ATT&CK mapping, adversary emulation, red/purple team feedback, and current threat landscape trends to sharpen threat detection capabilities.
  • Mentor and develop junior analysts and hunters, fostering a high-performance culture grounded in curiosity, rigor, and continuous improvement. Provide technical leadership and knowledge transfer through training, peer reviews, and lessons learned.
  • Track and communicate program metrics and outcomes to leadership, demonstrating threat reduction, detection coverage improvements, and strategic impact of hunt operations on overall cyber defense posture.

Qualifications
  • Bachelor's degree in Computer Science, Cybersecurity, Information Systems, or a related technical field (or equivalent practical experience).
  • 8+ years of experience in cybersecurity, with at least 3 years in a leadership or team lead role involving threat hunting, SOC operations, or cyber threat intelligence.
  • Proven expertise in hypothesis-driven threat hunting methodologies, including anomaly detection, behavioral analysis, and adversary emulation.
  • Strong familiarity with MITRE ATT&CK, cyber kill chain, and other adversary behavior frameworks.
  • Hands-on experience with SIEM, EDR/XDR platforms, network forensics tools, and log analysis across multiple telemetry sources.
  • Solid understanding of modern attacker tactics, techniques, and procedures (TTPs) and experience hunting in hybrid environments (on-prem, cloud, and SaaS).
  • Demonstrated ability to lead and grow technical teams, manage priorities, and deliver measurable improvements in detection and response maturity.
  • Proficiency with scripting or automation languages (e.g., Python, PowerShell) for operational efficiency and hunt enablement.
  • Strong written and verbal communication skills, capable of delivering clear technical reports and briefing executive stakeholders.

Preferred Qualifications:
  • Master's degree in Cybersecurity, Computer Science, or a related discipline.
  • Experience implementing or working with threat intelligence platforms (TIPs) and integrating intelligence into hunt operations.
  • Experience working in or managing a 24x7 SOC or hybrid security operations environment with geographically distributed teams.

Boost your career
Find thousands of job opportunities by signing up to eFinancialCareers today.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs