My client, an FX Settlements business based in London, is looking for a Cyber Threat Intelligence Analyst to join their growing team. The salary is up to £90K plus a £15.9K bonus. This role will require you to only be in their London offices two times per week. Unfortunately no sponsorship is offered.
Job Overview
My client is seeking a highly motivated, and skilled Operational Cyber Threat Intelligence Analyst to join a global threat management team. The role will be located in London. The position will report to the Head of Cyber Threat Intelligence and will proactively identify, investigate, and mitigate advanced cyber threats across their organization's network and systems. Leveraging a deep understanding of the latest attack techniques, threat actor tactics, and security tools, you will help safeguard their infrastructure and ensure the resilience of our networks. The ideal candidate will be aware of industry trends and frameworks and how they could impact our business, including threat actor groups, their TTPs, and intrusion activities. This position requires someone with an analytical mind, a quick learner, and the ability to create and deliver briefings, propose, and execute program initiatives & improvements, and collaborate with a wide range of key stakeholders.
Job Description
- Collects, processes, and disseminates cyber threat intelligence from varying sources, including open-source reports, information sharing partners, and vendor reports to create actionable results for internal stakeholders.
- Assist in identifying and mitigating sophisticated cyber threats, leveraging a variety of tools, techniques, and data sources.
- Collaborate with Senior Threat Hunter to research, document, and develop Use Cases and Hypotheses for proactive hunting in cyber security tools including SIEM, EDR, and IDS/IPS (extract TTPs and behaviours from research to apply to logging and tool queries/hunts and detections).
- Research, document and develop threat detections based on behavioural attributes of actors, malware operators, and general threats.
- Coordinate and produce strategic, operational, and tactical intelligence products for business units, technical teams, and executive stakeholders.
- Provide situational awareness on current threat landscape and maintain knowledge of adversary activities including geopolitical implications and TTPs to brief varying teams.
- Assess emerging threats against our operational environment and work in partnership with our security teams for detection, mitigation, and remediation efforts.
- Perform trend and correlation of cyber intelligence for recommendation-based countermeasures.
- Support and engage in incident response investigations.
- Perform basic network security analysis in support of intrusion detection operations, including the development and enrichment of indicators used to enhance network security posture.
- Produce reports for both executive and technical stakeholders and be able to brief all stakeholders.
Experience
- 3+ years of direct cyber threat intelligence experience.
- 4+ years of progressive experience in information security (cyber security) field, preferable in Threat Intelligence, Security Operations or Incident Response roles.
- Understanding of intelligence lifecycle and risk management.
- Knowledge of fundamentals of threat actors' TTPs.
- Familiarity with MITRE ATT&CK framework and mapping.
- Experience with threat intelligence platforms and analysing indicators of compromise, TTPs, and adversary behaviour.
- Knowledge of TCP/IP, network protocols, and deep packet inspection.
- Excellent interpersonal and relationship management skills.
- Individual contributor whilst also contributing to a small team.
- Self‑motivated with ability to work with minimal supervision.
Qualifications/Certifications
- Bachelor's Degree in Cybersecurity studies, Computer Science, Intelligence Studies, International Relations, or related discipline.
- Security certification such as SANS GIAC (or equivalent) ideally GCTI, GOSI, or working towards certification (or equivalent).
- Experience with threat intelligence and SOC/CIRT interaction.
- Splunk experience is highly preferred.
- Basic scripting or automation knowledge, especially Python experience is highly preferred.
- Experience with automating CTI use cases, especially in a Threat Intelligence Platform.
- Experience with SIEM, EDR solutions, network monitoring tools, and other cyber security tools.
If the above role is of interest please apply to this advertisement or email me on darius.goodarzi@robertwalters.com or you can phone me on 0207 509 8040.
Robert Walters Operations Limited is an employment business and employment agency and welcomes applications from all candidates.
About the job
- Contract Type: Permanent
- Specialism: Technology & Digital
- Focus: Information Security
- Industry: Banking
- Salary: £80,000 - £90,000 per annum + £15.9K bonus
- Workplace Type: Hybrid
- Experience Level: Mid Management
- Location: London
- Job Reference: ORTK8H-7706859B
- Date posted: 19 November 2025