Job Search and Career Advice Platform

Enable job alerts via email!

Senior CIRT Analyst

S&P Global, Inc.

Greater London

On-site

GBP 60,000 - 80,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A global information provider in Greater London is looking for a Cyber Incident Response Analyst to join their Cyber Defence team. The ideal candidate will coordinate responses to incidents, develop security playbooks, and work closely with threat intelligence to enhance detection capabilities. Required qualifications include 3+ years of information security experience, familiarity with cyber attacks, and strong analytical skills. This position offers a dynamic environment with opportunities for career growth and competitive benefits.

Benefits

Health & Wellness benefits
Flexible time off
Continuous learning resources
Financial wellness programs

Qualifications

  • Experience analyzing system logs to investigate security issues.
  • Hands-on experience with threat hunting.
  • Advanced knowledge of network protocols (TCP/IP, HTTP).

Responsibilities

  • Coordinate response to cybersecurity events.
  • Develop and maintain Incident Response playbooks.
  • Create and tune detections using intelligence signals.

Skills

Knowledge of common cyber attacks
Clear communication skills for technical audiences
Ability to map activity to MITRE ATT&CK
Analytical problem-solving
Detail-oriented mindset

Education

3+ years of information security experience

Tools

SIEM (Splunk preferred)
TIPs (e.g., MISP, OpenCTI)
Job description
About the Role:

Grade Level (for internal use): 11

Cyber Incident Response Analyst

The Role

As a Cyber Incident Response Analyst, you will be part of the Cyber Defence team that develops and oversees the company's security program, ensuring S&P Global is protected from existing and emerging threats. In close partnership with Security Operations and Threat Intelligence, you will detect, analyze, and decisively respond to security incidents, enrich investigations with timely intelligence, and help drive proactive defences. While based in the UK, you will support response and intelligence needs globally.

Candidates should have a genuine interest in cyber security and a strong grasp of attacker tactics, techniques, and procedures (TTPs). This role requires a detail-oriented, critical thinker who understands how adversaries exploit systems, networks, and people—and how to respond. Experience applying threat intelligence to investigations and to improve detections is highly desirable.

Primary Responsibilities
  • Coordinate and triage response to cybersecurity events and conduct forensic analysis across endpoints, networks, cloud, and SaaS.
  • Integrate threat intelligence into investigations (e.g., enrich IOCs, map activity to MITRE ATT&CK, identify likely threat actors/TTPs, and assess potential impact).
  • Understand the threat landscape through collaboration with industry peers, FS-ISAC, trust groups, and commercial/open-source intelligence, translating insights into actionable recommendations.
  • Develop, maintain, and operationalize Incident Response playbooks and SOPs; include PIRs (Priority Intelligence Requirements), collection plans, and feedback loops to refine detections.
  • Work closely with the SOC to investigate incidents and deliver containment, remediation, and root cause analysis; produce high-quality intel-informed incident reports.
  • Create and tune detections (e.g., SIEM/SOAR, EDR) using intelligence signals (TTPs, behaviors, YARA/Sigma where applicable).
  • Produce and present consumable intelligence outputs (e.g., flash alerts, threat overviews, executive briefs) tailored to technical and non-technical stakeholders.
  • Contribute to vulnerability/threat surfacing (e.g., emerging CVEs, exploit trends) and advise on risk-based prioritization.
  • Deliver actionable incident and hunting metrics to management; assess detection coverage and recommend improvements.
  • Follow the end-to-end incident response lifecycle and support post-incident lessons learned with intelligence-driven enhancements.
  • Build an understanding of key S&P technology, systems, and business practices to contextualize threats and drive pragmatic defenses.
  • Participate in information-sharing activities (e.g., FS-ISAC submissions) in line with TLP and legal/compliance requirements.
Required Qualifications
  • Working knowledge of common cyber attacks, tools, and attacker tradecraft; ability to map activity to MITRE ATT&CK and articulate likely TTPs.
  • Demonstrated experience handling security events in critical environments and applying intelligence to accelerate triage and response.
  • Experience analyzing system, application, and cloud/SaaS logs to investigate security and operational issues; comfort enriching with IOCs and behaviours.
  • Hands‑on experience with a SIEM (Splunk preferred) for investigations, alert creation, reporting, and threat hunting.
  • Ability to produce clear, actionable intel and incident reports, including executive‑ready summaries and visuals.
  • Familiarity with threat intel workflows: collection planning, source evaluation, indicator lifecycle, PIRs, TLP, and feedback loops to detections.
  • Experience with one or more TIPs or intel data sources (e.g., MISP, OpenCTI, Recorded Future) and STIX/TAXII concepts.
  • 3+ years of information security experience with a focus on incident response, threat hunting, or threat intelligence.
  • Excellent communication skills for varied business and technical audiences; strong presentation skills.
  • Comfortable working in a fast‑paced environment; passion for cyber security.
  • Advanced knowledge of network protocols (TCP/IP, HTTP) and operating systems.
Preferred Qualifications
  • Experience in the financial services industry.
  • Familiarity with threat hunting techniques (hypothesis‑driven, ATT&CK‑aligned, behavior‑based).
  • Windows and Linux administration tools and concepts.
  • Understanding of threat actors and the cybercrime ecosystem, including initial access vectors, monetization paths, and supply‑chain/SaaS attack patterns.
  • Exposure to malware/TTP analysis at a functional level (family identification, persistence/discovery behaviors) and creation of detections (e.g., Sigma/YARA) is a plus.
  • Experience producing finished intelligence products (tactical through executive) and briefing senior stakeholders.
  • Relevant certifications (e.g., GCTI, GCFA/GCFR, GCIH, FOR578) or equivalent experience.
  • Familiarity with information‑sharing standards and practices (FS-ISAC, TLP) and legal/compliance considerations.
  • Knowledge of cloud provider threat models and telemetry (AWS, Azure, GCP, M365/SaaS).
  • Second language and/or geopolitical awareness for actor context is a plus.
Compensation & Benefits

This role is eligible to receive additional S&P Global benefits. For more information on the benefits we provide to our employees, visit https://www.spgbenefitess.com/newhires.

  • Health & Wellness: Health care coverage designed for the mind and body.
  • Flexible Downtime: Generous time off helps keep you energized for your time on.
  • Continuous Learning: Access a wealth of resources to grow your career and learn valuable new skills.
  • Invest in Your Future: Secure your financial future through competitive pay, retirement planning, a continuing education program with a company‑matched student loan contribution, and financial wellness programs.
  • Family Friendly Perks: It’s not just about you. S&P Global has perks for your partners and little ones, too, with some best‑in‑class benefits for families.
  • Beyond the Basics: From retail discounts to referral incentive awards—small perks can make a big difference.

For more information on benefits by country visit https://spgbenefits.com/benefit-summaries

About S&P Global

At S&P Global, we don’t give you intelligence—we give you essential intelligence. The essential intelligence you need to make decisions with conviction. We’re the world’s foremost provider of credit ratings, benchmarks and analytics in the global capital and commodity markets. Our divisions include S&P Global Ratings, S&P Global Market Intelligence, S&P Dow Jones Indices and S&P Global Platts. For more information, visit www.spglobal.com.

Equal Opportunity Employer

S&P Global is an equal opportunity employer and all qualified candidates will receive consideration for employment without regard to race/ethnicity, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, marital status, military veteran status, unemployment status, or any other status protected by law. Only electronic job submissions will be considered for employment.

If you need an accommodation during the application process due to a disability, please send an email to: EEO.Compliance@spglobal.com and your request will be forwarded to the appropriate person.

The EEO is the Law Poster http://www.dol.gov/ofccp/regs/compliance/posters/pdf/eeopost.pdf describes discrimination protections under federal law.

Recruitment Fraud Alert:

If you receive an email from a spglobalind.com domain or any other regionally based domains, it is a scam and should be reported to reportfraud@spglobal.com. S&P Global never requires any candidate to pay money for job applications, interviews, offer letters, “pre‑employment training” or for equipment/delivery of equipment. Stay informed and protect yourself from recruitment fraud by reviewing our guidelines, fraudulent domains, and how to report suspicious activity here.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.