Enable job alerts via email!

Senior Threat Hunting Analyst | London, UK

London Stock Exchange Group

London

On-site

GBP 50,000 - 90,000

Full time

Today
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking a proactive cyber threat hunter to join their dynamic security operations team. This role focuses on leveraging extensive data sets and analytical techniques to identify and mitigate potential threats. You will be at the forefront of cyber defense, collaborating with cross-functional teams and mentoring others in innovative threat hunting strategies. If you have a passion for cyber security and a knack for problem-solving, this opportunity will allow you to make a significant impact in a fast-paced environment.

Qualifications

  • Experience in cyber security operations, incident response, and threat hunting.
  • Proficiency in query languages and analyzing large datasets.

Responsibilities

  • Perform proactive threat hunts and contribute to detection engineering.
  • Research new attack behaviors and assist in developing threat hunting processes.

Skills

Cyber security operations
Threat hunting
Incident response
Threat intelligence analysis
Analytical techniques
Programming/scripting (Python, Go, Rust)
Strong communication skills
Ability to work under pressure

Tools

XDR/EDR
SIEM
AWS CloudTrail
Azure Sentinel
IDS/IPS
Splunk
KQL
Jupyter notebooks

Job description

LSEGCyber security operations is a central function employing people, processes, and technology to proactively prevent, detect, and respond to cyber security incidents. Security operations span multiple pillars including cyber threat intelligence, threat detection, data loss prevention, cyber incident response, and cyber threat hunting.

This role sits within the cyber threat hunting pillar and is responsible for driving a proactive, hunt-based approach to cyber defense. It involves leveraging large, disparate data sets, analytical techniques, and deep subject matter expertise across various disciplines to identify rare, unknown, and anomalous behaviors.

Key Responsibilities
  • Perform intelligence-led proactive threat hunts across the estate, utilizing available tooling, focusing on relevant behavioral TTPs identified as potential threats.
  • Contribute to detection engineering by identifying opportunities for and implementing new detections based on threat hunts.
  • Support other security functions by responding to hunt requests and applying expertise in advanced actors and TTPs during ongoing incidents, collaborating closely with incident responders.
  • Research new attack behaviors and TTPs used by threat actors to discover new hunting and detection opportunities.
  • Assist in developing and maturing the threat hunting process and team through innovative techniques and automation.
  • Develop threat hunting hypotheses in collaboration with the threat intelligence team, tracking relevant threat actors, campaigns, and emerging threats.
  • Cross-train and mentor team members in threat hunting development.
  • Represent threat hunting to the wider security team and business through reports, presentations, and knowledge-sharing sessions.
Technical / Job Functional Knowledge
  • Experience in cyber security operations, such as incident response, threat hunting, or threat intelligence analysis.
  • Extensive experience with security tools across endpoint, cloud, and network environments, including XDR/EDR, SIEM, AWS CloudTrail, Azure Sentinel, IDS/IPS.
  • Proficiency in query languages like Splunk or KQL, capable of analyzing large datasets.
  • Expertise in formulating hypotheses and working with data to draw conclusions.
  • Solid understanding of current threat actor TTPs and ability to replicate behaviors in labs.
  • Experience with the Mitre ATT&CK Framework or similar, to identify detection gaps.
  • Ability to respond quickly to emerging threats and develop effective hunts under strict deadlines.
Personal Skills and Capabilities
  • Autonomous operation and initiative in delivering impactful results.
  • Curiosity and eagerness to learn.
  • Ability to work calmly under pressure in fast-paced environments.
  • Strong communication and collaboration skills.
  • Preferred skills include programming/scripting languages like Python, Go, Rust, or similar.
  • Experience with automation pipelines and tools like Jupyter notebooks.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.