Cyber Threat Intelligence Analyst
LSEG
Job Overview
Who's the hiring manager?
Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Job Description
Cyber Threat Intelligence Analyst at LSEG
LSEG Security Operations is a central function employing people, process and technology to continuously monitor and respond to cyber-security incidents. Security Operations spans multiple domains including cyber threat intelligence, cyber threat detection, data loss prevention and cyber incident response.
This Cyber Threat Intelligence Analyst role sits within the Cyber Threat Intelligence (CTI) team and will provide proactive analysis of the risks to LSEG; help track current cyber threats; and develop and curate threat indicators to help improve the overall quality of LSEG’s defences.
Key Responsibilities
- Triage, investigate and remediate threat intelligence-driven events
- Partner with other Security Operations teams and the wider LSEG cyber-security teams to conduct threat intelligence investigations.
- Identify and evaluate new sources of intelligence and integrate into monitoring technologies.
- Develop critical intelligence partnerships to develop and curate high quality threat analysis and indicators.
- Perform cyber threat intelligence activities across the intelligence lifecycle, maintaining a standard of the highest quality and confidentiality across multiple geographies.
- Stay up-to-date with current vulnerabilities, attacks, and counter-measures.
- Research, develop and implement detection rules based on a solid understanding of adversary tactics, techniques and procedures
Technical / Job Functional Knowledge
- Background in collecting, analysing, and interpreting data from various sources, detailing the results and preparing substantial analysis products.
- Keen interest in geo-political events and their impact on cyber threat actor activity
- Awareness of open-source intelligence techniques and platforms.
- Demonstrable working knowledge of networks including the TCP/IP stack, typical organisation architectures, and common protocols abused by malware.
- Experience in security event analysis and triage, incident handling and root-cause identification.
- Understanding of tools, techniques and procedures that attackers use to compromise organisations, ideally from direct experience.
Personal Skills And Capabilities
- Ability to work in a fast-paced environment, whilst remaining calm under pressure and possessing the agility to work on multiple projects in parallel
- Strong verbal and written communication skills and an ability to collaborate effectively across multiple teams.
- Preferred security industry specific and core technical accreditations such as OSCP, GIAC, CCNA but not essential
- Preferred competence with one or more programming/scripting languages (e.g. Python, PowerShell, Java, C#) but not essential
- Is willing to go through Government or Industry security clearance process when required.
- Experience with local and multiple country regulations governing cyber intelligence processing and handling of sensitive data.
- Experience conducting cyber threat hunting operations using known adversary tactics, techniques and procedures to detect advanced threats to the enterprise.
- Familiarity with policies, standards and security frameworks e.g. NIST, CIS, MITRE ATT&CK.
Key skills/competency
- Cyber Threat Intelligence
- Threat Analysis
- Incident Response
- Network Protocols
- Security Operations
- OSINT
- MITRE ATT&CK
- Python/Scripting
- Data Interpretation
- Cyber Security Frameworks
How to Get Hired at LSEG
- Research LSEG's culture: Study their mission, values (Integrity, Partnership, Excellence, Change), recent news, and employee testimonials on LinkedIn and Glassdoor.
- Tailor your resume: Highlight experience in cyber threat intelligence, security operations, and financial sector relevance, customizing for the Cyber Threat Intelligence Analyst role.
- Master technical skills: Prepare for in-depth questions on network protocols, TCP/IP, MITRE ATT&CK framework, OSINT, and scripting languages like Python or PowerShell.
- Showcase analytical prowess: Be ready to discuss your experience collecting, analyzing, and interpreting threat data, and your understanding of adversary TTPs and geo-political impacts.
- Demonstrate collaboration and communication: Provide examples of successful cross-functional teamwork and clear communication in fast-paced security environments.
Frequently Asked Questions
Find answers to common questions about this job opportunity
Explore similar opportunities that match your background