Jobs

Cyber Threat Analyst


Job details
  • M&G
  • Stirling
  • 7 months ago
Applications closed

We will consider flexible working arrangements for any of our roles and also offer work place accommodations to ensure you have what you need to effectively deliver in your role.

The Cyber Threat Analyst role is positioned with the M&G Security Operations team that consists of the following functions:

Security Operations Centre (Monitoring) Threat Intelligence and Vulnerability Management Security Operations Engineering (Tooling Support) Cyber Response (Security Incident Manage and Cyber Resilience)

The role reports in directly to the SOC Manager and the successful applicant will work alongside an internal team as well as a Managed Security Service consisting of 24/7 L1 and L2 SOC analysts.

Key Responsibilities:

Use-case contributions and review – helping to ensure the analytical rules continue to be fit for purpose and reflective of real-world attack scenarios including assisting MSSP in driving team automation Incident Response – Blocking of IOCs, stakeholder alerting, act as a part of team co-ordinated activity Collaboration with internal teams within the Security Operations function and wider M&G to ensure effective service. Collaboration with external teams within the Security Operations function (such as the managed service provider) where necessary to investigate cyber security alerts and incidents. Act as a business point of escalation for MSSP L1s and L2s where further assistance is required from the 24/7 monitoring team. Pro-actively suggesting service improvements with the aim of improving the organisation’s security posture. Be able to articulate complex problems, risks and solutions to key stakeholders internally and externally. Adherence to existing processes/procedures and aid in new process development where a new business requirement comes into existence. Supporting of key regular internal/external audit activities where applicable – typically through tracking of SOC activities, adherence to process/procedures and ad-hoc participation in technical sessions to support the SOC Manager where required.

Target Skills, Experience and Technologies:

Previous experience in Security Operations environment Exposure to Cyber Incident Response. Experience in Endpoint Detection and Response tooling (ideally Defender for Endpoint and/or Palo Alto Cortex XDR Experience in Microsoft Sentinel (querying of logs, knowledge of analytical rules) Experience with IDPS systems (NGFW, Firepower/Sourcefire etc) Experience in other Microsoft Azure environment – including use of Azure Activity Directory, Identity Protection, Defender for Cloud etc. Exposure to use-case management (fine tuning of false positives etc) Ideally having worked in the financial services sector (or another highly regulated area)

Desirable Certifications

Desirable certifications for the role at this level may include:

Non-vendor specific such as CompTIA Security+, CySa+, ISC2 SSCP, Security Essentials Microsoft specific such as SC200, AZ500

We have a diverse workforce and an inclusive culture at M&G plc, underpinned by our policies and our employee-led networks who provide networking opportunities, advice and support for the diverse communities our colleagues represent. Regardless of gender, ethnicity, age, sexual orientation, nationality or disability we are looking to attract, promote and retain exceptional people. We also welcome those who take part in military service and those returning from career breaks.

Sign up for our newsletter

The latest news, articles, and resources, sent to your inbox weekly.

Similar Jobs

Information Security Analyst - Vulnerability

Starling is the UK’s first and leading digital bank on a mission to fix banking! We built a new kind of bank because we knew technology had the power to help people save, spend and manage their money in a new and transformative way. Read more aboutOur Storyhere.We’re a fully...

Starling Bank London

SOC Analyst

You must be fully eligible to work in the UK and be able to travel into the Newcastle office to apply for this roleThe CompanyAre you an IT professional eager to transition into the world of cyber security? This is your opportunity to join a fast-growing security consultancy. A new...

Newcastle upon Tyne

Intelligence Analyst Intern - GTAC eCrime (Remote)

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn't changed - we're here to stop breaches, and we've redefined modern security with the world's most advanced AI-native platform. Our customers span all industries, and they count on...

CrowdStrike

Senior Analyst, Detection Engineer

We are seeking a Detection Engineer who will support in building out and improving McDonald’s ability to effectively detect and respond to threats. You will collaborate closely with cybersecurity experts, Global Technology teams, service partners, and business leaders to assess detection gaps across McDonald’s and drive the development, deployment, and...

McDonald's London

Senior Threat & Vulnerability Analyst

Job Title: Senior Threat & Vulnerability AnalystContract Type: PermanentLocation: Alderley Edge/EdinburghWorking style: Hybrid 50% home/office basedClosing date: 7th February 2025 We are expanding our security and resilience team within the CISO office. Over the last few years, we have been on a continuous improvement journey and are looking to expand...

Royal London Group Macclesfield

Security Engineering and Automation Manager

Security Engineering and Automation ManagerPermanent - Strong salary + benefitsLocation: Hybrid - CambridgeYour new companyA NASDAQ-listed semiconductor organisation in the UK are currently looking for a Security Engineering and Automation Manager to join their ranks. The organisation are very well known in their world and offer strong benefits and hybrid...

Cambridge