National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Junior Threat Intelligence Analyst

M-KOPA-SOLAR
Greater London
1 year ago
Create job alert

At M-KOPA, We Finance Progress.Recognized twice by the Financial Times as one Africa's fastest growing company (2022 and 2023) and by TIME100 Most influential companies in the world 2023 , we've served over 3 million customers, unlocking $1 billion in cumulative credit for the unbanked across Africa. At M-KOPA, we empower our people to own their careers through diverse development programs, coaching partnerships, and on-the-job training. We support individual journeys with family-friendly policies, prioritize well-being, and embrace flexibility. Join us in shaping the future of M-KOPA as we grow together. Explore more at .M-KOPA's Threat Intelligence team sits within the Security department and identifies and assesses threats against our products, business and personnel. The team has taken a unique approach to Threat Intelligence by developing a custom analysis platform instead of depending on standard tools — Recorded Futures.By consuming several intelligence sources, we aim to provide minute-by-minute information to our Fraud, Application Security and Managerial teams using Azure Microservices.Your role is acting as a developer, primarily Python, for the Threat Intelligence team with elements of Threat Hunting in the mix. It's not only about building automated tools to scour the Internet but also about identifying new threats to monitor.It is a fully Remote role within the following time zone (UTC -1 / UTC+3), and you will report to the Senior Threat Intelligence Researcher. Additionally, you will work closely with the Application Security and Global Fraud teams to develop intelligence-gathering systems to distribute significant findings appropriately.

You're excited about this opportunity because;

You will create, build and enhance a bespoke Threat Intelligence platform, exceeding the capabilities of 99% of Threat Intelligence teams. You will identify new threats against M-KOPA, our products and our employees. You will get to learn about development best practices, Continuous Integration and Continuous Development processes. You will become familiar with the latest hardware hacking, web applications hacking and malware attacks. You will receive and analyze cyber threat alerts from various sources and communicate them to the appropriate team members. You will perform cyber defense trend analysis, assist team members with determining their cybersecurity requirements, and establish reporting mechanisms. You will develop and deliver written and oral mobile threat alerts, scheduled internal notifications, case studies, and after-action reports to several stakeholders. You will coordinate and communicate across multiple stakeholder groups. You will monitor external data sources to maintain an up-to-date understanding of cyber actors and threats and provide recommendations on prioritizing cyber threats and prevention/mitigation measures. You will review and evaluate incoming intelligence reports, information, collection plans, and programs.

We're excited about you because you have experience with;

Moderate experience writing Python programs or knowledge of Python development. Any experience with Microsoft Azure or cloud microservice architectures Some familiarity with modern development practices, Continuous Integration and Continuous Development. Any knowledge of Threat Intelligence principles. Windows and Linux command line knowledge.

Benefits - What's in it for you!

You will be involved, and participate in, our Application and Information Security Red Teaming operations. Have the opportunity to travel internationally to attend conferences and training courses.Annual Learning and Development Fund- You have an annual$ 1,200 allowanceto spend on learning and development (that is, between 1 January and 31 December). For your first year at M-KOPA, this allowance is pro-rated depending on the month that you start.Home Office Set Up -Having the best IT equipment tools in the world doesn't make sense if you do not have a proper setup to work with. For this reason, M-KOPA will pre-approve the following items for a total budget of $1000 that you can use at any time after signing the offer letter with M-KOPAOn site retreatswith wider tech team, plus trips to operational markets'

- -M-KOPA is an equal opportunity and affirmative action employer committed to assembling a diverse, broadly trained staff. Women, minorities, and people with disabilities are strongly encouraged to apply.M-KOPA explicitly prohibits the use of Forced or Child Labour and respects the rights of its employees to agree to terms and conditions of employment voluntarily, without coercion, and freely terminate their employment on appropriate notice. M-KOPA shall ensure that its Employees are of legal working age and shall comply with local laws for youth employment or student work, such as internships or apprenticeships. M-KOPA does not collect/charge any money as a pre-employment or post-employment requirement. This means that we never ask for ‘recruitment fees’, ‘processing fees’, ‘interview fees’, or any other kind of money in exchange for offer letters or interviews at any time during the hiring process.

Related Jobs

View all jobs

Junior Threat Intelligence Analyst

Sr. Information Security Analyst

Google Chronicle Developer - Remote

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.

Cyber Security Jobs Employer Hotlist 2025: 50 UK Companies Actively Hiring Right Now

Bookmark this guide—refreshed every quarter—so you always know who’s really expanding their cyber security teams. Ransomware payouts broke records in 2024, the UK’s new Cyber Security Bill imposed mandatory breach disclosure, and the National Cyber Force’s move to Samlesbury has super‑charged the northern skills market. Result? Demand for security architects, SOC analysts, penetration testers, cloud‑security engineers, threat hunters & GRC specialists is at an all‑time high in 2025. Below you’ll find 50 organisations that have posted UK‑based cyber security vacancies or announced head‑count growth during the past eight weeks. They’re organised into five quick‑scan categories. For every employer you’ll see: Main UK hub Example live or recent vacancy Why it’s worth a look (tech stack, culture, mission) Search any company on CyberSecurityJobs.tech to view current ads, or set a free alert so fresh openings land straight in your inbox.

Return-to-Work Pathways: Relaunch Your Cyber Security Career with Returnships, Flexible & Hybrid Roles

Re-entering the workforce after a career break can feel especially challenging in a fast-moving field like cyber security. Whether you stepped away for parenting, caregiving or another life chapter, the UK’s cyber security sector now offers a range of return-to-work pathways—from structured returnships to flexible and hybrid roles. These programmes value the transferable skills and resilience you’ve developed during your break, pairing you with mentorship, upskilling opportunities and supportive networks to ease your transition back into cyber security. In this article, tailored for parents and carers, you’ll discover how to: Understand the growing demand for cyber security talent in the UK Translate your organisational, communication and problem-solving skills into cyber security roles Tackle common re-entry challenges with practical solutions Refresh your technical knowledge through targeted learning Access returnship and re-entry programmes specific to cyber security Find roles that accommodate family commitments—whether hybrid, flexible or full-time Balance your career relaunch with caring responsibilities Master applications, interviews and networking in cyber security Draw inspiration from real returner success stories Whether you aim to return as an analyst, penetration tester, security engineer or compliance specialist, this guide will equip you with the steps and resources to reignite your cyber security career.