Engineer the Quantum RevolutionYour expertise can help us shape the future of quantum computing at Oxford Ionics.

View Open Roles

L2 Insider Threat Analyst

Willis Towers Watson
London
1 week ago
Create job alert

Description

We are seeking passionate people to grow the Cyber Security team within WTW and provide an excellent service and trusted expertise to all parts of our business. We have an exciting opening for a skilled and experienced L2 Insider Threat- IRM Analyst.

As part of the Cyber Defence department, this role will investigate Insider Risk Management (IRM) cases that have been escalated by our L1 Insider Threat team. Reporting to the Insider Threat - IRM Operations Manager, the L2 Insider Threat- IRM Analyst role is suited to someone who has strong Microsoft Purview DLP and Insider Risk Management (IRM) analyst experience. It is a business facing role and requires working proactively with stakeholders and colleagues to investigate Insider Threat and IRM cases.

The Role:

As the L2 Insider Threat- IRM Analyst, the primary responsibilities will be:

  • Perform advanced analysis and investigation of Insider Threat and IRM cases across the various egress channels in both on premise and cloud environments.
  • Analyse event/ case/ alert patterns to properly interpret and prioritise threats with available IRM and DLP tools and other data protection devices.
  • Help Identify trends and drive requirements aimed at improving and enhancing existing IRM detection policies.
  • Work closely with Cyber Defence teams such as the Global Security Operations Centre as well as Legal, Privacy and HR teams if necessary, during investigations and incidents.
  • Prepare detailed reports on security incidents, investigations, and mitigation efforts.
  • Contribute to the fine tuning of rules across the detection tools by highlighting pain points to the Insider Threat - IRM Operations Manager and Insider Threat Engineering Manager.
  • Contribute to the development, improvement and review of operational documents.

Secondary responsibilities:

  • Other relevant tasks as designated by the Insider Threat - IRM Operations Manager.
  • Help coach and mentor L1 IRM Analysts.
  • Provide support to projects and initiatives that enhance Insider Risk and IRM policies and standards.

Qualifications

The Requirements:

  • It is essential that you have in-depth experience within an L2 IRM/ DLP or Insider Threat Analyst role in a global enterprise organisation.
  • Relevant Microsoft Qualifications for Purview IRM, Defender and DLP (like SC400/401, AZ 900).
  • Excellent operational knowledge of Purview IRM, Defender and DLP.
  • Excellent analytical and investigative skills to identify complex security issues and respond at the same level with a technical understanding of when to escalate impacting security events.
  • Ability to identify trends and patterns in data usage behaviour.
  • Must possess excellent oral communication and writing skills.
  • Must be self-motivated and capable of independent work while operating in a geographically and culturally diverse peer group.
  • Must possess good stakeholder management skills.
  • Must exhibit a history of reliability and strong decision-making skills due to the trust imparted as an IRM analyst.
  • Proficiency in using security tools and technologies such as Microsoft Sentinel SIEM, EDR and forensic analysis tools.
  • Familiarity with KQL be beneficial for automating tasks and conducting advanced analysis.

Beneficial:

  • Understanding of data protection laws, regulations, and compliance requirements (e.g., GDPR, CCPA, HIPAA).
  • Industry certifications such as Certified Information Systems Security Professional (CISSP) or Certified Information Privacy Professional (CIPP).
  • Prior experience in cyber security roles in areas such as incident response, threat detection or security operations.
  • Understanding of risk scoring.

Equal Opportunity Employer

At WTW, we believe difference makes us stronger. We want our workforce to reflect the different and varied markets we operate in and to build a culture of inclusivity that makes colleagues feel welcome, valued and empowered to bring their whole selves to work every day. We are an equal opportunity employer committed to fostering an inclusive work environment throughout our organization. We embrace all types of diversity.

At WTW, we trust you to know your work and the people, tools and environment you need to be successful. The majority of our colleagues work in a ”hybrid” style, with a mix of remote, in-person and in-office interactions dependent on the needs of the team, role and clients. Our flexibility is rooted in trust and “hybrid” is not a one-size-fits-all solution.

We’re committed to equal employment opportunity and provide application, interview and workplace adjustments and accommodations to all applicants. If you foresee any barriers, from the application process through to joining WTW, please email


#J-18808-Ljbffr

Related Jobs

View all jobs

L2 Insider Threat Analyst

L2 Insider Threat Analyst

Information Security Analyst L2 ( Talent pool )

Cyber Platform Developer

Infrastructure and Projects Engineer

Technical Projects & Support Engineer (CRM & IT)

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Pre-Employment Checks for Cyber Security Jobs: DBS, References & Right-to-Work and more Explained

The cyber security sector in the UK stands at the forefront of protecting national infrastructure, business operations, and personal data from increasingly sophisticated cyber threats. As organisations across all sectors recognise cyber security as a critical business function, employers are implementing the most rigorous pre-employment screening processes in the technology industry to ensure they recruit professionals capable of defending against advanced persistent threats and maintaining the highest standards of security and trustworthiness. Whether you're a penetration tester, security analyst, incident response specialist, or chief information security officer, understanding the comprehensive vetting requirements is essential for successfully advancing your career in this security-critical field. This detailed guide explores the extensive background checks and screening processes you'll encounter when applying for cyber security positions in the UK, from fundamental eligibility verification to the most stringent security clearance requirements and specialised threat intelligence assessments.

Why Now Is the Perfect Time to Launch Your Career in Cyber Security: The UK's Digital Defence Revolution

The United Kingdom faces an unprecedented cyber security challenge that presents an extraordinary career opportunity. With cyber attacks increasing by 300% year-on-year and the average cost of a data breach reaching £4.24 million, Britain urgently needs skilled cyber security professionals to defend its digital infrastructure, protect citizens' data, and maintain national security in an increasingly connected world. If you've been considering a career change or seeking to future-proof your professional trajectory, cyber security represents one of the most secure, well-compensated, and socially impactful career choices available. The convergence of escalating threats, skills shortage, government investment, and regulatory requirements has created a perfect storm of opportunity that shows no signs of abating.

Automate Your Cyber Security Jobs Search: Using ChatGPT, RSS & Alerts to Save Hours Each Week

Cyber roles drop across consultancies, MSSPs, hyperscalers, banks, gov & start-ups every day—often buried in ATS portals or duplicated across boards. The fix is simple: put discovery on autopilot with keyword-rich alerts, RSS feeds & a reusable ChatGPT workflow that triages listings, ranks fit, & tailors your CV in minutes. This copy-paste playbook is built for www.cybersecurityjobs.tech readers. It’s UK-centric, practical, & designed to save you hours each week. What You’ll Have Working In 30 Minutes A role & keyword map spanning SecOps/Detection, DFIR, AppSec, Cloud Security, GRC, Red Team, Threat Intel, IAM/PAM, OT/ICS & Vulnerability Management. Shareable Boolean search strings for Google & job boards to cut noise fast. Always-on alerts & RSS feeds delivering fresh roles to your inbox/reader. A ChatGPT “Cyber Job Scout” prompt that deduplicates, scores fit & outputs tailored actions. A simple pipeline tracker so deadlines & follow-ups never slip.