Cyber Threat Intelligence Analyst - Banking and Finance
- Up to £60,000 per annum
- Liverpool Street, Greater London, United Kingdom
- Permanent
- 60000
- Enterprise
- Enterprise Security
- Cyber Security
Looking to shape the future of international banking and wealth management?
Join a leading independent offshore bank and trust company with over 160 years of experience, delivering specialized financial services across Bermuda, the Cayman Islands, Guernsey, Jersey, Singapore, Switzerland, The Bahamas, and the United Kingdom. The organization combines deep expertise, global reach, and a strong reputation for stability and excellence to support clients’ banking, investment, and trust needs, while maintaining high standards of governance and service.
If you’re ready to contribute to a legacy of trusted, innovative offshore banking, this is your opportunity to make a global impact.
Responsibilities:
- Monitor, analyse, and respond to security incidents and EDR alerts using CrowdStrike and supporting security tooling
- Conduct cyber threat intelligence analysis using internal data, OSINT, and platforms such as Recorded Future
- Track and report on emerging threats, threat actors, and changes in the global threat landscape
- Produce high-quality written intelligence reports for technical and non-technical stakeholders
- Support incident response investigations with intelligence-led insights and contextual analysis
- Work closely with security operations to enhance detections, investigations, and response processes
- Use SIEM, TIPs, and threat feeds to enrich alerts and improve security posture
- Translate complex technical findings into clear, actionable intelligence
- Operate independently while collaborating with the wider team through regular meetings
Skills / Must Have:
- Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, Computer Engineering, or a related field
- Around 4 years’ experience in cyber threat intelligence, security operations, or a closely related role
- Strong understanding of networking concepts including TCP/IP, DNS, common protocols, and system internals across Windows and Linux
- Hands-on experience with SIEM platforms, threat intelligence platforms, and threat-hunting tools such as Recorded Future, Elastic, CrowdStrike, or Mimecast
- Familiarity with intelligence and security frameworks including MITRE ATT&CK, Cyber Kill Chain, and Diamond Model
- Experience conducting OSINT and investigative research
- Excellent analytical thinking, pattern recognition, and problem-solving skills
- Strong written and verbal communication skills with the ability to present intelligence clearly
- Comfortable working independently and managing workload proactively
- Experience in finance, military, or police environments is beneficial
- Exposure to Microsoft and Windows-centric environments
- Scripting or programming knowledge such as Python or PowerShell is advantageous but not essential
Certifications (desirable, not all required):
- Certified Threat Intelligence Analyst (CTIA)
- CREST Threat Intelligence certifications such as CRTIA or CCTIM
- SANS FOR578
- CISSP
- GCIH or GCIA
- CEH
- CompTIA Security+ or CySA+
Benefits:
- Split-shift working model aligned with UK and Canada offices
- No out-of-hours or on-call requirements
- Hybrid working with one day per month in the London office
- Well-defined role with autonomy and ownership
- Exposure to a constantly evolving threat landscape
- Regular team collaboration with two scheduled meetings per week
Salary:
- Up to £60,000 per annum