As a Cyber Incident Response Analyst, you will be part of the Cyber Defence team that develops and oversees the company's security program, ensuring S&P Global is protected from existing and emerging threats. You will detect, analyze, and decisively respond to security incidents, enrich investigations with timely intelligence, and help drive proactive defences. While based in the UK, you will support response and intelligence needs globally.
Requirements
- Working knowledge of common cyber attacks, tools, and attacker tradecraft;
- Ability to map activity to MITRE ATT&CK and articulate likely TTPs;
- Demonstrated experience handling security events in critical environments and applying intelligence to accelerate triage and response;
- Experience analyzing system, application, and cloud/SaaS logs to investigate security and operational issues;
- Hands-on experience with a SIEM (Splunk preferred) for investigations, alert creation, reporting, and threat hunting;
- Ability to produce clear, actionable intel and incident reports, including executive-ready summaries and visuals;
- Familiarity with threat intel workflows: collection planning, source evaluation, indicator lifecycle, PIRs, TLP, and feedback loops to detections;
- Experience with one or more TIPs or intel data sources (e.g., MISP, OpenCTI, Recorded Future) and STIX/TAXII concepts;
- 3+ years of information security experience with a focus on incident response, threat hunting, or threat intelligence;
- Excellent communication skills for varied business and technical audiences; strong presentation skills;
- Comfortable working in a fast-paced environment; passion for cyber security;
- Advanced knowledge of network protocols (TCP/IP, HTTP) and operating systems;
- Experience in the financial services industry;
- Familiarity with threat hunting techniques (hypothesis-driven, ATT&CK-aligned, behavior-based);
- Windows and Linux administration tools and concepts;
- Understanding of threat actors and the cybercrime ecosystem, including initial access vectors, monetization paths, and supply-chain/SaaS attack patterns;
- Exposure to malware/TTP analysis at a functional level (family identification, persistence/discovery behaviors) and creation of detections (e.g., Sigma/YARA);
- Experience producing finished intelligence products (tactical through executive) and briefing senior stakeholders;
- Relevant certifications (e.g., GCTI, GCFA/GCFR, GCIH, FOR578) or equivalent experience;
- Familiarity with information-sharing standards and practices (FS-ISAC, TLP) and legal/compliance considerations;
- Knowledge of cloud provider threat models and telemetry (AWS, Azure, GCP, M365/SaaS);
- Second language and/or geopolitical awareness for actor context is a plus;
- Ability to understand key S&P technology, systems, and business practices to contextualize threats and drive pragmatic defenses;
- Participation in information-sharing activities (e.g., FS-ISAC submissions) in line with TLP and legal/compliance requirements;
- Familiarity with incident response lifecycle and ability to support post-incident lessons learned with intelligence-driven enhancements;
Benefits
- Health & Wellness: Health care coverage designed for the mind and body.
- Flexible Downtime: Generous time off helps keep you energized for your time on.
- Continuous Learning: Access a wealth of resources to grow your career and learn valuable new skills.
- Invest in Your Future: Secure your financial future through competitive pay, retirement planning, a continuing education program with a company-matched student loan contribution, and financial wellness programs.
- Family Friendly Perks: It’s not just about you. S&P Global has perks for your partners and little ones, too, with some best-in class benefits for families.
- Beyond the Basics: From retail discounts to referral incentive awards—small perks can make a big difference.