CrawlJobs Logo

Threat Simulation Analyst

legalandgeneral.com Logo

LegalAndGeneral

Location Icon

Location:
United Kingdom , London

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

We're looking for a Threat Simulation Analyst to join our Group CISO team. You'll play a key role in fusing together strategic, operational and tactical threat intelligence across L&G to support and inform the creation and delivery of engaging threat simulations - collaborating with key stakeholders across the organisation to test L&G’s ability to respond to cyber attacks.

Job Responsibility:

  • Developing threat simulation exercises and scheduling quarterly (at least) exercises with all Group Business Units
  • Reviewing threat intelligence, data and trends and creating CSIRT exercises that support the development of mitigations
  • Developing and creating metrics by which progress of the threat simulation exercises can be demonstrated
  • Leading regular reviews with internal stakeholders to obtain and ensure that current and possible threats are exercised to best practice
  • Conducting threat intelligence research utilising open source, paid, community and national feeds to monitor and assess current and emerging threats that could pose a risk to L&G
  • Coordinating with other security and operational teams to ensure any threat assessments and actions are progressed as required
  • Producing written or verbal threat intelligence artifacts as required, identifying trends within physical security, cyber security or geo-politics
  • Defining, developing and delivering processes and systems to ensure a consistent and good level of service that means divisions can comply with all regulatory and security requirements

Requirements:

  • Strong understanding of Strategic, Operational and Tactical threat intelligence
  • A current understanding of cyber security incidents and how they could be practised within exercises to test the resilience of L&G
  • Experience in the creation and implementation of short-term and long-term plans for developing a programme of exercises
  • Threat intelligence and/or Information Technology industry certification (CREST, SANS or equivalent) would be great
  • Prior experience of delivering tabletop exercises or crisis simulations would be a huge plus!

Nice to have:

  • Threat intelligence and/or Information Technology industry certification (CREST, SANS or equivalent)
  • Prior experience of delivering tabletop exercises or crisis simulations
What we offer:
  • The opportunity to participate in our annual, performance -related bonus plan and valuable share schemes
  • Generous pension contribution
  • Life assurance
  • Healthcare Plan (permanent employees only)
  • At least 25 days holiday, plus public holidays, 26 days after 2 years’ service. There’s also the option to buy and sell holiday
  • Competitive family leave
  • Participate in our electric car scheme, which offers employees the option to hire a brand-new electric car through tax efficient salary sacrifice (permanent employees only)
  • There are the many discounts we offer – both for our own products and at a range of high street stores and online
  • In 2023, some of our workspaces were redesigned. Our offices are great spaces to connect and collaborate and have your wellbeing at the heart

Additional Information:

Job Posted:
January 03, 2026

Employment Type:
Fulltime
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Threat Simulation Analyst

Security Incident Response Analyst

We are looking for an Incident Responder with robust technical skills, expertise...
Location
Location
Poland , Gdańsk
Salary
Salary:
184500.00 - 246000.00 PLN / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience: 3+ years in security domains like Operations, Incident Response, Detection Engineering, Threat Research, or Engineering, with relevant incident response and investigation experience
  • Technical Skills: Proficiency in modern programming languages (Python, Ruby, Java, Go) or scripting for security tasks
  • experience with AWS, GCP, or similar cloud platforms
  • Project Management: Experience in building and delivering projects from start to finish
  • Specialization: Expertise in areas such as malware analysis, forensics, threat hunting, network analysis, or cloud endpoint analysis
  • Community Engagement: Contributions to the security community or open source projects
  • Communication: Capable of explaining technical issues to non-technical stakeholders
Job Responsibility
Job Responsibility
  • Security Incident Management: Act as an escalation point, collaborate with partners, communicate updates, and work towards resolution
  • participate in on-call roster and conduct post-incident reviews to analyze causes and recommend improvements
  • Investigation and Analysis: Investigate log data from multiple sources for signs of compromise, conduct threat hunts, research threat actor tools and tactics, and lead evidence collection and forensic analysis
  • Technical Solutions and Automation: Provide technical solutions to reduce incidents, build and maintain tools for automation, and develop security incident response guides and procedures
  • Advocacy and Training: Advocate for security best practices and secure coding standards, and conduct tabletop exercises and simulations to test and improve incident response readiness
What we offer
What we offer
  • Health and wellbeing resources
  • paid volunteer days
  • equity
  • bonuses
  • commissions
  • Fulltime
Read More
Arrow Right

Senior Security Incident Response Analyst

We are looking for an Incident Responder with robust technical skills, expertise...
Location
Location
Poland , Gdańsk
Salary
Salary:
256000.00 - 342000.00 PLN / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years in security domains like Operations, Incident Response, Detection Engineering, Threat Research, or Engineering, with relevant incident response and investigation experience
  • Proficiency in modern programming languages (Python, Ruby, Java, Go) or scripting for security tasks
  • Experience with AWS, GCP, or similar cloud platforms
  • Experience in building and delivering projects from start to finish
  • Expertise in areas such as malware analysis, forensics, threat hunting, network analysis, or cloud endpoint analysis
  • Contributions to the security community or open source projects
  • Capable of explaining technical issues to non-technical stakeholders
Job Responsibility
Job Responsibility
  • Security Incident Management: Act as an escalation point, collaborate with partners, communicate updates, and work towards resolution. Participate in on-call roster and conduct post-incident reviews to analyze causes and recommend improvements
  • Investigation and Analysis: Investigate log data from multiple sources for signs of compromise, conduct threat hunts, research threat actor tools and tactics, and lead evidence collection and forensic analysis
  • Technical Solutions and Automation: Provide technical solutions to reduce incidents, build and maintain tools for automation, and develop security incident response guides and procedures
  • Advocacy and Training: Advocate for security best practices and secure coding standards, and conduct tabletop exercises and simulations to test and improve incident response readiness
What we offer
What we offer
  • health and wellbeing resources
  • paid volunteer days
  • Fulltime
Read More
Arrow Right

Principal Cybersecurity / Threat Hunter Analyst

Berkshire Hathaway Specialty Insurance (BHSI) has an exciting opportunity for a ...
Location
Location
United States , Boston
Salary
Salary:
135000.00 - 170000.00 USD / Year
bhspecialty.com Logo
Berkshire Hathaway Specialty Insurance
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of hands-on cybersecurity experience across incident response, forensics, vulnerability management, and cloud security
  • Expertise in threat intelligence tools, network analysis, and attack simulation
  • Strong knowledge of IAM, PIM/PAM, and regulatory frameworks (NIST, GDPR, ISO, SOC2)
  • Proven leadership in managing security incidents and driving remediation
  • Certifications like CISSP, CISM, OSCP, or similar are a plus
Job Responsibility
Job Responsibility
  • Drive threat hunting activities, simulating red team/blue team exercises
  • Lead the charge in threat hunting and digital forensics, identifying and neutralizing risks before they escalate
  • Perform deep-dive analysis of critical security events to assess immediate and long-term impact
  • Advance our SOAR capabilities, making incident response faster and smarter
  • Spearhead our threat intelligence program, aggregating and analyzing global threat data
  • Collaborate across teams to elevate cybersecurity maturity and embed best practices
  • Act as a trusted advisor and thought leader, shaping security strategy and awareness
What we offer
What we offer
  • Comprehensive Health, Dental and Vision benefits
  • Disability Insurance (both short-term and long-term)
  • Life Insurance (for you and your family)
  • Accidental Death & Dismemberment Insurance (for you and your family)
  • Flexible Spending Accounts
  • Health Reimbursement Account
  • Employee Assistance Program
  • Retirement Savings 401(k) Plan with Company Match
  • Generous holiday and Paid Time Off
  • Tuition Reimbursement
Read More
Arrow Right

Threat Analyst

As a Threat Analyst at NTT DATA, you will be responsible for researching and ana...
Location
Location
Romania , Sibiu
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cybersecurity, Computer Science, International Relations, or Intelligence Studies strongly preferred
  • Minimum 1–3 years of experience in cybersecurity or IT security roles
  • Advanced scripting capabilities (Python, PowerShell preferred)
  • Strong proficiency with threat intelligence platforms like MISP, ThreatConnect, or Anomali, Security Alliance
  • Deep familiarity with MITRE ATT&CK framework, dark web monitoring techniques, and attack simulation techniques
  • Demonstrated skills in cyber threat modeling, malware reverse engineering, and API-triggered automation
  • Strong analytical and problem-solving abilities
  • Excellent written and verbal communication skills
  • Attention to detail and accuracy in technical analysis
  • Direct experience working in government, military, or intelligence organizations advantageous
Job Responsibility
Job Responsibility
  • Research, track, and analyze Indicators of Compromise (IOCs) and threat actor profiles using sources that include open-source (OSINT), dark web forums, government feeds, and commercial intelligence platforms
  • Conduct detailed analysis of Threat Actor Tactics, Techniques, and Procedures (TTPs) and malware
  • Deliver actionable intelligence insights to enhance detection, prevention, and response embedded within the threat lifecycle
  • Develop and deliver weekly threat briefs, annual landscape overviews, and ad-hoc risk signals for both technical and non-technical audiences
  • Produce detailed reports based on industry-specific campaigns or identified vulnerability patterns
  • Communicate emerging threats to relevant technical stakeholders, influencing rapid mitigation strategy formulation
  • Integrate threat intelligence feeds (TIPs) into platforms like SIEM or SOAR, prioritizing automation workflows where required
  • Track and assess malware campaigns, underground forums, and marketplaces to identify emerging attack vectors
  • Analyze threat data to produce predictive insights about probable trends and future adversarial strategies
  • Represent NTT DATA at external security forums and intelligence-sharing communities
What we offer
What we offer
  • Smooth integration and a supportive mentor
  • Choose from Remote, Hybrid or Office work opportunities
  • Projects have different working hours to suit your needs
  • Sponsored certifications, trainings and top e-learning platforms
  • Private Health Insurance
  • Individual coaching sessions or joining our accredited Coaching School
  • Epic parties or themed events
  • Fulltime
Read More
Arrow Right
New

Senior Resilience Lead

Microsoft’s Detection and Response Team (DART) is seeking a skilled and highly o...
Location
Location
Japan , Tokyo
Salary
Salary:
Not provided
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Master's Degree in Statistics, Mathematics, Computer Science or related field OR 5+ years experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection
  • Ability to travel up to 75% to deliver onsite with customers
  • A minimum of 3+ years of experience in development and delivery of workshops and tabletops
  • Ability to meet Microsoft, customer and / or government security screening requirements
  • Ability to support Business Level conversations in Japanese
  • Ability to support Business Level conversations in English
Job Responsibility
Job Responsibility
  • Lead Proactive Security Initiatives
  • Develop and launch advanced resilience programs, readiness assessments, and threat modeling engagements
  • Drive continuous improvement and measurable risk reduction
  • Support Reactive Security Initiatives
  • Provide infrastructure tooling deployment support on reactive customer engagements
  • Provide support of deep technical conversations in Japanese and English
  • Elevate Incident Response Readiness
  • Deliver tabletop exercises, cyber range simulations, and playbook development to prepare customers for real-world threats
  • Align offerings with global best practices and compliance standards
  • Inspire and Collaborate with a High-Performing Team
  • Fulltime
Read More
Arrow Right
New

Principal Engineer - Data Scientist

The Data-Driven Security & Analytics team at Wells Fargo is at the forefront of ...
Location
Location
United States , ISELIN; CHARLOTTE; IRVING
Salary
Salary:
159000.00 - 305000.00 USD / Year
https://www.wellsfargo.com/ Logo
Wells Fargo
Expiration Date
March 11, 2026
Flip Icon
Requirements
Requirements
  • 7+ years of Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
  • Strong proficiency in Python (pandas, scikit-learn, XGBoost/LightGBM/CatBoost, PyTorch/TensorFlow, PySpark) and experience with ML experimentation frameworks (MLflow, Weights & Biases, etc.)
  • Deep understanding of supervised & unsupervised learning, imbalanced classification, anomaly/outlier detection, time-series analysis, and ensemble techniques
  • Hands-on experience deploying models into real-time production environments (e.g., via APIs, Kafka consumers, Spark Streaming, or low-latency serving platforms)
  • Solid SQL skills and comfort working with large-scale data warehouses/lakehouses (Snowflake, Databricks, BigQuery)
  • Proven track record of delivering measurable business impact (e.g., fraud loss reduction, false-positive rate improvement, detection rate lift) in regulated environments
Job Responsibility
Job Responsibility
  • Act as an advisor to leadership to develop or influence applications, network, information security, database, operating systems, or web technologies for highly complex business and technical needs across multiple groups
  • Lead the strategy and resolution of highly complex and unique challenges requiring in-depth evaluation across multiple areas or the enterprise, delivering solutions that are long-term, large-scale and require vision, creativity, innovation, advanced analytical and inductive thinking
  • Translate advanced technology experience, an in-depth knowledge of the organizations tactical and strategic business objectives, the enterprise technological environment, the organization structure, and strategic technological opportunities and requirements into technical engineering solutions
  • Provide vision, direction and expertise to leadership on implementing innovative and significant business solutions
  • Maintain knowledge of industry best practices and new technologies and recommends innovations that enhance operations or provide a competitive advantage to the organization
  • Srategically engage with all levels of professionals and managers across the enterprise and serve as an expert advisor to leadership
  • Research, design, develop, and productionize machine learning models for fraud detection (supervised, unsupervised, semi-supervised), anomaly detection, behavioral biometrics, network intrusion detection, account takeover prevention, and synthetic identity fraud
  • Build and maintain real-time and near-real-time scoring pipelines that deliver sub-second fraud/attack predictions during payment authorization, login, and high-risk interactions
  • Perform advanced feature engineering on complex, heterogeneous data sources (transactional, temporal, graph-based, textual threat intel, device & behavioral signals) to create high-signal features for model training and inference
  • Apply techniques such as graph neural networks, sequence modeling (LSTM/Transformer), ensemble methods, autoencoders, isolation forests, contrastive learning, and adversarial robustness to address evolving fraud and cyber threats
What we offer
What we offer
  • Health benefits
  • 401(k) Plan
  • Paid time off
  • Disability benefits
  • Life insurance, critical illness insurance, and accident insurance
  • Parental leave
  • Critical caregiving leave
  • Discounts and savings
  • Commuter benefits
  • Tuition reimbursement
  • Fulltime
!
Read More
Arrow Right
New

Incident Response Senior Analyst

We are seeking a highly skilled and detail-oriented Cybersecurity Incident Respo...
Location
Location
United States , Salt Lake City
Salary
Salary:
Not provided
alterdomus.com Logo
Alter Domus
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in computer science, information security, or related professional experience
  • Minimum of 1 to 3 years of experience in incident response, Security operation, threat management
  • Strong knowledge of SIEM, and SOAR environment
  • Hands-on experience with IDS/IPS, and endpoint protection platforms
  • Working knowledge of Azure Defender and AWS security suite (GuardDuty, Security Hub)
  • Knowledge of network device configurations and standards (Firewalls, Switches, NSGs)
  • Knowledge of common operating systems MacOS, Linux and Windows OS
  • Familiarity with malware analysis, reverse engineering, and forensic tools
  • Strong cross functional communication skills and the ability to work closely with internal teams & lead cyber incident remediation efforts
  • Familiarity with common security frameworks and standards, such as NIST
Job Responsibility
Job Responsibility
  • Respond to security incidents
  • Lead and manage alerts, investigate, contain, and eradicate the cyber threats
  • Conduct forensic investigations to identify the root cause of security breaches and recommend preventive measures
  • Participate in post-incident reviews to identify lessons learned
  • Coordinate with internal teams and external partners during incident containment, eradication, and recovery efforts
  • Monitor security information and event management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), and other tools for suspicious activity
  • Investigate and assess potential threats, vulnerabilities, and attack vectors
  • Create detailed incident reports, document findings, remediation steps, and lessons learned
  • Maintain and update incident response playbooks and processes
  • Participate in Tabletop exercise and incident response trainings for other stakeholders
What we offer
What we offer
  • Support for professional accreditations
  • Flexible arrangements, generous holidays, plus an additional day off for your birthday
  • Continuous mentoring along your career progression
  • Active sports, events and social committees across our offices
  • 24/7 support available from our Employee Assistance Program
  • The opportunity to invest in our growth and success through our Employee Share Plan
  • Plus additional local benefits depending on your location
Read More
Arrow Right

Military Mission Operational Analysis Engineer

You will join a team of 65+ system engineers in the 'Situational Awareness and M...
Location
Location
France , Marignane
Salary
Salary:
Not provided
airbus.com Logo
Airbus
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Deep functional knowledge of Military Decision Making Process (MDMP), Joint Operation Planning Process (JOPP), or equivalent NATO/Coalition planning standards
  • Proven background in developing and managing ORBATs and OPORDs/OPOs for complex forces
  • Expert capability in Modeling & Simulation, scenario architecture, and validation of simulated environments against real-world intelligence/doctrine
  • Strong understanding of modular, open systems architecture (MOSA), embedded network protocols (AFDX, High-Speed Ethernet), and their performance impact in a simulated contested environment
  • Demonstrated ability to perform robust quantitative and qualitative analysis of massive datasets to extract tactical insights and inform procurement/design decisions
  • Proven ability to effectively liaise between Warfighters, Intelligence Analysts, and Engineering Teams
  • Team Spirit, good communication skills and experience in stakeholder management
  • English business fluent / negotiation level
  • This position requires a security clearance or will require being eligible for clearance by the recognized authorities.
Job Responsibility
Job Responsibility
  • Develop, document, and maintain a robust library of high-fidelity operational scenarios, focusing on high-risk mission profiles
  • Integrate and calibrate environmental models to accurately reflect the Area of Responsibility (AOR)
  • Define, model, and implement the full Friendly and Opposing Force (OPFOR) ORBAT
  • Define or Translate the Mission Operational Order (OPO) into executable simulation protocols and event triggers
  • Lead the execution of T&E campaigns
  • Conduct exhaustive After Action Reviews (AARs)
  • Provide clear, actionable intelligence and recommendations to system architects
  • Ensure the accurate modeling of distributed avionics architectures
  • Contribute to the creation of the Military Helicopters Operations (MHO) learning curriculum
  • Develop and deliver specialized training modules
What we offer
What we offer
  • Attractive salary, agreements on success and profit sharing schemes, employee savings plan abounded by Airbus and employee stock purchase plan on a voluntary basis
  • Extra days-off for special occasions, holiday transfer option, a Staff council offering many social, cultural and sport activities and other services
  • Complementary health insurance coverage (disability, invalidity, death). Depending on the site: health services center, concierge services, gym, carpooling application
  • Great upskilling opportunities and development prospects with unlimited access to +10.000 e-learning courses to develop your employability, certifications, expert career path, accelerated development programmes, national and international mobility.
  • Fulltime
Read More
Arrow Right