Start Date
Immediate
Expiry Date
12 Sep, 25
Salary
45000.0
Posted On
10 Aug, 25
Experience
2 year(s) or above
Remote Job
Yes
Telecommute
Yes
Sponsor Visa
No
Skills
Case Management, Brand Protection
Industry
Information Technology/IT
TECHNICAL SUPPORT ANALYST – ENTRY LEVEL CYBERSECURITY (CONTRACT)
Location: London (Near Old Street Station)
Job Type: Contract – Minimum 5 months
Positions: 5
Work Mode: Hybrid – 3 days in the office per week (4 days initially)
Shift: Early shift to support U.S. clients (9 AM–5 PM local)
Potential Conversion Salary: Around £45,000 for high-performing contractors
PREFERRED SKILLS (NOT ESSENTIAL)
· Familiarity with Notion or Swimlane case management
· Awareness of competitor tools such as ZeroFox, Digital Shadows, Doffle, FishLabs, CrowdStrike Brand Protection, SOCRadar
· Experience with phishing detection, threat hunting, or OSINT investigation
How To Apply:
Incase you would like to apply to this job directly from the source, please click here
ROLE SUMMARY
We are seeking five Technical Support Analysts to join our cybersecurity and threat intelligence team in London. This is an entry level cybersecurity contract role, ideal for graduates or early-career professionals who want hands-on experience in digital risk protection, SOC investigations, and open-source intelligence (OSINT) research. You will help protect major global brands by monitoring and investigating cyber threats, and escalating urgent incidents to U.S. enterprise clients.
As an entry-level analyst on our Managed Services team, you will directly support our global clientele through escalation and threat analysis activities. In collaboration with our Triage and Senior Research teams, you’ll be responsible for writing and publishing notes related to threats facing our customers.
KEY RESPONSIBILITIES
· Monitor, triage, and investigate alerts from the Recorded Future threat intelligence platform
· Research phishing, credential theft, fraudulent domains, and data leaks
· Escalate sensitive cyber threats to U.S. clients before the start of their working day
· Follow Standard Operating Procedures (SOPs) under the guidance of Senior Analysts
· Support Digital Risk Protection (DRP) workflows and provide manual investigation support
· Maintain accurate investigation logs and documentation for SOC reporting
· Support shift hours (9 AM–5 PM local) to ensure alerts are addressed timely and accurately
· Conduct threat research escalated by senior analysts, covering phishing, credential harvesting, fraudulent domains, data leakage, social media monitoring, and malicious infrastructure
· Collaborate with Triage and Senior Research teams to produce written threat intelligence notes for customers