Technical Support Analyst – Entry Level Cybersecurity (Contract) at Tholons LTD
London EC1Y 1BE, , United Kingdom -
Full Time


Start Date

Immediate

Expiry Date

12 Sep, 25

Salary

45000.0

Posted On

10 Aug, 25

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Case Management, Brand Protection

Industry

Information Technology/IT

Description

TECHNICAL SUPPORT ANALYST – ENTRY LEVEL CYBERSECURITY (CONTRACT)

Location: London (Near Old Street Station)
Job Type: Contract – Minimum 5 months
Positions: 5
Work Mode: Hybrid – 3 days in the office per week (4 days initially)
Shift: Early shift to support U.S. clients (9 AM–5 PM local)
Potential Conversion Salary: Around £45,000 for high-performing contractors

PREFERRED SKILLS (NOT ESSENTIAL)

· Familiarity with Notion or Swimlane case management
· Awareness of competitor tools such as ZeroFox, Digital Shadows, Doffle, FishLabs, CrowdStrike Brand Protection, SOCRadar
· Experience with phishing detection, threat hunting, or OSINT investigation

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities

ROLE SUMMARY

We are seeking five Technical Support Analysts to join our cybersecurity and threat intelligence team in London. This is an entry level cybersecurity contract role, ideal for graduates or early-career professionals who want hands-on experience in digital risk protection, SOC investigations, and open-source intelligence (OSINT) research. You will help protect major global brands by monitoring and investigating cyber threats, and escalating urgent incidents to U.S. enterprise clients.
As an entry-level analyst on our Managed Services team, you will directly support our global clientele through escalation and threat analysis activities. In collaboration with our Triage and Senior Research teams, you’ll be responsible for writing and publishing notes related to threats facing our customers.

KEY RESPONSIBILITIES

· Monitor, triage, and investigate alerts from the Recorded Future threat intelligence platform
· Research phishing, credential theft, fraudulent domains, and data leaks
· Escalate sensitive cyber threats to U.S. clients before the start of their working day
· Follow Standard Operating Procedures (SOPs) under the guidance of Senior Analysts
· Support Digital Risk Protection (DRP) workflows and provide manual investigation support
· Maintain accurate investigation logs and documentation for SOC reporting
· Support shift hours (9 AM–5 PM local) to ensure alerts are addressed timely and accurately
· Conduct threat research escalated by senior analysts, covering phishing, credential harvesting, fraudulent domains, data leakage, social media monitoring, and malicious infrastructure
· Collaborate with Triage and Senior Research teams to produce written threat intelligence notes for customers

Loading...