Threat Intelligence Analyst

Ref: DS_ThrInt_JOB  ·  Posted on 12 May 2022

Introduction

The client is a leading multinational telecommunications company who specialise in critical national infrastructure.

For this role you will detect and analyse cyber threats and malware impacting the clients business. You will identify and understand the level of the threats posed and work with the client to take an informed decision on how to counteract the threat.

Key responsibilities
  • You’ll be responsible and accountable for operationally providing advanced cyber activities; Malware and Vulnerability services.
  • Assessing information provided by threat intelligence feeds to ascertain the relevance to the customer.
  • Applying your knowledge of current and past malware methods, attack methodologies, and TTPs (Tactics, Techniques, Procedures) to discover anomalies and trends within the data.
  • Continuously identifying operational and technical improvements that can be made within the customers environment.
  • Reviewing information from various sources using appropriate analytical tools and techniques to interpret gaps, patterns and trends, assess threat, risk and harm and make recommendations and provide advice to the end customer.
  • You will be able to interpret packet captures to understand the state of a network and provide recommendations and advice where necessary.
  • You will understand the current threat landscape and previous and recent attack methods.
Skills & experience
  • Storytelling with data: strong skills in building the case for change at a high business level, drawing on data and analytical techniques, and communicating this to senior business audiences.
  • Understanding of offensive security including attack methods and techniques.
  • Ability to generate clear and concise reports and presentations for senior stakeholders, from technical analysts to management and senior leadership teams.
  • Knowledge of SIEM tools and the analysis of their generated output
  • Knowledge of reverse engineering malware and known malware attacks.
  • Knowledge and understanding of the vulnerability scanning output.

The client would also like to see some of the below, but this is not essential:

  • CompTIA N+ and/or S+
  • Relevant Malware course or certification
  • At least 3 years working in an operational security environment
  • Demonstrated experience in developing and delivering crime or risk reduction recommendations and / or strategies

Our client is committed to providing a diverse and inclusive workplace and welcomes applications from all backgrounds.

Additional benefits
  • Flexible Benefits Scheme
  • Private Medical Cover
  • Dental Insurance
  • Health Assessment
  • Critical Illness Cover
  • Additional Holiday
  • Life Cover
  • Bonus sacrifice – pay amount of Bonus into Pension
  • Legal Protection Insurance
  • Give As You Earn (GAYE)
  • Pension
  • Cycle to Work Scheme
  • Saveshare Scheme
  • Technology Benefits
  • Holidays

RECOMMEND A FRIEND: If you have professional friends/colleagues who would be interested in one of our roles and our excellent levels of service too, we'd like to recognise your recommendations with a 'thank you' of our own. For every colleague you refer who then starts a role through Datasource either Contract or Permanent, we will send you £250 of Love to Shop Gift Vouchers!

You will be required to hold a minimum of SC clearance & NPPV3. If you do not hold an active SC clearance, please familiarise yourself with the vetting process before applying.

(c) Copyright Datasource Computer Employment Limited 2022.

Apply for role
Cyber Risk Stakeholder Data Operational Analyst Analytics

Refer your friend: We want to give you a Netflix or Amazon Prime subscription and £250 Love2Shop vouchers!

Refer your friend
Refer your friend:
Contact us

Let's connect and work together

Start the conversation

Submit CV  ·  Submit Vacancy