Job Description
Cyber Security Analyst\n\nApplicants for this role should currently hold a valid Security (SC) Clearance.\n\nResponsibilities:\n\n* Support mission to coordinate the response to critical and cross-cutting cyber threats, incidents and vulnerabilities, and enable cyber defenders to defend as one.\n\n* Become part of the Watch Officer rota to provide initial triage and escalation of reports and requests from Government organisations.\n\n* Support Incident Management when required during periods of heightened operational activity.\n\n* Maintain an understanding of the real-world cyber threat, identifying trends and emerging threats.\n\n* Maintain an understanding of the cyber threats likely to target the business.\n\n* Facilitate the timely sharing of high-quality actionable Cyber Threat Intelligence, both through regular and ad-hoc reporting, and through briefings to customers and stakeholders.\n\n* Work collaboratively with Incident Management, providing insights on adversaries to enable a more effective response, and capturing insights for wider use.\n\n* Support the implementation and ongoing management of Threat Intelligence tooling and infrastructure, including, malware sandboxes, and threat intelligence platforms. \n\n* Engage with the wider public sector cyber security, cyber threat intelligence and assessment communities on behalf of business.\n\nSKILLS / EXPERIENCE\n\n* Experience of working in cyber security, ideally within a Security Operations environment.\n\n* Good foundational knowledge of IT and digital services.\n\n* Ability to produce well written and structured products and notifications in clear English, with minimal support that will meet the requirements of stakeholders\n\n* Excellent written and verbal communication skills, including the ability to clearly and simply explain technical details to non-technical audiences, and engage with senior stakeholders. \n\n* Experience working with internal and external stakeholders.\n\nCyber Threat Intelligence Specific\n\n* Excellent understanding of the tools, techniques and procedures used by adversaries in real-world cyber attacks.\n\n* Experience monitoring a variety of sources of information to identify, analyse and report on relevant threats, carrying out all-source analysis and assessment to understand current and near-future threats.\n\n* Experience using cyber threat intelligence tools such as, malware sandboxes, and Threat Intelligence Platforms