Location(s):UK, Europe and Africa : UK : London UK, Europe and Africa : UK : Leeds
BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments.
Job Title:
Threat Intelligence Analyst
Requisition ID:
Location:
London : We offer a range of hybrid and flexible working arrangements : please speak to your recruiter about the options for this particular role.
Grade:
GG11
Referral Bonus:
GBP 5,000
Threat Intelligence Analyst
Role description
To undertake the day to day operation of (and incremental improvement of) a dedicated Security Operations Centre (SOC) to support the defence of a major UK CNI organisation. The networks protected are predominantly hosted in Azure cloud platforms, with many systems within these environments that must be protected. The customer is committed to development of this improved SOC to be a benchmark of best practice and excellence in reflection of the significant threat that the protected systems are subject to.
The SOC Analyst roles are 'hands:on' shift based roles, working as part of a 24/7 operation with four shift teams working in a standard rotation. They are responsible for utilising the SOC's SIEM and SOAR toolsets to detect and investigate potential Security and Service Incidents occurring within the monitored networks.
These roles require a minimum of SC clearance. Due to timelines for the start of operations, it will not be possible to sponsor new clearances so candidates must have existing clearances.
Responsibilities
stylemargin:top:0.0cm;margin:bottom:0.0cm:
:
Produce and maintain threat assessments to provide a clear understanding of the customer threat landscape.
:
Maintain the IoC database tailored to the monitored environment and threats and ensure changes are pushed to the detection systems in a timely manner.
:
Maintain threat profiles and threat modelling and applicability to the monitored estate along with updating the modelling to detail what detection and controls are in place to mitigate the threats.
:
Gather and maintain a set of TI requirements that define the threats that will be monitored, tracked and researched by the TI Team.
:
Oversee the collection, collation and maintenance of threat data collected from open and closed sources and ensure it appropriately validated.
:
Conduct analysis and research to determine the identity, motivations, relationships, targets / victims, capabilities, tooling and infrastructure of threat groups relevant to customer.
Requirements
Technical
stylemargin:top:0.0cm;margin:bottom:0.0cm typedisc:
:
Working in a Threat Intelligence team developing threat intelligence products for technical and non:technical audiences.
:
Performing malware analysis and reverse engineering.
:
Conducting threat assessments and defining threat intelligence requirements.
:
Developing and maintaining threat data sources.
:
Advanced knowledge of Windows and Linux operating systems and use of the command line.
:
Advanced knowledge of core networking concepts and technologies e.g. TCP/IP.
:
Intermediate knowledge of malware behaviour and techniques employed by attackers to evade security controls.
:
Intermediate knowledge of malware analysis and reverse engineering techniques.
Non:technical
stylemargin:top:0.0cm;margin:bottom:0.0cm typedisc:
:
Client side consulting, including stakeholder engagement and the ability to communicate insights and concepts to others (including briefing skills and report writing)
:
Able to understand and adapt to different cultures and hierarchical structures.
:
Team player and adept at working in multi:disciplina