An industry leading Defence company are looking for a Senior Cyber Defence Analyst to join their established team. This is an opportunity to join a team of highly skilled and innovative network defenders, and an excellent group of individuals out there. Must be eligible for SC Clearance.

 

The role:

You will be expected to “think like an adversary” and engage in threat hunting operations leveraging your understanding of the tactics, techniques and procedures employed by advanced threats combined with intelligence from multiple sources and provide reporting and briefings to other teams and leadership in order to maintain appropriate levels of situational awareness. Specifically, this will include:

  • Analyse network and host activity associated with both successful and unsuccessful intrusions by advanced attackers
  • Perform network traffic analysis utilising raw packet data, net flow, IDS, and custom sensor output.
  • Support enterprise incident response efforts
  • Leverage understanding of tactics, techniques and procedures associated with advanced threats to create and add custom signatures that mitigate highly dynamic threats to the enterprise.
  • Employ advanced forensic tools and techniques for attack reconstruction and intelligence gathering
  • Proactively research emerging cyber threats. Apply analytical understanding of attacker methodologies and tactics, system vulnerabilities, and key indicators of attacks and exploits
  • Contribute to threat intelligence reports and briefings that provide situational awareness of cyber threats impacting the company’s global network infrastructure, to every level of the organisation
  • Participate in threat hunt operations using known adversary tactics, techniques and procedures, as well as indicators of attack, in order to detect advanced threats to the enterprise
  • Collaborate using information and knowledge sharing networks and professional relationships to achieve common goals
  • Provide on-call support for incident response efforts outside of core hours, as needed
  • Mentor junior analysts technically and conceptually
  • Collect, create and disseminate threat intelligence
  • Lead small groups within the team for discernable tasks, including projects and incident response
  • Drive advanced countermeasures through to completion
  • Understanding and educating the team about defending new threat vectors

 

The individual

  • Experience in conventional networkhost-based intrusion analysis, digital forensics, or malware analysis
  • Experience performing “deep dive” analysis and correlation of log data from multiple sources including PCAP and forensic artifacts
  • Experience leading and contributing to incident response activities
  • Strong understanding of Operating Systems and Network Protocols
  • Proficiency with Microsoft Windows administrative tools, and the Unix/Linux command line
  • Understanding of behavioural based threat models, including ATT&CK, Cyber Kill Chain, Diamond Model, etc
  • Experience with Splunk (preferred) or other SIEM-type platforms
  • Capable and comfortable communicating actionable threat intelligence to both technical and executive-level stakeholders
  • Familiarity with common languages (like Perl and Python) to parse logs, automate processes, and integrate systems
  • Previous experience as Threat Researcher and/or Intelligence Analyst
  • Experience with dynamic malware analysis, and reverse engineering
  • Experience in cryptography or cryptanalysis
  • Experience in cyber security engineering
  • Experience defending large cloud infrastructures (AWS, Azure, etc.)
  • Ability to create, modify, and implement both Snort and YARA signatures
  • Published research papers at conferences or through other mediums (blogs, articles)
  • Working knowledge of Computer Network Exploitation (CNE), Computer Network Attack (CNA) and Computer Network Defense (CND) tools and techniques
  • A deep understanding of advanced cyber threats targeting enterprises, along with the tools, tactics, and procedures used by those threats
  • Experience applying threat and data modeling, advanced data correlation, and statistical analysis to develop alerts, notable events, investigative dashboards, and metrics driven reports

 

The package

  • Salary up to £92,000
  • Contributory Pension Scheme
  • Private Medical Insurance
  • 33 days Annual Leave (including public and privilege holidays)
  • Access to Flexible benefits (including life assurance, health schemes, childcare vouchers and cycle to work scheme)
  • Dynamic Working

Upload your CV

Send us your CV today and let us find you the perfect job

We want to hear from you…

If you are looking for a preferred recruitment company to work with to find you your next opportunity or to source prime talent in the market, get in touch!

Ping us a mail

info@copello.co.uk

Send us a message

Get in touch

Let's have a chat

+44 (0)23 9310 0594

Apply Now

Stop by for a coffee

16-18 Barnes Wallis Rd, Fareham, PO15 5TT