Lead Cyber Threat Analyst

Sorry, this advert is now closed. Click here to view our live vacancies.

Why i-confidential

i-confidential offers a range of information security consulting services.  We provide cost effective services to help our clients to clearly understand their information risks and develop their information and cyber security strategies.  We deliver practical, understandable solutions to protect information. Our client base is expanding, and our clients are asking for an increasingly diverse range of services.

We are looking to work with Threat Analysts to assist one of our financial services clients.

Key accountabilities:

  • Act as threat lead within the Ransomware Feature team, providing SME input and helping set direction
  • Work with other technical SME's from the bank's wider security operations and security service teams to drive out Ransomware Defence improvements using Agile techniques
  • Technically assess Ransomware campaigns of interest using industry recognised techniques. Develop actionable intelligence through threat models against the clients environments that can be used to create defence improvement opportunities
  • Work with the Ransomware Feature Team product owner to deliver strategic improvements and new ways of working
  • Liase with the clients threat intelligence team and external threat partners to refine threat intelligence requirements around Ransomware
  • Produce regular reporting as defined by the Ransomware Feature Team product owner reflecting activity performed by the feature team
  • Support the creation and operation of the Ransomware Feature Team including working with other threat analyst assigned to the team and additional regular tasks

Skills and experience required

  • Background in Cyber Security industry, preferably working in a similar role
  • Detailed knowledge of advanced cyber-attack techniques
  • Understanding and experience in security technologies,
  • Experience in analysing malware, hacking tools, and threat actor tactics, techniques and procedures to characterise threat actors’ technical methods for accomplishing their missions.
  • Possess, or working towards, professional or industry certifications, such as, CHFI, CISSP, SANS, and have an understanding of the security principles outlined in OWASP, NIST and ISO27000.
  • Excellent verbal and written communication skills with the ability to effectively articulate complex technical terms to both technical and non-technical audiences.
Contract
9 March 2021
SME
Competitive