Contract MDR & Threat Intelligence Analyst (no shifts)

Contract MDR & Threat Intelligence Analyst (no shifts)

Posted 3 days ago by Job Board - LinkedIn on Linkedin

Negotiable
Undetermined
Remote
United Kingdom
Our client is based in the UK, South Africa and the US and offers independent cyber security services. Their consultative and unique 360-degree coverage approach surfaces risks, so that they continually deliver on improving clients' security posture.

  • Must have a B.Sc Degree or similar AND 3+ years Cyber Analyst experience
  • Right to work in the UK
  • Able to work Remotely with occasional office visits (in Maidenhead)

The primary role of the (MDR Cyber Security and TI) Analyst within the Managed Security Services (MSS) division is to support security monitoring and incident handling, and act as an escalation point to ensure the confidentiality, integrity, and availability of information assets. The analyst must be capable of performing full root cause analysis and be familiar with threat hunting. They must also keep up-to-date with the latest emerging threats and vulnerabilities to be able to provide context to incidents and guide threat hunting and incident response activities.

Key Performance Areas

  • Required Education and Experience:
  • University education, CyberSecurity Degree (or similar)
  • 3 + years security analyst experience - Microsoft Azure Sentinel
  • Knowledge of security technologies and products
  • Experience with EDR and/or Sysmon, Anti-Virus, SIEM, general security analytics and log sources
  • ITIL proven skills in a SOC functional unit highly desirable
  • Must have the ability to understand large, complex systems and be able to focus on specific details or subsystems, their vulnerabilities and linkages
  • Experience dealing with malware, attack vectors, and the ability to perform pattern analysis and discover root cause
  • Keeping up to date with attacker techniques, such as by reading blogs and whitepapers on recent threats
  • Requires basic knowledge of hardware / software architecture and domains in IT operations
  • Team player and team building (creation of a cohesive division)
  • Able to clarify and issue and/or follow instructions in the current role - job familiarity
  • Must be effective in communication - written and verbal and listening skills
  • Openness of mind and curiosity
  • Structured thinking
  • Teachability - (having a positive attitude and a willingness to learn)
  • Individual thinking within the current role
  • Collaboration - willingness and ability to collaborate with other Team Leaders / Supervisors
  • Action oriented - production of desired outcomes within the required timeframes
  • Work pro-actively - both independently and with peers
  • Assertive and confident
  • Ability to handle conflict
  • Ability to plan and organise work tasks
  • Strong sense of accountability and responsibility

Technical competencies:

  • Knowledge of endpoint/EDR, firewalls, web & e-mail security highly desirable
  • Ability to reverse engineer malware to discover IOCs, identify the malware family or if it is unknown, etc.
  • Knowledge of pivoting to find more artefacts related to an incident
  • Knowledge of networking protocols, switches, routers etc.
  • Knowledge of SIEM and querying log sources
  • Knowledge of root cause analysis and escalation procedures
  • Industry-specific technical knowledge, such as use of specific analysis tools
  • Knowledge of CVE, Google Fu and threat intelligence concepts
  • Writing skills - being able to articulate technical reports on emerging threats, vulnerabilities, and incidents

PLEASE NOTE: THIS ROLE IS FULLY REMOTE AND CAN BE PERFORMED ANYWHERE WITHIN THE UK!!

egotiable daily rate
  • company laptop provided

  • Other Benefits

    Work with the best of the best in the world of CyberSecurity Professionals!

    Standby allowance.