
Contract MDR & Threat Intelligence Analyst (no shifts)
Posted 3 days ago by Job Board - LinkedIn on Linkedin
Negotiable
Undetermined
Remote
United Kingdom
- Must have a B.Sc Degree or similar AND 3+ years Cyber Analyst experience
- Right to work in the UK
- Able to work Remotely with occasional office visits (in Maidenhead)
Key Performance Areas
- Required Education and Experience:
- University education, CyberSecurity Degree (or similar)
- 3 + years security analyst experience - Microsoft Azure Sentinel
- Knowledge of security technologies and products
- Experience with EDR and/or Sysmon, Anti-Virus, SIEM, general security analytics and log sources
- ITIL proven skills in a SOC functional unit highly desirable
- Must have the ability to understand large, complex systems and be able to focus on specific details or subsystems, their vulnerabilities and linkages
- Experience dealing with malware, attack vectors, and the ability to perform pattern analysis and discover root cause
- Keeping up to date with attacker techniques, such as by reading blogs and whitepapers on recent threats
- Requires basic knowledge of hardware / software architecture and domains in IT operations
- Team player and team building (creation of a cohesive division)
- Able to clarify and issue and/or follow instructions in the current role - job familiarity
- Must be effective in communication - written and verbal and listening skills
- Openness of mind and curiosity
- Structured thinking
- Teachability - (having a positive attitude and a willingness to learn)
- Individual thinking within the current role
- Collaboration - willingness and ability to collaborate with other Team Leaders / Supervisors
- Action oriented - production of desired outcomes within the required timeframes
- Work pro-actively - both independently and with peers
- Assertive and confident
- Ability to handle conflict
- Ability to plan and organise work tasks
- Strong sense of accountability and responsibility
- Knowledge of endpoint/EDR, firewalls, web & e-mail security highly desirable
- Ability to reverse engineer malware to discover IOCs, identify the malware family or if it is unknown, etc.
- Knowledge of pivoting to find more artefacts related to an incident
- Knowledge of networking protocols, switches, routers etc.
- Knowledge of SIEM and querying log sources
- Knowledge of root cause analysis and escalation procedures
- Industry-specific technical knowledge, such as use of specific analysis tools
- Knowledge of CVE, Google Fu and threat intelligence concepts
- Writing skills - being able to articulate technical reports on emerging threats, vulnerabilities, and incidents
egotiable daily rate
Work with the best of the best in the world of CyberSecurity Professionals!
Standby allowance.