Application Security Coordinator

Sept 2017 Branding
1 month ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Compensation
£ 69K

Job location

Tech stack

Command-Line Interface
Computer Security
Intelligence Analysis
Network Forensics
Packet Analyzer
Open Source Technology
Open Source Intelligence
Software Security
Mitre Att&ck
Malware
Cyber Threat Analysis
Information Technology
Splunk

Job description

CLS is seeking a highly motivated, self-driven Cyber Threat Intelligence Analyst to join a global threat intelligence team. The role will be located in London, UK. The position will report to the Threat Intelligence Manager and will involve technical research and intelligence analysis of threats relevant to our industry, business, and related technologies. The ideal candidate will be aware of industry trends and frameworks and how they could impact our business, including threat actor groups, their TTPs, intrusion activities, and geopolitical relevance.Â, • Collects, processes, and disseminates cyber threat intelligence from varying sources, including open source reports, information sharing partners, and vendor reports to create actionable results for internal stakeholders

• Coordinate and produce strategic, operational, and tactical intelligence products for business units, technical teams, and executive stakeholders

• Provide situational awareness on current threat landscape and maintain knowledge of adversary activities including TTPs to brief team members and senior decision leadersÂ

• Assess emerging threats against our operational environment and work in partnership with our security teams for detection, mitigation, and remediation efforts

• Perform trend and correlation of cyber intelligence for recommendation-based countermeasures

• Support and engage in incident response investigations and threat hunting activitiesÂ

• Conduct research to develop and refine queries in Splunk for the purpose of identifying malicious activityÂ

• Contribute to improving the process through identification of process gaps and improvement opportunities

• Support external intelligence sharing engagements with other financial institutions and government partners

Requirements

• Senior-to-mid level experience in cyber intelligence analysis required (3 – 5 years’ work experience)

• Deep knowledge of analytical tradecraft, intelligence analysis, writing techniques and methodologies, critical thinking skills, and open source intelligence gathering techniquesÂ

• Strong interpersonal skills and team focused

• Subject matter expertise in nation-states, advanced persistent threats, and cybercriminal organizations

• Experience with SplunkÂ

• Experience with Threat Intelligence Platforms and tools including Yara, STIX/TAXII

• Experience with command line, packet analysis, network forensics, malware analysis or reverse engineeringÂ

• Experience with MITRE ATT&CK framework and Kill ChainÂ

• Demonstrated strong writing skills; ability to convey complex technical and non-technical concepts

Qualifications/CertificationsÂ

• Bachelor’s Degree in Cybersecurity studies, Intelligence Studies, International Relations, Economics, Computer Science, or related discipline

• Security certification such as SANS GIAC (or equivalent) ideally GCTI or working towards certification

Desired Skills

• Military/Government experienceÂ

• Advanced Degree in related disciplines

• Professional fluency or greater in a non-English language is a plus

Apply for this position