Senior Cyber Threat Intelligence Analyst (0711)
Location: Home based
Sector: Threat Intelligence
We have partnered with a European leader in the Cyber Threat Intelligence space, to search for an experienced Senior Analyst. You will be working in a highly skilled and experienced team, conducting primary research on financially motivated threat actors, to collect threat information and intelligence relevant to clients and produce high quality reports.
• Collecting, analysing, assessing, producing, and disseminating informed and accurate reporting, providing actionable insight into the threat landscape.
• Information will also be fused with other non-cyber information where possible, providing actionable and relevant insight into a given event or incident.
• Build and maintain relationships with partners, clients and peer analysts to ensure a more complete picture of the thread landscape.
• Identification, contextualisation, and analysis of threats, exploits, and vulnerabilities that pose previously unknown risks to our clients and partners.
• High quality standardised strategic and technical report writing, using widely used standardised reporting structures.
• Training and stakeholder engagement with clients to ensure a seamless cross-organisational team of expertise.
• Working under operational time pressure, self-managing tasks, meeting deadlines in support of client requirements.
• Leading primary research activities into threats and threat actors
As a Senior Analyst, you are expected to set an example in both output and work ethic. Your support to the wider team and junior analysts will be critical in the development of my clients capability.
1. An experienced Senior Cyber Threat Intelligence Analyst with at least five years direct, operational/tactical experience
2. Previous direct use of CTI methodologies such as investigative pivoting models, investigative frameworks, as well as MITRE ATT&CK, and the Extended CKC.
3. Ideally have previous experience writing and using scripted tooling in support of intelligence collection.
4. Familiarity with major cognitive bias types, and the ability to identify those cognitive biases when researching.
5. Previous experience with competing hypothesis theory and use of different tools to score those hypotheses.
6. A demonstrated ability to analyse, evaluate, and contextualise sets of information, using analytical techniques and common industry tooling.
7. Experience in open source collection, use of online tools, experience querying internal databases of information in support of investigative efforts.
8. Professional experience writing short and long form reporting to a specified, technical writing style.
9. Detailed understanding of the Threat Landscape, ideally within financial services.
10. Ideally exposure to and experience with MISP, Maltego, PassiveTotal and DomainTools.