Advance Search

Browse CVs

SOC Manager

Posted 3 months ago

  • Leeds, West Yorkshire
  • Any
  • External
??Defend the Nation: Senior Threat Intelligence Analyst Opportunity??
Are you ready to take on a leadership role in Cyber defense for nation states? Join our leading consultancy in Leeds as a Senior Threat Intelligence Analyst, where you will lead a dedicated team in keeping the UK safe from evolving cyber threats.
Responsibilities:
Threat Assessments:Produce and maintain comprehensive threat assessments to provide a clear understanding of the customer threat landscape.
IoC Database Management:Maintain the Indicator of Compromise (IoC) database tailored to the monitored environment and threats, ensuring timely updates to detection systems.
Threat Modeling:Develop and update threat profiles and threat modeling, assessing applicability to the monitored estate and detailing detection and control measures to mitigate threats.
Requirements Gathering:Gather and maintain a set of Threat Intelligence (TI) requirements, defining the threats to be monitored, tracked, and researched by the TI Team.
Vulnerability Management:Manage vulnerabilities, assess criticality for remediation, and advise and track remediation activities.
Threat Data Collection:Oversee the collection, collation, and maintenance of threat data from open and closed sources, ensuring appropriate validation.
Threat Group Analysis:Conduct in-depth analysis and research to determine the identity, motivations, relationships, targets/victims, capabilities, tooling, and infrastructure of threat groups relevant to the customer.
Requirements - Technical:
Proven experience working in a Threat Intelligence team, developing intelligence products for both technical and non-technical audiences.
Expertise in performing malware analysis and reverse engineering.
Experience in conducting threat assessments and defining threat intelligence requirements.
Advanced knowledge of Windows and Linux operating systems, including command line proficiency.
Advanced knowledge of core networking concepts and technologies (e.g., TCP/IP).
Intermediate knowledge of malware behavior and techniques employed by attackers to evade security controls.
Intermediate knowledge of malware analysis and reverse engineering techniques.
How to Apply:If you are a seasoned Threat Intelligence professional with the passion and expertise to lead a team in the defense of our nation, we want to hear from you! Submit your resume and a cover letter detailing your relevant experience