At a Glance
- Tasks: Hunt cyber threats, analyse data, and create reports to protect critical infrastructure.
- Company: Join BAE Systems Digital Intelligence, a leader in cyber and intelligence solutions across 10 countries.
- Benefits: Enjoy hybrid working, flexible hours, and a supportive work-life balance.
- Why this job: Be part of a dynamic team tackling real-world cyber threats with a focus on innovation and excellence.
- Qualifications: 3+ years in Cyber Threat Intelligence; degree in Cybersecurity or related field required.
- Other info: Potential for SC clearance and opportunities for professional development and certifications.
The predicted salary is between 36000 - 60000 £ per year.
Location(s): UK, Europe & Africa: UK: Leeds
BAE Systems Digital Intelligence employs 4,500 experts in digital, cyber, and intelligence fields. We collaborate across 10 countries to analyze complex data, enabling governments, armed forces, and businesses to gain a digital advantage in demanding environments.
Role Description
BAE Systems operates a dedicated Security Operations Centre (SOC) to support the defense of a major UK Critical National Infrastructure (CNI) organization. The networks are mainly cloud-hosted, with numerous systems to protect. We aim to develop this SOC to be a benchmark of excellence, reflecting the significant threats faced. This role requires at least SC clearance, with potential for DV clearance in the future. Reports to the Delivery Lead/PMO.
The Role
- Creating Threat Hunt Hypotheses and executing Threat Hunts regularly.
- Translating hypotheses into KQL queries, executing them, and triaging results independently.
- Having knowledge of attacker TTPs and APT groups, conducting in-depth research.
- Verifying and refining Threat Hunt queries based on results.
- Incident Response and Management experience.
- Ensuring high-quality Threat Hunt Reports and effective documentation.
- Providing analysis, context, and predictions in deliverables.
- Assessing and improving the client's threat maturity, developing and delivering improvements.
- Serving as a point of contact for intrusion analysis, forensics, and incident response queries.
- Managing ADHOC and regular products during capacity constraints.
- Knowledge of Cyber Kill Chain, MITRE ATT&CK, and developing new analytics and playbooks.
Requirements
- Technical: 3+ years in Cyber Threat Intelligence, research, and investigation.
- Experience in incident response and management.
- Understanding of threats related to government and CNI.
- Excellent open-source research skills.
- High-level knowledge of Windows, Azure, networking, and cloud platforms.
- Non-Technical: Bachelor’s in Cybersecurity, Computer Science, or equivalent.
- Experience in SOC, Threat Intelligence, or Vulnerability Management.
- Strong communication skills for technical and non-technical audiences.
- Team player, self-motivated, and capable of mentoring.
Desirable Qualifications
- Degree in Cyber Security or related.
- SANS, CySA+, CREST, Azure, AWS certifications.
- Ethical hacking experience or equivalent.
Life at BAE Systems Digital Intelligence
We support Hybrid Working, enabling flexible work locations and times to promote work-life balance and well-being. We value diversity and inclusion, fostering a culture where varied perspectives and backgrounds drive excellence and innovation.
Cyber Threat Analyst - National Security West employer: BAE Systems
Contact Detail:
BAE Systems Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Threat Analyst - National Security West
✨Tip Number 1
Familiarise yourself with the Cyber Kill Chain and MITRE ATT&CK frameworks. Understanding these concepts will not only help you in interviews but also demonstrate your knowledge of the industry standards and practices that are crucial for a Cyber Threat Analyst role.
✨Tip Number 2
Engage with online communities and forums related to cyber threat intelligence. Networking with professionals in the field can provide insights into the latest trends and challenges, and may even lead to referrals or recommendations for job openings.
✨Tip Number 3
Stay updated on current cyber threats and incidents, especially those affecting national security and critical infrastructure. Being knowledgeable about recent events will allow you to speak confidently about real-world applications of your skills during interviews.
✨Tip Number 4
Consider obtaining relevant certifications such as CySA+ or SANS. These qualifications not only enhance your resume but also show your commitment to professional development in the cybersecurity field, making you a more attractive candidate for the role.
We think you need these skills to ace Cyber Threat Analyst - National Security West
Some tips for your application 🫡
Understand the Role: Thoroughly read the job description for the Cyber Threat Analyst position. Make sure you understand the responsibilities and requirements, especially the technical skills and experience needed.
Tailor Your CV: Customise your CV to highlight relevant experience in Cyber Threat Intelligence, incident response, and any specific tools or methodologies mentioned in the job description, such as KQL queries or the MITRE ATT&CK framework.
Craft a Compelling Cover Letter: Write a cover letter that connects your background to the role. Emphasise your experience with threat hunting, your understanding of attacker TTPs, and how you can contribute to BAE Systems' mission.
Highlight Certifications: If you have any relevant certifications like SANS, CySA+, or Azure, make sure to mention them prominently in your application. These can set you apart from other candidates.
How to prepare for a job interview at BAE Systems
✨Understand the Cyber Kill Chain
Make sure you have a solid grasp of the Cyber Kill Chain and MITRE ATT&CK frameworks. Be prepared to discuss how these concepts apply to threat hunting and incident response, as they are crucial in understanding attacker behaviours.
✨Showcase Your Technical Skills
Highlight your experience with KQL queries and any relevant tools you've used in threat intelligence. Be ready to provide examples of how you've executed threat hunts or responded to incidents in previous roles.
✨Communicate Clearly
Since the role requires strong communication skills, practice explaining complex technical concepts in simple terms. This will demonstrate your ability to convey information effectively to both technical and non-technical audiences.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your problem-solving skills in real-world situations. Think about past experiences where you had to manage incidents or develop threat hunt hypotheses, and be ready to discuss your thought process.