At a Glance
- Tasks: Monitor cybersecurity threats and analyse intrusion attempts to protect customer IT systems.
- Company: Join BAE Systems Digital Intelligence, a leader in digital, cyber, and intelligence solutions across 10 countries.
- Benefits: Enjoy hybrid working options, flexible hours, and a £2,000 referral bonus.
- Why this job: Be part of a diverse team making a real impact in national security and technology.
- Qualifications: Knowledge of intrusion analysis, relevant certifications, and a degree in Cyber Security or related field.
- Other info: Opportunities for coaching, training, and leading threat hunting workgroups.
The predicted salary is between 36000 - 60000 £ per year.
Location(s): UK, Europe & Africa: UK: Leeds
BAE Systems Digital Intelligence is home to 4,500 digital, cyber, and intelligence experts. We work across 10 countries to collect, connect, and understand complex data, enabling governments, armed forces, and commercial businesses to unlock digital advantages in demanding environments.
We offer hybrid and flexible working arrangements. Please discuss options with your recruiter.
Job Description
- Conduct cybersecurity monitoring to detect hacking/malware intrusion attempts against customer IT systems.
- Triaging detection alarms to identify causes such as active infections, intrusion attempts, or false positives.
- Identify and document attack sources, techniques, tactics, and procedures (TTPs), and assess attack scope.
- Document attack chain details and update detection capabilities accordingly.
- Maintain monitoring effectiveness by creating and updating SIEM/SOAR playbooks, adapting to evolving TTPs.
- Use intrusion analysis skills to contribute to new detection techniques and research industry capabilities.
- Coordinate with government or commercial security operation centers for root cause analysis.
- Create KQL analytics and hunt queries, conduct IOC and anomaly-based threat hunts.
- Identify and tag incorrect alert logic or high false positive detection rules for review.
- Transform internal and partner threat intelligence into actionable detections.
- Coach junior analysts and colleagues as needed.
- Lead threat hunting workgroups during complex TTPs across industries.
- Deliver training and workshops to promote security awareness and knowledge sharing.
- Provide daily SITREPs on attacker activity.
Experience
- Knowledge of intrusion analysis on Windows devices and servers.
- Experience with intrusion analysis in Azure, including attacker methods like ‘living off the cloud’ (e.g., Microsoft Graph API, app registrations, managed identities).
- Ability to research and learn new tools and techniques quickly.
- Good working knowledge of MITRE ATT&CK framework.
- Understanding of networking concepts and protocols (TCP/IP, UDP, DNS, DHCP, HTTP).
- Experience with intrusion analysis on Windows and Azure cloud architecture.
- Relevant certifications such as SANS GCIH, GCIA, or similar.
- Understanding of operating system functionalities.
- Develop hypotheses and perform threat hunting in Azure cloud or Windows device data.
Desirable Qualifications
- Degree in Cyber Security or related field.
- Certifications like CompTIA Network+, Security+, CREST (Intrusion Analyst, Cyber Threat Intelligence), Azure (AZ900, SC200, SC900), AWS Cloud Essentials.
- SANS GCIH, GCIA, or similar certifications.
Life at BAE Systems Digital Intelligence
We embrace hybrid working, allowing flexibility in when and where you work, including from home, offices, or client sites. We foster a culture of diversity and inclusion, encouraging employees of varied backgrounds and perspectives to collaborate and achieve excellence.
Front Line Analyst – National Security – Leeds employer: BAE Systems
Contact Detail:
BAE Systems Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Front Line Analyst – National Security – Leeds
✨Tip Number 1
Familiarise yourself with the MITRE ATT&CK framework, as it's crucial for understanding attack techniques and tactics. Being able to discuss specific TTPs during your interview will demonstrate your expertise and readiness for the role.
✨Tip Number 2
Stay updated on the latest cybersecurity trends and threats, especially those related to Azure and Windows environments. This knowledge will not only help you in interviews but also show your commitment to continuous learning in a rapidly evolving field.
✨Tip Number 3
Practice creating KQL analytics and hunting queries. Being able to showcase your practical skills in threat detection and analysis can set you apart from other candidates and demonstrate your hands-on experience.
✨Tip Number 4
Network with professionals in the cybersecurity field, particularly those who work in roles similar to the Front Line Analyst position. Engaging with industry experts can provide valuable insights and potentially lead to referrals or recommendations.
We think you need these skills to ace Front Line Analyst – National Security – Leeds
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in cybersecurity monitoring, intrusion analysis, and any specific tools or techniques mentioned in the job description. Use keywords from the job listing to ensure your application stands out.
Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for cybersecurity and your understanding of the role. Mention specific experiences that relate to the responsibilities outlined, such as your familiarity with the MITRE ATT&CK framework or your experience with Azure.
Showcase Relevant Certifications: List any relevant certifications prominently in your application. If you have certifications like SANS GCIH, GCIA, or Azure-related qualifications, make sure they are easy to find, as these will strengthen your application.
Highlight Teamwork and Leadership Skills: Since the role involves coaching junior analysts and leading threat hunting workgroups, include examples of your teamwork and leadership experiences. This could be from previous jobs, projects, or even volunteer work.
How to prepare for a job interview at BAE Systems
✨Understand the Role
Make sure you have a solid grasp of what a Front Line Analyst does, especially in cybersecurity. Familiarise yourself with key responsibilities like triaging detection alarms and maintaining monitoring effectiveness. This will help you answer questions confidently and demonstrate your enthusiasm for the role.
✨Showcase Your Technical Skills
Be prepared to discuss your experience with intrusion analysis, particularly on Windows devices and Azure. Highlight any relevant certifications you hold, such as SANS GCIH or GCIA, and be ready to explain how you've applied your knowledge in real-world scenarios.
✨Familiarise Yourself with MITRE ATT&CK
Since understanding the MITRE ATT&CK framework is crucial for this position, make sure you can discuss its relevance in threat detection and response. Prepare examples of how you've used this framework in your previous work or studies to identify attack techniques.
✨Prepare for Scenario-Based Questions
Expect to face scenario-based questions that assess your problem-solving skills in real-time situations. Think about past experiences where you had to analyse threats or coordinate with security operation centres, and be ready to walk the interviewer through your thought process.