At a Glance
- Tasks: Monitor cyber security to detect hacking attempts and perform detailed analysis.
- Company: Join BAE Systems Digital Intelligence, a leader in digital and cyber solutions across 10 countries.
- Benefits: Enjoy hybrid working options, flexible hours, and a £2,000 referral bonus.
- Why this job: Be part of a diverse team making a real impact in national security and technology.
- Qualifications: Knowledge of intrusion analysis, relevant certifications, and a degree in Cyber Security preferred.
- Other info: Opportunities for coaching, training, and professional development in a supportive environment.
The predicted salary is between 36000 - 60000 £ per year.
Location(s): UK, Europe & Africa : UK : Leeds BAE Systems Digital Intelligence is home to 4,500 digital, cyber, and intelligence experts. We work collaboratively across 10 countries to collect, connect, and understand complex data, enabling governments, armed forces, and commercial businesses to unlock digital advantage in demanding environments. Job Title: Front Line Analyst Requisition ID: 121791 Location: Leeds – We offer a range of hybrid and flexible working arrangements. Please speak to your recruiter about options for this role. Grade: GG08 Referral Bonus: £2,000 Job Description Conduct cyber security monitoring to detect hacking/malware intrusion attempts against customer IT. Perform full triage of detection alarms to identify the cause, such as active infection, intrusion attempt, or false positive. Identify and document attack sources, techniques, tactics, and procedures (TTPs), and assess attack extent. Capture and feed back attack chain details into detection capabilities. Ensure monitoring effectiveness by creating and updating SIEM/SOAR playbooks aligned with attacker TTPs. Use intrusion analysis skills to contribute to new detection techniques and research industry capabilities. Communicate with government or commercial security operation centers for root-cause analysis. Create low to medium complexity KQL analytics and hunt queries, conduct IOC and anomaly-based threat hunts, and identify root causes. Identify and tag incorrect alert logic and high false positive detection rules for review. Transform internal and partner threat intelligence into actionable detections. Coach junior analysts and colleagues as needed. Lead threat hunting workgroups during events for complex TTPs across industries. Deliver ad-hoc training and workshops to promote security awareness and team knowledge. Provide daily SITREPs on attacker activity to local teams. Experience Knowledge of intrusion analysis on Windows end-user devices and servers. Knowledge of intrusion analysis on Azure, including attacker methods like \’living off the cloud\’ using Microsoft Graph API, app registrations, and managed identities. Ability to quickly research and learn new tools and techniques. Good working knowledge of MITRE ATT&CK Framework. Understanding of networking concepts and protocols (TCP/IP, UDP, DNS, DHCP, HTTP, etc.). Experience with intrusion analysis on Windows devices and Azure cloud architecture. Relevant certifications such as SANS GCIH, GCIA, or similar incident response/forensics certifications. Understanding of Operating System functionality and operations. Ability to develop hypotheses and perform threat hunting in Azure cloud or Windows device data. Desirable Qualifications Degree in Cyber Security or related field. Certifications like CompTIA Network+ / Security+. CREST certifications – Intrusion Analyst, Cyber Threat Intelligence. Azure certifications – AZ900, SC200, SC900. AWS Cloud Essentials. SANS GCIH, GCIA, or similar. Life at BAE Systems Digital Intelligence We embrace hybrid working, allowing flexibility in when and where you work, including from home, offices, or client sites. We leverage technology to facilitate remote interaction, collaboration, and creation, promoting work-life balance and well-being. Diversity and inclusion are core to our success. We foster a culture where diverse perspectives, skills, and backgrounds are valued, enabling us to achieve excellence and unlock individual and organizational potential. #J-18808-Ljbffr
Front Line Analyst - National Security - Leeds employer: Babcock
Contact Detail:
Babcock Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Front Line Analyst - National Security - Leeds
✨Tip Number 1
Familiarise yourself with the MITRE ATT&CK Framework, as it's crucial for understanding attacker tactics and techniques. Being able to discuss specific examples of how you've applied this knowledge in previous roles will set you apart during interviews.
✨Tip Number 2
Stay updated on the latest trends in cyber security, particularly around intrusion analysis and cloud security. Mentioning recent developments or tools you've explored can demonstrate your proactive approach and passion for the field.
✨Tip Number 3
Network with professionals in the cyber security community, especially those who work in similar roles. Engaging in discussions on platforms like LinkedIn can provide insights into the role and may even lead to referrals.
✨Tip Number 4
Prepare to showcase your analytical skills by discussing past experiences where you've successfully identified and resolved security incidents. Use specific metrics or outcomes to highlight your impact, as this will resonate well with the hiring team.
We think you need these skills to ace Front Line Analyst - National Security - Leeds
Some tips for your application 🫡
Understand the Role: Read the job description thoroughly to understand the key responsibilities and required skills for the Front Line Analyst position. Tailor your application to highlight relevant experiences that align with these requirements.
Highlight Relevant Experience: In your CV and cover letter, emphasise your experience in cyber security monitoring, intrusion analysis, and any relevant certifications. Use specific examples to demonstrate your skills in handling detection alarms and conducting threat hunts.
Showcase Technical Skills: Make sure to mention your knowledge of tools and frameworks like MITRE ATT&CK, KQL analytics, and Azure cloud architecture. This will show that you have the technical expertise needed for the role.
Craft a Compelling Cover Letter: Write a cover letter that not only outlines your qualifications but also expresses your enthusiasm for the role and the company. Mention how your values align with BAE Systems Digital Intelligence's commitment to diversity and inclusion.
How to prepare for a job interview at Babcock
✨Understand the Role
Make sure you thoroughly understand the responsibilities of a Front Line Analyst. Familiarise yourself with cyber security monitoring, intrusion analysis, and the tools mentioned in the job description, such as SIEM/SOAR playbooks and KQL analytics.
✨Showcase Your Knowledge
Be prepared to discuss your knowledge of the MITRE ATT&CK Framework and how it applies to real-world scenarios. Highlight any relevant certifications you hold, like SANS GCIH or GCIA, and explain how they have equipped you for this role.
✨Demonstrate Problem-Solving Skills
Expect to be asked about past experiences where you identified and resolved security incidents. Use the STAR method (Situation, Task, Action, Result) to structure your answers and clearly demonstrate your analytical skills.
✨Emphasise Team Collaboration
BAE Systems values collaboration, so be ready to discuss how you've worked effectively in teams. Share examples of how you've coached junior analysts or led threat hunting workgroups, showcasing your leadership and communication skills.