At a Glance
- Tasks: Join us as a Threat Hunter, tackling complex cyber threats and enhancing security measures.
- Company: BAE Systems Digital Intelligence is a global leader in digital, cyber, and intelligence solutions.
- Benefits: Enjoy hybrid working options, flexible hours, and a supportive work culture.
- Why this job: Make a real impact in national security while collaborating with top experts in the field.
- Qualifications: Experience in security testing, knowledge of Azure/AWS, and strong analytical skills required.
- Other info: Diversity and inclusion are key to our success; we welcome all backgrounds.
The predicted salary is between 43200 - 72000 Β£ per year.
BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments.
Location: Leeds - We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular role.
Grade: GG10 - GG11
Job Description:
- Point of escalation for intrusion analysis, forensics and Incident Response queries.
- Able to provide root cause analysis of complex, non-standard analytic findings and anomaly-based detections for which a playbook does not exist.
- Mentor and share knowledge with the wider team as and when it becomes prudent.
- Contribute and facilitate collaboration through the SOC Knowledge Repository and associated systems, autonomously creating new knowledge and updating existing items.
- Working outside the HMG community to build/develop relationships with external SOCs and cyber security researchers, identify analytics, tradecraft and threat intelligence that may benefit the Blue Team.
- Development of new complex and anomaly-based KQL analytics, and associated playbooks that result in creation of bespoke detection rules/analytics against M365 environments, plus host-based analytics for Linux and Windows VMs.
- Review open-source research into latest threats and detection opportunities that primarily impact cloud hosted services and cloud-hosted VMs. Independently prioritise for implementation.
- Research potential vulnerabilities which could lead to environment compromise. Produce proof-of-concept exploit code capable of demonstrating exploitation of the identified vulnerabilities.
- Emulate adversary TTPs for purposes of team training and detection capability evaluation.
- Review findings of red team/Pentest activities and derive new improvements to detection rules.
- Provide forensic support, and threat-emulation, to enhance the triage of existing alerts and their accuracy and/or risk posed, where reasonable.
- Identify weaknesses and gaps in SOC processes, data collection and analysis.
- Using technical knowledge and skills to perform a broad range of non-routine and more complex ID&A tasks, including threat hunting, automation and analytic enrichment.
- Set the vision and milestones for emulation and detection capability, influencing other teams to provide collaboration where necessary.
- Full accountability for adjustment of alert thresholds and suppressions based on assessment of signal-to-noise assessment, team risk appetite, analyst team capability and skill availability.
- Define Threat Hunting initiatives based on real-world or reasoned risks.
- Architect detection programmes/processes/systems to better determine unusual behaviours, reduce dwell time, and reduce resources spent on expected activity.
- Determine and oversee practices which improve daily operations and capabilities, including quality review of analyst activities.
- Provide strategy and goals of operational team exercises with full autonomy as detection needs require.
- Influence the formation of team requirements inclusive of engineering, analysis and continuous improvement strategy.
- Devise technical interview questions, conduct technical interviews and evaluate candidate responses.
Experience:
- Demonstrable experience of security testing practices and techniques.
- Knowledge of Azure, desirable to also have knowledge of AWS.
- Knowledge of Windows Active Directory.
- Knowledge of Windows Operating System fundamentals.
- Knowledge of Networking fundamentals.
- Experience using CICD and source control.
- Experience in writing new malware and anomaly detections.
- Knowledge of using statistical methods to find anomalies in data.
- Advanced practical use of Microsoft Sentinel and/or Microsoft XDR.
- Competent in writing med-highly complex KQL analytics/searches.
- Strong knowledge of latest threats in security.
- Ability to prioritise threats.
- Determine factors that contribute to a detection's effectiveness.
- Threat hunting or SOC analyst skills/certifications.
We are embracing Hybrid Working. This means you and your colleagues may be working in different locations, such as from home, another BAE Systems office or client site, some or all of the time, and work might be going on at different times of the day. By embracing technology, we can interact, collaborate and create together, even when weβre working remotely from one another. Hybrid Working allows for increased flexibility in when and where we work, helping us to balance our work and personal life more effectively, and enhance well-being.
Diversity and inclusion are integral to the success of BAE Systems Digital Intelligence. We are proud to have an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds β the best and brightest minds β can work together to achieve excellence and realise individual and organisational potential.
Threat Hunter - National Security - Leeds employer: BAE Systems Digital Intelligence
Contact Detail:
BAE Systems Digital Intelligence Recruiting Team
StudySmarter Expert Advice π€«
We think this is how you could land Threat Hunter - National Security - Leeds
β¨Tip Number 1
Familiarise yourself with the latest trends in threat hunting and cyber security. Follow industry leaders on social media, read relevant blogs, and participate in online forums to stay updated. This knowledge will not only help you during interviews but also demonstrate your passion for the field.
β¨Tip Number 2
Network with professionals in the cyber security community, especially those working in SOCs or as threat hunters. Attend local meetups, webinars, or conferences to make connections. These relationships can lead to valuable insights and potentially even referrals for the position at StudySmarter.
β¨Tip Number 3
Brush up on your technical skills, particularly in KQL analytics and cloud environments like Azure and AWS. Consider taking online courses or certifications that focus on these areas. Being well-versed in these technologies will give you a competitive edge when applying for the Threat Hunter role.
β¨Tip Number 4
Prepare for potential technical interviews by practising common threat hunting scenarios and problem-solving exercises. Think about how you would approach real-world threats and be ready to discuss your thought process. This preparation will showcase your analytical skills and readiness for the role.
We think you need these skills to ace Threat Hunter - National Security - Leeds
Some tips for your application π«‘
Tailor Your CV: Make sure your CV highlights relevant experience and skills that align with the Threat Hunter role. Focus on your knowledge of security testing practices, KQL analytics, and any experience with Azure or AWS.
Craft a Compelling Cover Letter: In your cover letter, express your passion for cybersecurity and threat hunting. Mention specific projects or experiences that demonstrate your ability to analyse complex data and contribute to a team.
Showcase Relevant Certifications: If you have any certifications related to threat hunting or SOC analysis, be sure to include them in your application. This can help set you apart from other candidates.
Highlight Collaboration Skills: Since the role involves working collaboratively with various teams, emphasise your ability to mentor others and share knowledge. Provide examples of how you've contributed to team success in previous roles.
How to prepare for a job interview at BAE Systems Digital Intelligence
β¨Understand the Role
Make sure you thoroughly understand the responsibilities of a Threat Hunter. Familiarise yourself with intrusion analysis, forensics, and incident response queries, as these will likely be key discussion points during your interview.
β¨Showcase Your Technical Skills
Be prepared to discuss your experience with KQL analytics, Azure, and security testing practices. Highlight any specific projects or challenges you've tackled that demonstrate your technical expertise in these areas.
β¨Demonstrate Collaboration Skills
Since the role involves mentoring and collaborating with teams, be ready to share examples of how you've worked effectively with others in past roles. Discuss how youβve contributed to knowledge sharing and team development.
β¨Stay Updated on Threats
Research the latest threats in cybersecurity, especially those impacting cloud services. Being able to discuss current trends and how they relate to the role will show your passion and commitment to staying informed in this fast-paced field.