At a Glance
- Tasks: Analyse cyber threats and produce actionable intelligence for our global team.
- Company: Join a leading financial institution focused on cybersecurity.
- Benefits: Competitive salary, professional development, and a dynamic work environment.
- Other info: Collaborative culture with opportunities for growth and learning.
- Why this job: Make a real impact in the fight against cyber threats and enhance your skills.
- Qualifications: 3-5 years in cyber intelligence analysis and strong analytical skills required.
The predicted salary is between 55000 - 65000 £ per year.
CLS is seeking a highly motivated, self-driven Cyber Threat Intelligence Analyst to join a global threat intelligence team. The role will be located in London, UK. The position will report to the Threat Intelligence Manager and will involve technical research and intelligence analysis of threats relevant to our industry, business, and related technologies. The ideal candidate will be aware of industry trends and frameworks and how they could impact our business, including threat actor groups, their TTPs, intrusion activities, and geopolitical relevance.
Job Description
- Collects, processes, and disseminates cyber threat intelligence from varying sources, including open source reports, information sharing partners, and vendor reports to create actionable results for internal stakeholders.
- Coordinate and produce strategic, operational, and tactical intelligence products for business units, technical teams, and executive stakeholders.
- Provide situational awareness on current threat landscape and maintain knowledge of adversary activities including TTPs to brief team members and senior decision leaders.
- Assess emerging threats against our operational environment and work in partnership with our security teams for detection, mitigation, and remediation efforts.
- Perform trend and correlation of cyber intelligence for recommendation-based countermeasures.
- Support and engage in incident response investigations and threat hunting activities.
- Conduct research to develop and refine queries in Splunk for the purpose of identifying malicious activity.
- Contribute to improving the process through identification of process gaps and improvement opportunities.
- Support external intelligence sharing engagements with other financial institutions and government partners.
Experience
- Senior-to-mid level experience in cyber intelligence analysis required (3-5 years work experience).
- Deep knowledge of analytical tradecraft, intelligence analysis, writing techniques and methodologies, critical thinking skills, and open source intelligence gathering techniques.
- Strong interpersonal skills and team focused.
- Subject matter expertise in nation-states, advanced persistent threats, and cybercriminal organizations.
- Experience with Splunk.
- Experience with Threat Intelligence Platforms and tools including Yara, STIX/TAXII.
- Experience with command line, packet analysis, network forensics, malware analysis or reverse engineering.
- Experience with MITRE ATT&CK framework and Kill Chain.
- Demonstrated strong writing skills; ability to convey complex technical and non-technical concepts.
Qualifications/Certifications
- Bachelor’s Degree in Cybersecurity studies, Intelligence Studies, International Relations, Economics, Computer Science, or related discipline.
- Security certification such as SANS GIAC (or equivalent) ideally GCTI or working towards certification.
Desired Skills
- Military/Government experience.
- Advanced Degree in related disciplines.
- Professional fluency or greater in a non-English language is a plus.
Application Security Coordinator in London employer: Sept 2017 Branding
Contact Detail:
Sept 2017 Branding Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Application Security Coordinator in London
✨Tip Number 1
Network like a pro! Get out there and connect with folks in the cybersecurity field. Attend meetups, webinars, or even local events. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Show off your skills! Create a portfolio or a personal blog where you can share your insights on cyber threats and intelligence analysis. This not only showcases your expertise but also demonstrates your passion for the field.
✨Tip Number 3
Prepare for interviews by brushing up on current trends and threats in the industry. Be ready to discuss how your experience aligns with the role of Application Security Coordinator and how you can contribute to the team.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive about their job search!
We think you need these skills to ace Application Security Coordinator in London
Some tips for your application 🫡
Show Off Your Skills: Make sure to highlight your experience in cyber intelligence analysis and any relevant tools you've used, like Splunk or Yara. We want to see how your skills align with the role, so don’t hold back!
Tailor Your Application: Take a moment to customise your application for this specific role. Mention how your background in threat intelligence and understanding of TTPs can benefit us at StudySmarter. It shows you’re genuinely interested!
Be Clear and Concise: When writing your application, keep it straightforward and to the point. Use clear language to convey your thoughts, especially when discussing complex topics. We appreciate clarity just as much as depth!
Apply Through Our Website: Don’t forget to submit your application through our website! It’s the best way for us to receive your details and ensures you’re considered for the role. We can’t wait to hear from you!
How to prepare for a job interview at Sept 2017 Branding
✨Know Your Threat Landscape
Before the interview, dive deep into the current cyber threat landscape. Familiarise yourself with recent incidents, threat actor groups, and their tactics, techniques, and procedures (TTPs). This will not only show your passion for the field but also help you engage in meaningful discussions during the interview.
✨Showcase Your Analytical Skills
Be prepared to discuss your experience with analytical tradecraft and intelligence analysis. Bring examples of how you've used critical thinking to assess threats or improve processes. This will demonstrate your ability to contribute effectively to the team and the organisation's security posture.
✨Familiarity with Tools is Key
Make sure you’re well-versed in tools like Splunk, Yara, and Threat Intelligence Platforms. If you have experience with command line, packet analysis, or network forensics, be ready to share specific instances where you applied these skills. This will highlight your technical expertise and readiness for the role.
✨Communicate Clearly and Confidently
Strong writing and communication skills are crucial in this role. Practice explaining complex concepts in simple terms, as you may need to brief non-technical stakeholders. Being able to convey your thoughts clearly will set you apart and show that you can bridge the gap between technical and non-technical teams.