This job is no longer available.
You can view related vacancies or set-up an email alert notification when similar jobs are added to the website using the buttons below.

Cyber Threat Analyst

JK0808_1533722098
£60000 - £75000 per annum 2 days' working from home

Managing this Role

image

Josh Keeley

Manager - Cyber Specialist 0207 759 7878

With seven years’ experience as an IT engineer within the Royal Marines, Josh has a strong ex-services network of SC and DV cleared CTI analysts and CCTIM managers. Bringing sound technical knowledge and in-depth market expertise, Josh works with consultancies, defence, MSSPs and TIPs, from rapidly-growing start-ups to established global enterprises.

 

Roles recruited: CTI analysts, CCTIM managers

Seniority: Senior

Job Type: Permanent

Geographical coverage: London

Market: Cyber threat intelligence and security operations

Blackthorn Trace's client is a leading financial services firm with offices across in the UK, US and Canada. In response to industry attacks, they are launching a Cyber Threat team whose main responsibility is ensuring all equities are secure against all tiers of adversaries whilst maintaining situational awareness across the global firm, taking action when necessary.

The company will welcome candidates who are looking for a fast-paced challenging environment where they can act as a senior member of the Cyber Threat Centre, handling security events and incidents within the defined Computer Security Incident Response process.

The Individual

This role would suit someone who enjoys being on the front lines of security incident response, threat hunting and intelligence. The successful Cyber Threat Analyst will be able to quickly analyse threats, understand risk, deploy effective countermeasures, make business critical incident response decisions, and work as part of a team of individuals dedicated to protecting the firm.

Working hours: 5am - 2pm & 2 days' working from home

Desired Skills & Experience:

* Systems administrator experience in Linux, Unix, Windows or OSX operating systems.
* Knowledge of networking and the common network protocols.
* Creating complex scripts, developing tools, or automating processes.
* Knowledge of vulnerabilities and a comfort in manipulating exploit code for analysis.
* Performing static and dynamic malware analysis.
* Analysing large data sets and identifying anomalies.
* Quickly creating and deploying countermeasures under pressure.
* Familiarity with common infrastructure systems that can be used as enforcement points.

You will also have one or more of the following certifications or the ability to obtain within 1 year:

* CISSP: Certified Information Systems Security Professional
* CCNA: Cisco Certified Network Associate
* SANS: GCIH - Incident Handler
* SANS: GCIA - Intrusion Analyst

Your responsibilities will include but are not limited to:

* Countermeasure deployment across various technologies.
* Malware and exploit analysis.
* Intrusion monitoring and response.
* Assessing alerts and notifications of event activity from intrusion detection systems and responding accordingly to the threat.
* Continuing content development of threat detection and prevention systems.
* Data analysis and threat research.

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.


This job has now been filled but you may be interested in:

 

IAM Architect - Consultancy - London

We are working with a global Consultancy who are hiring an IAM Architect to support their enterprise clients implement new IAM solutions.

The candidate should have good knowledge on the SailPoint IIQ, Oracle IAM 11g / 12g product suite with at least 14 years' of experience in IAM field. The candidate should have done 5 to 6 of end to end IAM solution implementation at least one in 11g. As an IAM architect, you should have good exposure to all the Oracle IAM product suite, CA IAM product suite and IBM IAM product suite.

As Identity & Access Management Architect, you will participate in projects at the following levels:

  • Implementation, Design and Architect of complex IAM solutions for large scale customers across various industry verticals
  • Understanding the business requirements in terms of Access and Identify Management
  • Design of the right strategic enterprise solution architecture in terms of application , data and security
  • Collaborate with Infrastructure designers
  • Document the Architecture solution
  • Evaluate the low level design document
  • Supervise and own the solution implementation in terms of install, configure and integration of SailPoint, Oracle IAM 11g / 12g product suite (OHS, Webgate, OAM, OIM, OID), CA IAM Product Suite, IBM ISAM / ISIM, PING Identity Product Suite with in scope target applications.
  • Guide the team in trouble shooting the issues faced during the product implementation.
  • Demonstrate the capabilities in understanding the clients' business environment and map the requirements into IAM solutions and proactively suggest alternatives as and when required

Required Skills

  • Experience inArchitecting, Designing and Implementation of at least two of the following Oracle Identity and Access Management Solutions:
    • SailPoint IIQ
    • Oracle Identity Manager 11g/12g
    • Oracle Access Manager 11g/12g

  • Excellent knowledge and understanding of other IAM products:
  • CA SiteMinder
  • CA Identity Manager
  • IBM Security Access Manager (ISAM)
  • IBM Security Identity Manager (ISIM)

  • Excellent knowledge and understanding ofLDAP concepts and working experience with at least few of the following directories:
    • Oracle Internet Directory/Oracle Virtual Directory
    • Sun Directory Server
    • Active Directory
    • Tivoli Directory Server
    • Novell Directory Server
    • CA Directory

  • Should have the ability to understand customer scenario and requirements (may include integration situations) and be capable of suggesting solutions.
  • Create HLD & LLD documentation
  • Should have good knowledge on current IDM, Strong Authentication and PKI (Public Key Infrastructure) technologies and products
  • Should be familiar with RFI & RFP process and have experience in creating solution response based on RFP needs.

Qualifications:

  • Many years of strong IAM implementation experience
  • Masters in computer science
  • Strong oral, written communications skills
  • Customer Facing Exposure is must
  • CISSP certification is a bonus
  • Open to travel requirements

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.

Senior CTI Analyst - London

We are working with a leading start up Cyber Threat Intelligence Consultancy who due to consistent commercial wins are expanding. Based in London, the successful candidate will play a key role in gathering information on Cyber threats and turning it into actionable intelligence, enabling clients to better protect themselves.

Tasks will include:

  • Project managing bespoke engagements for clients
  • Shaping client requirements into appropriate outputs at all stages of the intelligence cycle
  • Taking responsibility for overseeing various aspects of our intelligence subscription service
  • Proactively identifying new opportunities to develop our subscription and bespoke services
  • Peer reviewing content produced by team members to enhance the quality of outputs
  • Contributing to the development of our technical collection infrastructure

There will also be considerable flexibility for the right candidate to go beyond this remit and shape the role in the pursuit of the company's goals, in the way they see fit.

Experience

  • Have several years experience in cyber threat intelligence, including experience managing the production of bespoke deliverables
  • Understand the commercial aspects of delivering
  • Be able to use their initiative and understanding to manage their own research efforts, and those of other team members
  • Communicate efficiently, both verbally and in writing. Additional languages are also desirable, especially where specifically relevant to areas of heightened cyber threat
  • Maintain excellent standards in their work and show a high degree of attention to detail
  • Be competent with the Microsoft Office suite.
  • Experience with additional research tools and software related to intelligence collection and analysis is also desirable.
  • Experience with programming in any scripting language is also desirable.
  • Have relevant formal qualifications (i.e. SANS, CCTIM, CISSP)

If you believe this is an opportunity where you can excel and grow personally and professionally then apply within for a confidential chat with one of our Consultants.

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.

Information Security Manager

We are working with a global communications organisation who are building out their Information Security team in London. They have recently just been accredited with ISO 27001 and Cyber Essentials, so this Manager who reports to the Director of GRC will play a vital part in the continuous improvement of their ISMS; in order to keep the status.

The candidate will manage Risk Treatment Plans and maintain Plan of Actions and Milestones for those risks; and will assist in the management and delivery of projects across a wide spectrum of initiatives.

Key Responsibilities:

  • Oversee, evaluate, and support the documentation, validation and assessment of Information Security Management System processes necessary to assure that existing and new information and information processing systems meet the organization's cybersecurity and risk requirements
  • Ensure appropriate treatment of risk, compliance, and assurance from internal and external perspectives
  • Conduct comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information and information processing systems, assisting the security engineering team to prioritise corrective actions
  • Build strong relationships within the organisation to support and enhance a high performing collaborative approach to achieve departmental goals
  • Manage the agenda of the Information Security Steering Committee
  • Manage the internal audit plan leading to ISO 27001 re-certification
  • Lead, coordinate, communicate, integrate, and be accountable for the overall success of the risk management program, ensuring alignment with agency or enterprise priorities

Essential Knowledge and Skills:

  • Demonstrable knowledge and previous work experience of risk management processes (e.g., methods for assessing and mitigating risk)
  • Demonstrable knowledge and previous work experience of ISO 27000 family of standards
  • Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy
  • Proficiency in developing and applying ISO 27001 standards in a critical infrastructure operational environment
  • Ability to communicate complex information, concepts, or ideas in a confident and well organized manner through verbal, written, and/or visual means

Desirable Knowledge and Skills:

  • Knowledge of NIST family of standards
  • Knowledge of applicable business processes and operations of customer organizations
  • Knowledge of specific operational impacts of cybersecurity lapses
  • Working understanding of applying ISO 27001 controls in a satellite communications operational environment
  • Formal education or qualifications in Information Security preferred (e.g. CISSP)
  • ISO 27001 Certified Lead Auditor
  • ISO 27001 Certified Lead Implementer

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.

Cyber Threat Intelligence

We are working exclusively with a Threat Intelligence organisation based in London, hiring an experienced Cyber Threat Intelligence Analyst. You will work alongside professionals with many years experience, from a wide range of backgrounds. Their mission is to collect information from a wide range of sources in order to provide detailed reports to decision makers to allow them to overcome the threat's their companies may face.

The role


The successful candidate will support the team in gathering information on cyber threats and turning it into actionable intelligence, enabling clients to better protect themselves. Tasks will include;

  • Producing threat assessments and other bespoke projects for a variety of clients
  • Primary research on the deep and dark web to identify and cultivate new sources
  • Maintaining an understanding of the cyber threat landscape facing organisations, and providing regular research and analysis for the subscription service
  • Contributing to the development of our technical collection infrastructure

Skills required

  • Have some experience in cyber threat intelligence and understand the principles of cyber security, cyber threats and cyber risk
  • Be able to use their initiative and understanding to manage their own research efforts
  • Communicate efficiently, both verbally and in writing.
  • Additional languages are a desirable, especially where specifically relevant to areas of heightened cyber threat
  • Maintain excellent standards in their work and show a high degree of attention to detail
  • Experience with additional research tools and software related to intelligence collection and analysis is also desirable.
  • Experience with programming in any scripting language is also desirable.

This is a fantastic opportunity to join one of the fastest growing Intelligence Consultancies in the UK. If you would like to find out more, please apply within or contact me on josh.keeley@blackthorntrace.com

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.