Cyber Intelligence Analyst ( R-00072411-OTHLOC-PL-2D1040 )
Cyber Intelligence Analyst
We are in search of an experienced Cyber Defence Analyst to join our task force. You will be based in one of three locations Glasgow, Farnborough or Coventry but will be expected to make visits on client site.
Due to continued expansion and new business wins, Leidos, a Global Solutions Provider specializing in large scale implementations involving science, engineering and technology, require a Cyber Intelligence Analyst. The successful candidate will be able to demonstrate a minimum of 3-5 years’ experience from a Cyber Security Operations Centre (CSOC) background. To succeed in the role the candidate must be capable of working under pressure, delivering on multiple client accounts and have an appetite to progress and develop their own career. The Cyber Intelligence Analyst is required to work within a CSOC, adhering to a matrix managed environment and possess experience of leading and coordinating other CSOC Analysts who will escalate to them. The Cyber Intelligence Analyst will be expected to significantly contribute to the growth and development of the CSOC.
You will be expected to collaborate with and support colleagues in the wider UK Information Assurance and Cyber Security Practice. You will collaborate with a wide variety of stakeholders outside of Information Assurance and Cyber Security within and without Leidos to ensure we detect and respond to Cyber Security Incidents for its customers.
Take a lead to maintain the integrity and security of Cyber systems and networks.
Take the lead to support Cyber Security initiatives through both predictive and reactive analysis, articulating emerging trends to leadership and staff.
Lead the review of threat data from various sources and develops custom signatures or other custom detection capabilities.
Lead Cyber Threat intelligence analysis, correlates actionable security events/campaigns from various sources, and performs network traffic analysis using raw packet data, net flow, IDS, IPS, and custom sensor output as it pertains to the cyber security of communication networks.
Lead the development of unique automation and correlation techniques to better understand adversary Tactics, Techniques, and Procedures (TTPs).
Lead the analysis to provide indicators for enterprise defensive measures.
Lead the interface with external entities including law enforcement organizations, intelligence community organizations and other government agencies as required.
Uses data collected from cyber defence tools firewalls, IDS, network traffic, Security Orchestration and Automated Response (SOAR) etc. to analyse events that occur within the environments or based on the artefacts.
Employs network forensics techniques for attack reconstruction.
Respond to and correlate alerts from various detective and preventative Cyber Security tools such as Security Information Event Monitoring (SIEM), End Point Protection (EPP), End Point Detection and Response (EDR), Web Application Firewall (WAF) and Firewalls.
Proactively detect suspicious activity, vulnerabilities and security misconfigurations before they can be exploited by bad actors to impact Confidentiality, Integrity and Availability which could lead to a Cyber Security Incident.
Inspection and correlation of logs from multiple sources to identify repeating patterns and Indicators of Compromise (IOC).
Continuously scan the Threat Horizon to report and classify Threats according to impact which could potentially damage a client’s network or solution.
Engage with various security communities to review and share knowledge on IOC’s and Threats.
Follow and lead the development of the Cyber Security Incident Response Plan.
Follow and lead the development of the Cyber Security Incident Response Playbooks.
Apply and lead the development of the Cyber Security Incident Prioritisation Criteria to classify and rate Cyber Security Incidents.
Lead the coordination of countermeasures to mitigate Threats which can be used in action plans to respond to Cyber Security Incidents.
Ensure confidentiality and discretion is practiced when dealing with multiple clients to demonstrate professionalism and evidence their information is not shared with others.
Lead and develop the effective reporting of the operational status of all Cyber Security tools.
Lead and develop the effective reporting on the measurement of compliance with security updates and security patches and the production of MI for clients.
Where needed, lead a Team of Cyber Defence Analysts who collectively are responsible for making multiple daily CSOC checks to detect and respond to suspicious activity or alerts.
Part of a Team who may be required to work shifts in order to deliver a 24 x 7 CSOC capability to detect and respond to suspicious activity or alerts.
Lead and develop the concise and detailed recording of events of a Cyber Security Incident and of their own actions to deliver an effective handover during shift changes.
Lead the continuous improvement of CSOC processes and procedures.
Work closely with senior stakeholders from other Technology stacks to contribute to the Cyber Security Incident Response.
As part of a team lead table top scenarios and produce lessons learnt documents.
Technology and Process Experience
Exposure to working on or within HMG classified systems or programs is a bonus and not a must.
Already a CSOC Analyst or a Cyber Defence Analyst or a Cyber Intelligence Analyst with experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at it.
Understanding of the Confidentiality, Integrity and Availability (CIA) triad.
Understanding of current trends for malware, ransomware, Advanced Persistent Threats affecting Cloud Platforms and On Premise solutions.
Proficient with the full suite of Microsoft Office products Word, Excel, Visio.
Experience of working with the disciplines of a Change Controlled environment.
Knowledge of Identification, Authentication, Authorisation, Auditing and Logging services.
An understanding of the OSI 7 network layers.
An understanding of the TCP/IP network layers.
Exposure to working with NCSC, NIST, and Centre for Internet Security (CIS) best practice.
An understanding of network and boundary protection controls for both Cloud and On Premise solutions including but not limited to Firewalls, Network Access Control Lists, Network Security Groups, DDoS Protection, VPN’s, Mail Gateways, Web Proxies, Load Balancers including Web Application Firewalls, Intrusion Prevention System and Intrusion Detection Systems.
Experience of using as many as possible of detective and preventative Cyber Security tools such as but not limited to Security Information Event Monitoring (SIEM), Security Orchestration and Automated Response (SOAR), End Point Protection (EPP), End Point Detection and Response (EDR), Web Application Firewall (WAF) and Firewalls
An understanding of the implementation of technologies such as but not limited to Hardware Security Modules (HSM), USB Controls, Encryption, SSL, TLS, and SSH.
Exposure to leading vendor products such as but not limited to Cisco Firewalls, Palo Alto Firewalls, SPLUNK, LogRhythm, Sophos End Point Protection, Nessus, Rapid 7, AWS Guard Duty, AWS Detective, AWS Inspector, Azure Security Centre, Azure Defender, Azure Office 365 Security and Compliance Centre
The ideal candidate will hold or be willing to gain CISSP, GMON, GCIH certification or equivalent and have an exposure to market leading public cloud technology.
Communication and Soft Skills
Excellent verbal and written communication skills required for hand overs, reports, MI and documenting events during a Cyber Security Incident.
Confidence, composure and leadership qualities.
Works well in a team environment, open to taking feedback in order to learn, able to cope with team dynamics with differing viewpoints and can also work with minimal supervision.
Ability to build strong relationships with customers and internal stakeholders.
Ability to logically analyse a problem and identify a plan to fix or remediate.
Ability to track market trends and suppliers to keep at the forefront of Cyber Security Technology.
Ability to manage multiple streams of work, prioritising, and escalating as necessary.
A self-starter who can see past obstacles driving a solution through to completion.
Candidates have the option of being located in either one of the three Leidos office Glasgow, Farnborough and Coventry.
What do we do for you?
At Leidos we are PASSIONATE about customer success, UNITED as a team and INSPIRED to make a difference. We offer meaningful and engaging careers, a collaborative culture, and support for your career goals, all while nurturing a healthy work-life balance.
We provide an employment package that attracts, develops and retains only the best in talent. Our reward scheme includes:
• Contributory Pension Scheme
• Private Medical Insurance
• 33 days Annual Leave (including public and privilege holidays)
• Access to Flexible benefits (including life assurance, health schemes, childcare vouchers and cycle to work scheme)
Commitment to Diversity:
We welcome applications from every part of the community and are committed to a truly diverse and inclusive culture. We foster a sense of belonging, welcoming all perspectives and contributions, and providing equal access to opportunities and resources for everyone.
If you have a disability or need any reasonable adjustments during the application and selection stages please let us know, and we will respond in a way that best fits your needs.Pay Range: