Cyber Intelligence analyst

Ref No. EMP457279
Salary £45,000 - £60,000/annum
Location Farnborough, England
Start date ASAP
Job type Contract ()
Job Status Applicants Required


4x Cyber Intelligence Analysts are required on a perm or contract basis based in Farnborough


Cyber Security

The Job

This role is to start asap and will pay £45-60K p/a (perm) or £550 - £625 per day (Ltd/Umbrella - IR35 status TBC)

Working for a Global Solutions Provider specialising in large scale implementations involving science, engineering and technology, the Cyber Intelligence Analysts will be able to demonstrate previous experience from a Cyber Security Operations Centre (CSOC) background. To succeed in the role the candidate must be capable of working under pressure, delivering on multiple client accounts and have an appetite to progress and develop their own career. The Cyber Intelligence Analyst is required to work within a CSOC, adhering to a matrix managed environment and possess experience of leading and coordinating other CSOC Analysts who will escalate to them. The Cyber Intelligence Analyst will be expected to significantly contribute to the growth and development of the CSOC.

The Cyber Intelligence Analysts will be expected to collaborate with and support colleagues in the wider UK Information Assurance and Cyber Security Practice.

Essential experience and skills required -

Candidates must have Home Office SC clearance or SC cleared where the clearance can be transferred to the Home Office

  • Work 12 hour shifts as part of a rota for 24x7 CSOC Support, 4 days on day shift, 4 days off and 4 nights on night shift

Day to day duties -

  • Take a lead to maintain the integrity and security of Cyber systems and networks.
  • Take the lead to support Cyber Security initiatives through both predictive and reactive analysis, articulating emerging trends to leadership and staff.
  • Lead the review of threat data from various sources and develops custom signatures or other custom detection capabilities.
  • Lead Cyber Threat intelligence analysis, correlates actionable security events/campaigns from various sources, and performs network traffic analysis using raw packet data, net flow, IDS, IPS, and custom sensor output as it pertains to the cyber security of communication networks.
  • Lead the development of unique automation and correlation techniques to better understand adversary Tactics, Techniques, and Procedures (TTPs).
  • Lead the analysis to provide indicators for enterprise defensive measures.
  • Lead the interface with external entities including law enforcement organizations, intelligence community organizations and other government agencies as required.
  • Uses data collected from cyber defence tools firewalls, IDS, network traffic, Security Orchestration and Automated Response (SOAR) etc. to analyse events that occur within the environments or based on the artefacts.
  • Employs network forensics techniques for attack reconstruction.
  • Respond to and correlate alerts from various detective and preventative Cyber Security tools such as Security Information Event Monitoring (SIEM), End Point Protection (EPP), End Point Detection and Response (EDR), Web Application Firewall (WAF) and Firewalls.
  • Proactively detect suspicious activity, vulnerabilities and security misconfigurations before they can be exploited by bad actors to impact Confidentiality, Integrity and Availability which could lead to a Cyber Security Incident.
  • Inspection and correlation of logs from multiple sources to identify repeating patterns and Indicators of Compromise (IOC).
  • Continuously scan the Threat Horizon to report and classify Threats according to impact which could potentially damage a client's network or solution.
  • Engage with various security communities to review and share knowledge on IOC's and Threats.
  • Follow and lead the development of the Cyber Security Incident Response Plan.

Technology Experience required -

  • Exposure to working on or within HMG classified systems or programs is a bonus and not a must.
  • Already a CSOC Analyst or a Cyber Defence Analyst or a Cyber Intelligence Analyst with experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at it.
  • Understanding of the Confidentiality, Integrity and Availability (CIA) triad.
  • An understanding of the OSI 7 network layers.
  • An understanding of the TCP/IP network layers.
  • Exposure to working with NCSC, NIST, and Centre for Internet Security (CIS) best practice.
  • An understanding of network and boundary protection controls for both Cloud and On Premise solutions including but not limited to Firewalls, Network Access Control Lists, Network Security Groups, DDoS Protection, VPN's, Mail Gateways, Web Proxies, Load Balancers including Web Application Firewalls, Intrusion Prevention System and Intrusion Detection Systems.
  • Experience of using as many as possible of detective and preventative Cyber Security tools such as but not limited to Security Information Event Monitoring (SIEM), Security Orchestration and Automated Response (SOAR), End Point Protection (EPP), End Point Detection and Response (EDR), Web Application Firewall (WAF) and Firewalls
  • An understanding of the implementation of technologies such as but not limited to Hardware Security Modules (HSM), USB Controls, Encryption, SSL, TLS, and SSH.

This role is to start asap and will pay £45-60K p/a (perm) or £550 - £625 per day (Ltd/Umbrella - IR35 status TBC)

Networkers acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers and is part of Gattaca Plc.

Gattaca Plc provides support services to Networkers and may assist with processing your application.

Related jobs



Related articles

What are you looking for most from your next employment or assignment?

Back to top