Cyber Threat Specialist

Cyber Threat Specialist

About the role:

An exciting opportunity at a leading international telecoms organisation has arisen for a Cyber Threat Specialist, to work within a dedicated CDO function, proactively discovering new attacks, or attacks currently underway, and then working with other expert cyber security resolver teams to contain and remediate the impact as quickly as possible.

Key Responsibilities:

  • Accountable for proactively discovering new attacks, or attacks currently underway through the use of advanced security monitoring techniques and advanced cyber systems/tools.

  • Complex Active Monitoring & Triage - Observation, triage, correlation analysis/investigation and closure of real time of information complex security events including false positive identification.

  • Data Hunting Technology Management - advanced configuration and development of high end data hunting technologies.
  • Data Hunting Use Cases - the rapid development and deployment of advanced security monitoring techniques and new 'data hunting' use cases.

  • Data Hunting Analysis - using advanced big data analytics to create cyber analysis, intelligence, insight, and action.

  • High-risk security monitoring and creating high value inputs into the cyber threat management process.

  • Engage with stakeholders to understand and gather requirements and deliver security monitoring solutions.

Key Skills & Requirements:

  • 5 years minimum experience in similar role or experience in security monitoring

  • Must be expert in security event monitoring and data hunting methodologies and technologies with strong technical Information Security background and extensive hands-on experience.

  • Deep knowledge of Data Hunting technology management and configuration.

  • Deep knowledge of the development and deployment of advanced security monitoring techniques and the creation of new 'data hunting' use cases.

  • Knowledge of risk analysis and the link to data analytics.

  • Deep knowledge of security threat and vulnerability management technologies best practice/continuous improvement (from both a technology and operational process perspective) that will improve Cyber Defence Operations overall detection and response capabilities.

  • Ability to provide technical insight and recommendations on the adoption of data hunting technologies to the organisation to enhance the threat detection capabilities.

  • Highly proficient in creating analytical outcomes that enable improvements in other teams e.g. content development, policy refinement and other measurable improvements.

W1siziisimnvbxbpbgvkx3rozw1lx2fzc2v0cy9hb29kbwfuie1hc3nvbi9qcgcvu2fmzxjkb2jmb2dvlmpwzyjdxq

To stay safe in your job search we recommend that you visit SAFERjobs, a non-profit, joint industry and law enforcement organisation working to combat job scams. Visit the SAFERjobs website for information on common scams and to get free, expert advice for a safer job search.