Threat Intelligence Specialist

Posted 6 hours 45 minutes ago by Infoplus Technologies UK Ltd

Contract
Not Specified
Temporary Jobs
Berkshire, Reading, United Kingdom, RG317
Job Description

Role: Threat Intelligence Specialist

Location: Reading, UK

Inside IR35

Contract Position

The Role:

As part of the Global Security Threat Intelligence Specialist & Vulnerability Management team the Cyber Threat Intelligence team collect, process and analyze data to produce information an organization can use to understand the threats that have, will, or are currently targeting our organization. Threat Intelligence Specialist also provides expertise in supporting the resolution of advanced or complex security threats against the company as well as advising on best practice countermeasures and detection's.
The Threat Intelligence Specialist Analyst role will strengthen the Threat Intelligence program by collecting, processing, analysing and disseminating actionable intelligence.

Your responsibilities:
Collection of information to address the most important intelligence requirements.
Analysis of information into intelligence that allows partners to make informed decisions
Creation and sharing of threat intelligence focusing on these key areas:
o Incident Response
o Security Operations
o Vulnerability Management
o Customer Internet Security
o Security Leadership
o Fraud Prevention

Capture feedback from the main partners to make sure you understand their current intelligence requirements and adjust any processes.
Lead the initial analysis of intelligence correlations and proactively seek for internal threats, including insider threats.
Assist in running a threat intelligence platform that can store cyber threat intelligence idioms such as threat actors, exploit targets from disparate sources, devices, communities and industries in a structured & standardized way.
Reporting - write and present security reports to the stakeholders in an automated but human, readable or visual way.
Identify intelligence trends, patterns and behavior to provide business-focused impactful intelligence.
Evaluation and triage threats are highlighted through Intelligence tooling and raise to appropriate partners.
Conduct Dark web investigations and OSINT gathering for key partners to support RFI engagements.
3rd party liaison - The individual must build partnerships with security teams in governments or other industries, putting them in a position to share Intel and be able to receive early signals that could affect the organization. Also, they must be prepared to represent Organization at offsite meetings, conferences or work on a temporary basis in these environments.
Broader overall security related responsibilities as part of a cutting-edge security team.

Your Profile:
Systematic problem-solving skills, with the ability to think.
Excellent in analytical thinking for translating data into informative visuals and reports.
Adaptable to change.
Quick Learner Open learn and work on new technologies and products.

Essential skills/knowledge/experience: (Up to 10, Avoid repetition)
Background in technical investigations, open-source intelligence collection, experience operating in the deep/dark web, and account takeover.
Strong technical and analytical security skills required and a minimum of 2 years security experience, ideally in a capacity where Threat Intelligence or incident detection and response formed a key part of the role(s) played.
Strong understanding of the Threat Intelligence life cycle methodology and confidence in application in everyday processes.
Cyber Fundamentals include understanding of high-level threats and groups.
Self-starter takes initiative and is self-motivated; Takes ownership of problems, evaluates and recommends resolutions and sees through to completion.
Excellent written and oral communication skills.

Desirable skills/knowledge/experience: (As applicable)
Experience in presenting findings and making recommendations at a senior management level.
Experience in working with a wide range of stakeholders in the context of improving security.
Understanding and application of threat hunting methodologies and attack simulation technologies desirable.