Find your future role
Job title
Cyber Threat Analyst
Ref no. | BHN560129 |
---|---|
Location | Crawley, England |
Start date | ASAP |
Job type | Permanent |
Job status | Closed |
Job summary
As a Cyber Threat and Vulnerability Analyst, you will support the Cyber Security Operations Lead in identifying and mitigating security vulnerabilities understanding associated risks, and developing strategies to protect our critical infrastructure
Key skills required for this role
Cyber Threat Intelligence, CTI, Digital forensics, OWASP 10,SANS, MITRE ATT&CK, vulnerability research, malware analysis, STiX, Cyber Kill Chain, Diamond Model, vulnerability scanning, Qualys, Nessus, OpenVAS, Kenna, Rapid7, CRTIA, CRTIM, CEH, CCSP
Important
Are you passionate about defending critical infrastructure from cyber threats? Do you possess expertise in IT security, incident response, threat intelligence, and vulnerability management?
Job description
Your efforts will minimize the risk of business disruption, reputational damage, and customer impact from cyber incidents.
This is a permanent job opportunity situated in Crawley, West Sussex, offering a hybrid working arrangement.
Key Responsibilities:
- Collect, review, and assess cyber threat intelligence from various sources.
- Develop and maintain internal vulnerability management policies, standards, and procedures.
- Collect, review, correlate and assess cyber threat intelligence and advisories from multiple sources to identify potential risks and vulnerabilities to identify relevant countermeasures.
- Develop and maintain internal vulnerability management policies, standards and procedures that underpin the vulnerability management lifecycle.
- Plan and coordinate regular cyber security penetration testing and vulnerability scanning activities.
- Support a program of cyber security improvements affecting our technical, procedural, and policy-based security arrangements.
Qualifications:
- 3 years of experience in IT security, including incident response, threat intelligence, vulnerability management, penetration testing, and ethical hacking in an enterprise environment.
- Practical experience with vulnerability scanning and management, systems such as Qualys, Nessus, OpenVAS, Kenna, Rapid7
- Certification in one or more of the following is desirable: CRTIA, CRTIM, CEH, CCSP.
- Understanding of security frameworks and methodologies, such as OWASP 10, SANS TOP 25, MITRE ATT&CK.
- Practical experience with vulnerability scanning and management systems, such as Qualys, Nessus, OpenVAS, Kenna, Rapid7.
- Knowledge of active cyber security threats and actors.