Enable job alerts via email!
A government agency is looking for a Monitoring Analyst to join their Cyber Security Monitoring & Investigations Team. The successful candidate will play a crucial role in the initial triage of security alerts, utilizing various analytical tools to respond to potential threats. Responsibilities include monitoring systems for indicators of compromise and supporting the development of rules for testing across data sets. Applicants should have a solid understanding of security threats and effective incident response tactics.
The Cyber Security Monitoring & Investigations Team is part of the DWP Cyber Resilience Centre, and it plays a vital role in securing the DWP estate; ensuring that service delivery is not affected by potential malicious activity from either internal or external threat actors. The team operates in a dynamic environment at the forefront of the Department’s cyber protection capability.
This role is for a first line monitoring analyst who will have responsibility for the initial triage of security alerts generated from across the DWP estate.
Opportunity A – Shift worker (up to 9 posts). Operating as part of a team working continental shifts to provide 24/7/365 monitoring coverage. The shift pattern is a 28-day repeating pattern with a mixture of day shifts (7am - 7pm) and night shifts (7pm – 7am) and including weekends and bank holidays. A shift allowance may be applicable.
Opportunity B – Core Hours (3 posts). Working as part of a core hours team. Working flexible hours, providing coverage between 7am and 7pm Monday to Friday.
Working as a Security Alert Analyst you will monitor systems to detect potential indicators of compromise. You will lead the first stage categorisation and investigation of security alerts generated by analytical tools and capabilities operating across DWP systems and networks.
You will be responsible for interpreting reports and dashboards and, using your knowledge of security risks and latest cyber intelligence, will ensure an effective response to alerts. Where appropriate you will escalate potential incidents, collating and presenting all necessary information to others, to enable immediate and accurate investigations. You will use malware analysis tools as appropriate to support your decision-making.
You will support the development of theoretical rules to test and deploy across large data sets and will continually review and refine those rules to ensure high quality outputs are maintained and supplied to operational stakeholders.