Our Cyber team is rapidly growing and can highlight a portfolio of high profile clients, giving the opportunity to work on a large client base.
What you’ll be doing
- Develop and integrate automated feeds and enrichment sources.
- Providing training sessions and documentation for SOC staff on effective usage of MISP.
- Monitor a range of sources (threat feeds, OSINT, dark web, internal logs) for emerging threats; and facilitate threat intelligence, sharing with internal teams and external partners while ensuring compliance with data sharing policies.
- Analyse collected data to identify patterns, indicators of compromise (IOCs), and emerging adversary behaviours.
- Produce monthly situational reports highlighting operational threats and actionable recommendations.
- Collaborate with the SOC and incident response teams during active security incidents, providing real-time threat intelligence.
- Contribute to threat hunting initiatives by providing intelligence-led hypotheses and analysis that guide proactive investigations.
- Study threat actors’ tactics, techniques, and procedures (TTPs) using frameworks like MITRE ATT&CK. Evaluating the potential impact of identified threats on both internal operations and customer environments.
- Track and document evolving threat trends, vulnerabilities, and attack vectors that could affect our operations.
- Maintain detailed documentation of all threat intelligence activities.
- Regularly review and refine intelligence processes, tools, and methodologies to improve overall SOC efficiency.
What you’ll bring
- Solid grasp of cybersecurity frameworks (e.g., MITRE ATT&CK) and threat analysis methodologies.
- Excellent analytical skills and able to synthesize complex threat data.
- Consistent record of working under pressure and adapting to constantly evolving threat landscapes.
Referral Bonus: £1500.00
Clearance: DV Cleared or eligible