Enable job alerts via email!

Front Line Analyst - National Security - Leeds

Babcock

Leeds

Hybrid

GBP 35,000 - 50,000

Full time

11 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

A leading company in cyber security seeks a Front Line Analyst to monitor and analyze security incidents. The role includes conducting cyber surveillance, responding to alerts, and developing detection methodologies while coaching junior analysts. Ideal candidates will have a background in Azure, Windows intrusion analysis, and relevant certifications.

Benefits

Flexible working arrangements
Diversity and inclusion culture

Qualifications

  • Relevant certifications such as SANS GCIH or similar required.
  • Knowledge of intrusion analysis, especially on Azure and Windows devices.
  • Good understanding of MITRE ATT&CK Framework.

Responsibilities

  • Conduct cyber security monitoring for detection of hacking/malware.
  • Identify and document attack methods and sources.
  • Lead threat hunting workgroups during incidents.

Skills

Intrusion analysis
Knowledge of networking concepts
Ability to quickly research
Threat hunting
Communication with security centers

Education

Degree in Cyber Security or related field
Certifications like CompTIA Network+ / Security+

Tools

Microsoft Graph API
SIEM/SOAR

Job description

Location(s): UK, Europe & Africa : UK : Leeds

BAE Systems Digital Intelligence is home to 4,500 digital, cyber, and intelligence experts. We work collaboratively across 10 countries to collect, connect, and understand complex data, enabling governments, armed forces, and commercial businesses to unlock digital advantage in demanding environments.

Job Title: Front Line Analyst

Requisition ID: 121791

Location: Leeds - We offer a range of hybrid and flexible working arrangements. Please speak to your recruiter about options for this role.

Grade: GG08

Referral Bonus: £2,000

Job Description
  • Conduct cyber security monitoring to detect hacking/malware intrusion attempts against customer IT.
  • Perform full triage of detection alarms to identify the cause, such as active infection, intrusion attempt, or false positive.
  • Identify and document attack sources, techniques, tactics, and procedures (TTPs), and assess attack extent.
  • Capture and feed back attack chain details into detection capabilities.
  • Ensure monitoring effectiveness by creating and updating SIEM/SOAR playbooks aligned with attacker TTPs.
  • Use intrusion analysis skills to contribute to new detection techniques and research industry capabilities.
  • Communicate with government or commercial security operation centers for root-cause analysis.
  • Create low to medium complexity KQL analytics and hunt queries, conduct IOC and anomaly-based threat hunts, and identify root causes.
  • Identify and tag incorrect alert logic and high false positive detection rules for review.
  • Transform internal and partner threat intelligence into actionable detections.
  • Coach junior analysts and colleagues as needed.
  • Lead threat hunting workgroups during events for complex TTPs across industries.
  • Deliver ad-hoc training and workshops to promote security awareness and team knowledge.
  • Provide daily SITREPs on attacker activity to local teams.
Experience
  • Knowledge of intrusion analysis on Windows end-user devices and servers.
  • Knowledge of intrusion analysis on Azure, including attacker methods like 'living off the cloud' using Microsoft Graph API, app registrations, and managed identities.
  • Ability to quickly research and learn new tools and techniques.
  • Good working knowledge of MITRE ATT&CK Framework.
  • Understanding of networking concepts and protocols (TCP/IP, UDP, DNS, DHCP, HTTP, etc.).
  • Experience with intrusion analysis on Windows devices and Azure cloud architecture.
  • Relevant certifications such as SANS GCIH, GCIA, or similar incident response/forensics certifications.
  • Understanding of Operating System functionality and operations.
  • Ability to develop hypotheses and perform threat hunting in Azure cloud or Windows device data.
Desirable Qualifications
  • Degree in Cyber Security or related field.
  • Certifications like CompTIA Network+ / Security+.
  • CREST certifications - Intrusion Analyst, Cyber Threat Intelligence.
  • Azure certifications - AZ900, SC200, SC900.
  • AWS Cloud Essentials.
  • SANS GCIH, GCIA, or similar.
Life at BAE Systems Digital Intelligence

We embrace hybrid working, allowing flexibility in when and where you work, including from home, offices, or client sites. We leverage technology to facilitate remote interaction, collaboration, and creation, promoting work-life balance and well-being.

Diversity and inclusion are core to our success. We foster a culture where diverse perspectives, skills, and backgrounds are valued, enabling us to achieve excellence and unlock individual and organizational potential.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Front Line Analyst – National Security – Leeds

BAE Systems (New)

Leeds

Hybrid

GBP 40,000 - 55,000

12 days ago

Front Line Analyst – National Security – Leeds

BAE Systems

Leeds

Hybrid

GBP 40,000 - 60,000

12 days ago