Overview
Senior Threat Modeler — 12 months initially — Remote (with occasional visits to Preston or Frimley) — £41.94 per hour.
Role Description
Supports the overall delivery of the threat modelling function and wider UK SOC by evaluating the client’s estate and its capability. Proactively protects the client through continual testing of security controls. Understands Cyber Threat Intelligence and Active Defence techniques and best practices. Has good knowledge of the cyber threat landscape, current affairs and geopolitics, including threat groups and how to apply this knowledge within an operational environment. Understands the MITRE ATT&CK Framework, Threat Intelligence Platforms and the coordination of Advanced Threat Protection (ATP) and tactics, techniques and procedures (TTPs) to support Cyber Operations. Knowledge of user behaviour analytics and infrastructure analysis, e.g. perimeters, network endpoints. Works with other teams to ensure effective cyber security across the organisation. Works under general direction within a clear framework of accountability, exercises substantial personal responsibility and autonomy. Uses substantial discretion in identifying and responding to complex issues and assignments as they relate to the deliverable/scope of work. Escalates when issues fall outside their framework of accountability. Engages with and contributes to the work of cross-functional teams to ensure that customers and user needs are being met throughout the deliverable/scope of work. Facilitates collaboration between stakeholders who share common objectives. Participates in external activities related to their own specialism. Applies, facilitates and develops creative thinking concepts or finds innovative ways to approach a deliverable. Successful candidates will be enrolled in the client’s Cyber Academy with access to comprehensive training tailored towards the needs of the role. Ability to gain UK Government Clearance to SC level (mandatory).
The role holder is accountable for:
- Generally working to SFIA level 4 (Enable) and some 3 (Apply).
- Establishing and maintaining relationships with key stakeholders within the SOC and business units.
- Owning specific work areas, managing their own development including participating in on-the-job training and attending training programmes as appropriate, and supporting/providing mentorship to others in the team.
- Supporting the Threat Modelling Lead when required, particularly on forecasting future team operations.
- Being a subject matter expert (SME) on emerging threats and working as a fully contributory member of the Threat Modelling Team, with limited guidance from the Line Manager.
Core Duties
- Building and implementing processes and procedures for continuous and effective threat modelling capability.
- Maintains an in-depth understanding of the external and internal security environment and how the organisation reacts to security threats.
- Performs continuous evaluation of the organisation's estate, assessing function capability, and suggesting improvements where necessary.
- Identifies security gaps, and builds attack simulations to support Purple Team engagements by illustrating potential attack patterns to prioritise future remediation efforts.
- Produces reports detailing key threats and risks to the organisation at a strategic level for business units to digest.
- Conducts remediation planning to illustrate how the business can perform effective risk reduction in the long term.
- Contributes to, plans and delivers activities in support of organisational and security development needs in accordance with regulatory requirements and changes in the threat landscape.
- The assessment, validation and reporting of information on current and potential cyber threats to maintain an organisation's situational awareness.
- The verification that systems and processes meet the specified security requirements and that processes to verify ongoing compliance are in place.
Knowledge, Skills and Qualifications
- An understanding of threat modelling frameworks and processes e.g. PASTA, OWASP Threat Dragon, DREAD, STRIDE-LM, OCTAVE, MITRE ATT&CK.
- Up-to-date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs.
- An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007.
- Knowledge of security control (and maturity) frameworks e.g. NIST (CSMA, CSF), CIS, ISO 27000 series, CSA Cloud Controls Matrix, NCSC CAF, and an understanding of the types and functions of security controls.
- An understanding of hypothetical attack paths, familiarity with NIST CSF tools and able to use it for gap analysis.
- Understands Data Flow Diagrams (DFD) and trust boundaries and is able to create one using information provided about an environment.
- Familiar with the functions of relevant authorities e.g. NCSC, NPSA.
- An understanding of Vulnerability Management, Red Teaming, and Breach and Attack Simulation or experience of working within an Active Defence discipline.
Experience
- Experience looking for: all internal based projects. Backlog of tasks to work through.
- Mitre ATT&CK framework used a lot.
- Research and understand the tech stacks.
- Understanding of risk management.
- Conduct gap analysis.
- Industry experience or industry-based certifications could be useful.
- IT degree could be useful.
- Understand data flow diagrams, pick it up and run with it.