Enable job alerts via email!

Threat Hunter – National Security – Leeds

BAE Systems (New)

Leeds

Hybrid

GBP 50,000 - 80,000

Full time

19 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

BAE Systems Digital Intelligence is seeking a Threat Hunter to enhance security measures across hybrid environments. In this pivotal role, you'll drive sophisticated intrusion analysis and mentor junior team members while engaging with external SOCs. Join us to contribute to cutting-edge cybersecurity efforts while benefiting from a supportive work environment that values diversity and innovation.

Qualifications

  • Proven background in security testing and threat detection.
  • Experience with KQL analytics and Azure.
  • Understanding of Windows OS fundamentals and Active Directory.

Responsibilities

  • Lead operational strategies and complex threat hunting tasks.
  • Provide forensic support and define threat hunting initiatives.
  • Mentor team members while contributing to the SOC Knowledge Repository.

Skills

Security testing practices
Azure knowledge
Networking fundamentals
KQL analytics
Threat prioritization

Education

Threat hunting or SOC analyst certifications

Tools

Microsoft Sentinel
AWS knowledge

Job description

Location(s): UK, Europe & Africa: UK: Gloucester

BAE Systems Digital Intelligence is home to 4,500 digital, cyber, and intelligence experts. We work across 10 countries to collect, connect, and analyze complex data, enabling governments, armed forces, and businesses to achieve digital advantages in demanding environments.

Job Title: Threat Hunter

Requisition ID: 121789

Location: Leeds – hybrid and flexible working arrangements available. Please consult your recruiter for details.

Grade: GG10 – GG11

Referral Bonus: £5,000

Job Description
  • Serve as the point of escalation for intrusion analysis, forensics, and incident response queries. Provide root cause analysis for complex, non-standard findings and anomalies without existing playbooks.
  • Mentor team members and share knowledge proactively.
  • Contribute to the SOC Knowledge Repository by creating and updating documentation independently.
  • Build relationships externally with other SOCs and cybersecurity researchers to identify analytics, threat intelligence, and tradecraft that benefit the Blue Team. Communicate funding and prioritization suggestions and lead implementation when needed.
  • Develop complex, anomaly-based KQL analytics and playbooks for detection in M365, Linux, and Windows environments.
  • Review open-source research on threats affecting cloud services and VMs, prioritizing and implementing relevant findings.
  • Research vulnerabilities, produce proof-of-concept exploits, and emulate adversary TTPs for training and detection evaluation.
  • Review red team and pentest findings to improve detection rules.
  • Provide forensic support and threat emulation to improve alert triage and accuracy.
  • Identify gaps in SOC processes, data collection, and analysis, demonstrating the need for improvements through scenarios and red teaming.
  • Perform complex threat hunting, automation, and analytic enrichment tasks.
  • Set vision and milestones for emulation and detection capabilities, influencing other teams.
  • Adjust alert thresholds and suppressions based on risk assessments.
  • Define threat hunting initiatives based on real-world risks.
  • Architect detection programs to identify unusual behaviors, reduce dwell time, and optimize resource use.
  • Oversee practices that enhance daily operations, including quality reviews.
  • Lead operational strategy and team exercises, collaborating across functions.
  • Contribute to team requirements, including engineering and continuous improvement.
  • Design and conduct technical interviews, evaluating candidate responses.
Experience
  • Proven experience in security testing practices and techniques.
  • Knowledge of Azure, with AWS knowledge preferred.
  • Understanding of Windows Active Directory and Windows OS fundamentals.
  • Networking fundamentals experience.
  • Experience with CI/CD and source control systems.
  • Experience in developing malware and anomaly detections.
  • Use of statistical methods for anomaly detection.
  • Proficiency with Microsoft Sentinel and/or XDR.
  • Strong skills in writing complex KQL analytics/searches.
  • Awareness of current security threats.
  • Ability to prioritize threats effectively.
  • Understanding factors affecting detection effectiveness.
  • Threat hunting or SOC analyst certifications preferred.
Life at BAE Systems Digital Intelligence

We support hybrid working, enabling flexible work arrangements from home, offices, or client sites, promoting work-life balance and well-being.

Diversity and inclusion are core to our culture. We value diverse perspectives and backgrounds, fostering an environment of excellence and innovation.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

LOCUM Biomedical Scientist - Histology | Band 6 | Leeds

Hunter AHP

Leeds null

On-site

On-site

GBP 60,000 - 80,000

Full time

4 days ago
Be an early applicant

Lead Mechanical Engineer

Hunter Plastic Surgery

Leeds null

Hybrid

Hybrid

GBP 60,000 - 75,000

Full time

9 days ago

Private Weekend Locum Obs Sonographer - Obs Sonographer

Hunter AHP

Leeds null

On-site

On-site

GBP 60,000 - 80,000

Full time

4 days ago
Be an early applicant

Senior Town Planner

Hunter Dunning

Leeds null

Hybrid

Hybrid

GBP 35,000 - 55,000

Full time

22 days ago

Project Developer

Hunter Philips Executive Search

null null

Remote

Remote

GBP 50,000 - 80,000

Full time

26 days ago