
Senior Cyber Analyst – Threat Intelligence
- Maidenhead, Berkshire
- Permanent
- Full-time
- Deputise for the Head of CTI where required.
- Produce and update threat actor profiles, detailing their motivations, capabilities, and infrastructure to enhance understanding of potential adversaries.
- Conduct intrusion analysis to support incident response and to develop in-depth understanding of threats targeting the organisation.
- Responsible for updating and maintaining an enterprise TTP framework to track coverage across the organisation.
- Responsible for creating, reviewing and updating CTI processes and documentation, as well as upskilling other team members.
- Responsible for identifying areas and gaps for continuous improvement and ensuring stakeholders adopt a threat-led approach.
- Accountable for the effective collection, analysis, and dissemination of intelligence reports.
- Determine, prioritise and monitor a set of internal and external sources for threat data.
- Prioritise, validate and correlate threat data to obtain actionable information on existing and emerging threats to Maersk.
- Responsible for the configuration and use of the chosen threat intelligence platforms (TIPs).
- Produce and disseminate strategic, operational, and tactical threat intelligence reports periodically and urgently to relevant stakeholders in the enterprise.
- Conduct tactical investigations into key indicators and TTPs sourced from TIPs and Incident Response activities.
- Regularly review and update Priority Intelligence Requirements (PIRs) according to changes in the business and/or threat landscape.
- Apply and maintain an in-depth knowledge of principal cyber security threat actors through open-source and social media monitoring, and attendance at seminars and industry events where possible.
- Provide finished intelligence products to key stakeholders.
- Lead collaboration activities with teams across the Cyber organisation to provide threat intelligence that furthers organisational understanding of potential adversaries and attack vectors, providing a foundation for building logging and monitoring strategies with CTI at the core.
- Identify, prioritise, and communicate threats related to newly identified vulnerabilities that pose a threat to Maersk.
- Define and enhance threat intelligence capabilities by developing processes where automation has the potential to improve efficiency.
- Supporting security incident management and delivering briefings to senior management.
- Ensure threat intelligence is actively used to drive improvements and remediation plans by participating in operational and change projects.
- Scope and respond to Requests for Information (RFIs) from Maersk stakeholders.
- Professional training in threat intelligence or cyber security analysis.
- Open-source intelligence and formal intelligence qualifications are favourable.
- Qualifications such as CEH, SANS, CRTIA, OSCP or equivalent are desirable.
- High proficiency in using threat intelligence platforms (e.g. MISP), security tools, and SIEM solutions.
- Extensive and demonstratable experience in collection, analysis, production, and dissemination of intelligence.
- Strong technical understanding of networking, internet protocols and information security.
- Experience using the Cyber Kill Chain, Mitre ATT&CK Framework and Diamond Model.
- Advanced knowledge of the cyber threat landscape and conversant in the tactics, techniques and procedures used by cyber adversaries.
- Experienced in supporting security breaches, security incident management and delivering briefings to senior management.
- Knowledge of standard methods / systems for analysis and prioritisation of vulnerabilities e.g. CVE, CVSS.
- Knowledge and understanding of key political, operational and security risk issues in the maritime, transport and logistics sector is preferable.
- Advanced expertise in analysing the intersection of political and geopolitical developments with cyber security threat vectors and policymaking.
- Knowledge of threats to Cloud-based systems, and incident response in a Cloud environment.
- At least four years previous experience operating in a cyber threat intelligence function or similar.
- Experience in other cyber security fields such as DFIR, threat hunting, or security engineering is highly desirable but not essential.
- Experience conducting intrusion analysis and contextualising key indicators using a combination of open-source and proprietary tools.
- Experience in developing and maintaining threat intelligence.
- Experience in direction and subsequent collection of intelligence from several sources of information.
- Familiarity with one or more Threat Intelligence Platforms.
- Experience with automation in a security operations context is desirable but not essential.