E2552I / Cyber Intel Analyst

advertisement
Cyber Intel Analyst
Job Reference:
LM People Job Code/Title:
Location:
Programme / Functional Group:
ISGS11483
E2552I / Cyber Intel Analyst
Farnborough
IS&GS - Security and Defence - Various
Description of Business Environment:
The Lockheed Martin UK Commercial Markets team deliver cyber security programmes
to public and private sectors in UK and Europe. Supporting these programmes, the
Cyber Analysts play a crucial role in delivering subject matter expertise in the area of
Computer Network Defence to customers
Specific Job Description:
The position responsibilities include, but are not limited to: Incident Response (aiding
customers and working under an Incident Lead throughout the incident response
processes), forensic analysis (handling compromised machines and supporting data to
identify malicious activity), developing thorough incident reports, delivering threat &
awareness/education briefings, coordination of process development & technical writing,
Cyber training, dealing with external entities/interfaces and supporting Customer
capability
The successful candidate will be required to be able to utilise security data provided
from various customer based sources (IDS, routers, SIEMS, firewalls, hosts) as well as
external data sources (Industry portals, mailing lists, newsgroups, etc) to both establish
and maintain understanding of the current threat landscape allowing for the
recommendations of effective mitigations, and reviewing appropriate data sources for
indications of adversary activity.
The position requires moderate understanding of networking, system administration,
digital forensics, architectures and security elements to include, but are not limited to:
•
Firewalls
•
Intrusion detection systems
•
Routers
•
Proxies
The candidate must also have the ability to quickly learn new analysis techniques with
guidance from other senior team members, and is required to successfully research and
maintain proficiency in tools, techniques and countermeasures.
Strong communication skills (both written and verbal), customer service and teaming
skills (both internally and with external agencies) are utilised extensively on a daily
basis. The Cyber Intelligence Analyst is also required to produce cohesive technical
intelligence reports. Ability to obtain a UK security clearance and to adhere to the
highest standards of ethics and professional conduct are an absolute must.
The candidate will be expected learn how to effectively employ the processes and tools
used within the Lockheed Martin UK Cyber Practice to detect and respond to the
Advance Persistent Threat (APT) and other sophisticated threats.
The successful candidate will:
•
Contribute to the Incident Response process,
•
Be part of the UK Cyber Practice and provide support to:
o Commercial Contract Work
o Incidents
o Incident escalation
o Incident communication
o Incident tracking
•
Support the Kill Chain process by applying the LM intelligence based response
process to understand how derived intelligence is translated into cost effective actions to
improve security posture;
•
Provide support to the Security Intelligence Centre:
•
Contribute to ancillary duties as needed such as updating process
documentation, tool evaluations.
Required Skills:
•
Unix/Linux background & related work experience
•
Host and network based forensics experience
•
Familiarity with information security tools and processes
•
Ability to obtain and maintain a UK Security Clearance
•
Ability and willingness to travel overseas for prolonged periods of time
Desired Skills
•
Relevant Professional Certifications
•
Programming/scripting experience, specifically Python
•
Tools proficiencies
•
Demonstrated excellent customer service and teaming skills
•
Understanding of networking, system administration, architectures and security
elements
•
Strong communication skills (both written and verbal)
Standard Job Description:
Responsible for maintaining the integrity and security of enterprise-wide cyber systems
and networks. Supports cyber security initiatives through both predictive and reactive
analysis, articulating emerging trends to leadership and staff. Coordinates resources
during enterprise incident response efforts, driving incidents to timely and complete
resolution. Employs advanced forensic tools and techniques for attack reconstruction,
including dead system analysis and volatile data collection and analysis. Supports
internal HR/Legal/Ethics investigations as forensic subject matter expert. Performs
network traffic analysis utilising raw packet data, net flow, IDS, and custom sensor
output as it pertains to the cyber security of communications networks. Reviews threat
data from various sources and develops custom signatures for Open Source IDS or
other custom detection capabilities.
Correlates actionable security events from various sources including Security
Information Management System (SIMS) data and develops unique correlation
techniques. Utilizes understanding of attack signatures, tactics, techniques and
procedures associated with advanced threats. Develops analytical products fusing
enterprise and all-source intelligence. May conduct malware analysis of attacker tools
providing indicators for enterprise defensive measures, and reverse engineer attacker
encoding protocols. Interfaces with external entities including law enforcement
organizations, intelligence community organizations and other government agencies
such as the Department of Defence.
Typical Minimum Education & Experience:
Ideally require a Bachelors degree from an accredited college and capability typically
achieved through proven professional experience. Will also consider individuals with
equivalent experience / combined education.
Considered experienced, but still a learner.
Download