Senior Technical Analyst - Cyber Threat Intelligence Analyst
Bengaluru Bengaluru (Bengaluru, IN, 560025
Computacenter
Life on the team
It’s an exciting time to join the Threat Intelligence Team as it’s still in its infancy – so bring your experience and help us shape the team. Once we’re at full capacity, our work will touch every part of the business. So, you’ll get to know the ins and outs of Computacenter in no time.
You’ll work as part of a team of five specialists and analysts. We’ve got big plans – there are so many things we already want to do – and if you’ve got specific areas, you’re passionate about, we’ll encourage and support you to follow that.
What you’ll do
- Identify and contextualise threats to Computacenter.
- Lead briefings, informing colleagues and relevant teams to help them understand what the threat is.
- Create threat reports, intelligence reports, briefings, and presentations.
- Allocate tasks relevant to identify threats that need further investigating.
- Lead your proactive projects to identify operational, reputational, and financial threats.
- Liaise with government partners and industry experts.
What you’ll need
- Experienced in Information and Cyber Security, including a SOC with 4 to 9 years.
- Experienced in common open and closed source intelligence tools and technologies.
- Experienced in adversary tactics and techniques frameworks such as Mitre ATT&CK and Killchain.
- Experienced in common SOC SIEM technology applications such as MS Sentinel.
- Experienced in KQL, with ability to formulate advanced queries.
- Experienced in investigating security breaches and security incident management.
Provide support for core CTH service lines as detailed below.
- DF – artefact/ evidence collation o DF – analysis of evidence
- DF – forensic investigation of seized assets
- DF – report writing.
- CTH – create hypothesis, generate structured plan and conduct threat hunts for given threats.
- CTH – create and maintain standard library of repeatable hunting queries to search for common attack techniques.
- CTH – generate reports on discovered threats o
- MA – Liaise with internal and external stakeholders to obtain malware samples, transferring them to the analysis environment in a secure, controlled manner.
- MA – Build suitable virtual environment for testing malware against
- MA – detonate and analyse malware using both static and dynamic techniques.
- MA – Define and disseminate findings to stakeholders.
About us
With over 20,000 employees across the globe, we work at the heart of digitisation, advising organisations on IT strategy, implementing the most appropriate technology, and helping our customers to source, transform and manage their technology infrastructure in over 70 countries. We deliver digital technology to some of the world’s greatest organisations, driving digital transformation, and enabling people and their businesses.
Learning and development
Our people are our strength which is why we offer leadership training, coaching, mentoring, professional development, and international opportunities. Whichever direction you choose to go in – whether it’s a well-trodden path or a completely new part of the business – we’ll support you. Our managers champion their people, powering their personal development and helping them to reach their full potential.
You belong
We passionately believe in the power of diversity and inclusion. We celebrate our differences because we know a diverse workforce with different experiences and perspectives helps us win together. And to do that, you need to feel comfortable to bring your whole self to work – and you can only do that when you feel supported, valued, and have a sense of belonging which is what we strive to achieve.
Your application is considered on its merits regardless of your age, disability, ethnicity, faith, gender identity or sexual orientation. All that matters to us is that you share our vision and our values, and that you bring the experience and skills we need.
We are proud to be a Disability Confident Employer, we welcome applications from people with a disability – and guarantee to interview applicants who have a disability and meet the essential requirements for the job.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Malware MITRE ATT&CK SIEM SOC Strategy Threat intelligence
Perks/benefits: Career development
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Product Security Engineer jobs
- Open Information Security Specialist jobs
- Open Information Security Officer jobs
- Open Senior Cyber Security Engineer jobs
- Open Product Security Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Cyber Security Specialist jobs
- Open Cyber Security Architect jobs
- Open Chief Information Security Officer jobs
- Open Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Editor jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Engineer jobs
- Open Consultant SOC / CERT H/F jobs
- Open IT Security Analyst jobs
- Open Senior Information Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open Senior Penetration Tester jobs
- Open Cybersecurity Specialist jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open Pentesting-related jobs
- Open Agile-related jobs
- Open Application security-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open ISO 27001-related jobs
- Open Threat intelligence-related jobs
- Open IAM-related jobs
- Open Analytics-related jobs
- Open CISA-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open Security Clearance-related jobs
- Open Java-related jobs
- Open APIs-related jobs
- Open Forensics-related jobs
- Open SaaS-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open DoD-related jobs
- Open DevOps-related jobs
- Open Splunk-related jobs