What you’ll be doing
1. Conduct proactive threat hunting activities to identify and mitigate potential security threats. Aligning with the MITRE ATT&CK Framework to put at the core of threat hunting activities.
2. Analyse and interpret security data from various sources, including logs, network traffic, and endpoint data.
3. Develop and implement advanced threat detection techniques and tools.
4. Collaborate with the incident response team to investigate and respond to security incidents.
5. Create and maintain detailed documentation of threat hunting activities and findings.
6. Stay up-to-date with the latest threat intelligence and cybersecurity trends.
7. Provide recommendations for improving security posture and threat detection capabilities.
8. Lead an intelligence-led vulnerability management process.
9. Domain knowledge to fill the role of CTI SME within wide range of Security engagements.
10. Leading collaboration activities with internal teams across the organisation in order to provide further internal understanding of potential adversaries and attack vectors.
11. Delivery of verbal presentations and threat briefs, in-person and virtually, to internal and external stakeholders at all seniority levels
12. Relationship management within the wider Information Security community. Representation of BT in a wide range of fore, to ensure impactful collaboration across the Telco and National Security communities including direct engagement with NCSC and the NCA.
13. Ownership of Vendor relationships - ensuring effective integration and usage of vendor platforms, in order to drive best value and effect for BT.
Skills & Experience Required for the Role
Must Have
14. Proven experience in threat hunting, incident response, malware analysis or a similar role.
15. Holds current relevant professional qualifications in Threat Hunting and/or Information Security (Relevant certifications (e.g., CEH, GCIH, GCFA) are a plus– or willing to work towards
16. Strong knowledge of cybersecurity principles, threat landscapes, and attack vectors.
17. Experience with Crowdstrike and Microsoft Defender hunting methodologies
18. Familiarity with the MITRE ATT&CK framework.
19. Knowledge of security tools and technologies such as SIEM, EDR, and IDS/IPS.
20. Excellent analytical and problem-solving skills.
21. Strong oral and written communication skills
22. Proactive Team Player
23. Demonstrable experience of operational delivery in a fast-paced security environment
24. Knowledge and understanding of current security threats, threat models, frameworks and common mitigations
25. People skills, with an ability to communicate effectively
Nice to Have
26. Experience of intelligence-led vulnerability management processes.
27. Experience of vulnerability management
28. Experience with scripting and automation (e.g., Python, PowerShell).
29. Experience within another Telecommunications/CNI environment
30. Good written reporting skills
31. Management/Leadership experience
32. Network analysis skills