Search by job, company or skills

SOC Lead



    Job Description

    More Info

    Recruiter Info

Job Description

  • The candidate will be a member and supporting regional security and intelligence projects, as well as delivering in-depth technical analysis and investigation Part of this work will include working on vendor platforms to collect, process, investigate and analyze data to develop a strong understanding of Nomura s threat landscape, understand how the threats are evolving and support the development of measures to protect against them.
  • Intelligence Analysts contribute to inform operational teams and provide situational awareness to senior leadership through the regular production and delivery of threat briefings and written analysis focusing on higher-level, longer-term trends, dynamics, and threats that could impact the Nomura s operations.
  • Assist investigations in complex cases to understand attribution and identify the most effective enforcement strategies against adversarial threats Architect and maintain the systems supporting collection, processing and analysis of raw intelligence and data, e.g. Threat Intelligence Platform (TIP) Proactively hunt for currently undetected threats by leveraging internal data, open-source intelligence and third party private intelligence. Review zero days and other critical vulnerabilities and help prioritize patching.
  • The candidate will contribute to a variety of finished intelligence products to support stakeholders and business lines, and help create mitigation strategies for known threats. The candidate will have excellent communication skills and work with teams across the globe on a daily basis.
  • The candidate will be given the opportunity to develop this role as the GCTI team grows in maturity, and work collaboratively across a multitude of teams, with a clear career and development path. In this position, the Threat Analyst is expected to have the followingQualifications
  • Bachelor s degree required in cyber/information/network security, computer science, software/ network engineering, or other IT/security/network-related degrees. Willing to work towards security qualifications.

Essential Experience required:-

  • Understanding of malware analysis, hacking tools, and threat actor tactics, techniques and procedures - and be willing to develop this further.
  • Some experience tracking and understanding threats from: Nation State Threat Actors, Ransomware, Cyber Crime, Extremist Groups and Cyber Terrorists, Hacktivism, Malware, Vulnerabilities, Fraud and Social Engineering Techniques.
  • Must be proficient with OSINT gathering techniques and dark web monitoring concepts.
  • Have an up-to-date knowledge of the threat landscape for financial services.
  • Have a solid understanding of the cyber security risks associated with various technologies and ways to manage them.
  • Have the skills and ability to investigate security events.
  • Good level of understanding in the approach threat actors take to attacking a network; phishing, port scanning, web application attacks, DDoS, lateral movement, domain infringement etc.
  • Strong interpersonal collaborative skills, and the ability to communicate security and risk-related concepts to technical and non-technical audiences.
  • Must possess the ability to multitask, prioritize, and manage time effectively.
  • Must have strong attention to detail.

Similar Jobs

SOC Analyst

Company Name Confidential

National Lead Cyber Security

Company Name Confidential
Last Updated: 29-05-2024 03:25:47 AM
Beware of Scammers

We don’t charge money for job offers