Offers “Gsk”

Expires soon Gsk

Security Intelligence Analyst, OT

  • POLAND
  • Infra / Networks / Telecom

Job description



Your Responsibilities :
The Sr. Cyber Threat Intelligence Analyst is responsible for a broad range of responsibilities, with a primary emphasis on collecting, conducting research and analysis on current threat activities using the Intelligence OODA Loop framework as well as identifying and summarizing top industry cyber security trends as they apply to GSK.
The analyst will identify, analyze, and report on employed threat Techniques, Tactics and Procedures (TTP) in order to provide security members - internal security operations teams, information technology teams, enterprise risk management teams, and executive decision makers - with awareness and/or actionable information that allows for the development or implementation of proactive defensive measures and improved response actions. The analyst will also leverage intelligence data to support and assist with threat modelling exercises, cyber threat hunting, complex, sensitive incident response activities and apply knowledge of computer and network architecture to provide analysis during investigations, identifying adversarial activity and methods for future detection and recommendations for control development.
This analyst will coordinate with external peers and cyber intelligence sharing groups to share and consume intelligence data surrounding relevant cyber threats.

The role will evolve from supporting IT environment to support OT (Operational Technology / ICS) environment in the future.

Responsibilities
• Monitoring, collecting and analysing the global cyber threat landscape through; open source channels, vendor feeds, participation in industry/government information sharing organizations/platforms and cultivated personal relationships.
• Maintaining threat actor profiles and corresponding data on their tactics, techniques and procedures (TTPs)
• Applying structured analytical methodologies to threat monitoring and intelligence analysis using commercial, OpenSource tools and analytical tradecraft methods
• Preparing intelligence write-ups, including high-quality papers, assessments, briefings, recommendations, and findings
• Provide log/network/malware/device analysis and making recommendations for remediation of security vulnerability conditions
• Provide independent critical thinking to diagnose and analyze threat intelligence data and making decisions on response and remediation
• Develop internal documentation, such as procedures, playbooks, and operational metrics reports as required
• Execute daily ad-hoc tasks or lead small projects as needed

*LI-GSK
G7

Why You?

Basic qualifications:
• Fluent English language skills (spoken and written)
• Excellent verbal, written and interpersonal communication skills
• 3+ years of experience in cyber security or information technology security role, with a preference in cyber threat intelligence.
• Strong research, analytical, and problem solving skills
• Experience in leveraging online research tools to identify and navigate online forums, specialized Web sites, social media, and traditional sources
• Experience with collecting, analyzing, and interpreting qualitative and quantitative data from multiple sources for the purposes of documenting results and analyzing findings to provide advanced threat intelligence
• Good knowledge of intelligence analysis principles either through formal education / training or equivalent professional experience.
• Knowledge of current hacking techniques, vulnerability disclosures, data breach incidents, and security analysis techniques
• Ability to develop specific expertise, discern patterns of complex threat actor behaviour, and communicate an understanding of current and developing cyber threats

Preferred qualifications:
• Graduation from a university in a technical / engineering discipline or equivalent work experience
• Experience with Security Tools related to Enterprise Log Management, IPS/IDS, Antivirus, Firewalls, Proxies, DLP and SIEM
• Experience leveraging cyber analytic frameworks to analyze cyber threats and assess their risk. (Diamond Model, Kill Chain Methodology, MITRE ATT&CK Framework)
• Experience in Cybersecurity analysis, incident response, or a related field with increasing responsibility
• Relevant Technical Security Certifications (GIAC, CISSP, SSCP, EC-Council, Offensive Security, etc.) is a plus
• Experience in writing automation scripts (PowerShell, Python or other) is a plus

Why GSK? :
• Competitive salary and bonus plan
• Extended private medical care
• Life insurance and pension plan
• Sport and recreation package
• Free car and bike parking [only in Poznan]
• Using English on daily basis
• Flexible working hours
• Short Fridays [if applicable]
• Home office
• Integration events
• Fresh fruits everyday

Contact information:
You may apply for this position online by selecting the Apply now button.

Important notice to Employment businesses/ Agencies

GSK does not accept referrals from employment businesses and/or employment agencies in respect of the vacancies posted on this site. All employment businesses/agencies are required to contact GSK's commercial and general procurement/human resources department to obtain prior written authorization before referring any candidates to GSK. The obtaining of prior written authorization is a condition precedent to any agreement (verbal or written) between the employment business/ agency and GSK. In the absence of such written authorization being obtained any actions undertaken by the employment business/agency shall be deemed to have been performed without the consent or contractual agreement of GSK. GSK shall therefore not be liable for any fees arising from such actions or any fees arising from any referrals by employment businesses/agencies in respect of the vacancies posted on this site.

jobDetails

Make every future a success.
  • Job directory
  • Business directory