215433-en_GB
Life on the team
The Cyber Threat Operations Team plays a vital role in protecting Computacenter from the latest threats and threat actors. We maintain a forward-looking mentality to identify emerging threats and trends, ensuring we stay one step ahead of security threats. Our team combines specialist skills in Threat Intelligence, Threat Hunting, Malware Analysis, Digital Forensics, Incident Response, and Threat Modelling.
At our core, we are driven by a mission to “investigate, collate and locate”: to unearth new threats, gather all available intelligence, and proactively respond. We apply technical expertise and global awareness to produce relevant, actionable intelligence that helps Computacenter minimise risk.
We stay ahead by continuously tracking adversaries, geopolitical developments, and technical advancements to understand the Tactics, Techniques, and Procedures (TTPs) of those who pose the greatest threats. Our culture of curiosity ensures no stone is left unturned, and we work across the business to deliver strategic, tactical, operational, and technical intelligence.
What you’ll do
You’ll be responsible for gathering, correlating, and interpreting data from various sources to produce actionable intelligence. You’ll oversee our Threat Intelligence Platform (TIP), ensuring we are aware of the latest, critical intelligence and ensuring our feeds are up to date and will be responsible for briefing our wider security function on identified threats, driving remediation ad readiness activities. You will also be responsible for leading threat-lead initiatives across the organisation to better protect Computacenter against emerging threats.
What this looks like:
Threat Intelligence Platform (TIP) Maintenance:
- Take ownership of the Threat Intelligence Platform and related tooling, ensuring its effective utilisation for monitoring and analysing both cyber and geopolitical threats.
- Optimise the platform to enhance the team's capabilities in threat detection and response.
- Continue to develop access to internal data and leverage threat intelligence tooling to maximise intelligence opportunities.
Cyber Threat Analysis & Dissemination:
- Identify intelligence of concern for Computacenter across various sources and tooling and conduct analysis and assessment of such threats and their potential impact to the business.
- Monitor and analyse geopolitical events to identify potential impacts on the organisation's cyber security landscape.
- Using a variety of sources to increase knowledge, corroborate and parallel information. This involves engaging in communities and intelligence sharing initiatives.
- Have confidence in your ability to draw conclusions and provide intelligence led recommendations.
- Own and run regular briefings of Threat Intelligence to the wider security team.
- Respond to intelligence requests from internal teams, using all available sources of intelligence to produce assessments on the threat to support decision-making.
- Ensure clear and concise communication of assessments and complex bits of information for various stakeholders.
- Collaborate with cross-functional teams to address immediate intelligence needs and contribute to the overall security posture.
- Work closely alongside other Security Operations teams such as SOC.
- Develop hypotheses based on threat intelligence to direct joint operations with Cyber Threat technical resources to direct threat hunting.
- Continue to develop access to internal data and leverage threat intelligence tooling to maximise intelligence opportunities.
- Dark Web Monitoring to unearth threats to Computacenter.
Ensuring Threat Intelligence Programme Meets Organisational Aims:
- Collection of Priority Intelligence Requirements from key stakeholders.
- Effective tracking of intelligence activities against these PIRs.
- Reporting of service quality against KPIs.
Incident Response Support:
- Required to work out of hours, when situation dictates, to support Incident Response activities.
What you’ll need
- Current SC clearance or the ability and willingness to undertake.
- Extensive and demonstratable experience in the collection, analysis, production and dissemination of intelligence.
- Experience of using a Threat Intelligence Platform
- Experienced in supporting security breaches, security incident management and delivering briefings to senior management.
- Excel in balancing priorities, being able to identify where Threat Intelligence could provide the most value in projects across the business.
- Excellent communication skills, including the ability to influence and persuade stakeholders to enact a more security focused approach.
- Demonstrable experience in Information and Cyber Security and a desire to continue building your knowledge on Cyber Security.
- Technical understanding of networking, internet protocols and information security.
- Experience of using MITRE ATT&CK Framework, Kill Chain, and Diamond Intrusion model.
- Advanced knowledge of global threats to international cyber security and conversant in the tactics, techniques and procedures used by adversaries.