Register  |  Log In  |  Contact Us

Cyber Security Threat Analyst

Reference
1716163
Contract Type
Permanent
Sector
Education, Media & Communications
Location
London, GBR
Expiry Date
19/02/2018
Cyber Security Threat Analyst Description Description At Pearson, we’re committed to a world that’s always learning and to our talented team who makes it all possible. From bringing lectures vividly to life to turning textb...

Job Description

Cyber Security Threat Analyst

Description

Description

At Pearson, we’re committed to a world that’s always learning and to our talented team who makes it all possible. From bringing lectures vividly to life to turning textbooks into laptop lessons, we are always re-examining the way people learn best, whether it’s one child in our own backyard or an education community across the globe. We are bold thinkers and standout innovators who motivate each other to explore new frontiers in an environment that supports and inspires us to always be better. By pushing the boundaries of technology — and each other to surpass these boundaries — we create seeds of learning that become the catalyst for the world’s innovations, personal and global, large and small.

Role purpose

The Role of the Threat Analyst will be to help identify, manage, monitor, and communicate the information security risks associated with inherent and residual threats that may result in harm or disruption to the Company. The individual will support the Threat and Investigation team, and closely partner with key stakeholders from IT, Business and Corporate Support Functions to gather requirements to understand priorities and communicate impact and context of analyzed threats. The individual will help T&I management to develop metrics and to measure the effectiveness of practices and controls to mitigate threats and vulnerabilities; and develop dashboards that illustrate the effectiveness of risk mitigation over time. Production of Threat Intelligence analysis and periodic articles to help keep management informed of ongoing threats.

Additionally, the individual will work with teams to resolve information security related incidents events and related security breaches in a manner that ensures the safety of information system assets and confidential customer, consumer, employee and corporate data. The individual will also help identify and manage the implementation of Threat Intelligence and appropriate security controls, aligned with industry best practices to meet security objectives and standards while allowing flexibility for the businesses to manage their responsibilities.

Responsibilities

  • As a member of the global Cyber Security Threat and Investigation Team, help to define, ratify, maintain and improve the Threat Intelligence program
  • Use host-based and network forensic capabilities to develop information regarding Indicators of Compromise (IOC) and Tactics, Techniques & Procedures (TTPs) for threat actors and malware, which can be shared amongst other internal teams
  • Leverage practical experience to develop methodologies for proactive hunting of threat actors in the absence of alerting or rules-based appliances.
  • Perform cyber threat intelligence operations including Threat hunting, intelligence collection (IOCs), tracking threat actors, identifying and tracking malicious infrastructure
  • Respond to research requests from stakeholders with timely and accurate assessments and reporting
  • Proactively research relevant threats, provide intelligence briefings to stakeholders and produce reports and intelligence products
  • Partner with the lines of business to provide continuous awareness of key threats and risks that may impact the Business
  • Support prototyping and continuous development/integration of tools to store, exchange, and analyse threat and incident data
  • Implementation of an industry standard TIP along with open source and commercial intelligence feeds
  • Drive and coordinate threat life cycle management, recommend actions that strengthen controls.
  • Assess and understand Pearson’s current security posture and future architecture, providing recommendations for Cyber Security improvement and risk reduction through

Qualifications

Experience

Skills and Experience

  • Experience with Threat Intelligence or Incident Response processes
  • Working knowledge of FS-ISAC and similar open/commercial threat intelligence feeds
  • Experience of Enterprise TIPS platform
  • Prior experience with SIEM tools and Splunk is helpful
  • Strong analytical skills (i.e., technical and non-technical problem solving skills)
  • Technical writing experience and ability to research, perform and articulate threat analysis
  • Creation of periodic articles on Threat Intelligence analysis, activity and exposures
  • Ability to automate reporting processes using scripting languages (Python, Perl, Unix Shell or VBA) a plus
  • An application development background or previous experience with developing or supporting applications, a plus
  • Ability to work across team boundaries to achieve goals
  • Proficient communication skills
  • Results driven, with a strong sense of accountability
  • Great team player to work with colleagues and managers
  • A pro-active, motivated approach while following management direction for task completion in time
  • The ability to operate with urgency and prioritize work accordingly
  • A structured and logical approach to solving business challenges
  • Strong problem solving skills
  • A creative and innovative approach to work
  • The ability to manage workloads and tight deadlines
  • Excellent attention to detail and accuracy
  • Drive efficacy into all solutions delivered, demonstration clear and measurable results through the development of KPIs
  • Drive innovation and best practice
  • Strive for standardisation and simplification in all aspects of work
  • Always cost conscious balancing the needs of the business against the provision of the best solutions possible

Qualifications

  • Bachelor's Degree in Business, Computer Sciences, or equivalent prior work experience in a related field
  • Maintain or willing to pursue certificationin an information security related field. The following are recommended: CISSP, CISM, GSEC, GIAC, GPEN

\#LI-VP1

Primary Location: GB-GB-London

Work Locations: GB-London-80 Strand 80 Strand London WC2R 0RL

Job: Technology

Organization: Technology & Operations

Employee Status: Regular Employee

Job Type: Standard

Shift: Day Job

Job Posting: Jan 24, 2018

Job Unposting: Ongoing

Schedule: Full-time Regular

Req ID: 1716163