Tactical Intelligence Analyst

GBR Remote

Apply now Apply later

Thanks for checking out our job opening; we are excited that YOU are interested in learning more about NCC Group.

We are on a mission to make society a safer and more secure place. Our people are the ones who make that possible; a global community of talented individuals working together towards a safer future.

We aim to create an environment where everyone can reach their full potential. We work together, we are brilliantly creative, we embrace difference and we want you to join in our mission, to make the world safer and more secure.

Take a look at our website here to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation business… https://www.nccgroup.com/uk/

The Opportunity:

As a Threat Intelligence analyst you will play a key role in our Tactical Threat Intelligence team. You will bring experience in either Malware analysis, CTI Analysis or OSINT research (or a combination of these),

Together with colleagues spanning almost all time zones, you will help to make our clients safer and more secure against cyber threats by helping them understand the motivations of relevant actors, identifying their targets and how they operate.

The Global Threat Intelligence Team has built a very strong reputation when it comes to collecting our own data and combining this with open and commercial sources.

This role involves analysis of cyber threats, the development of actionable intelligence, and collaboration with various teams.

Your support to the wider organisation will be critical in the development of NCC Group’s Threat Intelligence capabilities and the broader service we offer.

Key Accountabilities:

A combination of the following…

Threat Intelligence Analysis:

  • Track, document and report different types of Threat Actors
  • Document and report on their TTPs, IOCs and Infrastructure
  • In-depth analysis, document and report on malware families

Malware Analysis and response:

  • Conduct in-depth static and dynamic analysis of new and emerging malware threats, identifying potential risks and novel attack vectors.
  • Provide detailed analysis of malware samples as part of Digital Forensics and Incident Response (DFIR) investigations.
  • Stay up-to-date with ongoing malware campaigns and techniques, providing insight into emerging or high-impact threats.
  • Based on malware analysis, create and refine detection signatures such as YARA rules. Identify Network and host-based detection opportunities.

Collaboration and Information Sharing:

  • Collaborate with internal teams, external partners, and industry forums to share threat intelligence.
  • Participate in information-sharing communities to stay abreast of the latest threat landscape.
  • Present at internal and external conferences and events, on occasion.
  • Communicate directly with clients to present research findings, obtain feedback, and answer questions.
  • Answer internal and external RFI's

Tool Management:

  • Manage and optimise threat intelligence platforms and tools to enhance analysis efficiency. Evaluate and recommend new tools to improve the overall capabilities of the threat intelligence function.
  • Gain and maintain access to dark web resources. Web forums, shops, markets, and chat services.
  • Develop and maintain tools and scripts for malware analysis, including custom configuration extractors and unpackers in the malware lab.
  • Based on malware analysis, create and refine detection signatures such as YARA rules. Identify Network and host-based detection opportunities.

Documentation and Reporting:

  • Document and report on the behaviour, techniques, tactics, and procedures (TTPs) used by malware
  • Generate and share IoCs from malware analyses, leveraging the internal TIP tooling.
  • Contribute to external communications through blog posts that highlight unique or significant malware findings.

Intelligence Reporting:

  • Generate comprehensive and actionable intelligence reports for both technical and non-technical stakeholders.
  • Communicate complex technical information in a clear and concise manner to enable informed decision-making.

Technical Skills:

  • A bachelor's or master's degree or equivalent experience in Computer Science or Information Security (Preferred)
  • Proven experience as a Malware Analyst, Threat Intelligence Analyst, or similar role
  • (Malware Analysis) Strong knowledge of reverse engineering tools and techniques for malware analysis, including tools like IDA Pro, Ghidra, OllyDbg, or similar.
  • Familiarity with programming languages such as Python, C++, or assembly for developing analysis tools and scripts.
  • Knowledge of virtualization technologies, operating systems (Windows, Linux, MacOS, Unix)
  • Offensive security reconnaissance skills
  • Familiarity with the Cyber Threat Intelligence (CTI) cycle

About NCC Group:

At NCC Group, our mission is to create a more secure digital future. That mission underpins everything we do, from our work with our incredible clients to groundbreaking research shaping our industry.

Our teams' partner with clients across a multitude of industries, delving into, securing new products, and emerging technologies, as well as solving complex security problems. As global leaders in cyber and escrow, NCC Group is a people-powered business seeking the next group of brilliant minds to join our ranks.

Our colleagues are our greatest asset, and NCC Group is committed to providing an inclusive and supportive work environment that fosters creativity, collaboration, authenticity, and accountability.

We want colleagues to put down roots at NCC Group, and we offer a comprehensive benefits package, as well as opportunities for learning and development and career growth.

We believe our people are at their brilliant best when they feel bolstered in all aspects of their well-being, and we offer wellness programs and flexible working arrangements to provide that vital support. Come join us!

About your application:

We review every application received and will get in touch if your skills and experience match what we’re looking for. If you don’t hear back from us within 10 days please don’t be too disappointed – we may keep your CV on our database for any future vacancies and we would encourage you to keep an eye on our career opportunities as there may be other suitable roles.

If you do not want us to retain your details, please email cv@nccgroup.com. All personal data is held in accordance with the NCC Group Privacy Policy. We are committed to diversity and flexibility in the workplace. If you require any reasonable adjustments to support you during the application process, please tell us at any stage.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  3  1  0
Category: Analyst Jobs

Tags: C Computer Science DFIR Forensics Ghidra IDA Pro Incident response Linux MacOS Malware Offensive security OllyDbg OSINT Privacy Python Reverse engineering Threat intelligence TTPs UNIX Windows

Perks/benefits: Career development Conferences Flex hours Team events

Regions: Remote/Anywhere Europe
Country: United Kingdom

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.