Cyber Incident Response Analyst

Mons, Belgium

Apply now Apply later

Spektrum have a wide range of exciting opportunities in several global locations.

We are always looking to add great new talent to our team and look forward to hearing from you.

Spektrum supports apex purchasers (NATO, UN, EU, and National Government and Defence) and their Tier 1 supplier ecosystem with a wide range of specialist services. We provide our clients with professional services, specialised aerospace and defence sales, delivery, and operational subject matter expertise. We are looking for personnel to join our team and support key client projects.

Who we are supporting 

The NATO Communication and Information Agency (NCIA) is responsible for providing secure and effective communications and information technology (IT) services to NATO's member countries and its partners. The agency was established in 2012 and is headquartered in Brussels, Belgium.

The NCIA provides a wide range of services, including:

  • Cyber Security: The NCIA provides advanced cybersecurity solutions to protect NATO's communication networks and information systems against cyber threats.
  • Command and Control Systems: The NCIA develops and maintains the systems used by NATO's military commanders to plan and execute operations.
  • Satellite Communications: The NCIA provides satellite communications services to enable secure and reliable communications between NATO forces.
  • Electronic Warfare: The NCIA provides electronic warfare services to support NATO's mission to detect, deny, and defeat threats to its communication networks.
  • Information Management: The NCIA manages NATO's information technology infrastructure, including its databases, applications, and servers.

Overall, the NCIA plays a critical role in ensuring the security and effectiveness of NATO's communication and information technology capabilities.

The program

Assistance and Advisory Service (AAS)

The NATO Communications and Information Agency (NCI Agency) is NATO’s principal C3 capability deliverer and CIS service provider. It provides, maintains and defends the NATO enterprise-wide information technology infrastructure to enable Allies to consult together under Article IV, and, when required, stand together in the face of attack under Article V.

To provide these critical services, in the modern evolving dynamic environment the NCI Agency needs to build and maintain high performance-engaged workforce. The NCI Agency workforce strategically consists of three major categorise's: NATO International Civilians (NIC)'s, Military (Mil), and Interim Workforce Consultants (IWC)'s. The IWCs are a critical part of the overall NCI Agency workforce and make up approximately 15 percent of the total workforce.

Role Background

The NATO Cyber Security Centre (NCSC) is a team of over 200 members working to monitor and protect NATO networks. In the NCSC’s role to deliver robust security services to the NATO Enterprise and NATO Allied Operations and Missions (AOM), the centre executes a portfolio of programmes and projects around 219 MEUR euros per year, in order to uplift and enhance critical cyber security services. The Portfolio ranges from Programme of Work (POW) activities funded via the NATO Military Budget (MB) to Critical / Urgent Requirements (CURs/URs) and NATO Security Investment Programme (NSIP) projects funded via the Investment Budget (IB). In some edge cases, projects are also funded via the Civilian Budget (CB). Projects can span multiple years and are governed by various frameworks, including the Common Funded Capability Development Governance Framework (CFCDGM).

In order to execute this work, the NCI Agency is seeking to support the work undertaken by the NATO Cyber Security Centre (NCSC) in the area of Communications and Information System (CIS) security, cyber defence and cyberspace operations.

To support NCSC for the execution of tasks identified in the subject work package of the project, the NCI Agency is looking for subject matter expertise in the delivery of complex, foundational and novel Cybersecurity capability.

Role Duties and Responsibilities

Conduct detailed investigation and research of security events within NATO Cyber Security Centre (NCSC) team:

  • Analyse firewall, IDS, anti-virus and other sensor-produced system security events and present findings.
  • Leverage the comprehensive extended toolset (e.g. Log Collection, Intrusion Detection, Packet Capture, VA, Network Devices etc.) to identify malicious activity.
  • Outcome: Triage, analysis and response to alerts. Deliver analysis and reports in response to tasks associated with ongoing investigations and incidents.

Develop new Splunk alerts, searches and reports for security monitoring and detection

  • Identify security gaps in NATO infrastructure, develop, update and review custom content utilising available toolset.
  • Outcome: 5 new use cases per month. Propose possible optimisations and enhancements, which help to maintain and improve NATO’s Cyber Security posture.

Collaborate with threat intelligence teams to incorporate threat indicators into detection systems.

  • Work closely with the threat intelligence team to integrate the latest Indicators of Compromise (IOCs) and attack techniques into the detection environment.
  • Outcome: Implementation of at least 3 new threat intelligence-driven detections per quarter to stay ahead of emerging threats.

Develop and maintain standard operating procedures (SOPs) and playbooks for incident detection and response.

  • Ensure documentation is up-to-date and provides clear guidance for responding to common attack scenarios.
  • Outcome: Delivery of updated SOPs and playbooks quarterly, ensuring they reflect the latest threat landscape and detection capabilities.

Produce briefings in Microsoft PowerPoint or Word format to provide detailed technical reports in support of incidents and capability improvements

  • Report and/or briefing for the management team containing details on the detection capabilities, scope, and details. This may be requested in either Word, PowerPoint, or both depending on the briefing.

Review reports and observables from threat hunting, red teaming, and purple teaming activities.

  • Detection gap analysis and recommendations for solutions, subsequently leading on the development, testing and implementation.

Brainstorm during weekly meetings with the rest of the Monitoring and Detection Team how to improve detection capability to increase detection coverage

  • Participation in meetings as reported and tracked in the meeting minutes which need to be prepared before the meeting and updated during the meeting (Confluence)

Essential Skills and Experience

  • 3+ years of experience in IT security, with a focus on System Administration, Security Tools Management in large organisations.
  • Strong understanding of security best practices
  • Expert level in at least three of the following areas and a high level of experience in several of the other areas:
    • Security Incidents Event Management products (SIEM) – e.g. Splunk.
    • Network Based Intrusion Detection Systems (NIDS) – e.g. SourceFire, Palo Alto Network Threat Prevention.
    • Host Based Intrusion Detection Systems (HIDS).
    • Full Packet Capture systems – e.g. Niksun, RSA/NetWitness.
    • A variety of Security Event generating sources (e.g. Firewalls, IDS, Routers, Security Appliances).
    • Cloud-specific security tools.
    • Splunk ES suite and Phantom SOAR.
  • Proficiency in Intrusion/Incident Detection and Handling.
  • Expert knowledge of malware families, network attack vectors and threat actor tools, techniques and procedures.
  • Experience in endpoint detection and analysis techniques.
  • Expert knowledge of the principles of computer and communications security, networking, and the vulnerabilities of modern operating systems and applications.
  • Comprehensive knowledge of the principles of computer and communications security, networking, and the vulnerabilities of modern operating systems and applications.
  • Very good communications skills and reporting experience with capacity to communicate to different types of audience (senior executive, middle management, technical and non-technical).
  • Very good understanding of the principles of Computer and Communication Security, networking, and the vulnerabilities of modern operating systems and applications acquired through a blend of academic or professional training coupled with practical professional experience.

Desirable Skills and Experience

  • Experience in working with NATO.
  • Experience of working with NATO Communications and Information Agency.
  • Experience of working with national Defence or Government entities.

Language Proficiency

  • Business English

Education

  • Bachelor's degree in Computer Science, Information Technology, or related field Or equivalent experience.

Working Location

  • Mons, Belgium

Working Policy

  • On-Site

Travel

  • Some travel to other NATO sites may be required

Security Clearance

  • Valid National or NATO Secret personal security clearance

We never know what new opportunities might be just over the horizon. If this opportunity isn't for you please feel free to send us your resume anyway and be the first to know if something suitable for your skills and experience comes up. 

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  2  1  0

Tags: Clearance Cloud Computer Science Confluence Firewalls Governance IDS Incident response Intrusion detection Malware Monitoring NATO Red team RSA Security Clearance SIEM SOAR Sourcefire Splunk Threat intelligence Vulnerabilities

Perks/benefits: Career development Team events Travel

Region: Europe
Country: Belgium

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.