Top Web 2024
×

Threat Operations Analyst

Roles & Responsibilities

Threat Operations Analyst 

Key Responsibilities 

Threat & Vulnerability Analysis 

  • Review and analyse threats, risks, and vulnerabilities surfaced by the CTRL and Proactive cyber detection pipelines. 
  • Validate the presence of exposed services (e.g., RDP, SSH, databases, edge devices) using platforms such as Shodan, Censys, LeakIX, and Nuclei scans. 
  • Evaluate security configurations to determine whether mitigating controls or compensating measures are in place. 

Asset Verification & Attribution 

  • Confirm internet-facing asset ownership using WHOIS, DNS lookups, reverse-DNS checks, TLS fingerprinting, Shodan datasets, and related OSINT techniques. 
  • Resolve attribution uncertainties, ensuring customers only receive notifications for confirmed assets. 

Customer Notification & Advisory Work 

  • Produce clear and concise security alerts, including explanations of the issue, affected assets, recommended remediation steps, and references to vendor guidance. 
  • Communicate directly with customers and brokers to explain findings, clarify risks, and guide remediation priorities where necessary. 

Internal Collaboration & Escalation 

  • Act as a technical escalation point for Customer Support, Underwriting, and Claims teams. 
  • Investigate inbound queries relating to exposed services, flagged vulnerabilities, potential false positives, or disputed asset ownership. 
  • Contribute technical insight to improve internal processes, detection workflows, and knowledge sharing across teams. 

 

Operational Excellence 

  • Maintain a high standard of customer service, ensuring communications are professional, timely, and approachable. 
  • Assist in tuning detection logic and improving the accuracy of vulnerability and exposure matching. 
  • Support the continuous improvement of CTRL intelligence capabilities and processes. 

 

Required Skills & Knowledge 

  • Strong understanding of networking fundamentals (TCP/IP, ports, protocols, common services). 
  • Familiarity with cyber security terminology (CVE, CVSS, threat actor TTPs, exploitation lifecycle, attack surface concepts). 
  • Hands-on experience using internet scanning or exposure assessment tools (e.g., Shodan, Censys, LeakIX, Nuclei). 
  • Ability to interpret DNS records, WHOIS data, HTTP response headers, and other OSINT artefacts. 
  • Able to break down complex technical issues into clear, customer-friendly language. 

Experience 

  • Proven track record in an MSSP, SOC, threat monitoring or security operations role. 
  • Experience triaging or validating vulnerabilities, exposures, misconfigurations, or security alerts.  

Certifications (Desired but Not Essential) 

  • CompTIA Security+ (or equivalent vendor-neutral foundational certifications). 
  • Other relevant certifications (e.g., Network+, CySA+, GIAC, eLearnSecurity, or similar) welcomed. 

 

Personal Qualities 

  • Strong written and verbal communication skills, with the ability to interact confidently with both technical and non-technical stakeholders. 
  • Analytical mindset with excellent attention to detail. 
  • Highly organised, able to handle multiple cases simultaneously. 
  • Proactive, curious, and motivated to investigate and understand emerging threats. 

Submit Your Resume

Lk image
free website hit counter