Head of Intelligence

Terms: Permanent Location: Cheltenham, Gloucestershire Reports to: Head of IA Services Salary: Competitive

CORVID provides advanced and innovative cyber security protection services across the wider Ultra Electronics Group, using sophisticated means to detect and manage technical security incidents. 

Job purpose

As CORVID’s capability has matured, the need for a dedicated focus on the collection and exploitation of cyber intelligence has been identified. A new senior role, Head of Intelligence (HoI), will seed and drive CORVID’s development in this area.

Projects are envisaged to range from developing innovative proof-of-concept systems and overseeing their development, through to the development of strategies and systems for managing intelligence holdings. The role will require an individual with a diverse range of technical, analytical and strategic skills.

Key responsibilities:

  • Meet the intelligence demands of CORVID and its customers.
  • Identify and develop sources, methods and systems in support of intelligence production, to cover the long and short-term, as well as ad hoc situations.
  • Research, develop and demonstrate the value of new forms of intelligence.
  • Maintain oversight of data sources, intelligence production processes, intelligence management systems and the integration of intelligence into relevant services.
  • Assess the value of third party open and commercial sources.
  • Highlight the value and uses of intelligence through staff training, seminars and mentoring.

Candidates are expected to demonstrate:

  • Proven hands-on technical expertise in the field of cyber/information security, with ten years' experience in a cyber role(s).
  • Understanding of cyber risk concepts.
  • Understanding of threat intelligence analysis concepts.
  • Experience of the cyber incident response ecosystem.
  • Familiarity with the technical engineering requirements associated with the production of intelligence.
  • Ability to track industry developments and relevant new technologies.

Research interests in specific TA groups is not essential, but would be utilised.

Specific skills and experience should include significant understanding of:

  • The intelligence lifecycle and information lifecycle management.
  • The production and use of indicators, feeds, threat briefings and intel reports.
  • Attribution, TTPs and the taxonomies associated with current threat actor groups.
  • Incident response and intelligence analysis methodologies, including familiarity with common analysis frameworks.
  • Attack methodologies and familiarity with common threat and attack models used during IR and intel analysis.
  • OpSec for intelligence production.
  • Advanced malware detection and analysis techniques.

How to apply

This role is no longer available. Thank you to all applicants.