Cyber Threat Intelligence Analyst

ASM Research

The CTI Team is Responsible for monitoring and analyzing external cyber threat data to provide insights and actionable intelligence about potential cyber threats. They shall triage information collected from different threat intelligence sources, including internal sources, and study the pattern of attacks, their methodology, motive, severity, and threat landscape applicable to the organizations systems. They shall support enhancing the overall cybersecurity posture of an organization by delivering timely, relevant, information to stakeholders.

Job Responsibilities:

  • Monitor open-source websites for hostile content directed towards organizational or partner interests.
  • Analyze collected data to identify potential threats, vulnerabilities, and emerging trends.
  • Provide tactical intelligence that helps the SOC understand the specifics of current threats, including indicators of compromise (IOCs), tac?cs, techniques, and procedures (TTPs) used by attackers.
  • Assist the SOC during ongoing incidents by providing real-?me intelligence updates, context, and guidance to help investigate, contain, and remedy threats.
  • Provide information on known vulnerabilities and potential zero-day threats to help the SOC prioritize and patch systems accordingly.
  • Educate SOC analysts and other relevant teams on the latest threats, attack techniques, and defensive strategies to enhance the overall cybersecurity awareness within the organizati
  • Mentor and train junior analysts, fostering a culture of continuous improvement and knowledge sharing within the CTI team.

Minimum Qualifications

  • Bachelor’s Degree in Computer Science or a related field or equivalent experience.
  • 5+ years of experience in systems security.
  • Top Secret with SCI Eligibility

Other Job Specific Skills

  • Knowledge and experience Splunk Enterprise Security
  • Knowledge and experience of Microsoft Sentinel
  • Possess proficiency in performing threat factor analysis.
  • Through understanding incident response processes, methodologies, and best practices, contributing to effective threat mitigati
  • Experience in established cyber threat intelligence frameworks, such as MITRE ATT&CK, to inform security strategies and enhance threat analysis.
  • Possess an understanding of incident response processes, methodologies, and best practices, contributing to effective threat mitigati
  • Understand the operational capabilities and limitations of security technologies utilized within the SOC, ensuring effective threat response.
  • Familiarity with threat intelligence sharing platforms and collaborative frameworks, such as Information Sharing and Analysis Centers (ISACs).
  • Proficiency in using threat intelligence platforms and tools for effective data aggregation and analysis.
  • Exceptional analytical skills to evaluate and synthesize threat data from diverse sources, identifying complex attack patterns and trends.

Experience with conducting threat hunting activities to proactively identify and mitigate potential threats within the environment.

Read Full Description
Confirmed 16 hours ago. Posted 4 days ago.

Discover Similar Jobs

Suggested Articles