Threat Intelligence Analyst

Motorola Solutions

Benefits

Company Overview

At Motorola Solutions, we create technologies our customers refer to as their lifeline. Our technology platforms in communications, software, video and services help our customers work safely and more efficiently. Whether it’s helping firefighters see through smoke, enabling police officers to see around street corners, or reliably keeping the lights on in homes and businesses around the world, our work supports those who put their lives on the line to keep us safe. Bring your passion, potential and talents to Motorola Solutions, and help us usher in a new era in public safety and security.

Department Overview

Job Description

Primarily, the Threat Intelligence team is responsible for understanding and reporting on: threats against Customers and their operations that MSI supports with our products and services and provide initial recommendations on how to respond and recover from such threats; threats against MSI products and services themselves; and enriching media and open source intelligence for late breaking vulnerabilities that impact MSI Customers, products, and services overseeing the process to determine impacts and drive resolutions working within MSI development.

The Threat Intelligence team is also responsible for external engagement with peer groups in information security circles over cyber threats and for informing the development of global cyber policy. The Threat Intelligence teams’ collection efforts focus on events ranging from intrusions, malware, DDoS, unauthorized access, product and service fraud, insider attacks, and loss of Customer data or MSI proprietary information. This includes developing a deep understanding of global threat actors and geopolitical drivers of cyberspace. The Threat Intelligence team plays an integral role in alerting, responding, and advising on the mitigation of computer security incidents within a Product and Services CyberSecurity context. The team will work closely with other groups within the P&S CyberSecurity organization, as well as other teams within MSI.

The successful candidate possess an intelligence analysis background and is able to communicate in natural language with senior management as well as technical detail levels to enable mitigation activities with threats and incident impacts to MSI products and services. You will independently, or in concert with other work partners, identify cybersecurity threats, produce analytical deliverables, and provide support to ensure internal recipients are successful with threat information you'll produce. You'll use all-source technical data collection and analysis to produce a commonly understandable model of relevant threat related activity. The role includes developing and maintaining a Threat Intelligence Platform to collect new technical and non-technical sources of information, threat research, threat profile development, analyses, debriefings, warnings, and operational data to create tailored intelligence impacting MSI product and services offerings. Military or government service in cyber or intelligence operations a plus and may be used to waive degree requirements.

Essential Requirements:

  • Undergraduate or graduate degree in a STEM related fields with 0-3 years experience in security roles; 2+ years working in security/threat intelligence roles for non STEM applicants 
  • Military or government service in cyber or intelligence operations a plus and may be used to waive degree requirements
  • Proficiency in a programming or scripting language such as Python, Perl, Powershell Java a plus
  • Willingness to earn one of the following certifications within first year of employment: CEH, GCTI, GSEC
  • One or more years working in a Security Operations Center (SOC) or Intelligence function
  • Familiarity with mapping the intelligence cycle directly to threats related to a portfolio of products and services
  • Big Data background with a proven track record of turning large data sets (structured and unstructured) into actionable intelligence

Undergraduate or graduate degree in a STEM related fields with 0-3 years experience in security roles; 2+ years working in security/threat intelligence roles for non STEM applicants 

Military or government service in cyber or intelligence operations a plus and may be used to waive degree requirements

Proficiency in a programming or scripting language such as Python, Perl, Powershell Java a plus

Willingness to earn one of the following certifications within first year of employment: CEH, GCTI, GSEC

One or more years working in a Security Operations Center (SOC) or Intelligence function

Familiarity with mapping the intelligence cycle directly to threats related to a portfolio of products and services

Big Data background with a proven track record of turning large data sets (structured and unstructured) into actionable intelligence

Responsibilities:

  • Execute an established threat intelligence gathering methodology to identify, classify, prioritize and report on cyber threats using a structured approach to derive Customer marketspace relevant cyber intel
  • Identify and develop a portfolio of threat profiles, threat activity, trends and common attack vectors from all available sources
  • Provide actionable information by producing, editing, and distributing a variety of concise and actionable threat analysis and warning products in written and presentation form to an audience that spans a range of end users from customers and senior company executives to security analysts and developers
  • Coordinates with IT, the SOC, and Incidence Response teams to inform and enhance the threat intelligence platform
  • Compile and analyze cyber threat information and make recommendations based on suspected or known context in order to draw insights and conclusions regarding its relative threat to MSI product and services cybersecurity
  • Conduct studies and make recommendations to produce a library of cyber threats, threat vectors, threat actors, and threat trends for security analyst and development team consumption during threat modeling activities
  • Support the development, creation, and driving of current and new reporting methods of Intelligence analysis to peer teams within the Cyber Organization and leadership teams for purposes of situational awareness and making Intelligence actionable
  • Write intelligence and technical articles for knowledge sharing

Execute an established threat intelligence gathering methodology to identify, classify, prioritize and report on cyber threats using a structured approach to derive Customer marketspace relevant cyber intel

Identify and develop a portfolio of threat profiles, threat activity, trends and common attack vectors from all available sources

Provide actionable information by producing, editing, and distributing a variety of concise and actionable threat analysis and warning products in written and presentation form to an audience that spans a range of end users from customers and senior company executives to security analysts and developers

Coordinates with IT, the SOC, and Incidence Response teams to inform and enhance the threat intelligence platform

Compile and analyze cyber threat information and make recommendations based on suspected or known context in order to draw insights and conclusions regarding its relative threat to MSI product and services cybersecurity

Conduct studies and make recommendations to produce a library of cyber threats, threat vectors, threat actors, and threat trends for security analyst and development team consumption during threat modeling activities

Support the development, creation, and driving of current and new reporting methods of Intelligence analysis to peer teams within the Cyber Organization and leadership teams for purposes of situational awareness and making Intelligence actionable

Write intelligence and technical articles for knowledge sharing

General Skills:

  • Advanced written and verbal communications skills
  • Able to translate technical risk details into easy-to-understand natural language
  • Ability to work and influence in a very matrixed organization
  • Ability to formulate and present risk information to senior management
  • Team focus, dedication, self-motivated, attention to detail and flexibility
  • Ability to leverage available technical resources and tools (online and otherwise)
  • A desire for continued learning, research, and expansion of skill-sets essential to the role

Advanced written and verbal communications skills

Able to translate technical risk details into easy-to-understand natural language

Ability to work and influence in a very matrixed organization

Ability to formulate and present risk information to senior management

Team focus, dedication, self-motivated, attention to detail and flexibility

Ability to leverage available technical resources and tools (online and otherwise)

A desire for continued learning, research, and expansion of skill-sets essential to the role

Technical skills:

  • Familiarity with common adversary tactics, techniques, and procedures (TTPs)
  • Demonstrated knowledge of information technology and security principles
  • Familiarity with threat intelligence tools & management platforms to derive tactical and strategic intelligence products
  • Experience with collecting, analyzing, and interpreting data from multiple sources, documenting the results and providing meaningful, shareable analysis products
  • Experience with Security Operations
  • Proficiency in a programming or scripting language such as Python, Perl, Powershell, and programming languages such as Java
  • Big Data background with a proven track record of turning large data sets (structured and unstructured) into actionable intelligence 
  • A working understanding of cloud security, both from cloud consumer and cloud provider points of view
  • A working understanding of mobile security
  • One or more of the following certifications CEH, GCTI, GSEC or equivalent
  • Maltego experience preferred

Familiarity with common adversary tactics, techniques, and procedures (TTPs)

Demonstrated knowledge of information technology and security principles

Familiarity with threat intelligence tools & management platforms to derive tactical and strategic intelligence products

Experience with collecting, analyzing, and interpreting data from multiple sources, documenting the results and providing meaningful, shareable analysis products

Experience with Security Operations

Proficiency in a programming or scripting language such as Python, Perl, Powershell, and programming languages such as Java

Big Data background with a proven track record of turning large data sets (structured and unstructured) into actionable intelligence 

A working understanding of cloud security, both from cloud consumer and cloud provider points of view

A working understanding of mobile security

One or more of the following certifications CEH, GCTI, GSEC or equivalent

Maltego experience preferred

Basic Requirements

  • Undergraduate four year degree in Computer Science, Engineering or related fields, or related experience
  • 3+ years working in security roles, or 4+ years working in information security roles.
  • Military or government service in cyber or intelligence operations a plus and may be used to waive degree requirements.

Travel Requirements

Relocation Provided

Position Type

Referral Payment Plan

EEO Statement

Motorola Solutions is an Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran's status, or, any other protected characteristic.

If you are a current Motorola Solutions employee, please click this link to apply through your Workday account.

Read Full Description

Discover Similar Jobs

Suggested Articles