Threat Intelligence Analyst II - Cyber Security

7 - 9 years

5 Lacs

Posted:20 hours ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

Role Proficiency:

Collect information about cyberattacks and vectors attack groups new vulnerabilities and exploits and new campaigns and trends. Create of threat intelligence reports that communicate the results of the analysis - e.g. sharing information with decision-makers security officials senior corporate officials etc. Create innovative research reports. Mentor junior members of the team as well as assist the Team Lead.

Outcomes:

  1. Independently monitor cyber security news from the clear deep and dark web on a daily basis.
  2. Keep up to date with industry news security threats outside of their network and the intentions of potentially threatening entities.
  3. Closely follow the documented process to ensure consistent and repeatable guideline to report about threats (finished intelligence).
  4. Ensure documentation included in ThreatConnect/ CDC as predefined / agreed standards.
  5. Learn from review process for continuous improvement.
  6. Communicate and report appropriately as per defined process.

Measures of Outcomes:

  1. Case studies and value delivered to CyberProof/ externally (blogs webinars) as well as implementing new research types new analysis tools.
  2. Number of threat intelligence finished reports including threat landscape and asset-based intelligence
  3. Percent of security incidents opened based on the CTI analyst's reports.
  4. Adherence to process - validation formatting documentation improvement suggestion.
  5. Evidence of skill development including training certification etc.

Outputs Expected:

Collection:

  1. Work with OSINT sources.
  2. Use WEBINT techniques to collect and enrich intelligence data.
  3. Develop and maintain deep web sources.


Processing and analysis:

  1. Analyse the threat data into a finished report
    including technical recommendationsMITRE ATT&CK mappingand valid IOCs.
  2. Reach out to other SOC teams (DFIR
    THL2etc) for validating and enriching your intelligence.
  3. Complete documentation including annotation in ThreatConnect / CDC to ensure audit trail as per defined standards and quality requirements.
  4. In accordance with the defined process
    ensure that the defined reports are created and published to stakeholders.


Support the team:

  1. Assist the team lead in ensuring quality of service across the team.
  2. Seek advice from senior members of the team when in doubt.


Continuous Learninginnovationand optimization :

  1. Ensure completion of learning program.
  2. Lead ideas that will help innovation and optimization of processes.
  3. Continually learn new technology and stay updated on cyber threats.
  4. Conduct new types of research and recommend topics for inclusion
    or upgrade team workflows.

Skill Examples:

  1. User level skills in use of CDC ThreatConnect Sixgill IntSights VT Premium.
  2. Excellent logical problem-solving ability and analytical skills for intelligence processing and analysis
  3. Great oral and written communication skills.
  4. Ability to conduct presentation of finished intelligence to team members management clients.
  5. Ability to create innovative research reports (global trends cross clients collaboration with other teams in the company).
  6. Proficiency in data analytics tools - SQL BI reports.
  7. Proficiency in Python.

Knowledge Examples:

Knowledge Examples

  1. Understanding of cybersecurity threat landscape.
  2. Understanding of enterprise IT Infrastructure including Networks OS Databases Web Applications etc.
  3. Experience conducting research in the areas of WEBINT OSINT social media platforms and virtual HUMINT.
  4. Experience in gathering dark web intelligence.
  5. Training / Certification in Ethical Hacking etc.

Additional Comments:

Job Description - Threat Intelligence Analyst II - Cyber Security Experience- 12+ years Responsibilities: Focus on automation of threat hunting exercises, designated threat hunting projects, customer onboarding, build customer relation. Perform threat hunting on various enterprise assets by exploring and correlating large data sets resulting in timely notifications for customers. Enable and improve inhouse automation threat hunting projects that use Jupyter notebook, mysticpy etc Uncover novel attack techniques, monitor and catalogue changes in activity group tradecraft. Acquire new and leverage existing knowledge of attacker tools, tactics and procedures to improve the security posture of customers. Effectively engage and collaborate with partners in data science, and threat research to develop and maintain high-fidelity detection rules. Build or identify hunting tools and automation for use in the discovery of human adversaries You would be expected to support a 24/7 operation model that sometimes involves working in night shifts. Deep knowledge of the attacker landscape and rich telemetry from our sensors to perform root- cause analysis and generate custom s, ensuring that customers are well equipped to quickly respond to human adversaries identified in their unique environments. Skilled hunters harness the power of available telemtry / signals to quickly identify and report the latest human adversary behaviours, drive critical context-rich s, build new tools and automation in support of hunting objectives, and drive innovations for detecting advanced attacker tradecraft. Build strong cross team relationship with CTI, Detection engineering/UCM, automation, R&D and sales. Skilled working with extremely large data sets, using tools and scripting languages such as: Excel, SQL, Python, Splunk, and PowerBI. Preferred Qualifications: Bachelor degree preferred in Computer Science, Computer Engineering, Information Security. Knowledge ofoperating system internals, OS security mitigations & understanding of Security challenges in Windows, Linux, Mac, Android & iOSplatforms. Knowledge of kill-chain model, ATT&CK framework, and modern penetration testing techniques. Experience with reverse engineering, digital forensics (DFIR) or incident response, or machine learning models. Experience with system administration in a large enterprise environment including Windows and Linux servers and workstations, network administration. Experience with offensive security including tools such as Metasploit, exploit development, Open Source Intelligence Gathering (OSINT), and designing ways to breach enterprise networks. Additional advanced technical degrees or cyber security certifications such as CISSP, OSCP, CEH, or GIAC certifications.

Required Skills

Soc,Network Security,Cyber Security

Mock Interview

Practice Video Interview with JobPe AI

Start Python Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Python Skills

Practice Python coding challenges to boost your skills

Start Practicing Python Now
UST logo
UST

IT Services and IT Consulting

Aliso Viejo CA

RecommendedJobs for You