Job Description
Your Responsibilities:
Collection, analysis and distribution of Information Security (InfoSec) threat information from multiple sources
Preparation of intelligence reports, alerts and briefings, adversary threat actor profiles, and technical reports
Hunting and discovering previously unidentified/unknown and emerging threats
Analyzing threat intelligence and determine techniques, tactics, and procedures (TTPs) of Threat Actors, including detailed technical analysis of the TTPs
Translating analytical findings into security use cases that can be implemented within available detection capabilities
Serving as a data analysis expert for output from a wide variety of tools
Providing detailed and accurate technical reporting of analysis results
Researching new techniques for analysis & developing deeper technical analysis skills
Supporting the development of new cyber data analytics techniques
Supporting SOC analysis and incident response as needed
What We Are Looking For
The ideal candidate must have a passion for information security, with a good understanding of adversary motivations, capability and intent in cybercrime and the tools and techniques of the trade.
Qualifications:
Bachelor’s degree in Computer Information Systems or a related discipline, or equivalent experience
5+ years in IT Security roles, with 3+ years of experience with Cyber Threat Analysis, Red Teaming or Incident Response
CISSP, GIAC, or similar Information Security certification is preferred
Competencies
Previous experience as Threat Researcher, Hunter and/or Intelligence Analyst
Experience in Incident Response, Event Management, Network Forensics, Signature Creation, Log Analysis & Collection
Strong analytical and investigative skills
Experience hunting for unknown threats, as well as tracking existing campaigns and adversaries to see how they evolve over time
In-depth knowledge and understanding of cyber-attack vectors, detection techniques, malware analysis, cybercrime networks and methodologies
Strong working knowledge of networking fundamentals such as network protocols, ports and common services, TCP/IP protocols
In-depth understanding of technical details related to common TTPs employed by threat actors
Experience in Big Data analytics and visualization
Ability to learn & perform analysis quickly while balancing attention to detail and thoroughness
Strong interpersonal, facilitation & communication skills