Bachelor's degree or equivalent practical experience.
5 years of experience in a customer-facing role in cyber security (e.g., Network Forensics Analyst, Threat Intelligence Analyst).
Experience engaging with, and presenting to, technical stakeholders and executive leaders.
Experience in the consumption, processing, and analysis of CTI within an operational environment, supporting monitoring, detection, and response capabilities.
Experience of cyber threat intelligence practices, standards, and frameworks (e.g., MITRE ATT&CK, STIX/TAXII).
Preferred qualifications:
7 years of experience evaluating forensic reports of electronic media, packet capture, log data, malware triage, or enterprise-level information security operations.
Experience with CTI methodologies and application within cyber security organizations.
Experience in the analysis of CTI, supporting monitoring, detection, and response capabilities.
Experience with standard network logging formats, network management systems and network security monitoring systems, and security information and event management.
Experience in deploying and analyzing data from technical security controls (e.g., web proxy, firewalls, IPS, IDS, enterprise antivirus solutions, network analyzers).