המקום בו המומחים והחברות הטובות ביותר נפגשים
Job Description:
The Cyber Threat Intelligence Senior Analyst is responsible for conducting in-depth research, documentation, and intelligence analysis of key cyber threats to develop a comprehensive picture of the cyber threat landscape. This includes research via the use of various sources; development of historical, trend, and link analysis; and written and oral reporting to provide actionable intelligence. The analyst will also work to proactively research new threats and establish trends and patterns among existing attacks to help predict future risks.
Responsibilities include, but are not limited to:
• Working in a tactical/strategic role cultivating intelligence sources, analyzing information, creating intelligence, and hunting for exposures or related incidents
• Researching current and emerging threats, malware analysis, campaign assessment, data collection and analysis
• Researching threat actors and cultivating and assessing new sources of threat information and intelligence
• Collecting, assessing, and cataloguing threat indicators and responsibility for adding context to threat indicators to convey urgency, severity, and credibility
• Risk management
• Maintaining knowledge of threat landscape by monitoring OSINT and related sources
• Tracking cyber threat actors and their infrastructure with a view to disrupting their activity
• Collaborating with appropriate business partners and lines of business to analyze threats
• Escalating issues to management in a timely manner with appropriate information regarding risk and impact
• Exercising independent judgment in methods, techniques and evaluation criteria for obtaining results
• Participating in technical bridge lines to facilitate the identification, mitigation and containment of cyber-security incidents
• Drafting well-written analytical assessments and providing briefings to response teams, enterprise counterparts, and senior leadership on key issues
• Mentoring and developing other analysts on the team
• Minimum of 10 years of InfoSec experience tracking and reporting on cyber threats
• Experience as an intelligence analyst, and/or malware analyst is necessary
• Technical or information security certifications are also strong plus
• Excellent organizational and analytical skills
• Ability to communicate (verbal and written) with executives and stakeholders in non-technical terms while accurately encompassing risk, impact, likelihood, containment and remediation activities, and threat actor techniques, tactics and procedures
• Excellent written and verbal communication skills
• Ability to juggle multiple work efforts in a fast-paced environment and to be able to quickly change direction as needed
• Strong influencing skills
• Ability to prioritize conflicting tasks
• Proven experience with Information Security related activities
• Experience in an operations focused information security role
• Experience conducting analysis/investigation and containment of potential data breaches or cyber security incidents
• Familiarity with security vulnerabilities, exploits, malware and digital forensics
• Familiarity with network security vulnerabilities, exploits and attacks
• Familiarity with most operating systems, particularly UNIX and Windows
• Ability to work in a strong team-oriented environment with a sense of urgency and resilience whilst able to work independently
• Ability to work effectively with technical and non-technical business owners
• The candidate should exhibit a firm understanding of the cyber threat landscape.
• The candidate should be knowledgeable of emerging technologies and trends and should be able to identify strategic trends that may impact the bank based on data from a wide variety of sources.
• This person must have an inquisitive mindset and be able to translate raw data into actionable intelligence.
Desired Skills
• Bachelor’s or higher degree desired.
• Advanced degree in International Affairs or similar field a strong plus.
• Technical or information security certifications are also a strong plus.
• Foreign language fluency (Russian/Arabic/Farsi/Chinese/Korean) desired.
• Experience reporting on the cybercriminal threat
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
1st shift (United States of America)משרות נוספות שיכולות לעניין אותך