The point where experts and best companies meet
Share
Able to dismantle threat intelligence, use data analysis and cutting-edge security technologies to perform threat actor based investigations, create new detection methodologies, and provide expert support to incident response and monitoring functions where need be.The role will require developing hunts, translating them into an iterative process, and deploying them in various tool sets including, but not limited, to EDRs
Conduct cyber threat modeling to improve detection & mitigation, collaborate virtually with stakeholders at various levels across the organization. Define priority intelligence requirements and answer these with open source monitoring and detection rules. Disseminate intelligence and execute collection plans, participate in Cyber Intelligence Preparation of the Battlefield (IPB) exercises and prepare and brief CISO leadership on current cyber threat landscape.Required Technical and Professional Expertise
Recognize, research and analyze various threat actor groups/attack patterns, tactics, techniques and procedures (TTPs). Analyze threats across the enterprise by combining security rules, context, policy and relevant datasets. Demonstrate systems thinking; synthesize and communicate complex topics (such as threat intelligence through the intelligence process).
Able to dismantle threat intelligence, use data analysis and cutting-edge security technologies to perform threat actor based investigations, create new detection methodologies, and provide expert support to incident response and monitoring functions where need be.The role will require developing hunts, translating them into an iterative process, and deploying them in various tool sets including, but not limited, to EDRs
Conduct cyber threat modeling to improve detection & mitigation, collaborate virtually with stakeholders at various levels across the organization. Define priority intelligence requirements and answer these with open source monitoring and detection rules. Disseminate intelligence and execute collection plans, participate in Cyber Intelligence Preparation of the Battlefield (IPB) exercises and prepare and brief CISO leadership on current cyber threat landscape.
Preferred Technical and Professional Expertise
These jobs might be a good fit