Finding the best job has never been easier
Share
Job Description:
Job Description:
Role Responsibilities:
The position of Cyber Threat Intelligence Technical Analyst is responsible for collecting, analyzing, and actioning cyber threat intelligence to defend the Bank. The Cyber Threat Intelligence Technical Analyst also will be tasked with and collaborating with defensive control owners, threat research, and incident response to track and defend against emerging threat tactics, techniques, and procedures. The Cyber Threat Intelligence Technical Analyst requires strategic thinking with a strong background in cyber security, threat intelligence, and leadership.
Required Skills:
5+ years of experience in Cyber Threat Intelligence
Experience collecting, analyzing, and actioning Threat Intelligence
Must demonstrate extensive knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups, and both state and non-state sponsored threat actors
Ability to apply Cyber Threat Intelligence through enrichment, correlation, and attribution
Ability to provide expert guidance on threat trends, analysis methods, and defensive strategies to senior management and key stakeholders
Strong experience with offensive security tactics, techniques, and procedures (DDoS, Malware, Phishing, Vulnerabilities, etc.)
Strong technical experience performing OSINT investigations
Must demonstrate knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups, and both state and non-state sponsored threat actors
Technical experience with Threat Intelligence tools such as Passive DNS, Network Flow Analysis, Maltego, Virus Total, URLScan, etc.
Ability to analyze threats and distill common Indicators of Attack and Indicators of Compromise
Technical experience with defensive tools for actioning threat intelligence including tools like SIEM/Splunk, EDR, Big Data Platforms, etc.
Deep experience working with industry-wide frameworks and standards like MITRE ATT&CK
Ability to navigate and work effectively across a complex, geographically dispersed organization
Experience with threat intelligence vendors and platforms
Previous experience performing threat intelligence and incident response on major security incidents
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
These jobs might be a good fit