Finding the best job has never been easier
Share
Key Responsibilities:
The Intelligence Analyst role is part of the SOC team and will be responsible for analyzing curating and publishing threat intelligence. Handling and optimizing threat intelligence as well as the integrations between the threat intelligence platform, tools and other security technologies and systems to detect prioritize and mitigate the risk of cybersecurity related incidents. Perform collection analysis and distribution of threat intelligence from multiple sources and prepare intelligence products including high-quality papers, assessments briefings, recommendations, and findings. This position works together with the SoC Manager. Must have a general knowledge with regulatory and privacy laws.
Responsibilities:
• Responsible for knowing the major adversary groups targeting the enterprise in terms of Motivation, Tools and Methods
• Identify and classify cyber threats facing the organization, map the adversary’s objective to which company assets that are likely to be targeted and translate which cyber threats are possible against the company’s environment and prioritize based on impact and likelihood
• Review daily cyber threat intelligence reports and feeds to identify latest and emerging threats
• Update and maintain the threat actor library, cyber threat scenarios, SIEM detect use cases and playbooks to reflect current and predicted threat landscape
• Utilize Kill Chain, and MITRE ATT&CK methodologies to identify where in the security apparatus to apply a customized rule to prevent the attack
• Understand the “crown jewels” of clients as well as the security protection controls (tools and processes) implemented within the enterprise
• Perform Gap Analysis to determine whether adversary’s methods to achieve objective (company asset) will be able to circumvent company controls
• Submit change control to apply customized rules to prevent attacks
• Hunt for existence of compromise in the environment based on IOCs and TTPs`
• Publish Situational Awareness alerts (i.e., nonactionable intelligence) to Intelligence
Publications
• Review and analyze external threat intelligence feeds (industry feeds and security partners)
• Define and update the SoC Architecture strategy together with the SoC Manager
• Responsible for advising client stakeholders on information security matters, coaching other
members of staff, and conducting technical tabletop exercises
• Evaluate SIEM, and big data integrated log sources and collected security events to
extend/add, with the aim to maintain actionable use cases effectiveness to detect new for new threats and risks. Develop and maintain SIEM data source strategy, quality, and priorities.
• Maintain and deliver response procedures aligned with deployed use cases, as well as the overall SOC operational processes, runbooks, and communication plan
• Responsible for the response automation and orchestration design
• Collection of data feeds including vulnerability scans, threat feeds, penetration testing, attack surface, threat landscape
• Collect and analyze internal logging, patching, and vulnerability information from relevant groups
• Malware and patch advisory analysis
• Research adversary, threat, campaign, malware and testing methodologies
• Collect indicators, signatures, trends and insights from Data Collection, Monitoring,
Investigation and Security Tools Configuration Teams
• Provide high level risk analysis advisement and recommendations for major and highly publicized events
Required Technical and Professional Expertise
Preferred Technical and Professional Expertise
These jobs might be a good fit