• Full Time
  • Permanent
  • MOA, Pasay
  • 40k Php / Month

Threat Intelligence Analyst

DUTIES and RESPONSIBILITIES:

  • The Threat Intelligence Analyst will perform the functions outlined below:
  • Conduct thorough research on cyber threat events found in open-source intelligence (OSINT)
    or through the Recorded Future Intelligence Cloud to be covered in the production Validated
    Intelligence Event (VIEs) notes. Research should cover trending cyberattacks and specific topics
    within the cyber threat landscape (such as ransomware, phishing attacks, exploitation of software
    vulnerabilities, etc.)
  • Produce VIE notes, referencing and/or analyzing content found from research conducted
    through OSINT
  • Implement technical writing style during the creation of VIE notes, ensuring that the information
    conveyed adheres to our target audience (professionals, executives, fairly technical readers)
  • Identify the primary elements involved in a relevant cyber events, such as the threat actor,
    malware, indicators of compromise (IOCs), and tactics, techniques, and procedures (TTPs)
  • Map the appropriate MITRE ATT&CK identifiers associated with the topics covered as part of
    VIE note production
  • Collaborate with peer Threat Intelligence Analysts (TIAs) in the Philippines and Boston team as
    part of the overall process of producing, analyzing, and publishing VIE notes
  • Publish VIE notes to the Recorded Future Intelligence Cloud, and mapping the necessary
    entities (e.g. malware, threat actors, TTPs, MITRE ATT&CK IDs, etc.)
  • Collaborate with Data Science to curate new entities (such as malware, threat actor/s, CVEs,
    etc.) for added intelligence on the Recorded Future Intelligence Cloud.
    QUALIFICATIONS:
  • One (1) year professional experience in the cybersecurity/cyberthreat landscape
  • At least two years professional experience in cyber-related research and technical writing
  • B.S. equivalent in computer science, information systems, information technology (IT), or cyber
    intelligence
  • Adeptness in cybersecurity and data protectio
  • echnical proficiency in cyber threat intelligence and threat Intelligence platforms
  • Is able to thrive in a collaborative, fast-paced environment
  • Excellent English-language skills, both in writing and communication
  • Excellent English- language grammar skills
  • Excellent reading comprehension skills
  • Strong verbal communication in English
  • Is significantly keen to details
  • Familiarity with OSINT research (Open-Source Intelligence)
  • Independent and has curious approach to research
  • Has strong analytical skills; can accurately interpret raw data and put that into technical writing
  • Possesses sufficient or advanced knowledge about cyber threats (malware, phishing, trojans,
    botnets, etc.) and the cyber threat landscape (e.g. a ransomware attack targeted a specific
    company)
  • Possess sufficient knowledge about software vulnerabilities (CVEs) and associated threats
    (zero day exploits, malicious exploitation, proof-of-concept exploit codes)
  • Possesses sufficient or advanced knowledge about cybersecurity and protecting against cyber
    threats
  • Has sufficient knowledge (or is familiar) about the MITRE ATT&CK framework; is able to
    associate and/or map MITRE IDs relevant to a cyber event
  • Proficiency with Google Docs and Google Sheets
  • Preferred but not required – familiar with JIRA
  • Has strong and disciplined time management
  • Desired proficiency in at least cyber security and the cyber threat landscape
  • Regularly updated about recent cyber trends and events

BENEFITS OFFERED:

  • HMO (with 2 dependents)
  • Performance Bonus
  • SL/VL credits (20

Work Set-up: Hybrid (2-4x a month RTO), Night Shift 

To apply for this job please visit accprointernational.com.