Threat Intelligence Analyst
DUTIES and RESPONSIBILITIES:
- The Threat Intelligence Analyst will perform the functions outlined below:
- Conduct thorough research on cyber threat events found in open-source intelligence (OSINT)
or through the Recorded Future Intelligence Cloud to be covered in the production Validated
Intelligence Event (VIEs) notes. Research should cover trending cyberattacks and specific topics
within the cyber threat landscape (such as ransomware, phishing attacks, exploitation of software
vulnerabilities, etc.) - Produce VIE notes, referencing and/or analyzing content found from research conducted
through OSINT - Implement technical writing style during the creation of VIE notes, ensuring that the information
conveyed adheres to our target audience (professionals, executives, fairly technical readers) - Identify the primary elements involved in a relevant cyber events, such as the threat actor,
malware, indicators of compromise (IOCs), and tactics, techniques, and procedures (TTPs) - Map the appropriate MITRE ATT&CK identifiers associated with the topics covered as part of
VIE note production - Collaborate with peer Threat Intelligence Analysts (TIAs) in the Philippines and Boston team as
part of the overall process of producing, analyzing, and publishing VIE notes - Publish VIE notes to the Recorded Future Intelligence Cloud, and mapping the necessary
entities (e.g. malware, threat actors, TTPs, MITRE ATT&CK IDs, etc.) - Collaborate with Data Science to curate new entities (such as malware, threat actor/s, CVEs,
etc.) for added intelligence on the Recorded Future Intelligence Cloud.
QUALIFICATIONS: - One (1) year professional experience in the cybersecurity/cyberthreat landscape
- At least two years professional experience in cyber-related research and technical writing
- B.S. equivalent in computer science, information systems, information technology (IT), or cyber
intelligence - Adeptness in cybersecurity and data protectio
- echnical proficiency in cyber threat intelligence and threat Intelligence platforms
- Is able to thrive in a collaborative, fast-paced environment
- Excellent English-language skills, both in writing and communication
- Excellent English- language grammar skills
- Excellent reading comprehension skills
- Strong verbal communication in English
- Is significantly keen to details
- Familiarity with OSINT research (Open-Source Intelligence)
- Independent and has curious approach to research
- Has strong analytical skills; can accurately interpret raw data and put that into technical writing
- Possesses sufficient or advanced knowledge about cyber threats (malware, phishing, trojans,
botnets, etc.) and the cyber threat landscape (e.g. a ransomware attack targeted a specific
company) - Possess sufficient knowledge about software vulnerabilities (CVEs) and associated threats
(zero day exploits, malicious exploitation, proof-of-concept exploit codes) - Possesses sufficient or advanced knowledge about cybersecurity and protecting against cyber
threats - Has sufficient knowledge (or is familiar) about the MITRE ATT&CK framework; is able to
associate and/or map MITRE IDs relevant to a cyber event - Proficiency with Google Docs and Google Sheets
- Preferred but not required – familiar with JIRA
- Has strong and disciplined time management
- Desired proficiency in at least cyber security and the cyber threat landscape
- Regularly updated about recent cyber trends and events
BENEFITS OFFERED:
- HMO (with 2 dependents)
- Performance Bonus
- SL/VL credits (20
Work Set-up: Hybrid (2-4x a month RTO), Night Shift
To apply for this job please visit accprointernational.com.