Follow up with the major adversary groups targeting the enterprise in term of motivation, tools and methods to be updated with resent threats and risks
Identify and classify cyber threats facing the organization, map the adversary's objective to which the bank's assets that are likely to be targeted and translate which cyber threats are possible against the bank's environment and prioritize based on impact and likelihood to maintain the security posture
Review daily cyber threat intelligence reports and feeds to identify latest and emerging threats to use it in the Use case design
Update and maintain the threat actor library, cyber threat scenarios, Security Information & Event Management (SIEM) detect use cases and playbooks to reflect current and predicted threat landscape to ensure the effectiveness of the analyst team
Use Kill Chain methodology to identify where in the security apparatus to apply a customized rule to prevent potential attack
Understand the "crown jewels" of the organization as well as the security protection controls (tools and processes) implemented within the enterprise to recommend the proper detection and protection plan
Follow all relevant department policies, processes, standard operating procedures and instructions so that work is carried out in a controlled and consistent manner
Follow the day-to-day operations related to own jobs in the department to ensure continuity of work
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.