Contact Details:
1.Sandeep Bisane
Email:
Cell: (732)
2.Pio Dhivagar
Email:
Cell: (732)
3.Saravanan Ganesan
Email:
Cell: (732)
Job Title: Senior Cyber Security Threat Analyst Location: Brooklyn NY
Duration: 24 Months
Years of Experience: 12 Yrs.
Required Hours/Week: 35hrs./Week
Duties and Responsibilities:
- Support incident response efforts with tactically relevant guidance for triaging and forensic analysis as well as analyze and trend previous incident case data.
- Provide relevant timely and accurate threat intelligence support to network defenders at NYC3Scope direct and assist intelligencelead hunt missions in coordination with appropriate groups.
- Lead the collection processing analysis and dissemination of raw and finished intelligence to City of New York stakeholders.
- Manage operations and improvement of the finished intelligence platform.
- Develop and capture strategic intelligence requirements for stakeholders across the City of New York.
- Conduct quality assurance for strategic analysis and reporting.
- Create and document detailed standard operating procedures and playbooks
- Develop and maintain relationships with various external communities including SLTT vendors ISACS etc. Actively research and track geopolitical trends threat actors malware and campaigns. Conduct structured analytic technique exercises
Mandatory Qualifications:
- Minimum 8 years of experience in Threat Management/Cyber Threat Intelligence/Incident Response environment
- Strong understanding of cybersecurity and risk management concepts
- Proficient with allsource intelligence collection and processing OSINT Intel Feeds Tools Vendor Partner Deep Web etc.
Skills and Experience:
- Excellent verbal and written communication skills
- Previous experience briefing both technical and executive audiences
- Experience tracking and monitoring changes in geopolitical events malware phishing campaigns actor TTPs etc.
- Previous experience vetting intelligence partners and data sources
- Experience capturing and actioning strategic intelligence requirements across a large organization
- Prior experience as a threat intelligence practitioner with a strong understanding of intelligence lifecycle management
- Indepth knowledge of the cyber threat landscape and how to apply attacker motivation capability and intent to an organizational threat landscape
- Strong working knowledge administering Threat Intelligence Platforms and integrating with Security Appliances Security Tools and SIEM solutions
- Ability to translate raw data into actionable intelligence
- Experience performing security assessments and detecting forensic artifacts on host and networkbased systems
- Strong knowledge of how malware functions and how vulnerabilities are exploited ability to apply necessary courses of action