Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailNot Disclosed
Salary Not Disclosed
1 Vacancy
The Threat Intelligence Analyst will perform the functions outlined below:
Conduct thorough research on cyber threat events found in opensource intelligence (OSINT) or through the Recorded Future Intelligence Cloud to be covered in the production Validated Intelligence Event (VIEs) notes. Research should cover trending cyberattacks and specific topics within the cyber threat landscape (such as ransomware phishing attacks exploitation of software vulnerabilities etc.)
Produce VIE notes referencing and/or analyzing content found from research conducted through OSINT
Implement technical writing style during the creation of VIE notes ensuring that the information conveyed adheres to our target audience (professionals executives fairly technical readers)
Identify the primary elements involved in a relevant cyber events such as the threat actor malware indicators of compromise (IOCs) and tactics techniques and procedures (TTPs)
Map the appropriate MITRE ATT&CK identifiers associated with the topics covered as part of VIE note production
Collaborate with peer Threat Intelligence Analysts (TIAs) in the Philippines and Boston team as part of the overall process of producing analyzing and publishing VIE notes
Publish VIE notes to the Recorded Future Intelligence Cloud and mapping the necessary entities (e.g. malware threat actors TTPs MITRE ATT&CK IDs etc.)
Collaborate with Data Science to curate new entities (such as malware threat actor/s CVEs etc.) for added intelligence on the Recorded Future Intelligence Cloud.
Skills and Qualifications
Threat Intelligence Analyst
One (1) year professional experience in the cybersecurity/cyberthreat landscape
At least two years professional experience in cyberrelated research and technical writing
B.S. equivalent in computer science information systems information technology (IT) or cyber intelligence
Adeptness in cybersecurity and data protection
Technical proficiency in cyber threat intelligence and threat Intelligence platforms
Is able to thrive in a collaborative fastpaced environment
Excellent Englishlanguage skills both in writing and communication
Excellent English language grammar skills
Excellent reading comprehension skills
Strong verbal communication in English
Is significantly keen to details
Familiarity with OSINT research (OpenSource Intelligence)
Independent and has curious approach to research
Has strong analytical skills; can accurately interpret raw data and put that into technical writing
Possesses sufficient or advanced knowledge about cyber threats (malware phishing trojans botnets etc.) and the cyber threat landscape (e.g. a ransomware attack targeted a specific company)
Possess sufficient knowledge about software vulnerabilities (CVEs) and associated threats (zero day exploits malicious exploitation proofofconcept exploit codes)
Possesses sufficient or advanced knowledge about cybersecurity and protecting against cyber threats
Has sufficient knowledge (or is familiar) about the MITRE ATT&CK framework; is able to associate and/or map MITRE IDs relevant to a cyber event
Proficiency with Google Docs and Google Sheets
Preferred but not required familiar with JIRA
Has strong and disciplined time management
Desired proficiency in at least cyber security and the cyber threat landscape
Regularly updated about recent cyber trends and events
Full Time