Understanding of malware analysis, hacking tools, and threat actor tactics, techniques and procedures - and be willing to develop this further.
Some experience tracking and understanding threats from: Nation State Threat Actors, Ransomware, Cyber Crime, Extremist Groups and Cyber Terrorists, Hacktivism, Malware, Vulnerabilities, Fraud and Social Engineering Techniques.
Must be proficient with OSINT gathering techniques and dark web monitoring concepts.
Have an up-to-date knowledge of the threat landscape for financial services.
Have a solid understanding of the cyber security risks associated with various technologies and ways to manage them.
Have the skills and ability to investigate security events.
Good level of understanding in the approach threat actors take to attacking a network; phishing, port scanning, web application attacks, DDoS, lateral movement, domain infringement etc.
Strong interpersonal collaborative skills, and the ability to communicate security and risk-related concepts to technical and non-technical audiences.
Must possess the ability to multitask, prioritize, and manage time effectively.
Must have strong attention to detail.
Preferred experience includes:
Strong verbal and written communication skills - this can be developed with support from GCTI leads.
A good working knowledge of various security technologies such as network and application firewalls, host intrusion prevention and anti-virus a benefit.
Knowledge, understanding and experience of applying the intelligence cycle to cyber threat intelligence or similar work - this can be developed with support from GCTI leads.
Understanding of and experience with modern technical security controls and technologies, such as TIP s, SOAR s firewalls, SIEMs, IPS, HIPS, web proxies, etc.
Ability to interpret/ write investigation/detection rules like YARA, SNORT, SIGMA etc.