The successful candidate will report to the Director of Threat Intelligence and be responsible for the collection, collation, and analysis of internal incident data and external data in order to inform eSentire customers on the trends in the Threat Landscape and provide a clear picture of the emerging risks. The successful candidate will work collaboratively within the team, to support in producing written technical analytical assessments, malware blogs, and security advisories with the outcome of improved capabilities to disrupt cybercrime. This is a technical, hands-on role, for a person who enjoys solving complex problems and collaborating across business units. Along with strong open-source analysis skills and keen technical writing skills, a successful candidate should be methodical and apply creative thinking, with the capacity to push conventional boundaries, aiming to deliver state-of-the-art cybersecurity protection services.
Responsibilities
Apply your knowledge and experience in open-source analysis to collect, collate and provide clarity on the actual risks emerging and present in the Threat Landscape.
Work collaboratively with the team to automate data collection/processing where possible.
Produce tactical, operational, and strategic level intelligence products that include analysis of cyber threats and actors in support of the team objectives as well as overall cyber security and network defense operations.
Use a threat intelligence platform (TIP) on a daily basis to centralize all new collected threat intelligence
The Director of Threat Intelligence will assign other duties if required.
Time Allocation
50% Intelligence Processing and Reporting (TRU + Blogs Reports)
Minimum of 3 years experience in an analytic role such as intrusion detection, network forensics analyst, open-source analyst, intelligence analyst or technical writer.
Experience in writing technical reports from incidents in an operational environment such as SOC, CSIRT, CERT.
Excellent written and verbal communication skills.
Desired Skills
Experience in an Open-Source intelligence collection methods and demonstrates ability to pivot with data across various Open-Source platforms.
Experience with Threat Intelligence Platforms and Open Source tools such as MISP, ThreatConnect, Anomali, DomainTools, Recorded Future, Flare, CyberSixGill, Shodan, Censys Binary Edge.
Ability to convey complex technical content to a tactical, operational, and strategic audience.
Experience with public speaking at conferences and tradeshows, and technical writing.
Familiarity with incident lifecycle and reporting.
Familiarity with MITRE s ATTCK framework.
SANS Certifications are considered an asset (GCTI, GCIH, GCFA)