Should have hands on experience in various OSINT tools o Should be able to perform with dark and deep web scans
Should have experience in deployment/management of various tools pertaining
Threat Intelligence including MISP, Recorded Future etc
Should have basic understanding vulnerability scanning solutions
Must possess intermediate level of Cyber Security threats and various attack vectors
Roles
Use various intelligence collection and reporting tools and frameworks to create customized threat Intelligence reports
Publish, present, and explain the reports to relevant stakeholders
Collect, process, catalog, and document information using an all-source approach and various technical and human means on cyber-security topics as required based on defined intelligence requirements.
Development of various tactical and strategic intelligence products including advisories and threat landscape reports
Maintain a deep understanding of threat actor groups, campaigns and tactics, techniques, and procedures.
Act as an escalation point for CTI analysis and investigation-related events.
Work with members of various teams, such as incident response and security monitoring, to carry out joint investigations or other threat management functions.
Identifies gaps in available intelligence information and engages with leadership on strategies to meet intelligence requirements through Intelligence collection processes.
Aid in and participate in daily, weekly, quarterly, and yearly production reporting for clients, partners, and internal teams.
Q1.While working late at night, you figure out that the data available with you has something missing. You've been working on the data for the ... read more
Q2.Without the help of internet help me calculate the no. of white cars sold in Mumbai every year. Not the method as to how you calculate the f... read more
Q3."A woman came to the market to sell eggs. The first customer bought half of her eggs and a half of an egg. The second customer bought half o... read more