Join a global organization in the financial services sector, and aid with improving and optimizing their threat intelligence initiatives, as part of their global team dealing with intelligence, understanding threats and putting together the processes, tools and techniques to better secure the organization and its activities.
More details available – reach out for a full conversation and details on the role, the team, the organization and overall environment!
Some of the responsibilities and requirements for the Threat Intelligence Specialist role:
- Assess how intel and threat data is being used and put to work in the organization, including how the available data is properly utilized and integrated into security detection and response. Identify TI processes, link to high level objectives and their effectiveness,
- Work with various stakeholders in threat intel, security and other internal and external teams, using the assessment of how threat intelligence data is utilized, integrated and leveraged as part of the overall security initiatives of the organization.
- Analyze the requirements, and linked processes (data collection, analysis part, and detection and response connection), as well as current threat intel integrations and how they can be improved. This includes optimization and automation where possible.
- Assess current tools, including the CTI platform, in terms of usage and how it fits with the requirements and if it’s the best solution for current and future requirements. Compare with other available TIP solutions, and help with process of moving to a new platform or continuing and improving the current platform utilization.
- Identify opportunities of other integration and collaboration with other MDR related tooling and processes.
- Bring experience from working in similar complex, large environments, utilizing experience and understanding of threat intelligence cycle, intelligence frameworks (ATT&CK, Kill Chain), threat intelligence platform solutions, excellent assessment skills and bringing improvement / optimization of processes, integrations and creating proper documentation where needed.
- Utilize excellent communication skills to work with diverse, international, distributed teams.
Interested in this project or similar security roles? Let’s connect and have a conversation!
Relevant terms: CTI, Threat Analysis, Detection, Incident Response, MDR, Threat Intelligence, Forensics, Threat Hunting, Threat Model, Threat Actor, TTPs, Cyber Kill Chain, Unified Kill Chain, SOC, Security Data Lake, SIEM, IDS, IPS, Network Security, System Security, Application Security, AWS, Azure, Cloud Security, Splunk, Security Orchestration and Response, Rapid 7 Phantom, Containers, Docker, Kubernetes, Python, Bash, Shell, Information Security, Infosec, Security Research, ATPs, Ransomware, Malware, Phishing, Vulnerabilities, Exploits, OSINT, C2, CSIRT, CERT,Open Source Intelligence, STIX, TAXII, ISAC, ISAO, Mitre CRITs, CIF,GOSINT, MANTIS, MISP, MineMeld, Yeti, ThreatStream, Eclectic IQ, LookingGlass, ThreatConnect, OTX, ThreatExchange, X-Force Exchange
Base Cyber Security helps organizations build knowledge and capabilities in information security. Supporting organizations putting together strong infosec teams or finding the right cyber security experts for their needs is a big part of that.
We work with security professionals globally for information and cyber security roles and projects across all industries in Europe. Whether you are starting your career in information security, need advice for your next step, deciding on how to build knowledge or choose a growth area in security to continue with, let’s have a conversation!
If you have not yet registered with the Base Cyber Security network, be sure to do so! Send us your details at [email protected] & follow us on Twitter @BaseCyberSec to stay up to date with our activities and relevant info.
By registering with the security community and / or showing interest in a specific role, project or team, you agree with sharing your personal information with Base Cyber Security, which will in turn collect, use and process this in an ethical, private and compliant (including under the GDPR where applicable) manner.
To apply for this job email your details to email@example.com