Aktiviere Job-Benachrichtigungen per E-Mail!

Threat Intelligence Analyst

Next Ventures

Frankfurt

Remote

EUR 60.000 - 80.000

Vollzeit

Vor 13 Tagen

Erhöhe deine Chancen auf ein Interview

Erstelle einen auf die Position zugeschnittenen Lebenslauf, um deine Erfolgsquote zu erhöhen.

Zusammenfassung

A leading company seeking a Cyber Threat Intelligence Analyst with expertise in threat collection and analysis. You will utilize various frameworks and tools to generate actionable intelligence reports, collaborating with teams on threat response. This contract position offers flexibility, requiring remote work with occasional meetings in Frankfurt.

Qualifikationen

  • Relevant certifications in Cyber Threat Intelligence, such as GCTI, GOSI, CTIA.
  • Experience in threat data collection (2+ years).
  • Proficiency with frameworks like MITRE ATT&CK and Cyber Kill Chain.

Aufgaben

  • Collect and process cyber threat data from various sources.
  • Analyze and enrich information for actionable threat intelligence.
  • Develop and disseminate intelligence reports in varied formats.

Kenntnisse

Threat data collection and analysis
Cyber threat intelligence frameworks
Problem-solving
Collaboration

Ausbildung

GCTI, GOSI, CTIA certifications or equivalent

Tools

MISP
CRITs
Anomali
RecordedFuture
Maltego
VirusTotal
Splunk
IBM QRadar
Palo Alto XSOAR

Jobbeschreibung

Summary Description:
Cyber Threat Intelligence Analyst, specializing in the collection, processing, analysis, and dissemination of cyber threat intelligence. The role involves working with various frameworks, tools, and platforms to deliver actionable intelligence for the organization.

Role Type:Contract - 6months + ext

Start Date:Immediate

Salary:Day Rate + travel Expenses

Location/Language:
Remote - 5 days a month in Frankfurt/ [English]

Requirements Description:

  • Relevant certifications (e.g., GCTI, GOSI, CTIA) or equivalent in Cyber Threat Intelligence.
  • Experience in threat data collection, enrichment, and analysis.
  • Proficiency with cyber threat intelligence frameworks like MITRE ATT&CK, Cyber Kill Chain, and Diamond Model.
  • Hands-on experience with Collaborative Platforms (MISP, CRITs), Threat Intelligence Platforms (Anomali, RecordedFuture, CybelAngel), and Investigation tools (Maltego, VirusTotal, etc.).
  • Experience with SIEM and SOAR tools (e.g., Splunk, IBM QRadar, Palo Alto XSOAR).

Tasks Description:

  • Collect and process cyber threat data from various sources.
  • Analyze and enrich the collected information to generate actionable threat intelligence.
  • Develop threat intelligence products tailored to different audiences.
  • Disseminate intelligence reports and findings in various formats (e.g., dashboards, documents).
  • Use structured analytic techniques for identifying trends and providing threat assessments.
  • Collaborate with teams for threat analysis and incident response.

Essential Skills/Experience Description:

  • Strong understanding of the Cyber Kill Chain, MITRE ATT&CK Framework, and Diamond Model.
  • Proficiency in using commercial threat intelligence platforms (Anomali, RecordedFuture) and open-source intelligence tools (e.g., MISP, CRITs).
  • Experience with Intelligence Analyst Investigation tools (Maltego, VirusTotal, ThreatQuotient, etc.).
  • Familiarity with SIEM platforms like Splunk and IBM QRadar, and SOAR platforms such as Palo Alto XSOAR.
  • Ability to synthesize and deliver clear and actionable intelligence.

Desirable Skills/Additional Information Description:

  • Experience in managing and distributing IoCs (Indicators of Compromise).
  • Knowledge of automated threat intelligence platforms.
  • Previous work in high-pressure environments with tight deadlines.
  • Familiarity with incident response processes and working with security operations teams.

Team Contact:jude.russell@next-ventures.com

Hol dir deinen kostenlosen, vertraulichen Lebenslauf-Check.
eine PDF-, DOC-, DOCX-, ODT- oder PAGES-Datei bis zu 5 MB per Drag & Drop ablegen.