Enable job alerts via email!

Cyber Threat Intelligence Specialist

360 Adept, LLC

Georgia

On-site

USD 70,000 - 90,000

Full time

17 days ago

Job summary

A cybersecurity firm in Georgia is seeking a professional to analyze, report, and provide intelligence on cyber threats. Responsibilities include tracking threats, producing comprehensive reports for various stakeholders, and conducting threat hunting. Candidates should possess a Bachelor's degree in a related field or equivalent experience, along with relevant certifications like GIAC Cyber Threat Intelligence. This role requires strong analytical and research skills.

Qualifications

  • Bachelor's Degree in a relevant field or equivalent work experience of 5 or more years.
  • Must possess GIAC Cyber Threat Intelligence certification.

Responsibilities

  • Track, research, analyze and provide threat intelligence reporting on cyber threats.
  • Produce timely intelligence analysis and reporting on cyber threats.
  • Analyze external technical and non-technical data to build threat actor profiles.

Skills

Cyber threat analysis
Research skills
Analytical judgement
Threat hunting

Education

Bachelor's Degree in Computer Information or Information Technology
5+ years of relevant work experience

Tools

GIAC Cyber Threat Intelligence (GCTI)
Job description
Overview

Tracks, researches, analyzes and provides threat intelligence reporting on cyber threats targeting the organization; or produces relevant, accurate, and timely intelligence analysis and reporting that indicates the “who, what, when, where, why, how, and importance” of cyber threats, utilizing the intelligence life cycle, analytical judgement, legal and ethical parameters of intelligence collections; possess an understanding of cyber threats from espionage, hacktivism, cybercrime, malware, social engineering, geo-political influence, nation state and non-state actors, established and emerging intrusion sets and their relevance to an entity with a global footprint; produces a variety of threat intelligence reporting for stakeholders ranging from the C-Level to technical Incident Response Analysts; leverages the threat intelligence lifecycle and priority intelligence requirements to track threat actors, research cyber threats, conduct analysis and create threat intelligence reporting to support internal customers; produces a variety of intelligence reporting from technical audiences to the executive level; analyzes external technical and non-technical data from various intelligence sources (paid, open and closed) to build threat actor profiles and track threat actor activities both externally and internally; researches new and emerging vulnerabilities, threat actor’s tactics, techniques, and procedures, and conducts threat hunting within COH environment for the presence of related activity; prepares and delivers intelligence briefs to a variety of audiences.

Responsibilities
  • Track, research, analyze and provide threat intelligence reporting on cyber threats targeting the organization.
  • Produce relevant, accurate, and timely intelligence analysis and reporting that indicates the who, what, when, where, why, how, and importance of cyber threats, using the intelligence life cycle and ethical parameters.
  • Understand cyber threats from espionage, hacktivism, cybercrime, malware, social engineering, geo-political influence, nation-state and non-state actors, and both established and emerging intrusion sets and their relevance to a globally footprinted entity.
  • Produce threat intelligence reporting for stakeholders ranging from C-Level to technical Incident Response Analysts.
  • Leverage the threat intelligence lifecycle and priority intelligence requirements to track threat actors, research cyber threats, conduct analysis and create threat intelligence reporting to support internal customers.
  • Provide threat intelligence reporting for audiences from technical to executive levels.
  • Analyze external technical and non-technical data from various intelligence sources (paid, open and closed) to build threat actor profiles and track actor activities externally and internally.
  • Research new and emerging vulnerabilities, threat actors’ tactics, techniques, and procedures, and conduct threat hunting within COH environment for related activity.
  • Prepare and deliver intelligence briefs to a variety of audiences.
Qualifications
  • Education: Bachelor's Degree in Computer Information or Information Technology, Cybersecurity or Information Assurance or equivalent work experience of 5 or more years.
  • Certifications: GIAC Cyber Threat Intelligence (GCTI)
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.