19 Sep
Cyber Fusion Managed Services Threat Intelligence Analy
Vacancy expired!
- APTs-Focused, works within an interdisciplinary team that develops advanced analytical frameworks, tools and research methodologies in order to identify emerging cyber threats
- Collect information used to analyze the political, economic, social, and behavioral aspects of malicious cyber activity
- Contribute to cyber threat intelligence products for our clients
- Research and monitor underground forums, chat channels, and, social media, the identification and analysis of security incidents using open source and internal sources to assess severity and identify responsible parties, including hacktivist groups and actors
- Assist in producing a comprehensive operating picture and cyber security situational awareness
- Work with various intelligence collection and reporting tools and frameworks to produce reports
- Collect, process, catalog, and document information using an ALL-SOURCE approach and various technical and human means on cyber-security topics as required based on defined intelligence requirements
- Respond to requests for ad-hoc reporting and research topics from management and analysts as required
- Identify gaps in available intelligence information and engage with leadership on strategies to meet intelligence requirements through Intelligence collection processes
- Quickly understand and deliver on company and customer requirements
- Deal professionally with potentially offensive, profane, and obscene materials encountered during the course of investigations and research
- Aid in and participate in daily, weekly, quarterly, and yearly production reporting for clients, partners, and internal teams
- Adhere to internal operational security and other Deloitte policies
- Bachelor's degree or higher in Threat Intelligence, Information Security, Information Technology, Computer Science, Math, or any other related area
- 2+ years of experience working in cyber intelligence, information security, incident response, red team operations, reverse engineering, or other technical cyber security roles
- Extensive knowledge of Advanced Persistent Threats (APT) tactics, technics and procedures
- Understanding of possible attack activities such as network probing/scanning, DDOS, malicious code activity, etc.
- Understanding of basic networking protocols such as TCP/IP, DNS, HTTP
- Outstanding written and oral communication skills and the ability to prioritize work
- Good understanding of global geopolitical dynamics and the ability to apply that knowledge to an information security context
- Proven ability to understand and explain the behaviors of different types of complex organizations, from APT groups to clients
- Proven ability to translate complex information sets into specific recommendations that can be actioned by customers to enhance their security posture
- Familiarity with cyber threats, defenses, motivations and techniques
- Experience with intelligence analysis tools, methods and the intelligence lifecycle
- Experience distilling raw information into actionable and finished intelligence
- Ability to write analytical information products
- Ability to construct and analyze social network graphs
- Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future
- Outstanding written and oral communication skills and the ability to prioritize work
- Knowledge of foreign languages is a plus (Russian, Farsi, Arabic, Mandarin, Korean)
- Strong understanding of threat analysis and enterprise level, mitigation strategies
- Working knowledge of how malicious code operates and how technical vulnerabilities are exploited
- Knowledge of operating systems and networking technologies in general
- Knowledge of databases, query design, and how to analyze data thus obtained
- Knowledge of toolsets such as Confluence, Jira
- Excellent interpersonal and organizational skills
- Excellent oral and written communication skills
- Strong analytical and problem-solving skills
- Self-motivated to improve knowledge and skills
- A strong desire to understand the what as well as the why and the how of security incidents
Vacancy expired!