Cyber Security Specialist TRO Threat Intelligence

6 - 9 years

8 - 11 Lacs

Posted:1 week ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

Experience, education, skills, licensure, or training required: Threat intelligence Key member of the first line of defense threat intelligence team Collect, process, and analyze threat information Manage the relationship with any external providers of threat intelligence Communicate threat intelligence to relevant stakeholders to support evidence-based decision making Support the firm s mission to build client trust and confidence regarding information security generally and threat intelligence specifically Stay abreast of industry best practices in relation to threat intelligence Knowledge of threat intelligence sources and analysis methodologies preferred Knowledge of information security standards (e.g., Cyber Essentials, ISF Standard of Good Practice for Information Security, ISO 27001, NIST Cybersecurity Framework, CIS Top 20 Controls) Maintain awareness of the cyber threat landscape and leverage automation to build better detection capabilities Analyze and validate the feasibility of exploits and their impact to Prime based on the difficulty of development/exploitation Recommend patching priorities and timelines based on proof of concepts (POCs), exploits, and the Nike threat landscape Identify, develop, and maintain access to non-standard intel sourcesWHAT YOU BRING Bachelor s degree in Information Technology, Information Security/Assurance, Engineering, or related field of study Have 6-9years of Cyber Threat Intelligence experience Experience in and understanding cyber threat modeling (eg, STRIDE) to identify potential threats Experience in intelligence frameworks and collaboration platforms (MITRE ATTCK, CAPEC, MISP, Malpedia, STIX) Expertise in honeypots/honeynets, canaries, and other active deception tools to identify network attacks Intimate knowledge about information security threat intelligence and thrive on the details of threat analysis, what s possible and what s not, how to determine what s relevant Excellent written and verbal communication skills required, communicate details in a clear, business relevant manner. Experienced in threat validation, incident response Working level knowledge of the following: Python, C, C , Assembly language (ASM) Comfortable creating YARA rules for hunting purposes Has connections within the cyber threat intelligence community, Customer-oriented focus. Take pride in being diligent and self-driven, ethics and ability to manage sensitive material are unquestionable Experience, education, skills, licensure, or training required:
Threat intelligence Key member of the first line of defense threat intelligence team Collect, process, and analyze threat information Manage the relationship with any external providers of threat intelligence Communicate threat intelligence to relevant stakeholders to support evidence-based decision making Support the firm s mission to build client trust and confidence regarding information security generally and threat intelligence specifically Stay abreast of industry best practices in relation to threat intelligence Knowledge of threat intelligence sources and analysis methodologies preferred Knowledge of information security standards (e.g., Cyber Essentials, ISF Standard of Good Practice for Information Security, ISO 27001, NIST Cybersecurity Framework, CIS Top 20 Controls) Maintain awareness of the cyber threat landscape and leverage automation to build better detection capabilities Analyze and validate the feasibility of exploits and their impact to Prime based on the difficulty of development/exploitation Recommend patching priorities and timelines based on proof of concepts (POCs), exploits, and the Nike threat landscape Identify, develop, and maintain access to non-standard intel sources WHAT YOU BRING Bachelor s degree in Information Technology, Information Security/Assurance, Engineering, or related field of study Have 6-9years of Cyber Threat Intelligence experience Experience in and understanding cyber threat modeling (eg, STRIDE) to identify potential threats Experience in intelligence frameworks and collaboration platforms (MITRE ATTCK, CAPEC, MISP, Malpedia, STIX) Expertise in honeypots/honeynets, canaries, and other active deception tools to identify network attacks Intimate knowledge about information security threat intelligence and thrive on the details of threat analysis, what s possible and what s not, how to determine what s relevant Excellent written and verbal communication skills required, communicate details in a clear, business relevant manner. Experienced in threat validation, incident response Working level knowledge of the following: Python, C, C , Assembly language (ASM) Comfortable creating YARA rules for hunting purposes Has connections within the cyber threat intelligence community, Customer-oriented focus. Take pride in being diligent and self-driven, ethics and ability to manage sensitive material are unquestionable

Mock Interview

Practice Video Interview with JobPe AI

Start Cyber Security Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Python Skills

Practice Python coding challenges to boost your skills

Start Practicing Python Now
Primera Medical Technologies logo
Primera Medical Technologies

Health Technology

Boston

RecommendedJobs for You