Threat Intelligence Lead I - Cyber Security

9 - 12 years

5 Lacs

Posted:5 days ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

Role Proficiency:

Manage a team of Threat Intelligence analysts who oversee delivering the hands-on service to customers and and act as an incident manager with highly technical skills during escalated cyber incidents. Responsible for developing the service to meet market standards. Develop forensic methodologies and dictate the threat hunting methodology to align with the changing cyber landscape and lead the forensic and proactive hunting disciplines into the most advanced techniques in the market. Develop the analysts' technical skills. Effectively communicate with stakeholder. Study the market and help expand the TI service.

Outcomes:

  1. Stay on top of cyber security news from the clear deep and dark web daily. Pay attention to industry news security threats outside of their network and the intentions of potentially threatening entities.
  2. Mentor the team on best practice workflows and procedures to achieve their full potential and to increase level of security posture of customers.
  3. Solve complex forensics and hunting issues being escalated by team members and be the highest escalation point for all Operations teams.
  4. Define processes and workflows to optimize the work of the CTI analysts.
  5. Ensure documentation included in ThreatConnect/ CDC as predefined / agreed standards. Learn from review process for continuous improvement.
  6. Communicate and report appropriately as per defined process.
  7. Improve and automate response and hunting processes to increase efficiency of the services.
  8. Engage with sales teams to drive potential customers to purchase the services and increase CyberProof's margin goals
  9. Constantly strive to upgrade team workflows.

Measures of Outcomes:

  1. CTI weekly recommendations tuning the hunting query etc.
  2. Number of threat intelligence finished reports including threat landscape and asset-based intelligence delivered by the analysts
  3. Customer satisfaction - upsells new customers customer engagement.
  4. Evidence of skill development including training certification etc.
  5. Ideas suggested that will help innovation and optimization of processes.
  6. Increased productivity and efficiency of the service by focusing on automating activities.

Outputs Expected:

Collection:

  1. Working with OSINT sources.
  2. Using WEBINT techniques to collect and enrich intelligence data.
  3. Develop and maintain deep web sources.


Processing and analysis:

  1. Analyse the threat data into a finished report
    including technical recommendationsMITRE ATT&CK mappingand valid IOCs.
  2. Complete documentation including annotation in ThreatConnect / CDC to ensure audit trail as per defined standards and quality requirements.
  3. In accordance with the defined process
    ensure that the defined reports are created and published to stakeholders. Continuous Learninginnovation and optimization
  4. Ensure completion of analysts learning programs.
  5. Innovate new processes and workflows to deploy proactivity in all aspects to address complex threats and risks.


Communicate with stakeholder:

  1. Effectively communicate with customers to deliver timely and accurate Threat Intelligence.
  2. Communicate with other teams to collaborate in the development of the Threat Intelligence service and the other offerings of the company.
  3. Present finished intelligence to team members
    managementand clients.


Learning and Development:

  1. Continuously learn new technologies and stay updated on cyber threats.
  2. Create innovative research reports (global trends
    cross clientscollaboration with other teams in the company).
  3. Develop the analysts' technical skills


Sales and service development:

  1. Understand the sales cycle and contribute to increase sales.
  2. Understand product development and influence on its design.
  3. Assist with Marketing efforts to showcase our Intelligence and research
  4. Actively help develop new services

Skill Examples:

  1. User level skills in use of CDC ThreatConnect Sixgill IntSights VT Premium.
  2. Ability to manage incidents and collaborating several team activities in parallel streams to handle incident holistically.
  3. Excellent logical problem-solving ability and analytical skills for intelligence processing and analysis.
  4. Good time management skills Great oral and written communication skills.
  5. Presentation skills
  6. Sales skills to increase the uptake of services
  7. Designing skills for product development
  8. Programming languages such as Python and PowerShell
  9. Data analytics tools - SQL BI reports

Knowledge Examples:

Knowledge Examples

  1. Understanding of cybersecurity threat landscape and a deep understanding of computer intrusion activities incident response techniques tools and procedures.
  2. Understanding of enterprise IT Infrastructure including Networks OS Databases Web Applications etc.
  3. Deep and proven knowledge in baseline operating system internals network communications and user behavior.
  4. Thorough knowledge of digital forensics methodology as well as security architecture system administration and networking (including TCP/IP DNS HTTP SMTP)
  5. Experience conducting research in the areas of WEBINT OSINT social media platforms and virtual HUMINT.
  6. Experience with security assessment tools such as NMAP Netcat Nessus and Metasploit is a plus.
  7. Desirable - Training / Certification in Ethical Hacking etc.

Additional Comments:

Requirements: To be successful in this role, you should meet the following requirements: - 5+ years of technical experience in IT or IT Security, for example as a network or operating system administrator. - Expert level knowledge and demonstrated experience of common log management suites, Security Information and Event Management (SIEM), EDR, Email Protection, Case Management & other cyber security tools. - Expert level knowledge and demonstrated experience of common cybersecurity technologies such as IDS / IPS / HIPS, Advanced Anti-malware prevention and analysis, Firewalls, Proxies, MSS, etc. - Good knowledge and technical experience of 3rd party cloud computing platforms such as AWS, Azure, and Google. - Good knowledge and demonstrated experience of common operating systems and platforms to include Windows, Linux, UNIX, Oracle, Citrix, GSX Server, iOS, OSX, etc. - Good knowledge of common network protocols such as TCP, UDP, DNS, DHCP, IPSEC, HTTP, etc. and network protocol analysis suits. - Functional knowledge of scripting, programming and/or development of bespoke tooling or solutions to solve unique problems. - Good knowledge of key information risk management and security related standards including OWASP, ISO2700x series, PCI DSS, GLBA, EU data security and privacy acts, FFIEC guidelines and NIST standards - Good knowledge and demonstrated experience in incident response tools, techniques and process for effective threat containment, mitigation, and remediation. - Formal education and advanced degree in Computer Science or similar and/or commensurate demonstrated work experience in the same. - CEH, EnCE, SANS GSEC, GCIH, GCIA CISSP or any similar Certifications.

Required Skills

Cyber Security,Anti Malware,Firewall,Proxies

Mock Interview

Practice Video Interview with JobPe AI

Start IT Security Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Python Skills

Practice Python coding challenges to boost your skills

Start Practicing Python Now
UST logo
UST

IT Services and IT Consulting

Aliso Viejo CA

RecommendedJobs for You

Hyderabad, Pune