Transition Specialist – Threat Intelligence

7 - 10 years

0 Lacs

Posted:1 month ago| Platform: Linkedin logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

Responsibilities


  • Transition Management: - Lead the transition processes for the Threat Intelligence Platform, ensuring minimal disruption to ongoing operations.
  • Advisory Services: - Provide expert advisory services on threat intelligence strategies and best practices to internal and external stakeholders.
  • Integration: - Oversee the integration of new threat intelligence tools and technologies into the existing infrastructure.
  • Training and Support: - Develop and deliver training programs for team members and clients to enhance their understanding and usage of threat intelligence platforms.
  • Collaboration: - Work closely with cross-functional teams to ensure alignment and effective communication throughout the transition process.
  • Performance Monitoring: - Monitor the performance and effectiveness of the threat intelligence platform, identifying areas for improvement and implementing necessary changes.
  • Monitoring and Analysis of cybersecurity events, incidents, vulnerability reports from multiple sources.
  • Proactively monitor and analyze the cyber threat landscape to assess risk and applicability to the firm.
  • Review and analyze data from various sources such as OSINT/Darknet/TECHINT.
  • Work closely with Internal Research team to identify customer-specific threats.
  • Create customer-specific analytical reports based upon identified findings.
  • Create regular Security Trend reporting utilizing information from Internal threat repository.
  • Work with customer SPOC to understand customer threat landscape and tailor customized delivery.
  • Monitors analyze and report cybersecurity events.
  • Analyze information regarding intrusion events, Security incidents and other threat indications and early-warning functions.
  • Follow best practices of operational security to safeguard sources and methods.
  • Engage external communities to share and contribute to threat intelligence exchange activities.

Qualifications

  • Hand-on experience on Rapid7/Recorded Future/Cyble/Zerofox/Anomaly tools.
  • Proficiency in threat intelligence tools and platforms, as well as a strong understanding of cybersecurity principles. Good Understanding of Cyber Threat Intelligence.
  • Able to create high-quality Security Analysis reports.
  • Ability to understand and analyze various threat vectors effectively.
  • Should have knowledge of cyber threats, malware, APTs, exploits etc.
  • Familiarity with the DarkNet, DeepWeb, open-source, social media, and other sources of cyber-criminal activity.
  • Must be interested to learn new technologies and skills.
  • Experience in SOC environment will be a plus.
  • Any experience in Threat Hunting will be a plus.
  • Programming/scripting knowledge would be add-on.

Desired Experience: 7 to 10 years

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now
Live Connections logo
Live Connections

Telecommunications

Tech City

RecommendedJobs for You