Cyber Threat Intelligence Technical Analyst
|Reference # :||21-00561||Title :||Cyber Threat Intelligence Technical Analyst|
|Location :||New York, NY|
|Position Type :||Right to Hire|
|Experience Level :||Start Date / End Date :||04/30/2021 / 10/30/2021|
Our client, a leading global financial services company, has approximately 200 million customer accounts and does business in more than 140 countries. They provide consumers, corporations, governments and institutions with financial products and services, including consumer banking and credit, corporate and investment banking, securities brokerage, transaction services, and wealth management.
Right to hire
The Cyber Threat Intelligence Technical Analyst will conduct reverse engineering, perform original research, and generate technical enrichment to support tactical, operational, and strategic reporting. The successful candidate will be able to identify and analyze long and short-term cyber threats potentially impacting Client and its clients and will disseminate this information to Client's cyber security teams. Staff members are responsible for cyber threat analysis and reporting tasks performed on a daily basis as well as internal and external partnership functions.
-Supports CIC and Cyber Security Fusion Center (CSFC) requests and investigations.
-Interacts daily with globally-located Client CIC and CSFC Center staff members
-Actively monitors and researches cyber threats with a direct or indirect impact to the Client brand and examines associated tools, techniques, and procedures (TTP) to reconstruct attacker workflows
-Reverse engineers malware and analyzes reports to correlate and contextualize threat data. Maps threats to the Mitre Telecommunication&CK framework and communicates effective mitigation procedures where appropriate.
-Expands research and information scope using common enrichment platforms (e.g. VirusTotal, PassiveTotal)
-Produces actionable tactical and operational cyber threat intelligence products using a variety of internal and external sources that describe trends and shifts in the cyber threat landscape. Briefs key stakeholders on your conclusions.
-Maintains technical proficiency in the use of tools, techniques and countermeasures. Evaluates tools, services and processes to enhance the team's threat analysis capability.
-Has 3+ years of experience working in a cyber-threat intelligence or analysis function or information security function including but not limited to network operations, threat hunting, malware analysis, forensics, or incident response.
-Ability to discern patterns of threat actor behavior at the technical level by leveraging multiple resources. Deep understanding of threat actor capabilities, motivations, and tool sets to assess risk.
-Must possess strong writing, and critical thinking/analysis skills.
-Must be a self-starter, self-motivated and able to work independently with little oversight in a fast-paced, operationally-focused environment.
-Technical certifications abilities including GIAC's GREM and/or GCFA is a plus.
-Scripting/programming experience (Python, C, C++, Java, etc.) is a plus.
-Maintains an understanding of the threat intelligence lifecycle.
-Previous work in financial industry a plus.
Please see our complete list of jobs at: