We are seeking a highly experienced Senior Threat Intel Analyst to join our team. The ideal candidate should have at least 8 years of relevant experience in threat intelligence analysis, with a strong focus on threat modeling, reporting, maintaining threat feeds, and threat lifecycle management. The successful candidate will possess exceptional technical skills and a deep understanding of the threat landscape.
Responsibilities:
Conduct threat modeling to identify potential vulnerabilities, attack vectors, and potential adversaries.
Produce high-quality reports on adversary activities, management-level briefings, strategic analysis, and vulnerability reporting.
Maintain and update threat feeds, ensuring their accuracy, relevancy, and timeliness.
Manage the entire threat lifecycle, from detection and analysis to response and mitigation.
Collaborate with cross-functional teams to provide intelligence-driven recommendations for improving security posture.
Stay up to date with the latest threat intelligence trends, tools, and techniques.
Technical Skills:
Minimum of 8 years of experience in threat intelligence analysis or a related field.
Mandiant: Possess advanced proficiency in utilizing Mandiant\'s threat intelligence products and services for analysis and investigations.
Anomali: Demonstrated expertise in using Anomali ThreatStream for threat intelligence collection, correlation, and analysis.
Crowdstrike: Extensive experience in leveraging the Crowdstrike Falcon platform for threat hunting, incident response, and malware analysis.
Zerofox: Proficient in utilizing Zerofox\'s social media threat intelligence platform to identify and mitigate risks associated with social media platforms.
RiskIQ: Strong familiarity with RiskIQ\'s digital threat intelligence tools for external threat detection, brand protection, and vulnerability management.
Open Source Feeds: In-depth knowledge of leveraging open-source intelligence (OSINT) feeds for gathering relevant threat intelligence.
MISP, STIX TAXII: Experience working with MISP (Malware Information Sharing Platform) and STIX TAXII (Structured Threat Information eXpression and Trusted Automated eXchange of Indicator Information) for threat intelligence sharing and collaboration.
Tenable VM: Proficient in utilizing Tenable Vulnerability Management (VM) solutions for vulnerability assessment, scanning, and prioritization.