Job Description:
• Integrate open-source intelligence (OSINT) into analytic workflows, leveraging multiple enrichment sources to build a complete cyber threat picture.
• Author rapid tactical and strategic intelligence products for customers based on unique analytical findings.
• Conduct independent research and accelerated analysis to enhance the depth and breadth of our collective threat intelligence knowledge.
• Harness unique data holdings, including product telemetry and Incident Response (IR) data, to cluster threat activity, and produce and communicate valuable threat intelligence insights.
• Proactively collaborate and exchange information with other research and product teams to build joint capabilities and accomplish shared objectives.
• Continuously update threat actor, industry, region, and malware profiles based on ongoing analysis.
• Integrate AI and machine learning solutions across the intelligence lifecycle to improve analytic workflows, reduce research toil, and accelerate report creation.
Requirements:
• 10-12 years of experience in cyber threat intelligence, threat hunting, or a combination of technical and strategic analysis.
• Expert-level experience in Cyber Threat Intelligence, including actionable knowledge of adversary groups, TTPs, malware analysis, and hunting methodologies.
• Expert-level ability to extract intelligence from technical data sources (e.g., malware, netflow, internet scan data).
• Strong understanding of the cyber threat landscape with the ability to contextualize adversary advancements and new campaigns.
• Bachelor’s Degree in a relevant field or equivalent military experience.
• Strong writing and presentation skills with the ability to communicate complex threat intelligence to diverse audiences.
Benefits:
• A description of our employee benefits may be found here.