ONLY 10+ YEARS PROFILES

Job Title: NYC3 Senior Cyber Threat Analyst
Location:  New York,NY,10038
Duration: 26 Months Months
Due Date : 24/05/2021

*SCOPE OF SERVICES*

The senior analyst will conduct cyber investigations and provide direct
operational and intelligence support to network defenders.

*TASKS:*

• Support incident response efforts with tactically relevant guidance for
triaging and forensic analysis as well as analyze and trend previous
incident case data

• Provide relevant, timely, and accurate threat intelligence support to
network defenders at NYC3

• Scope, direct, and assist intelligence-lead hunt missions in coordination
with appropriate groups

• Lead the collection, processing, analysis, and dissemination of raw and
finished intelligence to City of New York stakeholders

• Manage operations and improvement of the finished intelligence platform

• Develop and capture strategic intelligence requirements for stakeholders
across the City of New York

• Conduct quality assurance for strategic analysis and reporting

• Create and document detailed standard operating procedures and playbooks

• Develop and maintain relationships with various external communities
including SLTT, vendors, ISACS, etc.

• Actively research and track geo-political trends, threat actors, malware,
and campaigns

• Conduct structured analytic technique exercises

*MANDATORY SKILLS/EXPERIENCE*

• Minimum 8 years of experience in Threat Management/Cyber Threat
Intelligence/Incident Response environment

• Strong understanding of cybersecurity and risk management concepts

• Proficient with all-source intelligence collection and processing -
OSINT, Feeds, Tools, Vendor, Partner, Deep Web, etc.

*DESIRABLE SKILLS/EXPERIENCE: *

• Excellent verbal and written communication skills

• Previous experience briefing both technical and executive audiences

• Experience tracking and monitoring changes in geo-political events,
malware, phishing campaigns, actor TTPs, etc.

• Previous experience vetting intelligence partners and data sources

• Experience capturing and actioning strategic intelligence requirements
across a large organization

• Prior experience as a threat intelligence practitioner with a strong
understanding of intelligence lifecycle management

• In-depth knowledge of the cyber threat landscape and how to apply
attacker motivation, capability and intent to an organizational threat
landscape

• Strong working knowledge administering Threat Intelligence Platforms and
integrating with Security Appliances, Security Tools, and SIEM solutions

• Ability to translate raw data into actionable intelligence

• Experience performing security assessments and detecting forensic
artifacts on host and network-based systems

• Strong knowledge of how malware functions and how vulnerabilities are
exploited - ability to apply necessary courses of action

-- 
You received this message because you are subscribed to the Google Groups 
"Android Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/android-discuss/CABexGQF%3Dh9qWk6DwWuH8UdcANfNfmdRNffkRwB4m6oS4-b8T6A%40mail.gmail.com.

Reply via email to