ONLY 10+ YEARS PROFILES Job Title: NYC3 Senior Cyber Threat Analyst Location: New York,NY,10038 Duration: 26 Months Months Due Date : 24/05/2021
*SCOPE OF SERVICES* The senior analyst will conduct cyber investigations and provide direct operational and intelligence support to network defenders. *TASKS:* • Support incident response efforts with tactically relevant guidance for triaging and forensic analysis as well as analyze and trend previous incident case data • Provide relevant, timely, and accurate threat intelligence support to network defenders at NYC3 • Scope, direct, and assist intelligence-lead hunt missions in coordination with appropriate groups • Lead the collection, processing, analysis, and dissemination of raw and finished intelligence to City of New York stakeholders • Manage operations and improvement of the finished intelligence platform • Develop and capture strategic intelligence requirements for stakeholders across the City of New York • Conduct quality assurance for strategic analysis and reporting • Create and document detailed standard operating procedures and playbooks • Develop and maintain relationships with various external communities including SLTT, vendors, ISACS, etc. • Actively research and track geo-political trends, threat actors, malware, and campaigns • Conduct structured analytic technique exercises *MANDATORY SKILLS/EXPERIENCE* • Minimum 8 years of experience in Threat Management/Cyber Threat Intelligence/Incident Response environment • Strong understanding of cybersecurity and risk management concepts • Proficient with all-source intelligence collection and processing - OSINT, Feeds, Tools, Vendor, Partner, Deep Web, etc. *DESIRABLE SKILLS/EXPERIENCE: * • Excellent verbal and written communication skills • Previous experience briefing both technical and executive audiences • Experience tracking and monitoring changes in geo-political events, malware, phishing campaigns, actor TTPs, etc. • Previous experience vetting intelligence partners and data sources • Experience capturing and actioning strategic intelligence requirements across a large organization • Prior experience as a threat intelligence practitioner with a strong understanding of intelligence lifecycle management • In-depth knowledge of the cyber threat landscape and how to apply attacker motivation, capability and intent to an organizational threat landscape • Strong working knowledge administering Threat Intelligence Platforms and integrating with Security Appliances, Security Tools, and SIEM solutions • Ability to translate raw data into actionable intelligence • Experience performing security assessments and detecting forensic artifacts on host and network-based systems • Strong knowledge of how malware functions and how vulnerabilities are exploited - ability to apply necessary courses of action -- You received this message because you are subscribed to the Google Groups "Android Discuss" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/android-discuss/CABexGQF%3Dh9qWk6DwWuH8UdcANfNfmdRNffkRwB4m6oS4-b8T6A%40mail.gmail.com.
