CTI Platform Specialist managing threat intelligence and cybersecurity operations for the Cyber Fusion Center. Collaborating with internal and external stakeholders to enhance organizational cybersecurity posture.
Responsibilities
Evaluate tools, methodologies, and best practices to effectively understand the tactics, techniques, and procedures (TTPs) utilized by cyber threat actors.
Perform continuous research and collection of information based on our Company’s Intelligence Requirement Framework from open source, vendor collection, and internal tooling to identify threat intel and cyber risks.
Monitor and action open source and vendor data for potential domain abuse, third party cyber incidents, credential/data leakage, dark web and social media malicious indicators, and executive impersonation.
Conduct basic threat hunting within Security Information and Event Management (SIEM) systems and within specific tools for malicious indicators and threat actor TTPs.
Research vulnerabilities and manage vulnerability response and remediation processes in our Company environment.
Support development of visualizations for external stakeholders.
Support data management and development of technical solutions.
Provide briefings to ITRMS stakeholders and ITRMS LT.
Collaborate with internal stakeholders for information sharing.
Participate frequently as team representative during internal daily calls.
Support operational incidents via cyber threat analysis, hunting, and vulnerability management.
Requirements
High School Diploma required
Minimum of 2 years of relevant experience
Experience with cyberthreat intelligence, vulnerability management or malicious threat hunting
Solid technical knowledge of one or more areas cybersecurity areas such as incident response and digital forensics, security engineering, malware analysis, or security operations
Experience working with Threat Intelligence Platform and Collaboration tools
Experience working with extremely large data sets, using tools and scripting languages within Excel, Python, CrowdStrike Logscale, Microsoft Sentinel (KQL), and Power BI
Experience working with LLM models and prompt engineering
Independently delivers complex tasks applying critical thinking and care for detail.
Benefits
medical, dental, vision healthcare and other insurance benefits (for employee and family)
Security Operations Center Analyst managing incidents and security alerts for 7 - Eleven stores. Focusing on in - depth analysis and proactive monitoring within a state - of - the - art Security Operations Center.
Security Operations Manager at Qnity managing physical security programs across global sites. Overseeing operations and collaborating with cross - functional teams to mitigate risk and maintain secure facilities.
SOC Analyst monitoring security events and responding to incidents at Junglee Games. Collaborating on security protocols to ensure protection of digital assets.
Senior Director of Global Security Operations at CyrusOne strategizing and managing security across global data centers. Driving execution, governance, and operational excellence in a high - availability environment.
Cybersecurity generalist at PwC providing security solutions and maintaining the protection of client systems. Involves monitoring security alerts, incident response, and collaboration with stakeholders.
Security Operations Manager overseeing safety measures for corporate office locations and events at Whatnot. Responsible for developing security frameworks and managing vendor relationships across global operations.
Manager overseeing technical security operations for the Protection Services department. Responsible for managing security systems, staff training, and interdepartmental collaboration.
Principal in Security Monitoring Response at Mastercard managing global crises and resilience operations. Leading incident response efforts and ensuring the safety of people and assets.
SOC Analyst II providing real time security monitoring and threat hunting services for clients in various industries. Assisting in identifying security incidents and managing vulnerabilities.