CTI Platform Specialist managing threat intelligence and cybersecurity operations for the Cyber Fusion Center. Collaborating with internal and external stakeholders to enhance organizational cybersecurity posture.
Responsibilities
Evaluate tools, methodologies, and best practices to effectively understand the tactics, techniques, and procedures (TTPs) utilized by cyber threat actors.
Perform continuous research and collection of information based on our Company’s Intelligence Requirement Framework from open source, vendor collection, and internal tooling to identify threat intel and cyber risks.
Monitor and action open source and vendor data for potential domain abuse, third party cyber incidents, credential/data leakage, dark web and social media malicious indicators, and executive impersonation.
Conduct basic threat hunting within Security Information and Event Management (SIEM) systems and within specific tools for malicious indicators and threat actor TTPs.
Research vulnerabilities and manage vulnerability response and remediation processes in our Company environment.
Support development of visualizations for external stakeholders.
Support data management and development of technical solutions.
Provide briefings to ITRMS stakeholders and ITRMS LT.
Collaborate with internal stakeholders for information sharing.
Participate frequently as team representative during internal daily calls.
Support operational incidents via cyber threat analysis, hunting, and vulnerability management.
Requirements
High School Diploma required
Minimum of 2 years of relevant experience
Experience with cyberthreat intelligence, vulnerability management or malicious threat hunting
Solid technical knowledge of one or more areas cybersecurity areas such as incident response and digital forensics, security engineering, malware analysis, or security operations
Experience working with Threat Intelligence Platform and Collaboration tools
Experience working with extremely large data sets, using tools and scripting languages within Excel, Python, CrowdStrike Logscale, Microsoft Sentinel (KQL), and Power BI
Experience working with LLM models and prompt engineering
Independently delivers complex tasks applying critical thinking and care for detail.
Benefits
medical, dental, vision healthcare and other insurance benefits (for employee and family)
Cybersecurity Operations Director leading cybersecurity managed services operations at a global accounting firm. Overseeing teams, driving growth, and serving as an advisor to clients.
Security Operations Analyst responsible for developing security processes and incident response. Collaborating with multiple teams for security best practices in a hybrid work environment.
Security Manager leading IAM and SecOps at fintech solutions provider in Brazil. Developing and implementing information security programs aligned with best practices and compliance requirements.
Security Engineer enhancing cybersecurity tools and solutions for The Walt Disney Company. Performing system analyses and developing security configurations for improved protection against cyber threats.
Security Operations Lead responsible for security operations aligning with policies and compliance. Handling incident response, vulnerability management, and supporting IT teams with security expertise.
Cyber Security Specialist protecting digital estate from threats at the University of Edinburgh. Focused on identifying and mitigating cyber risks while supporting teaching and research services.
Cybersecurity Incident Response Analyst detecting and responding to cyber threats at NOV. Collaborating using AI tools to enhance cybersecurity operations across IT, cloud, and OT environments.
Lead Specialist in Security Operations, enhancing detection engineering and incident response at Pearson. Collaborate with teams and drive process improvements in a high - paced environment.