Proactively monitor and analyze the cyber threat landscape to assess risk and applicability to the firm.
Research, model and analyze and prioritize emerging adversarial tactics, techniques, and procedures (TTPs) and their likelihood and impact to the firm.
Consume and evaluate threat intel to understand the evolving threat landscape, adversarial tactics, techniques, and procedures (TTPs), and areas of concern/targeting that could potentially impact our environment.
Create threat intelligence reports with thorough and accurate analysis leveraging a variety of open-sources and commercial tools.
Engage with other functions to provide specialized knowledge and requirements to influence threat mitigation strategies.
Manage and consolidate cyber threat knowledge based on industry-level frameworks and provide curated adversarial cyber intel and threat briefings to stakeholders.
Provide IT security SME knowledge and support during applicable IT security incidents to enable effective mitigation and remediation efforts.
Support investigations related to phishing, malware, and DDoS campaigns, among others.
Engage external communities to share and contribute to threat intelligence exchange activities.
ideally combined experience in cyber threat intelligence, threat research-oriented or cyber investigations role.
good understanding of cybersecurity organization practices, operations risk management processes and principles, cyber defense models, emerging threats, and vulnerabilities.
detailed knowledge and technical understanding of the global cyber threat landscape, and the tactics, techniques, and procedures (TTPs) used by adversaries, especially those related to the financial sector.
knowledge of threat modeling frameworks, such as cyber kill chains or the MITRE ATT&CK™ framework and expertise in mapping procedural intelligence of threats to TTPs.
experience conducting investigations and analysis of phishing and malware campaigns.
strong verbal/written communication skills, with the ability to present reports to both technical and non-technical audiences.
expertise in data management, data analysis and development of analysis models.
familiarity with network, endpoint controls and technology stack.
ability to translate external and internal data collected by the cyber defense functions into relevant risk indicators and metrics to be ingested into adversarial threat analysis and prioritization models.
experience building relevant dashboards summarizing complex threat management data to senior management.
experience with scripting and programming languages may be beneficial/preferable but not essential.
certifications such as GSEC, GCTI, GREM, CISSP or OSCP are desirable but not essential.