Analyst, Threat Intelligence

Sorry, this job was removed at 09:11 p.m. (CST) on Wednesday, Aug 21, 2024
Be an Early Applicant
Hyderabad, Telangana
3-5 Years Experience
Cybersecurity
The Role

SUMMARY

The Threat intelligence (TI) analyst is a self-motivated, independent, and critical thinker skilled in the application of threat intelligence for the enablement of a stakeholders’ network security. The qualified individual will address threat intelligence requirements and leverage Arete’s unique data to produce threat intelligence products such as briefings, threat actor profiles, flash reports, and technical reports.

The TI analyst will conduct research with a focus on dark web and open-source data to develop high quality assessments for both internal and external stakeholders. The Threat Intelligence Analyst will support the broader Threat Intelligence team by leveraging a solid foundation of technical knowledge of Cybersecurity, CTI, Dark Web, or Incident response and Digital Forensics (DFIR) to successfully execute responsibilities.

ROLES & RESPONSIBILITIES

  • Conduct dark web research by using knowledge of deep/dark web infrastructure, along with third party resources to formulate hypothesis on the cybercrime ecosystem such as initial access broker (IAB) activity, profiling ransomware affiliates, and more.
  • Track cyber-crime and advanced persistent threats and report on their tools, techniques, and procedures (TTPs) of attacker’s motivations, industry, and attacker trends.
  • Assist in the analysis and production of client-facing intelligence products including email updates, briefing material, requests for information (RFIs), and other client requirements.
  • Share meaningful insights about the context of an organization’s threat environment that improve its risk management posture. 
  • Produce briefing material, written products, and graphics to convey analysis, both verbally and in writing, to a variety of audiences.
  • Support client engagements by maintaining an understanding of networking principals, and how adversaries could exploit network related issues.
  • Correlate threat intelligence to identify relevant threat activity and trends.
  • Analyze the origins, pathways, and methodologies of malicious cyber activities to attribute, model and predict future intrusions.
  • Contribute to the development and enhancement of threat intelligence tools, technologies, and processes to improve automation, data analysis, intelligence sharing, and service offerings.
  • Collect accurate technical information from client concerning the engagement to include, but not limited to, search terms, security incidents, client’s environment, size, and technologies in place.
  • expertise, and sound analytical principals to drive forward client engagements.
  • Appropriately manage expectations, and communicate roadblocks, to maintain stakeholder satisfaction throughout the intelligence process.
  • Effectively supports clients in multiple regions and timezones, including providing high quality support to clients in the United State and India.
  • May perform other duties as assigned by management.

SKILLS & KNOWLEDGE

  • Strong background and practical hands-on experience with Cyber Threat Intelligence concepts.
  • Knowledge of ransomware groups with the ability to explain the current ransomware-as-a-service (RaaS) ecosystem, cybercriminal communications, IABs, and hypothesize on upcoming shifts within the threat landscape.
  • Ability to work effectively in a fast-paced, dynamic environment and prioritize tasks to meet deadlines.
  • Ability to correlate threat intelligence from the industry or region to observed activity impacting the customer.
  • Knowledge of Cyber Threat Intelligence (CTI) frameworks like STIX, MITRE ATT&CK, the Lockheed Martin Cyber Kill Chain, or the Diamond Model.
  • Previous experience with threat intelligence platforms such as ThreatConnect, MISP, or OpenCTI.
  • Ability to work under a minimal supervision environment maintaining high quality analytical production and excellent relationship with stakeholders.
  • Adaptable and willing to learn new technologies.

Core Competencies

The Arete Threat Intelligence maps the core competencies required for the role to the U.S. National Initiative for Cybersecurity Careers and Studies (NICCS) Workforce Framework for Cybersecurity (NICE Framework) to aide in identifying applicable abilities, knowledge, skills, and appropriate supporting training.

  • S0218: Skill in evaluating information for reliability, validity, and relevance.
  • A0072: Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes.
  • T0290: Determine tactics, techniques, and procedures (TTPs) for intrusion sets.
  • K0001: Knowledge of computer networking concepts and protocols, and network security methodologies.
  • K0002: Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • K0177: Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • K0362: Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).
  • K0444: Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP).
  • K0516: Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.
  • K0565: Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.
  • S0194: Skill in conducting non-attributable research.
  • S0196: Skill in conducting research using deep web.
  • S0256: Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships.
  • T0617: Conduct nodal analysis.
  • T0708: Identify threat tactics, and methodologies.

JOB REQUIREMENTS

  • 2-5 years of proven experience in cyber threat intelligence analysis, incident response, or a related field.
  • Strong written and verbal communication skills, with the ability to present technical information to both technical and non-technical stakeholders.
  • Experience taking non-traditional and creative approaches to solving problems and having the ability to quickly adapt as needed.
  • Experience in using threat intelligence platforms and tools such as MISP, OpenCTI, etc.

DISCLAIMER

The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. 

WORK ENVIRONMENT

While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodations may be made to enable people with disabilities to perform the essential functions of this job.

PHYSICAL DEMANDS

  • No physical exertion required.
  • Travel within or outside of state.
  • Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects.

TERMS OF EMPLOYMENT

Salary and benefits shall be paid consistent with Arete salary and benefit policy.

FLSA OVERTIME CATEGORY

Job is exempt from the overtime provisions of the Fair Labor Standards Act.

Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry.
 
 
When you join Arete…
You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters.
Equal Employment Opportunity
We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better.

The Company
HQ: Boca Raton, FL
389 Employees
On-site Workplace
Year Founded: 2015

What We Do

Arete is a global cyber risk company whose mission is to transform the way organizations prepare for, respond to, and prevent cybercrime. We are leaders in the cyber incident response business, having worked on thousands of matters since our inception in 2016. When clients engage Arete, they gain access to the world’s leading cybersecurity professionals — anywhere in the world — within hours, not days. We also work with organizations after a cyberattack to harden their systems and controls to help prevent future disruption.

We often partner with insurance carriers and their legal counsel in response to cyber insurance claims and are proud to work closely with these firms who are on the frontlines of keeping businesses and local governments up and running after cyberattacks.

We are a highly data-driven organization that uses the data we collect and the information we curate not only to improve outcomes for our clients but also inform new models and approaches for cyber risk mitigation and underwriting. We believe in the concept of “collective defense” of our economy, infrastructure, and livelihoods against cybercrime and actively work with law enforcement, government entities, and industry consortia to share our findings and best practices.

At Arete, we share a common passion, with uncompromising integrity in all that we do, to help our clients impacted by emerging issues in cybercrime. Through our rapid response and technical expertise, we have significantly reduced the financial impact and business interruption attributed to cyberattacks.

Jobs at Similar Companies

MacPaw Logo MacPaw

Senior UX Designer (R&D stage)

Information Technology • Security • Software • Cybersecurity • App development • Data Privacy
Remote
Hybrid
Kyiv, Kiev, UKR
550 Employees

Coro Logo Coro

Marketing Operations Manager

Artificial Intelligence • Cloud • Information Technology • Security • Software • Cybersecurity • Data Privacy
Hybrid
Chicago, IL, USA
286 Employees

Silverfort Logo Silverfort

Sales Operations Analyst

Information Technology • Sales • Security • Cybersecurity • Automation
Remote
United States
357 Employees

Similar Companies Hiring

Coro Thumbnail
Software • Security • Information Technology • Data Privacy • Cybersecurity • Cloud • Artificial Intelligence
Chicago, IL
286 Employees
MacPaw Thumbnail
Software • Security • Information Technology • Data Privacy • Cybersecurity • App development
Cambridge, MA
550 Employees
Silverfort Thumbnail
Security • Sales • Information Technology • Cybersecurity • Automation
US
357 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account