Job Openings Threat Landscape Analyst | Urgent | Hybrid | Pasay

About the job Threat Landscape Analyst | Urgent | Hybrid | Pasay

Qualifications:

  • College Graduate; Preferred, not a priority - BS equivalent in computer science, information systems, or cyber intelligence
  • 6 months to 1 year experience in Technical Writing, Threat Analysis, and Threat Landscape
  • Must have a familiarity with MITRE ATT&CK framework; is able to associate MITRE IDs relevant to a cyber event
  • Must have a familiarity with OSINT research (Open-Source Intelligence)
  • Preferred, not a priority - familiar with using JIRA
  • Preferably with Scripting knowledge
  • Excellent English language skills, both in writing and communication
  • Is significantly keen on details
  • Proficiency with Google Docs and Google Sheets
  • Has strong analytical skills; can accurately interpret raw data and put that into technical writing
  • Possesses sufficient or advanced knowledge about cyber threats (malware, phishing, trojans, botnets, etc.) and the cyber threat landscape (e.g. a ransomware attack targeted a specific company)
  • Possess sufficient knowledge about software vulnerabilities (CVEs) and associated threats (zero-day exploits, malicious exploitation, proof-of-concept exploit codes)
  • Possesses sufficient or advanced knowledge about cybersecurity and protecting against cyber threats
  • Is able to create logical assessments, on-point recommendations, and a thorough outlook about a cyber event (e.g. able to identify or describe the so what is related to the event)
  • Is able to thrive in a collaborative environment
  • Independent and has a curious approach to research
  • Strong discipline with time management
  • Preferred, not a priority - experience with generative artificial intelligence
  • Adaptive, open to change
  • Can handle tight deadlines in terms of report delivery
  • Amenable to work on a Mid Shift schedule (Possible Weekend Coverage)
  • Amenable to work on a hybrid setup (2-4x RTO/month) in MOA, Pasay

About the Role

Basic Function:

This position is responsible for the creation of finished intelligence reports and analyst notes.

Specific Duties and Responsibilities:

  • Prepare weekly, monthly, and quarterly client-specific finished intelligence reports
  • Analyze client-specific data to determine potential threats to a client or client infrastructure
  • Summarize findings from client-specific data to clearly and concisely communicate a level of threat to a client or client infrastructure
  • Identify open-source information and data relevant to a client's priority intelligence requirements, and summarize the information and data for inclusion in a client report
  • Discover cyber threat events/ stories to be covered in the Weekly Threat Landscape, and monitor existing suggestions to track which industries need additional research
  • Use the client's tool to validate information based on what was identified through open-source research; accurately interpret the results and create logical assessments or an outlook of the incident
  • Conduct research cyber threat events/stories, including open source research as well as research using the client's tool dataset, to provide actionable and relevant intelligence to clients to help them better protect themselves against cyber threats
  • Create Analyst Notes from previously published Weekly Threat Landscape stories
  • Collaborate with the Data Science team to curate entities that are referenced in reports
  • Monitor and remain up-to-date about recent cyber trends and events