Job Openings Threat Intelligence Analyst (Hybrid)

About the job Threat Intelligence Analyst (Hybrid)

Qualifications:

  • College Graduate; Preferred, not a priority - BS equivalent in computer science, information systems, or cyber intelligence
  • 6 months to 1 year experience in Technical Writing, Threat Analysis, and Threat Landscape
  • Must have a familiarity with MITRE ATT&CK framework; is able to associate MITRE IDs relevant to a cyber event
  • Must have a familiarity with OSINT research (Open-Source Intelligence)
  • Preferred, not a priority - familiar with using JIRA
  • Preferably with Scripting knowledge
  • Excellent English language skills, both in writing and communication
  • Possesses sufficient or advanced knowledge about cyber threats (malware, phishing, trojans, botnets, etc.) and the cyber threat landscape (e.g. a ransomware attack targeted a specific company)
  • Possess sufficient knowledge about software vulnerabilities (CVEs) and associated threats (zero-day exploits, malicious exploitation, proof-of-concept exploit codes)
  • Amenable to work on a Mid Shift schedule (Possible Weekend Coverage)
  • Amenable to work on a hybrid setup (2-4x RTO/month) in MOA, Pasay

Specific Duties and Responsibilities:

  • Conduct thorough research on cyber threat events found in open-source intelligence (OSINT) or through the client's tool to be covered in the production Validated Intelligence Event (VIEs) notes. Research should cover trending cyberattacks and specific topics within the cyber threat landscape (such as ransomware, phishing attacks, exploitation of software vulnerabilities, etc.)
  • Produce VIE notes, referencing and/or analyzing content found from research conducted through OSINT.
  • Implement technical writing style during the creation of VIE notes, ensuring that the information conveyed adheres to our target audience (professionals, executives, fairly technical readers)
  • Identify the primary elements involved in relevant cyber events, such as the threat actor, malware, indicators of compromise (IOCs), and tactics, techniques, and procedures (TTPs)
  • Map the appropriate MITRE ATT&CK identifiers associated with the topics covered as part of VIE note production
  • Collaborate with peer Threat Intelligence Analysts (TIAs) in the Philippines and Boston team as part of the overall process of producing, analyzing, and publishing VIE notes
  • Publish VIE notes to the client's tool, and map the necessary entities (e.g. malware, threat actors, TTPs, MITRE ATT&CK IDs, etc.)
  • Collaborate with Data Science to curate new entities (such as malware, threat actor/s, CVEs, etc.) for added intelligence on the client's tool

Why Apply?

  • Hybrid Work Set-up
  • Equipment provided
  • HMO Coverage
  • Work-life Balance
  • Engagement Activities
  • Telecommunication Allowance for Team Leaders and Up
  • Performance-based Bonuses (Quarterly)
  • For work onsite days, the office is located near transport terminals (Mall of Asia)