CTI Platform Specialist managing threat intelligence and cybersecurity operations for the Cyber Fusion Center. Collaborating with internal and external stakeholders to enhance organizational cybersecurity posture.
Responsibilities
Evaluate tools, methodologies, and best practices to effectively understand the tactics, techniques, and procedures (TTPs) utilized by cyber threat actors.
Perform continuous research and collection of information based on our Company’s Intelligence Requirement Framework from open source, vendor collection, and internal tooling to identify threat intel and cyber risks.
Monitor and action open source and vendor data for potential domain abuse, third party cyber incidents, credential/data leakage, dark web and social media malicious indicators, and executive impersonation.
Conduct basic threat hunting within Security Information and Event Management (SIEM) systems and within specific tools for malicious indicators and threat actor TTPs.
Research vulnerabilities and manage vulnerability response and remediation processes in our Company environment.
Support development of visualizations for external stakeholders.
Support data management and development of technical solutions.
Provide briefings to ITRMS stakeholders and ITRMS LT.
Collaborate with internal stakeholders for information sharing.
Participate frequently as team representative during internal daily calls.
Support operational incidents via cyber threat analysis, hunting, and vulnerability management.
Requirements
High School Diploma required
Minimum of 2 years of relevant experience
Experience with cyberthreat intelligence, vulnerability management or malicious threat hunting
Solid technical knowledge of one or more areas cybersecurity areas such as incident response and digital forensics, security engineering, malware analysis, or security operations
Experience working with Threat Intelligence Platform and Collaboration tools
Experience working with extremely large data sets, using tools and scripting languages within Excel, Python, CrowdStrike Logscale, Microsoft Sentinel (KQL), and Power BI
Experience working with LLM models and prompt engineering
Independently delivers complex tasks applying critical thinking and care for detail.
Benefits
medical, dental, vision healthcare and other insurance benefits (for employee and family)
Security Operations Intern responsible for security monitoring at Paddy Power Betfair. Involves data loss prevention investigations and content filtering analysis with a commitment to improving security posture.
SOC Analyst L2 responsible for managing and analyzing security incidents in digital transformation. Contributing directly to the protection of companies and infrastructures.
Senior Manager leading global IT security operations to protect company data and assets at Keenova. Overseeing incident response, monitoring, and cybersecurity capabilities with strategic oversight.
Security Operations Center leader at Woven by Toyota, managing triage and response to security alerts in Japan. Collaborating with global SOCs to ensure 24/7 operations.
GSOC Analyst responsible for security operations at Paramount Studios. Developing workflows, incident response, and risk monitoring in a dynamic team environment.
Security Operations Analyst at Orion Health focusing on monitoring and maintaining security tools while collaborating with teams. Engaging with real - world threats and enhancing operational security processes.
Senior Global Security Analyst overseeing physical security operations at Dolby’s San Francisco headquarters. Collaborating with global partners to strengthen safety systems across Dolby locations.