popup cross
Threat Intelligence Lead
Contract to hire
salary $ 115,000.00 / Per Year
category Infastructure
created 03/22/2024
end dateCloses: 03/24/2025
location [Malvern, United States ]

Job Info

Status: Closed to New Applicants

Education: University

Degree Title: Graduate

Duration:

Experience: 5 Years

Career Level: Mid Level

No of Jobs: 1

Posted: 03/22/2024

Apply Before: 03/24/2025

Description

Threat Intelligence Team Lead
Our institution is looking for an experienced and motivated Threat Intelligence Team Lead proficient
in delivering strategic and tactical intelligence products to executive management and tactical
operators. As the Threat Intelligence Team Lead, you will play an essential role in defending the
bank against sophisticated cyber threats, by investigating advanced threat actors, conducting
proactive research on emerging threats, and generating assessments to guide decision making at
the highest levels. The Threat Intelligence Lead will make decisions on moderately complex to
complex issues regarding technical approach for project components, and work is to be performed
without direction.
Responsibility
• Generate tailored and actionable products based on analyzed threat campaigns, external
and internal events, and incidents.
• Produce intelligence products at the Strategic, Operational, and Tactical level for audiences
with diverse technological backgrounds.
• Provide accurate and priority driven analysis on cyber activity/threats, and present complex
operational/technical topics to senior managers and stakeholders.
• Generate intelligence reports based on current vulnerabilities identified by the Vulnerability
and Patch Management team.
• Generate presentations that illustrate research through visualizations, charts, graphs,
infographics, and evidence capture for senior leadership.
• Create and evaluate trend/correlation analysis for scenario forecasting at both the tactical
and operational level.
• Review and analyze internal, open source, and dark web datasets to find threat information
and use it to provide value to the bank.
• Develop analytical hypotheses, prove (or disprove) those hypotheses through research;
communicate that information to stakeholders both verbally and in writing.
• Collaborate with technical analysts to provide indications and warnings and contribute to
predictive analysis of malicious activity.
• Apply knowledge of current cyber threats and the associated tactics, techniques, and
procedures used to infiltrate computer networks.
• Establish and maintain excellent working relationships/partnerships with the cyber security
and infrastructure support teams throughout the organization, as well as different business
segments.
• Conduct detailed technical analysis supported by industry accepted threat intelligence
analytical frameworks, tools, and standards.
• Provide expertise and recommend relevant remediation and countermeasures during
incident response efforts.
• Provide input for the development of objectives, key results, and program metrics.
• Collaborate on security risk mitigation methods and compensating controls to help drive
remediation efforts for the business.
• Develop and refine cyber-threat intelligence collection and analysis processes.
• Collect and analyze artifacts including malicious executables, scripts, documents, and packet
captures.
Required Qualifications
• Bachelor’s Degree in Computer Science, Cybersecurity, or similar work experience in a
related field
• 5+ years of cybersecurity experience in operational or tactical cyber threat analysis;
experience can include one or more of the following cyber-security functions: Intrusion
Detection/Prevention, Monitoring, Incident Response, Digital Forensics, Vulnerability
Management
• 2+ years of experience as a technical cyber threat intelligence (or related) subject matter
expert that has worked across organizational boundaries to analyze cyber threats to their
organization’s infrastructure and services.
Preferred Qualifications
• Financial industry experience
• Knowledge of advanced cyber threats, threat vectors, attacker methodology to include, tools,
tactics, and procedures and how they tie into the Cyber Kill Chain or Miter ATT&CK
framework.
• Experience with premium threat intelligence tooling and/or open-source intelligence
techniques.
• Experience in malware detection and analysis using static and dynamic malware analysis
methods.
• Knowledge of cloud services and their attack surface.
• Related industry certifications (Sec+, CTIA, CISSP)