Specific Duties and Responsibilities:
- Prepare weekly, monthly, and quarterly client specific finished intelligence reports
- Analyze client-specific data to determine potential threats to a client or client's infrastructure
- Summarize findings from client-specific data to clearly and concisely communicate a level of threat to a client or client's infrastructure
- Identify open source information and data relevant to a client's priority intelligence requirements, and summarize the information and data for inclusion in a client report
- Discover cyber threat events/ stories to be covered in the Weekly Threat Landscape, and monitor existing suggestions to track which industries need additional research
- Use the Client's Intelligence Cloud to validate information based on what was identified through open-source research; accurately interpret the results and create logical assessments or an outlook of the incident
- Conduct research cyber threat events/stories, to include open source research as well as research using the Client's Intelligence Cloud and dataset, to provide actionable and relevant intelligence to clients to help them better protect themselves against cyber threats
- Create Analyst Notes from previously published Weekly Threat Landscape stories
- Collaborate with the Data Science team to curate entities that are referenced in reports
- Monitor and remain up-to-date about recent cyber trends and events
Qualifications:
- At least one year of professional experience in cyber-related research and technical writing
- Excellent English-language skills, both in writing and communication
- Excellent English-language grammar skills
- Excellent reading comprehension skills
- Strong verbal communication in English
- Is significantly keen to details
- Proficiency with Google Docs and Google Sheets
- Has strong analytical skills; can accurately interpret raw data and put that into technical writing
- Possesses sufficient or advanced knowledge about cyber threats (malware, phishing, trojans, botnets, etc.) and the cyber threat landscape (e.g. a ransomware attack targeted a specific company)
- Possess sufficient knowledge about software vulnerabilities (CVEs) and associated threats (zero day exploits, malicious exploitation, proof-of-concept exploit codes)
- Possesses sufficient or advanced knowledge about cybersecurity and protecting against cyber threats
- Has sufficient knowledge (or is familiar) about the MITRE ATT&CK framework; is able to associate MITRE IDs relevant to a cyber event
- Is able to create logical assessments, on-point recommendations, and a thorough outlook about a cyber event (e.g. able to identify or describe the so what related to the event)
- Familiarity in OSINT research (Open-Source Intelligence)
- Is able to thrive in a collaborative environment
- Independent and has curious approach to research
- Strong discipline with time management
- Preferred, not a priority - BS equivalent in computer science, information systems, or cyber intelligence
- Preferred, not a priority - experience with generative artificial intelligence
- Preferred, not a priority - familiar with using JIRA
- Adaptive, open to change
- Can handle tight deadlines in terms of report delivery