• Collaborate on developing, implementing, and maintaining your threat intelligence platform and related tooling.
  • Manage threat intelligence platforms and monitor feed sources for efficacy and work with security operations and engineering to integrate threat indicator sources with appropriate tools.
  • Support Cyber operations designed to pursue anomalies or Cyber threats on Information Technology or Information Control System networks.
  • Develop, create, and drive current and new reporting methods of Intelligence analysis to peers and leadership teams for purposes of situational awareness and making Intelligence actionable.
  • Coordinate with enterprise wide Cyber defense staff to validate alerts and conduct continuous testing.
  • Develop relationships and enhance processes with teams across Cyber Operations and Intelligence towers.
  • Collect, analyze, and disseminate accurate and timely threat intelligence to support action plans based on impact, credibility, and likelihood.
  • Manage intelligence requirements from internal stakeholders across operations, engineering, risk management and others, soliciting feedback to continually drive improvements.
  • Be accountable for analyzing strategic enterprise risk as it relates to geopolitical, security, economic, policy and social developments that are big picture and granular in nature.
  • Ensure you have intimate knowledge about information security threat intelligence and thrive on the details of threat analysis.
  • Manage work with the Cybersecurity teams to identify DLP rules, thresholds and reporting requirements using existing tools.
  • Develop and implement an intelligence report feedback process to measure reporting impact and alignment.
  • Coordinate and provide expert technical leadership to enterprise wide Cyber defense operators to resolve Cyber defense incidents.
  • Be accountable for working in an Intelligence function, analyzing risk and authoring reports and conducting briefings that provide stakeholders with proactive, actionable insight about security concerns.
  • Ensure you arrange; understand how threat actors operate in a corporate environment, and how to create countermeasures to actions.

 

Categories: Articles