Provide consulting services to review and improve Cyber Threat Intelligence, vulnerability management, security monitoring, data loss prevention (DLP), forensics, and incident response capabilities.

More Uses of the Cyber Threat Intelligence Toolkit:

  • Collaborate on developing, implementing, and maintaining your threat intelligence platform and related tooling.
  • Audit: mastery of methods, sources, tools, and subject matter pertaining to all source Cyber Threat Intelligence collection and analysis.
  • Manage threat intelligence platforms and monitor feed sources for efficacy and work with security operations and engineering to integrate threat indicator sources with appropriate tools.
  • Support Cyber operations designed to pursue anomalies or Cyber threats on Information Technology or Information Control System networks.
  • Develop, create, and drive current and new reporting methods of Intelligence analysis to peers and leadership teams for purposes of situational awareness and making Intelligence actionable.
  • Develop, manage, optimize and continuously improve processes to enhance the overall Cyber Threat Intelligence function.
  • Direct: actively collaborate with Cyber Threat Intelligence teams to ensure response capabilities are adequate to the threat.
  • Identify current and emerging threat trends, threat actors using a variety of Cyber Threat Intelligence sources.
  • Coordinate with Cyber Threat Intelligence and Cybersecurity operations to ensure Cybersecurity control design is richly informed by current threat intelligence and incident response.
  • Coordinate with enterprise wide Cyber defense staff to validate alerts and conduct continuous testing.
  • Develop relationships and enhance processes with teams across Cyber Operations and Intelligence towers.
  • Collect, analyze, and disseminate accurate and timely threat intelligence to support action plans based on impact, credibility, and likelihood.
  • Manage intelligence requirements from internal stakeholders across operations, engineering, risk management and others, soliciting feedback to continually drive improvements.
  • Be accountable for analyzing strategic enterprise risk as it relates to geopolitical, security, economic, policy and social developments that are big picture and granular in nature.
  • Ensure you have intimate knowledge about information security threat intelligence and thrive on the details of threat analysis.
  • Manage work with the Cybersecurity teams to identify DLP rules, thresholds and reporting requirements using existing tools.
  • Negotiate actively collaborate with Cyber Threat Intelligence teams to ensure response capabilities are adequate to the threat.
  • Classify and prioritize threats through use of Cyber Threat Intelligence, intrusion detection systems, Firewalls and other boundary protection devices, and any.
  • Govern: research and implement new tools and data sources to expand analysis and incident response capabilities.
  • Coordinate security response and remediation efforts based off of curated Cyber Threat Intelligence feeds.
  • Supervise: conduct analysis of Cyber Threat Intelligence to stay abreast of emerging Cyber threats and associated defenses, and provide training and mentoring for IT Security resources.
  • Develop and implement an intelligence report feedback process to measure reporting impact and alignment.
  • Initiate: proactively initiate Cyber intelligence analysis in accordance with established intelligence priorities.
  • Coordinate and provide expert technical leadership to enterprise wide Cyber defense operators to resolve Cyber defense incidents.
  • Develop and refine Cyber Threat Intelligence collection and analysis processes, using technical and non technical, internal and external, threat intelligence sources.
  • Develop: external threats protects clients from phishing attacks, domain infringement, mobile app impersonation, social and brand impersonation, and data leakage.
  • Be accountable for working in an Intelligence function, analyzing risk and authoring reports and conducting briefings that provide stakeholders with proactive, actionable insight about security concerns.
  • Orchestrate: conduct detailed technical analysis supported by industry accepted threat intelligence analytical frameworks, tools, and standards.
  • Maintain and drive the development of new reports of Cyber Threat Intelligence analysis to peers and management for purposes of making threat intelligence actionable.
  • Ensure you arrange; understand how threat actors operate in a corporate environment, and how to create countermeasures to actions.

 

Categories: Articles