Position: Analyst - Cyber Threat Intelligence
Duration: 1 year ext
Overall Experience (Years): 5-7 Years Relevant Experience (Years): 3-5 Years
Primary Tools: Recorded Future & Sentinel (or using any tool)
- Around 3+ years of experience in a technical role with Digital Forensics and Incident Response background in the areas of Security Operations, Threat Hunting , Threat Intelligence, Cyber Incident Response, Penetration Testing and Red Teaming.
- Candidate should have the capability of making their own scripts and finding threats (hands-on).
- Understanding malware, how malware works, detecting malwares.
- Finding threats that tools cannot detect and able to apply intelligence on it.
- Worked on large scales industry (a.e. banks/telecom)
Professional/Regulatory/Certification Requirements: (at least 1 cert)
• Expertise on in using Threat Intelligence Platforms (Recorded Future, Flashpoint, Blueliv, Anomali, ThreatIQ etc.)
• Holding any of the following certifications (or working toward / or similar) would be preferred: • GIAC Certified Intrusion Analyst (GCIA)
• GIAC Certified Incident Handler (GCIH)
• GIAC Certified Forensic Examiner (GFCE)
• GIAC Certified Forensic Analyst (GCFA)
• GIAC Continuous Monitoring (GMON)
• GIAC Defending Advanced Threats (GDAT)
• GIAC Certified Detection Analyst (GCDA)
• CREST Certified Threat Intelligence Analyst
• CREST Certified Intrusion Analyst
• Offensive Security Certified Professional (OSCP)