Job Summary:
The Threat Analyst is responsible for monitoring, analyzing, and responding to cybersecurity threats that could impact the organization. This role involves working closely with other cybersecurity professionals to identify, assess, and mitigate potential security risks. The Threat Analyst will utilize a variety of tools and techniques to detect threats and provide actionable intelligence to help protect the organization’s assets.
Key Responsibilities:
- Threat Monitoring: Continuously monitor networks, systems, and applications for signs of potential threats or anomalies using various security tools and platforms (e.g., SIEM, IDS/IPS, firewalls).
- Threat Analysis: Investigate and analyze suspicious activities, indicators of compromise (IOCs), and potential threats to determine their impact on the organization.
- Incident Response: Collaborate with the Incident Response team to assess the severity of security incidents and assist in the development of response strategies.
- Threat Intelligence: Gather, analyze, and disseminate threat intelligence from various sources, including open source, commercial, and internal feeds.
- Reporting: Create detailed reports and briefings on threats, vulnerabilities, and incidents, communicating findings and recommendations to management and other stakeholders.
- Vulnerability Assessment: Assist in the identification and assessment of vulnerabilities in the organization’s infrastructure and recommend mitigation strategies.
- Security Tool Management: Maintain and optimize security monitoring tools and platforms, ensuring they are up-to-date and functioning effectively.
- Collaboration: Work with cross-functional teams, including IT, DevOps, and Compliance, to ensure security measures are integrated into organizational processes.
- Continuous Improvement: Stay up-to-date with the latest cybersecurity trends, threats, and technologies, and continuously seek to improve threat detection and response capabilities.
Qualifications:
- Education: Bachelor’s degree in Computer Science, Information Security, or a related field (or equivalent experience).
Experience:
- 5 Yrs of SOC analyst exp out of which 2+ years of experience in threat analysis or a related role.
- Experience with security information and event management (SIEM) tools, intrusion detection systems (IDS/IPS), and other security technologies.
- Certifications: Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or GIAC Certified Incident Handler (GCIH) are a plus.
Skills:
- Strong analytical and problem-solving skills.
- Understanding of common attack vectors, threat actors, and tactics, techniques, and procedures (TTPs).
- Proficiency in scripting or programming languages (e.g., Python, PowerShell) is a plus.
- Excellent communication skills, both written and verbal.
Other Requirements:
- Ability to work in a fast-paced environment and manage multiple tasks simultaneously.
- Strong attention to detail and the ability to think critically.
- Ability to work in a team-oriented environment with cross-functional teams.