The Cyber Threat Center Cyber Threat Intelligence Analyst will be responsible for participating in threat actor based intelligence analysis, creating relevant, timely and actionable intelligence products, and provide support to cyber incident response and cyber threat hunting. The focus of the Cyber Threat Analyst is to defend against adversarial activity by collecting intelligence that matters and producing tailored analysis driving active cyber defense efforts to deter successful exploitation of information networks. The Cyber Threat Analyst will use data analysis, threat intelligence, and cutting-edge security technologies. The Cyber Threat Analyst will directly support the Cyber Threat Center by applying analytic and technical skills to investigate intrusions, identify malicious activity and potential insider threats, and in some cases perform incident response.Identify cyber threats, trends and new developments on various cybersecurity topics by analyzing open source intelligence and data which includes geopolitical and transnational events.
Perform analysis of data and information meeting intelligence requirements as well as the financial sector's current cybersecurity intelligence needs.
Conduct research, analysis, and document events which meet Intelligence Requirements.
Produce quality intelligence reports for management and other teams. Be able to articulate and communicate intelligence openly and publically at all levels of the business.
Apply analytic tradecraft to intelligence. Investigate, document, and report on cybersecurity issues and emerging trends.
Identify and monitor the Tactics, Techniques, and Procedures (TTPs) used by cyber threat actors by analyzing open source intelligence and data.
Provide actionable strategic, technical, and tactical cyber information and intelligence through reports, briefings, and presentations.
Make analytical predictions about cyber adversaries and their future activities based upon known TTPs.
Identify threats by performing relevant research and data analysis using both internal and external tools and resources.