Security Threat Intelligence Engineer, REMOTE

Job: Security Threat Intelligence Engineer Location: REMOTE Visas: USC only Duration: 6 Months contract About the Opportunity:
seeking a Security Threat Intelligence Engineer Consultant to support their Threat Management Threat Intelligence team objectives to ensure cyber threats are continuously evaluated for risk and impact to client, customers, third parties, infrastructure, and wider ecosystem for all environments. This is a 6-month remote opportunity. Required Skills: · Solid understanding of common and advanced threats, penetration/intrusion techniques and attack vectors such as o Malware analysis o Software vulnerabilities & exploitation o Data analysis · Knowledge of current hacking techniques, cyber threat actors, attribution concepts, security analysis techniques, recent cyber incidents, and vulnerability disclosures · Familiarity with the following tools o Threat Intelligence Platform (TIP) o Threat intelligence feeds o STIX, MISP and TAXII frameworks o Open Source Intelligence feeds and tools (OSINT) o Malware Analysis / Reversal Tools o Security Incident and Event Monitoring (SIEM) o Security Orchestration, Automation & Response (SOAR) o Network sniffers and packet tracing tools. o Threat Intelligence Platforms (TIP) o Security Information& Event Management (SIEM) o Intrusion Detection& Prevention (IDS/IPS) o End Point Detection& Response (EDR) o Email and Web filtering technologies o link-analysis methods and software (e.g., Maltego, Analyst Notebook) · Familiarity with o Meraki dashboard and products · Ability to write custom query logic for major Security Incident and Event Monitoring (SIEM) tools · Ability to write SQL to search data warehouse databases · A minimum of 10 years of information security experience with at least 7 years of experience with all-source cyber intelligence and analysis; or the equivalent combination of higher education and/or real-world experience · Ability to communicate intelligence and analysis of cyber threats in various forms (written production; briefings) to varying audiences · Understand common threat actor tactics, techniques, and procedures (TTPs) and how they are chained together · Experience in working with a geographically diverse team in multiple time zones around the globe. · Demonstrated familiarity and expertise with data analytics tools like Splunk, ELK, Snowflake, or other searchable big data solutions · Excellent analytical skills Preferred Skills: · Relevant industry security certifications such as CISSP, SANS GIAC (e.g. GCTI, GCIH, GNFA, GCFE, GCFA, GREM), AWS certifications (SAA, SAP, or SCS), etc. If you are interested please kindly share your resume with us at taher@zettalogix.com.
Solution:
email: taher@zettalogix.com.
Jump to solution
1 Reply
Solution
frail-apricot
frail-apricot5mo ago
email: taher@zettalogix.com.