Description:
What you will do
- Analyse threats and attacks to organizational functions and assets by monitoring the clear, the deep and the dark web for data and threats
- Conduct OSINT collection and analysis (i.e., social media, research engines, government databases, etc.) to support investigations, misinformation and disinformation assessments, due diligence, and crisis management engagements,
- Watch the global cyber threat landscape and interpret political and economical news and events with a cyber point of view
- Prepare contextualized security and threat landscape briefings for our organization and partner members of SITA Community Cyber Threat Center (CCTC)
- Compile Vulnerability Advisories for organizational technology stack
- Compile attacker Tactics, Techniques and Procedures (TTPs)
- Improve continuous threat landscape monitoring and alerting
- Enable retrospective threat hunting missions based on past events
- Understand threat actors and anticipate future threats
- Follow and watch threat actor's activities and operations
- Create threat intelligence-driven products
- Compile of Indicators of Compromise (IoCs)
- Participate to information sharing and collaboration (ISAC) efforts
- Participate to CERT/SOC transversal collaboration activities
- Support Digital Forensic and Incident Response (DFIR), fraud and legal investigations
- Participate to projects, improvements and compliance efforts related to CERT matters
Qualifications
Who you are
- A minimum 5 years of experience in at least two of the following:
Threat Intelligence,
Threat Hunting,
Vulnerability Management,
Endpoint Detection and Response (EDR),
Blue team operations,