GuidePoint Security

Threat Intelligence Consultant

GuidePoint Security

full-time

Posted on:

Origin:  • 🇺🇸 United States

Visit company website
AI Apply
Apply

Job Level

Mid-LevelSenior

Tech Stack

AWSAzureCloudCyber SecurityGoOpen SourcePuppetPython

About the role

  • Operate as a technical resource within the Practice and actively participate in DFIR investigations to share and identify actionable intelligence
  • Lead and conduct Threat Actor Communications engagements, advising clients, legal counsel, and insurance carriers on risks, benefits, and key considerations for communication with threat actors in ransomware and data extortion cases
  • Effective engagement communication, time management, and collaboration with peers and clients. Foster client relationships by providing support, information, and guidance
  • Author comprehensive engagement deliverables that are tailored to both technical and managerial audiences; fully detail the technical findings, recommendations, business impact, and realistic remediation strategies
  • Utilize automation, orchestration, and scripting to reduce manual processes, improving overall efficiency while also enabling new capabilities to meet the rapidly changing needs of our clients
  • Contribute to integration of existing and future open-source and commercial tools or automation to help improve GRIT processes and procedures
  • Perpetually strengthen relevant skills, knowledge, and abilities to stay at the forefront of the information security industry
  • Maintain a strong desire to learn, adapt, and improve along with a rapidly growing company

Requirements

  • Two (2+) years of experience performing Threat Intelligence analysis and/or collection
  • Four (4+) combined years of IT and information security experience
  • Prior experience in a consulting and/or professional services role (preferred)
  • Prior experience in communicating with threat actors, such as through virtual persona operations, ransomware negotiations, or use of “sock puppet” accounts in Deep and Dark Web collection (preferred)
  • Experience implementing or improving operational processes or procedures in the intelligence analysis lifecycle (preferred)
  • Proficiency hunting APT data using open source or commercial cyber threat analytic tools or data repositories such as VirusTotal, Passive Total, Threat Miner, or Maltego (preferred)
  • Experience in scoping and conducting threat research centered on cybercrime, ransomware, and/or nation-state cyber operations (preferred)
  • Network traffic analysis
  • Host forensics
  • Malware handling / triage
  • Log review
  • Experience with a variety of industry-related solutions including EDR, SIEM, NDR, FW, NGAV, Velociraptor, OSQuery, and others
  • Strong ability to correlate data and research using open-source repositories (ex. VirusTotal, Domaintools, Threatminer, etc.)
  • Intermediate ability to present technical information and analysis to audiences up to 50 persons on a quarterly basis.
  • Ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, always ask why, defend your analysis, and apply attribution to cyber threat activity.
  • Ability to make confidence-based assessments for purposes of attribution based on their technical analysis of network traffic, multi-source data, malware and system analysis. Candidate must be able to identify analytic bias
  • Experience with common programming languages including PowerShell, Python, BASH, Go, or others
  • Experience with cloud technologies for the enterprise, such as Amazon Web Services, G Suite, Office 365, and Azure.
  • Awareness of attacker techniques, advanced threat groups, and integration of intelligence into an investigation
  • Other relevant industry certifications, such as but not limited to CASP+, CySA+, GCIA, GCIH, GDAT, GCFE, GFCA, GREM, PMRP, and Sec+