KMC Solutions

Threat Intelligence Analyst

KMC Solutions

full-time

Posted on:

Location Type: Remote

Location: Remote • 🇵🇭 Philippines

Visit company website
AI Apply
Apply

Job Level

Mid-LevelSenior

About the role

  • Summarizing large amounts of information into threat intelligence products
  • Supporting incident investigations from a threat intelligence perspective
  • Building threat actor profiles with supporting information such as TTPs, IOCs, etc
  • Developing, maintaining, and enhancing prioritized intelligence requirements
  • Communicating threats to multiple audiences
  • Assisting with new alert content creation as it pertains to threats
  • Analyzing closed investigation cases for linkages with campaigns, actors, and TTPs

Requirements

  • At least 3 years of security threat intelligence experience
  • Intermediate knowledge of OSINT data collection
  • Intermediate knowledge of the MITRE ATT&CK Framework
  • Intermediate knowledge of the threat intelligence lifecycle and the Diamond model
  • Significant experience in drafting and delivering written threat intelligence products
  • Moderate experience with OSINT aggregation tools such as RecordedFuture, Silo Breaker, Flashpoint, ShadowDragon
  • Moderate experience with enrichment tools such as VirusTotal, DomainTools, Hybrid Analysis
  • Moderate knowledge of network protocols and secure network design
  • Advanced knowledge of common attack vectors
  • Excellent written and verbal communication skills
  • The ability to communicate technical topics to non-technical audiences
  • Bachelors’ Degree in Computer Science, Information Security Assurance, or equivalent experience
Benefits
  • Comprehensive health benefits
  • Diverse learning & growth opportunities
  • Accessible Cloud HR platform (Sprout)
  • Above standard leaves

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
security threat intelligenceOSINT data collectionMITRE ATT&CK Frameworkthreat intelligence lifecycleDiamond modelthreat intelligence productsnetwork protocolssecure network designcommon attack vectors
Soft skills
written communicationverbal communicationability to communicate technical topics to non-technical audiences
Certifications
Bachelors’ Degree in Computer ScienceBachelors’ Degree in Information Security Assurance