Role: Sr. Cyber Threat Intelligence Analyst
• Discover, identify, and report regularly on significant cyber threats and risks to businesses, governments, and other organizations presented by cyber threat actors and groups originating in global regions.
• Knowledge of zero-day vulnerabilities and writing a report for vulnerabilities along with mitigations/ remediations.
• Develop and produce intelligence reports focused on intricate fraud events, threats and trends.
• Research and analyze cyber-threat actors, groups, and events to report on threatening tactics, techniques, and procedures (TTPs), behaviors, motivations, sponsorship, and influencing factors.
• Develop and produce strategic intelligence reports focused on industry-level analysis of developing cybersecurity threats, complex geopolitical events, conditions, impacts and trends.
• Participate in the drafting and dissemination of finished tactical and operational threat intelligence products (reports, briefings, etc.).
• Analyzing the likelihood that an emerging threat will impact the organization and identify gaps of weaknesses.
• Provide requirements to influence threat mitigation strategies.
• Develop documentation in support of response processes and/or procedures.
• Manage intelligence/data from vendor, consortium, and law enforcement partners to be consumed for intelligence development.
• Analyze internal risk and security controls to identify existing weaknesses.
• Consolidate cyber threat intelligence feeds and sources.
• Provide threat intelligence support to cybersecurity teams during security incidents.
• Maintain, develop, and continuously evaluate cyber threat intelligence sources to increase effectiveness and timeliness of creating actionable threat assessments.
• Respond to client requests for information (RFIs) and participate in the drafting and production of company threat assessments.
• Interact with (verbal and written) with executives and stakeholders in non-technical terms while accurately encompassing risk, impact, likelihood, containment remediation activities, and threat actor techniques, tactics, and procedures.
More Information
Application Details
-
Organization Details
TCS / Tata Consultancy Services
Recommended Comments
There are no comments to display.
Join the conversation
You are posting as a guest. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.