Lead Analyst, Threat Intelligence

Grab (Posted 25 Jun 22)

Get to know the Team You’ll be part of an exciting team that is responsible for the Grab Cyber Defence function. The Cyber Defence team is responsible for external threat detection, incident response, threat intelligence, threat hunting, red teaming, insider abuse and insider fraud detection. The Threat Intelligence Lead is responsible for spearheading and leading cyber security intelligence analysis efforts to support various teams and strengthen Grab Cyber Security posture. Get to know the Role

  • Responsible for managing day-to-day threat intelligence operations for Grab.

  • Investigate advanced threat actors, conduct proactive research on emerging threats and generate forward-looking assessments to guide decision making.

  • Author actionable threat intelligence deliverables for multiple stakeholders (threat detection, incident response, insider fraud, Trust & Safety, senior leadership, etc).

The Day-to-Day Activities

  • Manage the cyber security threat intelligence monitoring, assessment and analysis.

  • Develop predefined threat intel actions to handle security alerts including escalating to relevant teams and other support groups.

  • Maintain knowledge of current and emerging threats and trends to Grab.

  • Work with threat hunting teams to identify suspicious and anomalous activities.

  • Contribute to purple and red-team activities based on current cyber threats.

  • Author and disseminate function related monthly and ad-hoc intelligence reporting and communications.

  • Support incident reporting to regulators as required.

  • Establish relationships with other threat intelligence professionals, industry partners and intelligence vendors.

  • Provide coaching and mentoring to the team.

  • Author a yearly threat report based on previous year incident, current threat landscape and forecast for the current year.

The Must-Haves

  • 5+ years experience in threat intelligence operations, with incident management experience.

  • Demonstrated expert knowledge of prominent cyber threat actor groups, campaigns and TTPs.

  • Solid understanding of intelligence process and analysis.

  • Advanced understanding of adversarial mindset and motivations.

  • Advanced understanding on the MITRE ATT&CK Framework and related frameworks.

  • Excellent written and verbal communication skills; ability to break down complex. problems and articulate them clearly to a non-technical audience.

  • Able to work under pressure during critical situations.

  • Familiarity with threat intelligence platforms is a plus.

Last updated