Threat Intelligence Analyst
Singtel (Posted 7 Jan 22)
Last updated
Singtel (Posted 7 Jan 22)
Last updated
Responsibilities
Monitor and analyse threat intelligence from open and commercial sources for attack campaigns, new vulnerabilities, IOCs and threat actor groups and their TTPs
Hunt actively for IOCs, threat actor groups and TTPs in the environment
Analyse network flow, PCAPs, logs and endpoint artefacts for evidence of attacks and system breaches
Support the incident response team on cyber security incident investigations
Create incident reports and participate in post-mortem
Implement and maintain metrics to ensure that the performance of the operations of threat intelligence and detection are measured, and reporting requirements are met.
Ideal candidate must have
Minimum 2 years of practical experience in security operations
Minimum 2 years practical experience in computer forensics, malware analysis or incident response
Experience working as part of an information security operations team.
Advanced understanding in the MITRE ATTACK framework and Cyber Kill Chain
Advanced understanding in system processes, filesystems, memory
Advanced understanding in the following areas: Platform Security, Data Security, Network Security, Physical Security, Security Assessment Tools, Security Monitoring Tools.
Source: