Full-Time

Team Lead – Cyber Threat Intelligence

OneTrust

OneTrust

1,001-5,000 employees

Global privacy compliance

Data & Analytics
Consulting

Senior

Atlanta, GA, USA

Required Skills
Data Analysis
Requirements
  • Expertise in multiple aspects of intelligence and cyber security
  • Ability to communicate clearly, both verbally and in writing
  • Ability to collaborate and coordinate with multiple teams and vendors
  • Ability to work independently and as part of a team
  • Ability to multitask and prioritize effectively
  • Keen attention to details, while keeping the big picture in mind
  • Ability to work with minimal supervision
  • Ability to mentor, train, and educate other security personnel
  • Bachelor's degree in a related field or equivalent experience required
  • Must have demonstrable experience as an IT security professional
  • Solid grasp and experience applying common tools and analytical frameworks used to identify and describe cyber threat actors, actions, and capabilities (Diamond, VERIS, MITRE ATT&CK, etc.) and share threat intelligence (STIX/TAXII)
  • In-depth knowledge in the following fields is required: cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data; common information technology (IT) security controls (e.g.: firewalls, demilitarized zones, encryption); new and emerging information technology (IT) and cybersecurity technologies and risks; information technology (IT) supply chain and vulnerability risk best practices
  • Advanced planning/organizational, problem-solving, analytical, consulting, time management and decision-making skills required
  • Ability to effectively communicate technical security plans, strategies, and designs to all levels of the company
  • Must be detail oriented and able to maintain a high degree of accuracy
  • 5+ years' experience as a CTI analyst supporting cyber operations and incident response, with demonstrated application of CTI principles to include adversary methodologies and TTPs, IOCs (Indicators of Compromise), and malware analysis
  • 5+ years' experience identifying threat actor TTPs and campaigns and to gather information for reconnaissance, including large and unstructured data sets to identify trends and anomalies indicative of malicious cyber activities
  • 3+ years of hands-on technical expertise in at least one of the following areas: applied CTI & sharing, adversary emulation, incident response, defensive cyber operations, cyber analytics & malware analysis, cyber deception and adversary engagement, cyber effects and reverse engineering, or cyber forensics
  • 1+ years of people management experience
  • >1 Cyber Intelligence, Cloud and/or Security Certifications such as Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), GIAC Certified Pentester (GPEN), GIAC Open-Source Intelligence (GOSI) preferred
  • Background dealing with cyber security, fraud, and complex investigations
Responsibilities
  • Perform highly specialized review and evaluation of incoming cyber security information to resolve its usefulness for intelligence
  • Analyze threat information from various internal and external sources and synthesize and places intelligence information in context; draw insights about implications
  • Prepare formal/informal analysis and briefings to define threats to the organization. Lead efforts for appropriate mitigation
  • Provide collection and analysis of cyber security information that may be used to develop intelligence
  • Performs activities to gather TTP on cyber threat actors to mitigate possible or real-time threats, protect against espionage or insider threats, or to support other intelligence activities
  • Conduct operational-level planning across the full range of cyber defense operations
  • Investigate cyber security events or crimes related to information technology (IT) systems, networks, and digital evidence
  • Collect, processes, preserve, analyze, and present agent, cloud, host-based and dark web evidence in support of network vulnerability and threat mitigation and/or criminal, fraud, or law enforcement investigations
  • Identify, analyze, and mitigate threats to internal information IT systems and/or networks
  • Develop best practices and advanced solutions to collect, fuse, and analyze high volumes of open source and proprietary threat reporting to help produce and use predictive and actionable cyber threat intelligence
  • Develop policies, procedures, governance, and other guidance for building and evolving cyber threat intelligence, SOC (Security Operations Center) and incident response team integration
  • Integrate and apply CTI (Cyber Threat Intelligence) reporting and knowledge of adversary activity into cybersecurity operations systems and processes
  • Develop and scope tasks to support cyber operations to achieve red, blue, and purple missions

Company Stage

N/A

Total Funding

$1.2B

Headquarters

Atlanta, Georgia

Founded

2016

Growth & Insights
Headcount

6 month growth

6%

1 year growth

14%

2 year growth

9%
INACTIVE