Sr. Analyst – Threat Intelligence
By Cardinal Health At , , Pa
Collaborate with the Risk Management team to assess threats, vulnerabilities, and control gaps.
Work alongside the vulnerability management, offensive security, incident response teams, to improve proactive defensive processes.
Apply comprehensive knowledge and a thorough understanding of concepts, principles, and technical capabilities to perform varied tasks and projects.
Familiarity with Information Security Risk Management Frameworks and MITRE Att&ck Framework
We promote a culture that protects information assets, manages risk and embeds security in people, process and technology.
Defines solutions that balance information security requirements against business needs.
Threat Intelligence Analyst Jobs
By University of Oregon At , Eugene, Or $72,000 - $82,000 a year
Demonstrated experience with anticipating and/or emulating threat capabilities and actions based on knowledge of tactics used by cyber threat actors.
Bachelor’s degree from an accredited college or university or demonstrated equivalent skills and experience
Demonstrated experience with cyber intelligence/information collection capabilities and repositories.
One (1) year of experience in an operational information security role.
Demonstrated experience with the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
Demonstrated experience with common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).
Principal Cybersecurity Engineer – Advanced Cyber Threat Team - Threat Hunter/Intel
By Liberty Mutual At , Remote $144,900 - $189,600 a year
Experience with using a Security Information Event Management (SIEM) platform.
Coach and mentor junior team members to enhance and mature capabilities and team processes.
Serve as a Lead Responder on a global cybersecurity incident response team with a periodic on-call requirement.
Minimum 8+ years of recent experience working as a cybersecurity professional.
Active Cybersecurity certifications are desirable (but not required) such as GCIH, GREM, GCFA, GCTI, OSCP etc. (see list below).
Previous experience working in a Cyber Security Operations Center or similar function is desirable.
Threat Program Manager Jobs
By Nike At Beaverton, OR, United States
3+ years of Threat Management/Mitigation experience preferred
Professional affiliation with ATAP, Certified Threat Management (CMT) certification, GDBA Threat Management training are a plus
Strong time management skills and ability to complete multiple projects simultaneously
Bachelor's degree or combination of relevant education, experience, and training
5 years of work experience
3+ years of corporate work experience preferred
Threat Intelligence Analyst, Sear
By Apple At , Seattle, Wa
Proven history of successfully working on solo and group projects (experience with virtual/remote collaboration is a plus).
Minimum of 5 years experience conducting threat research.
Experience in analyzing highly-complex threat actor campaigns, including infrastructure, malware, and victim endpoints.
Ability to distill complex problems into manageable tasks and then drive those tasks to completion.
Some knowledge of macOS and iOS internals.
Excellent communications skills (verbal and written).
Threat Intelligence Analyst, Sear
By Apple At Seattle, WA, United States

Summary Apple’s Security Engineering & Architecture (SEAR) provides operating system security foundations across all of Apple’s innovative products, including Mac, iPhone, iPad, Apple Watch, ...

Cyber Threat Intelligence Engineer
By Veeva Systems At United States
Author intelligence reports that address specific intelligence requirements and emerging threats
Collaborate across other Veeva teams on relevant intelligence of emerging vulnerabilities to prioritize and drive remediation efforts
Experience in delivering adversary-based metrics or authoring/contributing to threat intelligence reports
Strong experience in organizing, processing, analyzing, and vetting indicators using sorting/processing tools to maintain a current, relevant threat database
Experience in enriching data of the four atomic indicators (domains, strings, IP addresses, accounts) to deliver additional context to incident responders
Strong experience in leveraging existing threat intelligence to augment investigations during incident response
Cyber Threat Intelligence Internship
By Mastercard At , New York, 10011, Ny
Inter-team collaboration, educational presentations and projects will see the intern not just learn but also work closely with other business units
Volunteer and team building experiences
Assist in the research, analysis and composition of written threat intelligence reports for dissemination to Mastercard's customers
Networking sessions and leadership speakers series
Innovative thinking and thoughtful risk taking
Ability to partner across the organization
Cyber Threat Intelligence Intern
By Cowbell Cyber Inc. At , Pleasanton, 94566, Ca $30 an hour
Penetration testing experience and understanding of remediation techniques for common misconfigurations and vulnerabilities
Develop and maintain application scanning solutions to inform stakeholders of security weaknesses & vulnerabilities.
Review outstanding vulnerabilities with product teams and assist in remediation efforts to reduce risk
Help in developing the capability to automate triaging, validating, reporting and reproducing application vulnerabilities.
Detail-oriented student leader with problem solving, communication, and analytical skills.
On track to complete the requisite degree and a goal of successfully obtaining relevant certifications associated with your career field.

Are you passionate about protecting organizations from cyber threats? Join our team as a Principal Threat Intelligence Analyst and help us stay ahead of the ever-evolving cyber security landscape. You will be responsible for researching and analyzing the latest threats, developing threat intelligence strategies, and providing actionable insights to our clients. If you have a knack for uncovering hidden threats and a desire to stay ahead of the curve, this is the perfect role for you!

Overview Principal Threat Intelligence is a senior-level position responsible for leading the development and implementation of threat intelligence strategies and initiatives. The role requires a deep understanding of the threat landscape, the ability to identify and assess threats, and the ability to develop and implement strategies to mitigate those threats. Detailed Job Description The Principal Threat Intelligence is responsible for leading the development and implementation of threat intelligence strategies and initiatives. This includes developing and maintaining threat intelligence capabilities, identifying and assessing threats, and developing and implementing strategies to mitigate those threats. The role requires a deep understanding of the threat landscape, the ability to identify and assess threats, and the ability to develop and implement strategies to mitigate those threats. The Principal Threat Intelligence will also be responsible for developing and maintaining relationships with external partners, such as law enforcement, intelligence agencies, and other organizations, in order to ensure the most up-to-date threat intelligence is available. Job Skills Required
• Expert knowledge of the threat landscape
• Ability to identify and assess threats
• Ability to develop and implement threat intelligence strategies
• Ability to develop and maintain relationships with external partners
• Excellent communication and interpersonal skills
• Ability to work independently and as part of a team
• Strong organizational and problem-solving skills
• Ability to work in a fast-paced environment
Job Qualifications
• Bachelor’s degree in computer science, information security, or a related field
• 5+ years of experience in threat intelligence or a related field
• Expert knowledge of the threat landscape
• Experience with threat intelligence tools and technologies
• Experience with security operations and incident response
• Experience with security architecture and design
Job Knowledge
• Expert knowledge of the threat landscape
• Knowledge of threat intelligence tools and technologies
• Knowledge of security operations and incident response
• Knowledge of security architecture and design
Job Experience
• 5+ years of experience in threat intelligence or a related field
• Experience with threat intelligence tools and technologies
• Experience with security operations and incident response
• Experience with security architecture and design
Job Responsibilities
• Develop and maintain threat intelligence capabilities
• Identify and assess threats
• Develop and implement strategies to mitigate threats
• Develop and maintain relationships with external partners
• Monitor the threat landscape for emerging threats
• Analyze threat intelligence data and develop actionable intelligence
• Provide guidance and support to other teams on threat intelligence
• Develop and maintain threat intelligence policies