Prudential Financial - Newark, NJ

posted 27 days ago

Full-time - Mid Level
Newark, NJ
Insurance Carriers and Related Activities

About the position

The Cyber Threat Intelligence Specialist plays a crucial role within the Cyber Defense and Response organization at Prudential. This position is responsible for developing finished intelligence to support various stakeholders across the enterprise, enhancing the organization's security posture and resilience. The specialist will analyze potential threats, support incident response efforts, and collaborate with business and technology teams to drive cyber resiliency.

Responsibilities

  • Collection, analysis, and dissemination of timely finished intelligence that meets intelligence requirements of stakeholders.
  • Perform regular analysis of internal and external sources to identify potential threats and attack trends.
  • Support Cyber Defense and Response team by providing curated research and reporting that can assist in incident response, investigations, and threat detection.
  • Support Attack Surface Management team by providing curated research and reporting that can assist in assessment of attack vectors.
  • Support technology owners in understanding threats relevant to their technology stack.
  • Partner and support business and technology stakeholders to drive cyber resiliency.
  • Analyze threat campaigns targeting Prudential using formal analytical frameworks such as the Diamond Model and MITRE ATT&CK.
  • Perform Cyber Threat Assessments based on potential cyber threats and their relevance to Prudential.
  • Integrate and automate the use of cyber threat intelligence to enrich the organization's security tools, security operations, and incident response.
  • Collaborate with internal teams, external partners, and industry peers to share intelligence and industry best practices.
  • Provide thorough insights on cyber resiliency and risk reduction opportunities.
  • Bring an applied understanding of relevant and emerging technologies, identify opportunities to provide input to the team, coach others, and embed learning and innovation in the day-to-day operations.

Requirements

  • Experience or training with analysis of security events from multiple sources including but not limited to events from Security Information Monitoring (SIEM) tools, XDR/EDR, network and host-based intrusion detection systems, firewall logs, and system logs (Unix and Windows).
  • Understanding of hybrid SaaS, Cloud, and on-prem enterprise environment.
  • Complete understanding of intelligence cycle including analytical methodologies such as Analysis of Competing Hypotheses.
  • Experience with agile development methodologies.
  • Knowledge of business concepts tools and processes that are needed for making sound decisions in the context of the company's business.
  • Ability to learn new skills and knowledge on an on-going basis through self-initiative and tackling challenges.
  • Excellent problem solving, communication and collaboration skills.
  • Applied experience with Cyber Threat Intelligence, Digital Forensics, Cyber Security Operations, Cyber Incident Response, Threat Hunting and Adversary Emulation, Automation and Engineering.

Nice-to-haves

  • GIAC GCTI, GREM, GCFA, or GNFA certifications.
  • AWS Cloud Practitioner or AWS Security certification.
  • AZ-900 or AZ-500 certification.
  • Experience with incident response, digital forensic investigations, security operations, and/or continuous monitoring.
  • Experience with Python scripting language; additional languages a plus.
  • Experience with Microsoft PowerShell.

Benefits

  • Paid time off
  • Medical insurance
  • Dental insurance
  • Retirement benefits
  • Discretionary annual incentive program
Job Description Matching

Match and compare your resume to any job description

Start Matching
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service