About The Position

We are seeking a Cyber Threat Intelligence Engineer to join our Cyber Threat Intelligence team. In this role, you will be instrumental in protecting our critical financial infrastructure and employees. By operating at the intersection of threat research and security engineering, you will collect, process, and analyze intelligence to stay ahead of threat actors targeting the financial sector and help the bank make intelligence-led decisions for proactive defense.

Requirements

  • Engineering: Proven experience engineering solutions in cybersecurity and/or threat intelligence.
  • Technical Proficiency: Hands-on experience coding in Python and ability to learn vendor-specific query languages. Automation of basic file processing, data manipulation, and data collection tasks.
  • Threat Frameworks: Practical knowledge of industry-standard cybersecurity attack frameworks such as the MITRE ATT&CK Framework, Cyber Kill Chain Methodology, or the Diamond Model of Intrusion Analysis.
  • Security Tooling: Utilizing SIEM/log management tools.
  • Analytical Mindset: Ability to differentiate between true and false positives, assess the credibility of threat feeds, and apply intelligence to achieve operational goals.

Nice To Haves

  • Certifications: Industry-recognized threat intelligence certifications such as C|TIA (Certified Threat Intelligence Analyst), GIAC Cyber Threat Intelligence (GCTI), or GIAC Certified Incident Handler (GCIH).
  • Data Sharing Formats: Experience managing intelligence feeds using structured sharing formats like STIX and TAXII.
  • Advanced Analysis: Familiarity with malware analysis, reverse engineering concepts, network traffic analysis, and HTTP header analysis to uncover vulnerabilities.

Responsibilities

  • Collection, Curation, & Operationalization: Collect, normalize, enrich, and tag Indicators of Compromise (IOCs) from commercial vendors, open-source intelligence, and partners. Operationalize intelligence into actionable decisions across our control stack. Assess intelligence quality and reduce noise through lifecycle management of intelligence indicators.
  • Platform Engineering: Design, develop, and maintain pipelines to ingest intelligence into our Threat Intelligence Platform (TIP). Develop automation to enrich and integrate intelligence. Improve efficiency and scalability of the Threat Intelligence Platform (TIP).
  • Intelligence Reporting: Build reporting capabilities to ingest and disseminate articles, vendor feeds, and threat alerts applicable to our environment. Enable the preparation of actionable Flash Reports, Threat Briefings, and detailed profiles on threat actor motivations and capabilities.
  • Cross-Functional Collaboration: Coordinate directly with Security Operations Center (SOC), Insider Threat, Fraud Risk, and other key stakeholders to prioritize alerts, mitigate emerging threats, and contextualize intelligence. Gather requirements from key stakeholders to prioritize the development of feeds or enrichments to support their business needs.
  • Threat Tracking & Hunting: Track threat actors, malware families, and vulnerabilities relevant to our operations. Align intelligence gathering priorities to enterprise risks and relevant threat actors.

Benefits

  • To view all of our comprehensive and competitive benefits, visit our Benefits at SoFi page!

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

No Education Listed

Number of Employees

1,001-5,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service