Threat Intelligence Analyst

GSK
3d$108,000 - $180,000Remote

About The Position

Analyst with the Cyber Intelligence team will be responsible for rapid and concise analysis of threats to corporate systems and data using data analysis tools, industry threat intelligence and related skill sets while supporting the efforts of team leadership in generating custom and comprehensive Cyber Intelligence reports and tools for GSK. They will need to help identify and provide support of implementation of business solutions through both technology and relationship building with other business segments of the company. This role will be critical in helping establish a forward-looking strategy and cutting-edge capability to take the team’s capability to industry leading levels. This role will provide YOU the opportunity to lead key activities to progress YOUR career, these responsibilities include some of the following: Intelligence gathering and reporting as it relates to identifying evaluating and reporting actionable intelligence details to the company and its interests. Analyse and report on critical intelligence partnerships internal and external, domestically, and globally to enable the maturation of quality intelligence analysis and actionable data. Develop tools and technology to assist in the maturation of the Cyber Intelligence program. Monitors cyber threats by leveraging industry standard tools and best practices; collecting, analysing, and correlating data points between various feeds, tools, and personal interactions; and analysing data for patterns and link analysis to determine the need for additional action. Research information about new technologies, developing and reviewing system documentation, reviewing network and tool set changes before and after installations. Develop industry expertise to include discerning patterns of complex threat actor behaviour and communicating current and developing cyber threats to leadership and business partners. Reviewing, refining, and creating team documentation and procedures. Participate in team meetings and discussions to help with knowledge transfer and quick identification of both trending intel and training or tool needs within the team.

Requirements

  • BS Degree in computer science, analytics, intelligence and/or minimum six years’ experience in the field.
  • 6+ years of experience in cyber security and threat analysis/analytics
  • 2+ years of threat intelligence platforms experience

Nice To Haves

  • Certificates: GSEC, GCTI, GREM, CISSP
  • Malware Analysis experience.
  • Writing custom reporting and maintaining structure and brand protection.
  • Strong critical thinking and group facilitation skills in large or complex problem settings.
  • Experience in improving the field of cyber intelligence.
  • Experience with emerging computer or online technologies, online social behaviours, and computer or internet terminology.
  • Experience with collecting, analysing, and interpreting qualitative and quantitative data from multiple sources into written and oral format.
  • Experience researching current hacking techniques, vulnerability disclosures, data breach incidents, and performing security analysis techniques.
  • Experience with Operational Technology (OT) infrastructure, security, technologies, vulnerabilities, and threats.

Responsibilities

  • Intelligence gathering and reporting as it relates to identifying evaluating and reporting actionable intelligence details to the company and its interests.
  • Analyse and report on critical intelligence partnerships internal and external, domestically, and globally to enable the maturation of quality intelligence analysis and actionable data.
  • Develop tools and technology to assist in the maturation of the Cyber Intelligence program.
  • Monitors cyber threats by leveraging industry standard tools and best practices; collecting, analysing, and correlating data points between various feeds, tools, and personal interactions; and analysing data for patterns and link analysis to determine the need for additional action.
  • Research information about new technologies, developing and reviewing system documentation, reviewing network and tool set changes before and after installations.
  • Develop industry expertise to include discerning patterns of complex threat actor behaviour and communicating current and developing cyber threats to leadership and business partners.
  • Reviewing, refining, and creating team documentation and procedures.
  • Participate in team meetings and discussions to help with knowledge transfer and quick identification of both trending intel and training or tool needs within the team.

Benefits

  • health care and other insurance benefits (for employee and family)
  • retirement benefits
  • paid holidays
  • vacation
  • paid caregiver/parental and medical leave
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service