REQUIRED QUALIFICATIONS
• 4 years of relevant work experience
• Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field, or equivalent practical experience.
• Demonstrable experience with threat intelligence platforms (TIPs) and security information and event management (SIEM) systems (e.g., Splunk, Elastic, Sentinel).
• Strong understanding and ability to deconstruct complex adversary tactics, techniques, and procedures (TTPs) and experience applying frameworks like MITRE ATT&CK to articulate adversary behaviors and inform defensive strategies.
• Excellent written and verbal communication skills, with the ability to convey complex technical information to diverse audiences.
• Demonstrated experience in leading and operationalizing a Threat Intelligence program.
PREFERRED QUALIFICATIONS
• Experience with scripting languages (e.g., Python) for data analysis, automation, or malware analysis.
• Experience with vulnerability scanning platforms (e.g., Tenable.sc, Nessus, Qualys) and their integration with threat intelligence.
• Experience performing in-depth technical analysis of malware (static and dynamic), phishing campaigns, and observed adversary techniques to understand their functionality, capabilities, and intent.
• Experience analyzing network traffic (PCAP), logs, and endpoint data to identify technical indicators and patterns of malicious activity.
• Certifications such as GCTI, GREM, GCFA, CISSP, or similar.