Cyber Threat Intelligence Analyst

DocuSign DocuSign · Enterprise · Bangalore, India · Security

This role focuses on collecting, processing, analyzing, and disseminating cyber threat intelligence to protect the organization from cyber threats. It involves monitoring emerging threats, collaborating with internal security teams, developing threat profiles, and creating reports for leadership. The ideal candidate has experience in cyber threat intelligence, scripting for automation, and using threat intelligence platforms.

What you'd actually do

  1. Collect, process, analyze, and disseminate cyber threat intelligence from various raw and finished intelligence sources
  2. Monitor and identify emerging threats, attack vectors, and malicious campaigns that could impact Docusign’s business
  3. Provide timely and actionable cyber threat intelligence to improve decision-making and improve incident response efforts
  4. Collaborate with internal teams (e.g. SOC, Incident Response, Red Team, Detection Engineering) to enhance mitigation strategies based on cyber threat intelligence insights
  5. Develop dynamic threat profiles, indicators of compromise (IOCs), tactics, techniques and procedures (TTPs) for threat actors targeting Docusign

Skills

Required

  • Cyber threat intelligence
  • Scripting/programming languages (Python, PowerShell)
  • Threat intelligence platforms (TIP)
  • Threat hunting tools
  • SIEM systems
  • Presenting technical information
  • Analytical skills
  • Understanding of current cyber threat landscape
  • MITRE ATT&CK
  • Pyramid of Pain
  • Structured Analytic Techniques
  • Traffic Light Protocol

Nice to have

  • Knowledge of threats to generative AI systems
  • Familiarity with malware analysis
  • Reverse engineering
  • Network forensics
  • Threat hunting
  • Detection engineering
  • Incident response
  • Threat Intelligence Lifecycle
  • Threat Profiling
  • Pivoting
  • OpenCTI
  • Threatconnect
  • Jupyter Notebook
  • Tines
  • Recorded Future
  • Spycloud
  • Feedly
  • APIs
  • structured and unstructured data

What the JD emphasized

  • 5+ years of experience in cyber threat intelligence
  • Experience with applying scripting or programming languages (e.g., Python, PowerShell) to automate intelligence collection, data processing, and analysis
  • Experience with threat intelligence platforms (TIP), threat hunting tools, and security information and event management (SIEM) systems
  • Proven record of presenting technical information to technical and non-technical audiences