Cyber Threat Intelligence Analyst

Verizon Verizon · Telecom · Basking Ridge, NJ +4

This role focuses on developing and maintaining sophisticated threat models to inform security strategies, identify risks, and enhance cyber resilience. It involves analyzing threat intelligence data, mapping threats to frameworks like MITRE ATT&CK, communicating findings, and collaborating with various security teams. The role also supports threat hunting and aims to automate modeling processes.

What you'd actually do

  1. Developing and maintaining Threat Models: Designing, building, and continuously refining threat models that represent potential attack vectors, adversary capabilities, and the impact on our organization's assets and operations.
  2. Analyzing Threat Intelligence Data: Collecting, processing, and analyzing diverse sources of threat intelligence, including open-source intelligence (OSINT), commercial feeds, incident reports, and internal security data, to identify emerging threats and trends.
  3. Mapping Threats to the Kill Chain and MITRE ATT&CK Framework: Aligning identified threats and tactics, techniques, and procedures (TTPs) with relevant frameworks to provide context and facilitate effective mitigation strategies.
  4. Communicating Findings: Clearly and concisely communicating threat intelligence findings to technical and non-technical audiences through reports, presentations, and dashboards.
  5. Collaborating with Security Teams: Partnering closely with security operations, incident response, vulnerability management, hunt, red/purple teams, and engineering teams to integrate threat intelligence into their workflows and improve security posture.

Skills

Required

  • Bachelor's degree or four or more years of experience.
  • Four or more years of relevant work experience.
  • Four or more years of experience in cybersecurity, with a focus on threat intelligence analysis and modeling.
  • Background working with cyber threats, attack methodologies, and adversary motivations.
  • Experience analyzing and interpreting data from various security tools and platforms.
  • Experience with the MITRE ATT&CK framework, Cyber Kill Chain, and other relevant security frameworks.
  • Experience with threat intelligence platforms (TIPs) and data visualization tools.

Nice to have

  • Excellent analytical, problem-solving, and critical thinking skills.
  • Strong written and verbal communication skills, with the ability to present complex information clearly and concisely.
  • Relevant security certifications (e.g., CISSP, CISM, GCTI, OSCP) are a plus.
  • Experience in the telecommunications industry.
  • Knowledge of cloud security concepts and threats.
  • Experience with scripting languages (e.g., Python) for data analysis and automation is a plus.

What the JD emphasized

  • Four or more years of relevant work experience required
  • Four or more years of experience in cybersecurity, with a focus on threat intelligence analysis and modeling.
  • Background working with cyber threats, attack methodologies, and adversary motivations.
  • Experience with the MITRE ATT&CK framework, Cyber Kill Chain, and other relevant security frameworks.