15 September 2021

Lead Cyber Threat Intelligence Analyst Cis Talent500 10 Years T853

WHO ARE We are looking FOR Were looking for Lead Cyber Threat Intelligence Analyst. This role is responsible for researching and analyzing current and emerging threats and vulnerabilities that have the potential to cause harm or malicious actions against the Nike environment. Our ideal candidate is highly experienced in the cyber threat field, believes in a business risk balanced approach and excels in a highly-matrixed, people-focused environment. WHAT WILL YOU WORK ON.
- Maintain awareness of the cyber threat landscape and leverage automation to build better detection capabilities.
- Analyze and validate the feasibility of exploits and their impact to Nike based on difficulty of development/exploitation.
- Recommend patching priorities and timelines based on proof of concepts (POCs), exploits, and the Nike threat landscape.
- Identify, develop, and maintain access to non-standard Intel sources.
- Provide direct support to the Nike Cyber Defense Center and Incident Response (NCDC/IR), and Corporate Information Security (CIS) Operations management team.
- API customizations from vendor tools that feed data visualization tools, such as Tableau.
- Identify and develop IOCs through research, sandboxing, and reversing.
- Share knowledge with the rest of the team and help other team members grow their skillsets. WHO WILL YOU WORK WITH This role is part of the Cyber Threat Intelligence team within Corporate Information Security (CIS). You will work with teams within CIS, including the Nike Cyber Defense Center and Incident Response (NCDC/IR) and CIS Operations Management team.
What you bring
- Bachelors degree in Information Technology, Information Security/Assurance, Engineering, or related field of study.
- Have 5-8 years of Cyber Threat Intelligence experience.
- experience in and understand cyber threat modeling (e.g, STRIDE) to identify potential threats.
- experience in intelligence frameworks and collaboration platforms (MITRE ATT and CK, CAPEC, MISP, Malpedia, STIX).
- Expertise in honeypots/honeynets, canaries, and other active deception tools to identify network attacks.
- Intimate knowledge about information security threat intelligence and thrive on the details of threat analysis. You know what\'s possible and what\'s not. You know how to determine what\'s relevant to Nike.
- Excellent written and verbal communication skills required. You are able to communicate details in a clear, business relevant manner.
- Experienced in threat validation.
- experience working incident response.
- Working level knowledge of the following: Python, C, C ++, Assembly language (ASM).
- Comfortable creating Yara rules for hunting purposes.
- Strong people leader. You know how to build and motivate teams and individuals and help them grow to their potential.
- Has connections within the cyber threat intelligence community.
- Customer-oriented focus, with a strong interest in a satisfied client.
- Take pride in being diligent and self-driven.
- Ethics and ability to manage sensitive material are unquestionable.
- Believe change is an opportunity and ambiguity doesn\'t rattle you.
- Work life balance is as important to you as it is to us. However, the occasional ad-hoc change of evening or weekend plans you see as a collective opportunity to excel.

Email: EXPIRED



REPORT
Jobs
goto: General Jobs