Qualifications:
- College Graduate; Preferred, not a priority - BS equivalent in computer science, information systems, or cyber intelligence
- 6 months to 1 year experience in Technical Writing, Threat Analysis, and Threat Landscape
- Must have a familiarity with MITRE ATT&CK framework; is able to associate MITRE IDs relevant to a cyber event
- Must have a familiarity with OSINT research (Open-Source Intelligence)
- Preferred, not a priority - familiar with using JIRA
- Preferably with Scripting knowledge
- Excellent English language skills, both in writing and communication
- Is significantly keen on details
- Proficiency with Google Docs and Google Sheets
- Has strong analytical skills; can accurately interpret raw data and put that into technical writing
- Possesses sufficient or advanced knowledge about cyber threats (malware, phishing, trojans, botnets, etc.) and the cyber threat landscape (e.g. a ransomware attack targeted a specific company)
- Possess sufficient knowledge about software vulnerabilities (CVEs) and associated threats (zero-day exploits, malicious exploitation, proof-of-concept exploit codes)
- Possesses sufficient or advanced knowledge about cybersecurity and protecting against cyber threats
- Is able to create logical assessments, on-point recommendations, and a thorough outlook about a cyber event (e.g. able to identify or describe the so what is related to the event)
- Is able to thrive in a collaborative environment
- Independent and has a curious approach to research
- Strong discipline with time management
- Preferred, not a priority - experience with generative artificial intelligence
- Adaptive, open to change
- Can handle tight deadlines in terms of report delivery
- Amenable to work on a Mid Shift schedule (Possible Weekend Coverage)
- Amenable to work on a hybrid setup (2-4x RTO/month) in MOA, Pasay
About the Role
Basic Function:
This position is responsible for the creation of finished intelligence reports and analyst notes.
Specific Duties and Responsibilities:
- Prepare weekly, monthly, and quarterly client-specific finished intelligence reports
- Analyze client-specific data to determine potential threats to a client or client infrastructure
- Summarize findings from client-specific data to clearly and concisely communicate a level of threat to a client or client infrastructure
- Identify open-source information and data relevant to a client's priority intelligence requirements, and summarize the information and data for inclusion in a client report
- Discover cyber threat events/ stories to be covered in the Weekly Threat Landscape, and monitor existing suggestions to track which industries need additional research
- Use the client's tool to validate information based on what was identified through open-source research; accurately interpret the results and create logical assessments or an outlook of the incident
- Conduct research cyber threat events/stories, including open source research as well as research using the client's tool dataset, to provide actionable and relevant intelligence to clients to help them better protect themselves against cyber threats
- Create Analyst Notes from previously published Weekly Threat Landscape stories
- Collaborate with the Data Science team to curate entities that are referenced in reports
- Monitor and remain up-to-date about recent cyber trends and events