Responsibilities
Produce intelligence outputs to provide an accurate depiction of the current threat landscape and associated risk through the use ..
Responsibilities
Produce intelligence outputs to provide an accurate depiction of the current threat landscape and associated risk through the use of customer, community, and open source reporting
Produce actionable intelligence information for delivery to colleagues and customers in the form of technical reports, briefings, and data feeds
Participate in regular threat focus meetings with fellow SOCs
Perform detailed investigative works into all traffic anomalies against established, historical baselines of individual agencies. Reviewing and profiling the events of all monitored clients
Assist the Security Analysts with the investigative works
Build rules and intelligence to detect such threats and proliferate to all monitored networks. Implementing and devising detection method of such threats in our security operations thru CESM IE/MCE Rules, DB scripts etc.
Works with R&D for new signature package for deployment.
Filtering and fine-tuning the security events flowing to our databases
Prepare training programme for Security Analyst and conduct knowledge sharing sessions for Security Analyst
Working with engineering team to set up new initiatives i.e. honeypot on the Internet ADSL link to improve security incident detection capabilities
Monitor real-time third party security feeds, forums, and mailing lists to gather information on vulnerabilities and exploits related to the client
Assess each event based on factual information and wider contextual information available
Any other tasks as assigned
Requirements
Degree holder with at least 5 years' of experience in related field and capacity
Prior experience working in a Security Operations Centre (SOC) or Computer Emergency Response Team (CERT/CIRT).
Possessed deep interest in open source research and critical thinking / contextual analysis abilities
Investigative and analytical problem solving skills
An understanding of the current vulnerabilities, response, and mitigation strategies used in cyber security;
Related professional cyber security certification, such as GCIA, CEH, will be preferred.
Experience with intelligence analysis processes, including Open Source Intelligence (OSINT) and closed source intelligence gathering, source verification, data fusion, link analysis, and threat actor.
Ability to research and characterize security threats to include identification and classification of threat indicators