Cyber Threat Analyst
HR TechX Corp.
Date: 2 days ago
City: Pasay
Contract type: Full time

TTP MNL reports on technical subject matter such as malware developments, offensive security tools, vulnerability exploits, cloud security, and mobile security. Cyber Threat Analysts are expected to familiarize themselves with these topics continuously, identifying threat leads from a variety of sources. Cyber Threat Analysts are also expected to analyze malware and create effective detections, which their senior peers will review and validate. Cyber Threat Analysts must be able to communicate this subject matter effectively to various audiences, both verbally and in writing.
Specific Duties and Responsibilities:
Threat Lead Identification: Research new adversary tactics, techniques, and procedures (TTPs) using open sources (public information such as security vendor reporting, social media, code repositories); closed sources (dark web and underground forums); and proprietary sources.
Subject Matter: Threat leads should focus on team priority intelligence
requirements (PIRs). Examples of such subject matter include malware
developments, offensive security tools, vulnerability exploits, cloud security, and mobile security.
Key Detail Identification: During research, identify and take note of infection chains, host and network IoCs, malware samples, threat actors, and MITRE ATT&CK tactics and techniques
Author Insikt Notes: Write TTP Instances detailing identified threat leads. TTP Instances include a combination of information from open-source reporting and your own analysis (i.e. code review, static malware analysis). TTP Instances are written and formatted to help our customers understand infection chains while also helping them prepare and validate their defenses.
Cadence: Write at least 2 TTP Instance notes daily
Quality: Authored TTP Instances should include minimal grammatical or syntax errors. Plagiarism is not acceptable.
Malware Analysis: Using sandbox environments and static analysis tools, analyze malware samples associated with threat leads.
Use Cases: Malware analysis is used to provide additional insight into an event, validate open-source reporting, uncover additional IoCs, and assist peers and customers in detection engineering
Detection Engineering: Create malware or vulnerability detections (e.g. YARA, Sigma, Snort, Nuclei) that can be used for threat hunting, detection, and classification.
Cadence: Create at least 1 malware or vulnerability detection per month
Delivery: In most cases, these detections will be delivered alongside a TTP Instance.
Information Security: Adhere to and implement Infinit-O's quality and information security policies and carry out its processes and procedures accordingly. Protect client-supplied and generated-for-client information from unauthorized access, disclosure, modification, destruction, or interference (see also Table of Offenses)
Carry out tasks as assigned and aligned with particular processes or activities related to information security.
Report any potential or committed non-conformity, observation and/or security event or risks to immediate superior.
Qualification
Specific Duties and Responsibilities:
Threat Lead Identification: Research new adversary tactics, techniques, and procedures (TTPs) using open sources (public information such as security vendor reporting, social media, code repositories); closed sources (dark web and underground forums); and proprietary sources.
Subject Matter: Threat leads should focus on team priority intelligence
requirements (PIRs). Examples of such subject matter include malware
developments, offensive security tools, vulnerability exploits, cloud security, and mobile security.
Key Detail Identification: During research, identify and take note of infection chains, host and network IoCs, malware samples, threat actors, and MITRE ATT&CK tactics and techniques
Author Insikt Notes: Write TTP Instances detailing identified threat leads. TTP Instances include a combination of information from open-source reporting and your own analysis (i.e. code review, static malware analysis). TTP Instances are written and formatted to help our customers understand infection chains while also helping them prepare and validate their defenses.
Cadence: Write at least 2 TTP Instance notes daily
Quality: Authored TTP Instances should include minimal grammatical or syntax errors. Plagiarism is not acceptable.
Malware Analysis: Using sandbox environments and static analysis tools, analyze malware samples associated with threat leads.
Use Cases: Malware analysis is used to provide additional insight into an event, validate open-source reporting, uncover additional IoCs, and assist peers and customers in detection engineering
Detection Engineering: Create malware or vulnerability detections (e.g. YARA, Sigma, Snort, Nuclei) that can be used for threat hunting, detection, and classification.
Cadence: Create at least 1 malware or vulnerability detection per month
Delivery: In most cases, these detections will be delivered alongside a TTP Instance.
Information Security: Adhere to and implement Infinit-O's quality and information security policies and carry out its processes and procedures accordingly. Protect client-supplied and generated-for-client information from unauthorized access, disclosure, modification, destruction, or interference (see also Table of Offenses)
Carry out tasks as assigned and aligned with particular processes or activities related to information security.
Report any potential or committed non-conformity, observation and/or security event or risks to immediate superior.
Qualification
- B.S. equivalent in computer science, information systems, or cyber intelligence
- One (1) year professional experience
- Technical proficiency in Cyber Threat Intelligence and Threat Intelligence Platforms
- Experience working with open-source intelligence (OSINT) and/or large data sets
- Experience working with sandboxes, virtual machines, or other malware analysis tools
- Familiarity with the MITRE ATT&CK Framework, including the ability map reported activity to ATT&CK tactics and techniques
- Familiarity with interpreting and mapping cyberattacks to the Diamond Model of Intrusion Analysis
- Adeptness in cybersecurity and data protection
How to apply
To apply for this job you need to authorize on our website. If you don't have an account yet, please register.
Post a resumeSimilar jobs
Head of Business Unit
HR TechX Corp.,
Pasay
6 days ago
We are seeking a dynamic and results-driven Head of Business Unit (General Manager) to lead multiple high-revenue, customer-facing verticals nationwide. This is a senior executive position overseeing the strategic direction, operational excellence, and profitability.This role requires a strategic business leader with strong operational discipline, commercial acumen, and proven experience in managing multiple business lines across a national footprint.Key ResponsibilitiesStrategic Leadership:...

Airport Representative| Hilton Manila
Hilton,
Pasay
1 week ago
Hilton isn’t just a place to work. With thousands of hotels in over 100 countries and territories, Hilton offers countless opportunities to delight. From an open door to a welcoming smile and an exceptional experience, we offer the millions of travellers who stay with us every year a welcome they will never forget.And, we strongly believe that our Team Members...

Implementation Analyst - Client Configuration Management
Visa,
Pasay
2 weeks ago
Visa is a world leader in payments and technology, with over 259 billion payments transactions flowing safely between consumers, merchants, financial institutions, and government entities in more than 200 countries and territories each year. Our mission is to connect the world through the most innovative, convenient, reliable, and secure payments network, enabling individuals, businesses, and economies to thrive while driven...
