Jr. Cyber Threat Analyst
HR TechX Corp.
Date: 3 weeks ago
City: Pasay
Contract type: Full time

You will be reporting on technical subject matter such as malware developments, offensive security tools, vulnerability exploits, cloud security, and mobile security. Cyber Threat Analysts are expected to familiarize themselves with these topics continuously, identifying threat leads from a variety of sources. Cyber Threat Analysts are also expected to analyze malware and create effective detections, which their senior peers will review and validate. Cyber Threat Analysts must be able to communicate this subject matter effectively to various audiences, both verbally and in writing.
Specific Duties and Responsibilities:
Specific Duties and Responsibilities:
- Threat Lead Identification: Research new adversary tactics, techniques, and procedures (TTPs) using open sources (public information such as security vendor reporting, social media, code repositories); closed sources (dark web and underground forums); and proprietary sources.
- Subject Matter: Threat leads should focus on team priority intelligence requirements (PIRs). Examples of such subject matter include malware developments, offensive security tools, vulnerability exploits, cloud security, and mobile security.
- Key Detail Identification: During research, identify and take note of infection chains, host and network IoCs, malware samples, threat actors, and MITRE ATT&CK tactics and techniques
- Author Insikt Notes: Write TTP Instances detailing identified threat leads. TTP Instances include a combination of information from open-source reporting and your own analysis (i.e. code review, static malware analysis). TTP Instances are written and formatted to help our customers understand infection chains while also helping them prepare and validate their defenses.
- Cadence: Write at least 2 TTP Instance notes daily.
- Quality: Authored TTP Instances should include minimal grammatical or syntax errors. Plagiarism is not acceptable.
- Malware Analysis: Using sandbox environments and static analysis tools, analyze malware samples associated with threat leads.
- Use Cases: Malware analysis is used to provide additional insight into an event, validate open-source reporting, uncover additional IoCs, and assist peers and customers in detection engineering.
- Detection Engineering: Create malware or vulnerability detections (e.g. YARA, Sigma, Snort, Nuclei) that can be used for threat hunting, detection, and classification.
- Cadence: Create at least 1 malware or vulnerability detection per month
- Delivery: In most cases, these detections will be delivered alongside a TTP Instance.
- Information Security: Adhere to and implement quality and information security policies and carry out its processes and procedures accordingly.
- Strong written communication in English
- Demonstrable experience writing reports on technical subject matter (e.g. malware, vulnerability exploits, offensive security tools) in a clear, concise, and logical format
- Disciplined time management
- Self-starting, self-motivated, and thrive in a collaborative environment
- Ability to receive and apply constructive feedback from peers and leadership
- B.S. equivalent in computer science, information systems, or cyber intelligence
- At least one (1) year professional experience, Malware Analysis & Technical Writing
- Technical proficiency in Cyber Threat Intelligence and Threat Intelligence Platforms
- Experience working with open-source intelligence (OSINT) and/or large data sets
- Experience working with sandboxes, virtual machines, or other malware analysis tools
- Familiarity with the MITRE ATT&CK Framework, including the ability map reported activity to ATT&CK tactics and techniques
- Familiarity with interpreting and mapping cyberattacks to the Diamond Model of Intrusion Analysis
- Adeptness in cybersecurity and data protection
- Proficiency in scripting or programming languages (PHP, C, C#, C++, Python, PowerShell, Go, JavaScript, Rust)
- Experience creating malware detections (e.g. YARA, Sigma, Snort)
- Experience creating vulnerability detections (e.g. Nuclei)
How to apply
To apply for this job you need to authorize on our website. If you don't have an account yet, please register.
Post a resumeSimilar jobs
Imaging Associate - Quality Assurance
Amazon,
Pasay
1 day ago
DescriptionThe Quality Assurance Associate will conduct image quality assurance work and make informed decisions based on specifications and instructions. The candidate will also be responsible in addressing and responding in a timely manner to issues and requests raised by the Internal teams. The QA Associate assumes responsibility for final file quality by accurately assessing compliance according to specifications, demonstrating attention...

Sr Quality Evaluator
Concentrix Limited Company,
Pasay
1 day ago
Apply NowJob TitleSr Quality EvaluatorJob DescriptionThe Sr Quality Evaluator is responsible for monitoring and evaluating inbound and/or outbound calls and other customer contact methods (e.g. email, chat) for accuracy and adherence to established quality standards. This position assists in the output of assessing quality standards, provide insight to customers to contribute to program performance improvements.Monitors, evaluates and / or audits...

Benefits Administration Services Associate IV
Conduent Business Solutions France,
Pasay
1 week ago
Through our dedicated associates, Conduent delivers mission-critical services and solutions on behalf of Fortune 100 companies and over 500 governments - creating exceptional outcomes for our clients and the millions of people who count on them. You have an opportunity to personally thrive, make a difference and be part of a culture where individuality is noticed and valued every day.Job...
