1-3 years of experience
Concerned about your lack of experience? Learn More...
Employment Type:
Full time
Job Category:
See more jobs for students and recent grads who studied:
Cyber Threat Intelligence Engineer
Tell Us More About Your Job Preferences
By telling us what you think of this job, we can help find jobs that match your interests. If you want to see more jobs like this, click on the smiley face. Or if this job isn't what you are looking for, click the frowny face. Learn More...

Follow This Company

Job Description

Prestigious Financial Institution is currently seeking a Cyber Threat Intelligence Engineer. Candidate will be responsible for the processing of threat intelligence to assess the risk to Company systems and reputation. The candidate will be responsible for producing threat information digests and developing countermeasures using industry standard information security controls.


Develop and use standard operating procedures which use cyber security and threat intelligence to enhance enterprise security posture.

Research cyber threats and develop digests of available information for communication to internal teams and management.

Analyze log data from various systems to correlate intelligence information with network behavior.

Develop and implement security countermeasures based on threat research.


  • 3+ years of experience in cyber security
  • 2+ years experience as an analyst, targeter, or collection management officer
  • Formal training and experience in intelligence analysis or targeting/collections management
  • Experience formulating and prioritizing intelligence requirements according to an organization's risk management framework
  • Experience producing finished analytic products
  • Ability to integrate outputs of technical research, eg, network forensics and reverse engineering, into intelligence products
  • Experience providing ad hoc analytic in support of incident handling and investigative activities
  • Experience using commercial and open source cyber threat information to support intelligence analysis
  • Ability to utilize tools for sifting through and visualizing large technical data sets
  • Ability to craft intelligence collection requirements that can be satisfied through technical and human collection methodologies
  • Strong understanding of cyber threat analysis models such as kill chain, diamond model, etc and how they apply to both targeted and non-targeted cyber threats


Applicants must be eligible to work in the specified location

This company profile was created by AfterCollege and is about Request Technology - Craig Johnson. This page is not endorsed by or affiliated with Request Technology - Craig Johnson. For questions regarding company profiles, please email: care@aftercollege.com.