1-3 years of experience
Concerned about your lack of experience? Learn More...
Employment Type:
Full time
Job Category:
Cyber Threat Intelligence Engineer
(This job is no longer available)
Grad Date

Not sure what types of jobs you are interested in?

Explore Jobs
Based on Your Education

Follow This Company

Job Description

Prestigious Financial Institution is currently seeking a Cyber Threat Intelligence Engineer. Candidate will be responsible for the processing of threat intelligence to assess the risk to Company systems and reputation. The candidate will be responsible for producing threat information digests and developing countermeasures using industry standard information security controls.


Develop and use standard operating procedures which use cyber security and threat intelligence to enhance enterprise security posture.

Research cyber threats and develop digests of available information for communication to internal teams and management.

Analyze log data from various systems to correlate intelligence information with network behavior.

Develop and implement security countermeasures based on threat research.


  • 3+ years of experience in cyber security
  • 2+ years experience as an analyst, targeter, or collection management officer
  • Formal training and experience in intelligence analysis or targeting/collections management
  • Experience formulating and prioritizing intelligence requirements according to an organization's risk management framework
  • Experience producing finished analytic products
  • Ability to integrate outputs of technical research, eg, network forensics and reverse engineering, into intelligence products
  • Experience providing ad hoc analytic in support of incident handling and investigative activities
  • Experience using commercial and open source cyber threat information to support intelligence analysis
  • Ability to utilize tools for sifting through and visualizing large technical data sets
  • Ability to craft intelligence collection requirements that can be satisfied through technical and human collection methodologies
  • Strong understanding of cyber threat analysis models such as kill chain, diamond model, etc and how they apply to both targeted and non-targeted cyber threats


Applicants must be eligible to work in the specified location