360 Adept, LLC
Overview
Tracks, researches, analyzes and provides threat intelligence reporting on cyber threats targeting the organization; or produces relevant, accurate, and timely intelligence analysis and reporting that indicates the “who, what, when, where, why, how, and importance” of cyber threats, utilizing the intelligence life cycle, analytical judgement, legal and ethical parameters of intelligence collections; possess an understanding of cyber threats from espionage, hacktivism, cybercrime, malware, social engineering, geo-political influence, nation state and non-state actors, established and emerging intrusion sets and their relevance to an entity with a global footprint; produces a variety of threat intelligence reporting for stakeholders ranging from the C-Level to technical Incident Response Analysts; leverages the threat intelligence lifecycle and priority intelligence requirements to track threat actors, research cyber threats, conduct analysis and create threat intelligence reporting to support internal customers; produces a variety of intelligence reporting from technical audiences to the executive level; analyzes external technical and non-technical data from various intelligence sources (paid, open and closed) to build threat actor profiles and track threat actor activities both externally and internally; researches new and emerging vulnerabilities, threat actor’s tactics, techniques, and procedures, and conducts threat hunting within COH environment for the presence of related activity; prepares and delivers intelligence briefs to a variety of audiences. Responsibilities
Track, research, analyze and provide threat intelligence reporting on cyber threats targeting the organization. Produce relevant, accurate, and timely intelligence analysis and reporting that indicates the who, what, when, where, why, how, and importance of cyber threats, using the intelligence life cycle and ethical parameters. Understand cyber threats from espionage, hacktivism, cybercrime, malware, social engineering, geo-political influence, nation-state and non-state actors, and both established and emerging intrusion sets and their relevance to a globally footprinted entity. Produce threat intelligence reporting for stakeholders ranging from C-Level to technical Incident Response Analysts. Leverage the threat intelligence lifecycle and priority intelligence requirements to track threat actors, research cyber threats, conduct analysis and create threat intelligence reporting to support internal customers. Provide threat intelligence reporting for audiences from technical to executive levels. Analyze external technical and non-technical data from various intelligence sources (paid, open and closed) to build threat actor profiles and track actor activities externally and internally. Research new and emerging vulnerabilities, threat actors’ tactics, techniques, and procedures, and conduct threat hunting within COH environment for related activity. Prepare and deliver intelligence briefs to a variety of audiences. Qualifications
Education:
Bachelor's Degree in Computer Information or Information Technology, Cybersecurity or Information Assurance or equivalent work experience of 5 or more years. Certifications:
GIAC Cyber Threat Intelligence (GCTI)
#J-18808-Ljbffr
Tracks, researches, analyzes and provides threat intelligence reporting on cyber threats targeting the organization; or produces relevant, accurate, and timely intelligence analysis and reporting that indicates the “who, what, when, where, why, how, and importance” of cyber threats, utilizing the intelligence life cycle, analytical judgement, legal and ethical parameters of intelligence collections; possess an understanding of cyber threats from espionage, hacktivism, cybercrime, malware, social engineering, geo-political influence, nation state and non-state actors, established and emerging intrusion sets and their relevance to an entity with a global footprint; produces a variety of threat intelligence reporting for stakeholders ranging from the C-Level to technical Incident Response Analysts; leverages the threat intelligence lifecycle and priority intelligence requirements to track threat actors, research cyber threats, conduct analysis and create threat intelligence reporting to support internal customers; produces a variety of intelligence reporting from technical audiences to the executive level; analyzes external technical and non-technical data from various intelligence sources (paid, open and closed) to build threat actor profiles and track threat actor activities both externally and internally; researches new and emerging vulnerabilities, threat actor’s tactics, techniques, and procedures, and conducts threat hunting within COH environment for the presence of related activity; prepares and delivers intelligence briefs to a variety of audiences. Responsibilities
Track, research, analyze and provide threat intelligence reporting on cyber threats targeting the organization. Produce relevant, accurate, and timely intelligence analysis and reporting that indicates the who, what, when, where, why, how, and importance of cyber threats, using the intelligence life cycle and ethical parameters. Understand cyber threats from espionage, hacktivism, cybercrime, malware, social engineering, geo-political influence, nation-state and non-state actors, and both established and emerging intrusion sets and their relevance to a globally footprinted entity. Produce threat intelligence reporting for stakeholders ranging from C-Level to technical Incident Response Analysts. Leverage the threat intelligence lifecycle and priority intelligence requirements to track threat actors, research cyber threats, conduct analysis and create threat intelligence reporting to support internal customers. Provide threat intelligence reporting for audiences from technical to executive levels. Analyze external technical and non-technical data from various intelligence sources (paid, open and closed) to build threat actor profiles and track actor activities externally and internally. Research new and emerging vulnerabilities, threat actors’ tactics, techniques, and procedures, and conduct threat hunting within COH environment for related activity. Prepare and deliver intelligence briefs to a variety of audiences. Qualifications
Education:
Bachelor's Degree in Computer Information or Information Technology, Cybersecurity or Information Assurance or equivalent work experience of 5 or more years. Certifications:
GIAC Cyber Threat Intelligence (GCTI)
#J-18808-Ljbffr