Sr. Cyberthreat Analyst

3 weeks ago


Pasay, Philippines HRTX Full time

Specific Duties and Responsibilities: Threat Lead Identification: Research new adversary tactics, techniques, and procedures (TTPs) using open sources (public information such as security vendor reporting, social media, code repositories); closed sources (dark web and underground forums); and proprietary sources.Subject Matter: Threat leads should focus on team priority intelligence requirements (PIRs). Examples of such subject matter include malware developments, offensive security tools, vulnerability exploits, cloud security, and mobile security.Key Detail Identification: During research, identify and take note of infection chains, host and network IoCs, malware samples, threat actors, and MITRE ATT&CK tactics and techniques.Author Notes: Write TTP Instances detailing identified threat leads. TTP Instances include a combination of information from open-source reporting and your own analysis (i.e. code review, static malware analysis). TTP Instances are written and formatted to help our customers understand infection chains while also helping them prepare and validate their defenses.Cadence: Write at least 2 TTP Instance notes dailyQuality: Authored TTP Instances should include minimal grammatical or syntax errors. Plagiarism is not acceptable.Malware Analysis: Using sandbox environments and static analysis tools, analyze malware samples associated with threat leads.Use Cases: Malware analysis is used to provide additional insight into an event, validate open-source reporting, uncover additional IoCs, and assist peers and customers in detection engineering.Detection Engineering: Create malware or vulnerability detections (e.g. YARA, Sigma, Snort, Nuclei) that can be used for threat hunting, detection, and classification.Cadence: Create at least 2 malware or vulnerability detections per monthDelivery: These detections may be uploaded to the Client Platform on their own, or accompanied by a TTP Instance.Content Review: Review TTP Instances and Malware Detections created by your peers, checking for subject matter accuracy, correct IoC identification (no false positives), MITRE ATT&CK mapping, Diamond Model mapping, and proper grammar and formatting.Content Publication: Upload reviewed TTP Instances to the Client Platform while ensuring proper entity and Diamond Model tagging.Information Security: Adhere to and implement our organization's quality and information security policies and carry out its processes and procedures accordingly.Protect client-supplied and generated-for-client information from unauthorized access, disclosure, modification, destruction, or interference (see also Table of Offenses)Carry out tasks as assigned and aligned with particular processes or activities related to information security.Report any potential or committed non-conformity, observation and/or security event or risks to immediate superior. Qualification Required Skills Strong written communication in EnglishDemonstrable experience writing reports on technical subject matter (e.g. malware, vulnerability exploits, offensive security tools) in a clear, concise, and logical formatDemonstrable ability to create malware detections (e.g. YARA, Sigma, Snort) with no false positivesDisciplined time managementFlexibility when working with a global team in varying timezones Self-starting, self-motivated, and thrive in a collaborative environment Ability to receive and apply constructive feedback from peers and leadership Minimum Qualifications B.S. equivalent in computer science, information systems, or cyber intelligence Four (4) years of professional experience in the Cybersecurity or Threat Intelligence industryTechnical proficiency in Cyber Threat Intelligence and Threat Intelligence platformsExperience working with open-source intelligence (OSINT) and/or large data setsExperience working with sandboxes, virtual machines, or other malware analysis toolsFamiliarity with the MITRE ATT&CK Framework, including the ability map reported activity to ATT&CK tactics and techniquesFamiliarity with interpreting and mapping cyberattacks to the Diamond Model of Intrusion AnalysisAdeptness in cybersecurity and data protection Preferred Qualifications Proficiency in scripting or programming languages (PHP, C, C#, C++, Python, PowerShell, Go, JavaScript, Rust)Experience creating vulnerability detections (e.g. Nuclei) R



  • Pasay, Philippines HRTX Full time

    Specific Duties and Responsibilities: Threat Lead Identification: Research new adversary tactics, techniques, and procedures (TTPs) using open sources (public information such as security vendor reporting, social media, code repositories); closed sources (dark web and underground forums); and proprietary sources. Subject Matter: Threat leads should focus on...


  • Pasay, National Capital Region, Philippines TASQ Staffing Solutions Full time

    About the job, Sr. Executive - Process Training (MOA Pasay) | HybridWork Setup: Hybrid (MOA Pasay)Work Schedule: Mid ShiftRequirements:2 years of experience in Training BPOGood communication skillsBasic knowledge of MS Office MS Excel, PowerPoint, Word Doc, OutlookResponsible for support for current new-hire training and then full facilitation of future...