Cyber Threat Analyst

2 days ago


Pasay, National Capital Region, Philippines HR TechX Corp. Full time

Join to apply for the Cyber Threat Analyst role at HR TechX Corp.

Get AI-powered advice on this job and more exclusive features.

Responsibilities
  • Threat Lead Identification: Research new adversary tactics, techniques, and procedures (TTPs) using open sources (public information such as security vendor reporting, social media, code repositories); closed sources (dark web and underground forums); and proprietary sources.
  • Subject Matter: Threat leads should focus on team priority intelligence requirements (PIRs). Examples of such subject matter include malware developments, offensive security tools, vulnerability exploits, cloud security, and mobile security.
  • Key Detail Identification: During research, identify and take note of infection chains, host and network IoCs, malware samples, threat actors, and MITRE ATT&CK tactics and techniques
  • Author Insikt Notes: Write TTP Instances detailing identified threat leads. TTP Instances include a combination of information from open-source reporting and your own analysis (i.e. code review, static malware analysis). TTP Instances are written and formatted to help our customers understand infection chains while also helping them prepare and validate their defenses.
  • Cadence: Write at least 2 TTP Instance notes daily
  • Quality: Authored TTP Instances should include minimal grammatical or syntax errors. Plagiarism is not acceptable.
  • Malware Analysis: Using sandbox environments and static analysis tools, analyze malware samples associated with threat leads.
  • Use Cases: Malware analysis is used to provide additional insight into an event, validate open-source reporting, uncover additional IoCs, and assist peers and customers in detection engineering
  • Detection Engineering: Create malware or vulnerability detections (e.g. YARA, Sigma, Snort, Nuclei) that can be used for threat hunting, detection, and classification.
  • Cadence: Create at least 1 malware or vulnerability detection per month
  • Delivery: In most cases, these detections will be delivered alongside a TTP Instance.
  • Information Security: Adhere to and implement Infinit-O's quality and information security policies and carry out its processes and procedures accordingly.
  • Protect client-supplied and generated-for-client information from unauthorized access, disclosure, modification, destruction, or interference (see also Table of Offenses)
  • Carry out tasks as assigned and aligned with particular processes or activities related to information security.
  • Report any potential or committed non-conformity, observation and/or security vent or risks to immediate superior.
Specific Duties and Responsibilities
  • Threat Lead Identification: Research new adversary tactics, techniques, and procedures (TTPs) using open sources (public information such as security vendor reporting, social media, code repositories); closed sources (dark web and underground forums); and proprietary sources.
  • Subject Matter: Threat leads should focus on team priority intelligence requirements (PIRs). Examples of such subject matter include malware developments, offensive security tools, vulnerability exploits, cloud security, and mobile security.
  • Key Detail Identification: During research, identify and take note of infection chains, host and network IoCs, malware samples, threat actors, and MITRE ATT&CK tactics and techniques
  • Author Insikt Notes: Write TTP Instances detailing identified threat leads. TTP Instances include a combination of information from open-source reporting and your own analysis (i.e. code review, static malware analysis). TTP Instances are written and formatted to help our customers understand infection chains while also helping them prepare and validate their defenses.
  • Cadence: Write at least 2 TTP Instance notes daily
  • Quality: Authored TTP Instances should include minimal grammatical or syntax errors. Plagiarism is not acceptable.
  • Malware Analysis: Using sandbox environments and static analysis tools, analyze malware samples associated with threat leads.
  • Use Cases: Malware analysis is used to provide additional insight into an event, validate open-source reporting, uncover additional IoCs, and assist peers and customers in detection engineering
  • Detection Engineering: Create malware or vulnerability detections (e.g. YARA, Sigma, Snort, Nuclei) that can be used for threat hunting, detection, and classification.
  • Cadence: Create at least 1 malware or vulnerability detection per month
  • Delivery: In most cases, these detections will be delivered alongside a TTP Instance.
  • Information Security: Adhere to and implement Infinit-O's quality and information security policies and carry out its processes and procedures accordingly.
  • Protect client-supplied and generated-for-client information from unauthorized access, disclosure, modification, destruction, or interference (see also Table of Offenses)
  • Carry out tasks as assigned and aligned with particular processes or activities related to information security.
  • Report any potential or committed non-conformity, observation and/or security vent or risks to immediate superior.
QualificationRequired Skills
  • Strong written communication in English
  • Demonstrable experience writing reports on technical subject matter (e.g. malware, vulnerability exploits, offensive security tools) in a clear, concise, and logical format
  • Disciplined time management
  • Self-starting, self-motivated, and thrive in a collaborative environment
  • Ability to receive and apply constructive feedback from peers and leadership
Minimum Qualifications
  • B.S. equivalent in computer science, information systems, or cyber intelligence
  • One (1) year professional experience
  • Technical proficiency in Cyber Threat Intelligence and Threat Intelligence Platforms
  • Experience working with open-source intelligence (OSINT) and/or large data sets
  • Experience working with sandboxes, virtual machines, or other malware analysis tools
  • Familiarity with the MITRE ATT&CK Framework, including the ability map reported activity to ATT&CK tactics and techniques
  • Familiarity with interpreting and mapping cyberattacks to the Diamond Model of Intrusion Analysis
  • Adeptness in cybersecurity and data protection
Preferred Qualifications
  • Proficiency in scripting or programming languages (PHP, C, C#, C++, Python, PowerShell, Go, JavaScript, Rust)
  • Experience creating malware detections (e.g. YARA, Sigma, Snort)
  • Experience creating vulnerability detections (e.g. Nuclei)
Seniority level
  • Not Applicable
Employment type
  • Full-time
Job function
  • Information Technology
Industries
  • Technology, Information and Internet
#J-18808-Ljbffr

  • Pasay, National Capital Region, Philippines beBeeCybersecurity Full time $60,000 - $80,000

    Job Title: Cyber Threat AnalystThis role involves the identification and analysis of cyber threats to protect our clients. As a cyber threat analyst, you will research new adversary tactics, techniques, and procedures (TTPs) using various sources including open-source intelligence (OSINT), closed sources, and proprietary information.Key responsibilities...


  • Pasay, National Capital Region, Philippines ACCPRO International Full time

    We're Hiring: Threat Intelligent AnalystMOA, Pasay | Hybrid (1-2x a month) | Night ShiftQUALIFICATIONS:- College graduate- At least 1 year experience in Technical Writing and Research (Technical Writers)- Must have general knowledge or familiarity (even if not direct experience) with Threat Analysis and Threat Landscape, MITRE ATT&CK framework, OSINT...


  • Pasay, National Capital Region, Philippines MicroSourcing Full time

    Cyber Security Administrator (Dayshift - Hybrid)As a Cyber Security Administrator, you will play a critical role in safeguarding the organisation's IT infrastructure and information assets by implementing, monitoring and maintaining robust security measures. You will be responsible for ensuring the security integrity, confidentiality and availability of...


  • Pasay, National Capital Region, Philippines JK Network Services Full time

    COMPANY PROFILE: A well-established BPO company that is well-committed in providing business outsourcing needs to its clientsPosition: Vulnerability Assessment AnalystCompany Industry: BPO CompanyWork Location: MOA Pasay Work Schedule: Mid Shift (4:00 PM or 5:00 PM)Salary: Php 60,000 – Php 70,000Work Set Up: Hybrid (1–2 times a month Return-to-Office)JOB...


  • Pasay, National Capital Region, Philippines beBeeCyberSecurity Full time $90,000 - $120,000

    Job DescriptionWe are seeking a skilled Cyber Defense Operations Engineer to join our team. As a key member of our CDO Team, you will play a vital role in identifying and managing cyber risks, leading operational remediation projects for both ship and shore.The ideal candidate will have a strong technical background in cybersecurity, with experience in...


  • Pasay, National Capital Region, Philippines Vestas Full time

    Cyber Security Analyst IIThe role is primarily responsible for providing SOC Tier 2 Security Incident analysis to ensure that Vestas' network, assets, and applications/platforms are monitored and secured.Organization: Enterprise Cyber Security > Global Security Operations Center > Security Operations Center - APACResponsibilitiesTrain, coach, mentor, and...


  • Pasay, National Capital Region, Philippines Metrobank Full time

    Press Tab to Move to Skip to Content LinkHere at Metrobank, we don't simply hire employees—we hone future leaders. We provide opportunities that enhance your skills and unlock your talents, helping you evolve into a well-rounded individual. We supply you with all the pieces you need to do your best work, unleashing your full potential to help you secure...


  • Pasay, National Capital Region, Philippines beBeeCyber Full time ₱900,000 - ₱1,200,000

    Protect and Preserve Our Digital FoundationsAs a Cyber Security Administrator, you will play a pivotal role in safeguarding our organisation's IT infrastructure and sensitive information by implementing, monitoring and maintaining robust security measures. Your expertise will help protect against cyber threats, ensure compliance with industry standards and...


  • Pasay, National Capital Region, Philippines beBeeSecurityExpert Full time

    We are seeking a highly skilled Security Expert to join our team in ensuring the security of our web applications.Job DescriptionThe successful candidate will be responsible for applying system security engineering principles to deliver real solutions that enhance the security position. This includes identifying threats and developing suitable defense...