
Mandiant
Job Requirements
Job Responsibilities
Cyber Threat Intelligence Consultant Jobs In Dubai 2022 | Mandiant
For More Top Organization Jobs: Click Here
Hiring Organization | Mandiant |
Job Location | Dubai, United Arab Emirates |
Date Posted | Sep/15/2022 |
Base Salary | AED |
Employment Type | Full Time |
Valid Until | N/A |
Cyber Threat Intelligence Consultant Jobs In Dubai 2022 | Mandiant
List Of Vacant Positions (Newly Updated)
JOB TITLE | LOCATION |
---|---|
Cyber Threat Intelligence Consultant | Dubai, United Arab Emirates |
Job Responsibilities:
- Process, organize, analyze, and assist in contextualization of incident indicators
- Support CTI collection, processing, and analysis
- Support Tactical CTI analysis efforts (i.e., log analysis and threat hunting)
- Provide static and dynamic malware analysis
- Support customer operational stand-up calls & weekly updates
- Develop engagement deliverables, support customer briefings
- Investigate network and host detection and monitoring systems to advise cyber defense teams
- Develop customers core threat intelligence capabilities and support CTI capability maturation
- Support CTI stakeholder identification and intelligence requirements gathering
- Support the creation and tuning of CTI standard operating procedures (SOPs)
- Integrate CTI workflows into cyber defense functions (i.e., SOC, IR, Hunt, Risk)
- Develop Cyber Threat Profiles based on industry, geo location, critical assets etc.
- Map Threat Actor capabilities to organizational defenses
- Support intelligence training course development and delivery
Job Requirements:
- 5+ years’ experience in a dedicated intelligence practitioner role; Intel disciplines can vary but must have worked (currently or previously) in a dedicated Intel role to be considered.
- Operational understanding of CTI methodologies and application concepts within the modern cyber security organization
- Direct experience in the consumption, processing, and analysis of tactical (technical) CTI within an operational environment, supporting monitoring, detection, and response capabilities
- Experience in deploying and analyzing data from technical security controls, to include web proxy, firewalls, IPS, IDS, mail content scanning appliances, enterprise antivirus solutions, network analyzers, and other host-based protection solutions