loader

Threat Intelligence and Researcher

Location :Mumbai (5 days WFO)

Total Experience:

Experience: 5 – 8 years

Job Skills:

  • Keep track of APTs groups (advanced persistent threats).
  • Know APT Groups motivation, their tools & techniques, the malware they write, and C&C (command and control center), identify their targets. 
  • Threat intelligence analyst must have professional experience in cybersecurity. 
  • A Threat Researcher is responsible for identifying and analyzing potential threats to an organization’s network and systems.
  • They work to understand the tactics, techniques, and procedures (TTPs) used by threat actors to compromise systems and steal sensitive data. 
  • Threat Researchers are also responsible for developing and implementing strategies to detect, prevent, and mitigate these threats.
  • Conducting research on emerging threats and Vulnerabilities.
  • Analyzing Threat intelligence data to identify potential threats.
  • Developing and implementing strategies to detect and prevent threats.
  • Collaborating with other cybersecurity professionals to develop and implement security measures.
  • Creating reports and presentations to communicate findings to management and other stakeholders.
  • Ensure all the advisories received from regulatory and strategy partners are analyzed and processed in timely manner. 
  • All TI trackers are updated in near real time. 
  • Create reports/Dashboard for higher management.
  • Collects data types and sources of information in addition to commonly collecting forms of threat data, i.e., malicious IPs and domains. Information from news and social media sources. Vulnerability data such as personally identifiable information. 
  • Performs sorting, filtering, indexing on raw data. 
  • Format and structure raw data. 
  • Take the result of several tools, data sources and combines those data points on a per-host basis, performing, investigating, and analyzing data. 
  • Dissemination: Deliver the intelligence to the intended consumers at different levels: Strategic, Tactical, Operational, Technical.
  • Provide Contextual Intel feeds to all the stacks which requires priority attention to protect HDFC assets.
  • Regular training and knowledge sharing with the team. 
  • Collaboration with TH and RT and provide threat intel to SOC CD to create use case. 
  • There should be no audit points to come from the defined and existing process. Audit requirements should be fulfilled. 
  • Efficacy testing for new product as per industry best practice. 
  • Timely tracking and follow-ups on all open alerts/advisories. 
  • Timely escalation on open issues/tasks.
  • Responding to all intelligence received from our Threat Intel partners and inform seniors or required escalation where required like Bank data leak/breach alerts. 
  • Doing in-house threat research from the open sources along with the help of our existing Threat Intel portal.

Platforms:

Notice Period: Immediate to 30 days.

Note:

About us – Terralogic (www.terralogic.com ; https://www.linkedin.com/company/terralogic/

The very basic foundation of Terralogic has been to provide Technology Services for the Connected World. Our core DNA is in tying deep Engineering expertise to our Customers’ roadmap and business needs to bring true partnership! We work from product conceptualization to product maturity, decline & sustenance by investing in a broad range of technical skills and domain experts with an eye on stability and increased productivity. We look at problem statements exactly the way our customers look at them and provide far-reaching solutions at highly optimized cost levels. With a thousand plus strength, experienced management, and best-in-class practices, we deliver world-class successes for our Customers.

 

Our 16 years of achievements includes:

  • 10M+

    lines of codes

  • 2400+

    projects completed

  • 900+

    satisfied clients

  • 16+

    counties served

Consult with us Now