Number of Openings 1 Total Yrs. of Experience 5-8 Years Relevant Yrs. of experience 3-5 Years Detailed JD (Roles and Responsibilities) Job Description
This position is for a Cyber Threat Intelligence Analyst within the Quartz business unit of Infosys, which supports the connectivity and entertainment platforms of Liberty Global, the parent company to multiple major telecommunications organisations across Europe.
As a Cyber Threat Intelligence Analyst within Quartz, your role will involve providing strategic, operational and tactical intelligence to support security operations, enabling various security functions to implement timely countermeasures. Additionally, you will be responsible for the configuration and operation of multiple new threat intelligence tools.
Key Responsibilities
• Stay updated on cyber threat trends, particularly those impacting the telecommunications and technology services sectors.
• Analyse intelligence from various sources such as government agencies, security vendors, commercial threat intelligence providers, etc.
• Create threat intelligence advisories on emerging threats for operational teams.
• Supporting the incident response process as the threat intelligence SME.
• Configuring collections rules within the threat intelligence platform to automate the collection of intelligence to satisfy intelligence requirements.
• Provide vulnerability intelligence on high-risk vulnerabilities to the Vulnerability Management team to facilitate their vulnerability prioritisation process.
• Monitor and respond to Digital Risk Protection (DRP) alerts. Key examples include:
o Exposed corporate credentials
o Data leakage
o Impersonating domains and phishing webpages
• Provide threat intelligence briefings to stakeholders.
• Optimise intelligence delivery to security systems.
About you
• Proficient in intelligence analysis, analytical models and threat intelligence frameworks such as the cyber kill chain and the diamond model.
• Skilled in OSINT gathering and OSINT investigations.
• Familiar with threat intelligence tools such as threat intelligence platforms.
• Experienced with navigation and collecting information from dark web sources.
• Proficient at extracting tactics, techniques and procedures from reporting and mapping them to the MITRE ATT&CK framework.
• Familiar with the threat dynamics in the telecommunications and technology sector.
• Ideally hold a Bachelor’s degree in IT, Computer Science or other related fields is preferred but is not a requirement.
• Certifications such as GCTI, CompTIA Security+, etc, are advantageous but not mandatory. Mandatory skills • Proficient in intelligence analysis, analytical models and threat intelligence frameworks such as the cyber kill chain and the diamond model.
• Skilled in OSINT gathering and OSINT investigations.
• Familiar with threat intelligence tools such as threat intelligence platforms.
• Experienced with navigation and collecting information from dark web sources.
• Proficient at extracting tactics, techniques and procedures from reporting and mapping them to the MITRE ATT&CK framework.
• Familiar with the threat dynamics in the telecommunications and technology sector.
• Ideally hold a Bachelor’s degree in IT, Computer Science or other related fields is preferred but is not a requirement.
• Certifications such as GCTI, CompTIA Security+, etc, are advantageous but not mandatory. Desired/ Secondary skills • Stay updated on cyber threat trends, particularly those impacting the telecommunications and technology services sectors.
• Analyse intelligence from various sources such as government agencies, security vendors, commercial threat intelligence providers, etc.
• Create threat intelligence advisories on emerging threats for operational teams.
• Supporting the incident response process as the threat intelligence SME.
• Configuring collections rules within the threat intelligence platform to automate the collection of intelligence to satisfy intelligence requirements.
• Provide vulnerability intelligence on high-risk vulnerabilities to the Vulnerability Management team to facilitate their vulnerability prioritisation process.
• Monitor and respond to Digital Risk Protection (DRP) alerts. Key examples include:
o Exposed corporate credentials
o Data leakage
o Impersonating domains and phishing webpages
• Provide threat intelligence briefings to stakeholders.
• Optimise intelligence delivery to security systems. Domain Security
Bachelor’s degree in IT, Computer Science