Description

Job Description

SPECIFIC DUTIES AND RESPONSIBILITIES

● Research new tactics, techniques, and procedures (TTPs) used by adversaries using open

sources (public information such as GitHub, social media, security vendor reporting,, etc);

closed sources (dark web and underground forums); and other proprietary sources using

research tools

● Identify whether a TTP instance has already been reported, and create new notes for new

or significantly updated TTP instances.

● Create at least 2 TTP Instance notes daily, and 1 malware detection (YARA) monthly. Notes

should include minimal grammatical or syntax errors. Plagiarism is not acceptable.

● Identify MITRE ATT&CK techniques, IoCs, associated malware, and associated threat

actors

● Adhere to and implement Infinit-O's quality and information security policies and carry out

its processes and procedures accordingly.

● Protect client-supplied and generated for client information from unauthorized access,

disclosure, modification, destruction or interference (see also Table of Offenses).

● Carry out tasks as assigned and are aligned with particular processes or activity related to

information security.

 

● Report any potential or committed non-conformity, observation and/or security event or

risks to immediate superior

REQUIRED SKILLS

● Strong written communication in English

● Able to produce written reports on technical subject matter (e.g. malware, vulnerability

exploits, offensive security tools) in a clear, concise, and logical format

● Disciplined time management

● Self-starting, self-motivated, and thrive in a collaborative environment

● Ability to receive and apply constructive feedback from peers and leadership

 

MINIMUM QUALIFICATIONS

● B.S. equivalent in computer science, information systems, or cyber intelligence

● Two (2) years professional experience

● Technical proficiency in Cyber Threat Intelligence and Threat Intelligence Platforms

● Experience working with open source intelligence (OSINT) and/or large data sets

● Familiarity with the MITRE ATT&CK Framework, including the ability map reported

activity to ATT&CK techniques

● Experience working with sandboxes, virtual machines, or other malware analysis tools

● Adeptness in cybersecurity and data protection

 

PREFERRED QUALIFICATIONS

● Proficiency in scripting language (PHP, C, C#, C++, Python, HTML, Base64, Powershell,

CMD)

● Experience creating malware detections (e.g. YARA, Sigma, Snort)


 

Education

Any Gradute