Threat Intelligence Engineer
Overview Compensation : $88, - $, based on experience and credentials Remote Opportunity The Threat Intelligence Engineer performs detailed intelligence analysis to support the organization.
Key responsibilities include building cyber resilience by developing attack trees and threat models to identify potential security threats and vulnerabilities.
This individual actively collaborates with peers in the IT Department, Fraud Risk Management Department, Information Security Department, and other business unit leaders to share the organization's security vision and solicit involvement to achieve higher levels of enterprise security.
An ideal candidate is self-motivated and accountable for independent performance as part of a geographically dispersed virtual team supporting a high operational tempo.
Suncoast Credit Union is consistently chosen as a Top Workplace because its employees genuinely #LOVEWORK! Employees flourish in an inclusive culture celebrating growth and prioritizing the community.
Chartered in , Suncoast has never furloughed any employees. To attract the highest quality candidates, Suncoast Credit Union offers a comprehensive benefits package including, but not limited to :
- COMPETITIVE MARKET SALARIES
- MEDICAL COVERAGE
- PAID TIME OFF
- 11 PAID HOLIDAYS
- PARENTAL LEAVE
- RETIREMENT PLANNING
- DEGREE ASSISTANCE
- BONUS OPTIONS
- ACCESS TO OVER 4, GYMS
- FREE IDENTITY THEFT PROTECTION
- PAID VOLUNTEER HOURS
- LEGAL ASSISTANCE
- MENTAL HEALTH RESOURCES
- EMPLOYEE LOAN DISCOUNTS
- Get the benefits you deserve from an organization that cares about your well-being, inside and outside the workplace. Join a team supporting a healthy body, healthy mind, and healthy work-life balance! Responsibilities Create threat assessments to understand the relevance and potential impact on the enterprise Acquire threat intelligence and technical indicators from external sources Produce Threat Intelligence Reports to provide detailed analysis of cyber events, including relevant political, economic, and geopolitical variables Determine the root cause of identified anomalous and malicious activity through analysis and report generation Collaborate with information security peers to develop countermeasures in response to threat actors Collaborate with internal and external entities to collect Indicators of Compromise (IoC) and discovered intelligence Develop data-centric threat modeling to identify potential security threats and vulnerabilities Quantify the level of threat and prioritize techniques to mitigate attacks and protect IT resources Develop attack trees from an attacker’s perspective to support threat models Collaborate with management to engage stakeholders and identify critical business needs or intelligence collection priorities Develop and distribute situational activity reports for discovered vulnerabilities for the organization Provide daily, monthly, quarterly, and annual summary reports of network events and activities for situational awareness and metric generation Partner with personnel from the Incident Response and Threat Detection Team to investigate and remediate identified threats Monitor industry news for emerging threats Assist management with regulatory compliance to ensure all work is completed in accordance with applicable laws and government regulations Maintain knowledge and understanding of current trends, laws, and issues affecting the area of expertise Attend educational events to increase professional knowledge and benefit the organization Qualifications Bachelor’s degree in information technology, information security, or related field (A comparable combination of education, work experience, and training may be substituted for education requirements) 3+ years of experence with incident response, intelligence analysis, vulnerability assessment, threat modeling, security engineering, or security operations Experience with collecting, processing, and analyzing intelligence Experience researching cybersecurity threats and creating security solutions Experience developing and delivering intelligence products Experience using intelligence concepts and standards (Example : MITRE ATT&CK, Cyber Kill Chain, intelligence lifecycle) Ability to prioritize tasks by effectively managing competing and changing priorities to meet deadlines Accurate, detail-oriented, and organized with task management Ability to analyze and resolve complex situations Excellent written, verbal, and interpersonal communication skills to interact effectively with members, staff, vendors, and government regulators Ability to influence others regarding policies, practices, and procedures
Create threat assessments to understand the relevance and potential impact on the enterprise Acquire threat intelligence and technical indicators from external sources Produce Threat Intelligence Reports to provide detailed analysis of cyber events, including relevant political, economic, and geopolitical variables Determine the root cause of identified anomalous and malicious activity through analysis and report generation Collaborate with information security peers to develop countermeasures in response to threat actors Collaborate with internal and external entities to collect Indicators of Compromise (IoC) and discovered intelligence Develop data-centric threat modeling to identify potential security threats and vulnerabilities Quantify the level of threat and prioritize techniques to mitigate attacks and protect IT resources Develop attack trees from an attacker’s perspective to support threat models Collaborate with management to engage stakeholders and identify critical business needs or intelligence collection priorities Develop and distribute situational activity reports for discovered vulnerabilities for the organization Provide daily, monthly, quarterly, and annual summary reports of network events and activities for situational awareness and metric generation Partner with personnel from the Incident Response and Threat Detection Team to investigate and remediate identified threats Monitor industry news for emerging threats Assist management with regulatory compliance to ensure all work is completed in accordance with applicable laws and government regulations Maintain knowledge and understanding of current trends, laws, and issues affecting the area of expertise Attend educational events to increase professional knowledge and benefit the organization
Bachelor’s degree in information technology, information security, or related field (A comparable combination of education, work experience, and training may be substituted for education requirements) 3+ years of experence with incident response, intelligence analysis, vulnerability assessment, threat modeling, security engineering, or security operations Experience with collecting, processing, and analyzing intelligence Experience researching cybersecurity threats and creating security solutions Experience developing and delivering intelligence products Experience using intelligence concepts and standards (Example : MITRE ATT&CK, Cyber Kill Chain, intelligence lifecycle) Ability to prioritize tasks by effectively managing competing and changing priorities to meet deadlines Accurate, detail-oriented, and organized with task management Ability to analyze and resolve complex situations Excellent written, verbal, and interpersonal communication skills to interact effectively with members, staff, vendors, and government regulators Ability to influence others regarding policies, practices, and procedures