Senior Cyber Threat Intelligence Analyst
Role details
Job location
Tech stack
Job description
The Cyber Defense (CD) team is seeking an experienced cyber threat intelligence analyst to contribute to the enhancement of our threat intelligence capabilities. You will be the first member of our EMEA Cyber Threat Intelligence (CTI) team, as we expand to provide global intelligence coverage.
The CTI team is an essential component of Cyber Defense's intelligence-led approach to protecting Okta. They monitor and perform research focused on the methodologies used by threat actors that seek to target Okta, our products and our customers. By better understanding their motives, tactics and techniques, we can assist our security teams in defending against them.
Responsibilities
- Identify, collate, assess and disseminate intelligence on the tactics, techniques and procedures (TTPs) of threat actors relevant to Okta
- Assist in the maintenance and ongoing improvement of our Threat Intelligence Platform to ingest and disseminate indicators of compromise for use by our defensive teams and tooling
- Monitor and maintain a detailed understanding of the cyber threat landscape, as it pertains to Okta and our customers and communicate curated knowledge with key stakeholders in written and oral formats
- Use our Priority Intelligence Requirements to identify and distribute intelligence of interest to CTI's stakeholders including our security, IT and product engineering teams
- Provide tactical cyber intelligence support to the incident commander as required during security incidents or events of interest
- Conduct research to support threat investigations using a combination of open-source and internal data and tools, make informed judgements and document assessed findings and conclusions
Requirements
Do you have experience in Splunk?, You're a passionate and experienced threat intelligence practitioner. You have great communications skills and a thirst for knowledge. You enjoy working under limited supervision, using priority intelligence requirements to drive the direction of your efforts. You're a team player and a mentor to less experienced colleagues. You're curious about systems and how they interact, knowing that to properly defend a system you must first understand how it works. You have a knack for synthesizing information from disparate data sources, understanding what's relevant, and communicating your assessments to others.
If you don't have a degree, you have equivalent experience that's given you the foundational knowledge to understand complex computing environments., * Strong understanding of network security fundamentals and their application to threat actor tracking. You should be very familiar with core protocols such as TCP/IP, TLS and DNS, etc.
- A minimum of 5 years experience in cyber threat intelligence or threat research roles
- Experience in performing research into the tactics, techniques and procedures of sophisticated adversaries and hunting for evidence of them within an enterprise environment
- Ability to work independently and achieve outcomes with limited direct supervision
- Excellent communication and writing skills (work samples encouraged)
Desirable Experience
We love to identify individuals who can supplement and enhance the existing skills within our team. Don't be put off by the length of this list - we're not looking for unicorns, but we would highly value applicants who have experience one - or multiple - of the following areas:
- Deploying, configuring and/or maintaining Threat Intelligence Platforms such as ThreatQuotient, MISP, OpenCTI, etc
- Demonstrated proficiency in Python scripting for automation, data analysis, security tool integration and custom tool development
- Malware reverse engineering, network traffic or log analysis
- Experience in cyber security operations in specialities such as incident response or detection engineering
- Experience with any of the following - Splunk, Snowflake, SQL, Maltego (particularly transform development), Jupyter Notebooks
- Experience in providing threat intelligence support in large SaaS vendor environments
- Experience leveraging tools such as VirusTotal, pDNS, Certificate Transparency logs, Shodan, Censys, Urlscan and other data sets to identify threats and provide context to security investigations.