Analyst(Data/ Business/ Application)

Cyber Threat Intelligence Analyst (Hybrid)

Your Role

 

As a Cyber Threat Intelligence Analyst your main responsibilities will include, but not necessarily be limited to, the following:

 

  • Maintain knowledge of latest cyber threats and industry best practices. Identify relevant threats, assess risk, and generate technical and non-technical reports for a variety of stakeholders.
  • Perform external and internal threat discovery, define and categorize the threat, characterize the risk posed to Zurich information systems, assess the likelihood of exploitation, and develop courses of action to implement mitigating controls.
  • Utilize a structured framework to document and model the behaviors of cyber threat groups and coordinate with various teams within Cyber Security to perform testing, identify security gaps and prioritize remediation based on risk.
  • As required, assist with Insider Risk and Forensics investigations

Your Skills and Experience


As an Cyber Threat Intelligence Analyst  your skills and qualifications will include: 

 

Required:

 

  • Bachelor’s degree and 3 or more years of experience in the information technology area OR
  • Zurich Cybersecurity Technician Apprentice, including Cyber Security Certification and 4 or more years of experience in the information technology area OR
  • High School Diploma or Equivalent and 5 or more years of experience in the information technology area AND
  • MS Office experience

 

Preferred:

 

  • Experience formulating risk-based cyber security strategies.
  • Experience communicating security-related concepts to a broad range of technical and non-technical staff.
  • Knowledgeable with current cyber threats and associated tactics, techniques, and procedures used to target IT systems.
  • Experience in Intelligence collection, evaluation, and reporting/dissemination processes and procedures.
  • Proven ability to succeed in collaborative work environments and build relationships.
  • Experience using evaluation platforms to organize and correlate large volumes of network log data preferred.
  • Previous use of technology tools Splunk, Tanium, and/or xSOAR preferred.
  • Digital forensics experience preferred.
  • Experience investigating Insider Risk incidents preferred.