Listing Description
Job Description
The Role:
Mandiant Intelligence is looking for motivated and skilled individual to provide cyber crime campaigns coverage and estimate the probability of satisfying collection requirements, and supervise the process.
Responsibilities:
• Monitor cyber crime campaigns within open-source/semi-open-source/outreach and other
sources.
• Tracking cyber crime campaigns using internal/external tools, third-party subscription services, technical research.
• Build and maintain targets that allow for the efficient and accurate collection of information of threat intelligence value in order to satisfy research requirements.
• Cultivate relationships in the cyber community for the purpose of gaining knowledge and
information to satisfy research requirements.
• Protect proprietary company and personal information from disclosure.
• Monitor specific cyber threat actors or groups to understand their tactics, techniques and
procedures.
• Tracking cybercrime threats in EMEA based on technical analysis, forums and social media
monitoring, OSINT.
• Provide help with utilities development to meet collection guidance and to establish actors or groups monitoring.
• Respond to tasking and direction as provided by the Team Leader.
• Mentor and guide mid-level and junior personnel of a research team.
• Collaborate with other researchers based on developed SME area.
• Create reports based on found information in English.
Qualifications
• 5+ years of work experience in Information Security field.
• Good knowledge of different OS, command line;
• Administrating skills;
• Strong knowledge of OSI-model, understanding how different layers interact with each other;
• Certain language as native (Romanian, Italian, French, German, Polish or Ukrainian), good
knowledge of English language;
• Collection and research skills;
• Experience conducting analysis of electronic media, packet capture, log data, and network
devices in support of intrusion analysis or enterprise level information security operations
Additional Qualifications:
• Ability to create YARA-rules and Snort signatures to detect malware families.
• Static and dynamic malware analysis.
• Work with network sniffers and port scanners.
• Fundamental knowledge of current events and international politics.
• Ability to think critically and properly qualify analytic assessments.
• Ability to recognize and appropriately handle sensitive data.
Listing Details
- Citizenship: Not Provided
- Incentives: Not Provided
- Education: Not Provided
- Travel: Not Provided
- Telework: Full Telecommute