Listing Description
Job Description:
Successful candidate will be responsible for:
• Working within the corporate’s environment to help develop and refine threat intelligence and incident response processes and operations, including defining roles and responsibilities.
• Ability to deliver appropriate threat intelligence products and services.
• Overseeing the corporate’s lifecycle of activity during incidents, zero days, and other major security events.
• Collection and coordination of information along with articulating the threat and what actions to take to various audiences.
• Ensuring that pertinent information is disseminated in accordance with TLP classification and handling protocols, to the sector through the appropriate dissemination mechanisms.
• This will require working with relevant stakeholders to help develop and oversee the creation of a security operations center (SOC) and SOC team.
• Establishing and maintaining a collaborative and active relationship with the corporate’s Threat Intelligence Committee (TIC) and meeting the collective needs of the membership and industry.
• Providing regular key performance indicators (KPIs) to leadership to reflect the effectiveness of corporate’s operations, products and services.
• Ability to create trend and correlation analysis and scenario forecasting at both the tactical and strategic level along with providing input and recommendations based on findings to senior management.
• Working with leadership to develop and maintain an annual budget for operational costs.
• Coordinating with other departments on exercises, programs, and workshops, as needed.
• Other duties, as assigned.Key Skills, Qualities, and Experience:
• Bachelor’s degree in Management Information Systems, Network Security, Computer Science, or related discipline, or equivalent education and work experience required.
• At least four (4) years’ experience with Threat Intelligence/Information Security/Information Technology or related discipline or equivalent work experience required.
• 7-10+ years’ cyber threat, information assurance, or intelligence experience
• 1 year minimum experience of security incident response.
• Understanding of cyber threat issues such as computer intrusions, malicious code, cyber terrorism, threat finance, money laundering / fraud / eCrime, and other criminal activity.
• Experience assessing technical intelligence collection and analytic products, including behavioral analysis and reverse engineering outputs from Incident Response or automated sandbox testing.
• Experience working in threat intelligence sharing or related discipline in an international setting and/or understanding of geopolitical environment and impacts on the cyber threat landscape.
• Understanding of risk management, risk assessment, and risk communication functions.
• Ability to demonstrate comprehensive, practical knowledge of research and analytical methods.
• Able to work in a matrixed environment.
• Have interpersonal skills to deal effectively with different types of business contacts.
• Professional demeanor.
• Strong decision making and problem-solving skills.
• Work varied shifts, including weekends and holidays.
• Self-motivated, highly organized, responsible and disciplined, able to prioritize effectively, handle multiple tasks simultaneously and think strategically on behalf of the organization and its members.
• Able to effectively communicate in English, in both written and oral forms.
• Have an active CISSP or equivalent cybersecurity certification.
Preferred Skills and Background:
• Able to lead and mentor a team.
• Working knowledge of the healthcare community.
• Familiarity with cyber security programs and supporting organizations, including law enforcement agencies, and associations and ISACs/critical infrastructure.
Listing Details
- Citizenship: Us Citizen
- Incentives: Bonus
- Education: Bachelors Degree
- Travel: Travel 25
- Telework: Optional Telecommute