Desired Skills and Experience
- Develop and deploy tools to support Threat Intelligence collection and tracking
- Develop tools to support malware analysis
- Integration with network defense systems and external data feeds
- System lifecycle planning for new and existing systems
- Develop and deploy automated intelligence ingestion with scripting and API integration
- Fault tolerant system design and implementation
- Plan for vulnerabilities in systems through risk assessments and mitigating controls
- Perform unit testing and system integration testing of newly-developed functionality
- Integration of data analysis tools to enrich intelligence
- Identify opportunities for automation and implement solutions to increase efficiency
- 5+ yearsâ experience as an engineer/developer in a Cybersecurity or Technical Threat Intelligence role in a large, mission-critical environment
- Experience with malware analysis - static and dynamic.
- Knowledge and use of threat intelligence platforms, link analysis and/or malware tools is desired: Cuckoo Sandbox, STIX/TAXII, ThreatConnect, Anomali, ThreatQ, EclecticIQ, SNORTâ¦
- Experience in designing, testing, and maintaining database repositories
- Experience with NoSQL data stores and big data technologies, e.g. MapReduce, Hadoop
- Proficient in programming and scripting languages â Java, Python, Shell, Bash, Ruby Perl, C++â¦
- Skilled with both Microsoft Windows & UNIX/Linux (Ubuntu, HEL)
- Cloud utilization, management, and security hardening experience a plus.
- CISSP certification a plus
- Excellent command of Cybersecurity organization practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies
- Keen understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity
- Noted cybersecurity expert, keeping technical skills current and participating in multiple forums
- Expertise in Agile and can work with at least one of the common frameworks
- Ability to identify network attacks and systemic security issues as they relate to threats and vulnerabilities, with focus on recommendations for enhancements or remediation
Apply