Desired Skills and Experience

  • Develop and deploy tools to support Threat Intelligence collection and tracking
  • Develop tools to support malware analysis
  • Integration with network defense systems and external data feeds
  • System lifecycle planning for new and existing systems
  • Develop and deploy automated intelligence ingestion with scripting and API integration
  • Fault tolerant system design and implementation
  • Plan for vulnerabilities in systems through risk assessments and mitigating controls
  • Perform unit testing and system integration testing of newly-developed functionality
  • Integration of data analysis tools to enrich intelligence
  • Identify opportunities for automation and implement solutions to increase efficiency
  • 5+ years’ experience as an engineer/developer in a Cybersecurity or Technical Threat Intelligence role in a large, mission-critical environment
  • Experience with malware analysis - static and dynamic.
  • Knowledge and use of threat intelligence platforms, link analysis and/or malware tools is desired:  Cuckoo Sandbox, STIX/TAXII, ThreatConnect, Anomali, ThreatQ, EclecticIQ, SNORT…
  • Experience in designing, testing, and maintaining database repositories
  • Experience with NoSQL data stores and big data technologies, e.g. MapReduce, Hadoop
  • Proficient in programming and scripting languages – Java, Python, Shell, Bash, Ruby Perl, C++…
  • Skilled with both Microsoft Windows & UNIX/Linux (Ubuntu, HEL)
  • Cloud utilization, management, and security hardening experience a plus.
  • CISSP certification a plus
  • Excellent command of Cybersecurity organization practices, operations risk management processes, principles, architectural requirements, engineering  threats and vulnerabilities, including incident response methodologies
  • Keen understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity
  • Noted cybersecurity expert, keeping technical skills current and participating in multiple forums
  • Expertise in Agile and can work with at least one of the common frameworks
  • Ability to identify network attacks and systemic security issues as they relate to threats and vulnerabilities, with focus on recommendations for enhancements or remediation

Apply