Logo
MSD

Cyber Threat Intelligence Senior Specialist

MSD, San Francisco, CA, United States


MSD

At MSD, we're following the science to tackle some of the world's greatest health threats. Get a glimpse of how we work to improve lives.

As a part of our Company's Cyber Fusion Center (CFC), the Cyber Threat Intelligence (CTI) team collaborates with external and internal stakeholders across international technical centers to maintain our Company’s proactive cybersecurity posture. The CTI team enables our Cyber Fusion Center to maintain an intelligence and threat informed approach to cybersecurity. The team liaises with our Company business partners in order to propose ideas and innovative solutions that reduce risk and enable new organizational capabilities.

The CTI Senior Specialist is responsible for the daily prioritization and actioning of Cyber Threat Intelligence (CTI), to include intelligence collection, curation, management, analysis standards, quality control, and dissemination of finished products to a wide range of technical and non-technical internal customers to maintain our Company’s proactive cyber security posture. The CTI Senior Specialist works closely with security operations teams, information technology teams, enterprise risk management teams, executive decision-makers, industry peers, and private/public sector intel sharing groups.

Key Responsibilities:

  • Evaluate tools, methodologies, and best practices to effectively understand the tactics, techniques, and procedures (TTPs) utilized by cyber threat actors.
  • Perform continuous research and collection of information based on our Company’s Intelligence Requirement Framework from open source, vendor collection, and internal tooling to identify threat intel and cyber risks.
  • Monitor and action open source and vendor data for potential domain abuse, third party cyber incidents, credential/data leakage, dark web and social media malicious indicators, and executive impersonation.
  • Conduct basic threat hunting within Security Information and Event Management (SIEM) systems and within specific tools for malicious indicators and threat actor TTPs.
  • Create detection logic within a (SIEM) solution and within specific tools to identify potential malicious activity.
  • Have an understanding of Security Operation Center (SOC) activity and be able to respond to cyber security incidents.
  • Build threat actor profiles to enhance threat prioritization.
  • Conduct basic malware analysis to extract potential malicious IOCs and behavioral analysis.
  • Share Indicators of Compromise (IOCs), vulnerabilities, and emerging threat intel with relevant stakeholders.
  • Independently produce finished CTI products for both technical, operational, and strategic audiences.
  • Expertly communicate priority cyber threat intelligence verbally and in a written format.
  • Respond to routine requests for information (RFIs) from stakeholders.
  • Drive innovation and new approaches for detecting and tracking threats, adversaries, techniques, tools, and infrastructure.
  • Frequently participate and deliver intel at daily syncs and team specific calls.
  • Identify potential process and product improvements and drive follow-on activities.
  • Mentor and train junior analysts in core cyber threat intel tradecraft, analysis, and production.
  • Responsible for Quality Assurance and Quality Control (QA/QC) of CTI deliverables.
  • Subject Matter Expert for CTI workflows and ensures workflows are accurately documented.
  • Facilitate external and internal threat intelligence partnerships on behalf of the CTI Team. This includes optimizing and managing data sources of threat intelligence information from vendors.
  • Responsible for the prioritization of cyber threat intelligence for all team members.

Position Qualifications:

Education Minimum Requirement:

  • BA/BS or MA/MS in either Computer Science, Information Security, Information Systems of Cyber Security or other related field.
  • Certifications: (not required, but preferred) GCTI, CTIA, CCTIA, CISSP, CISA, Security+, OSCP.

Required Experience and Skills:

  • 5+ years of experience in one or more of the following areas:
    • Cyber Threat Intelligence
    • Cyber Incident Response
    • Vulnerability Management
    • Penetration Testing
  • Excellent verbal and written communications skills.
  • Experience using open-source intelligence (OSINT) and internal data to track threat actor tactics, techniques, and procedures that span on-premises and cloud-based compromises.
  • Experience working with detection methodologies across multiple platforms.
  • Experience working with extremely large data sets, using tools and scripting languages within Excel, Python, Splunk, Microsoft Sentinel, and Power BI.
  • Functional understanding of common threat analysis models such as the Diamond Model, Cyber Kill Chain, and MITRE ATT&CK.
  • Demonstrated ability to work independently and as part of global teams in a fast-paced global environment.

Preferred Experience:

  • Reverse malware engineering experience.
#J-18808-Ljbffr