Which professional characteristics do you think are most important for this role? Compare the private sector Senior Cyber Threat Intelligence Analyst to that of a public sector one. Articulate the differences, similarities, advantages, disadvantages, strengths and weaknesses.
Read the job description of a Senior Cyber Threat Intelligence Analyst on the previous page.
Conduct further research on a Senior Cyber Threat Intelligence Analyst’s roles and responsibilities.
Write a reflection paper of not more than 1250 words to address the following questions:
Which professional characteristics do you think are most important for this role?
Compare the private sector Senior Cyber Threat Intelligence Analyst to that of a public sector one. Articulate the differences, similarities, advantages, disadvantages, strengths and weaknesses.
Discuss the types of knowledge, skills and abilities a Senior Cyber Threat Intelligence Analyst is expected to have in the areas of applied intelligence ethics, critical thinking, psychology, communication, and analysis. Back up your discussion with relevant examples and citations from your research.
Reflect on a Senior Cyber Threat Intelligence Analyst’s ethical code of conduct.
How has your understanding of a cyber threat intelligence analyst’s ethical code of conduct evolved since you first learned about it at the beginning of the Master’s in Applied Intelligence program?
– PLEASE ADD AN OUTLINE PAPER TO THIS ASSIGNMENT.
Requirements: 1250 word
As a Senior Cyber Threat Intelligence Analyst, you will use your technical experience to profile new and emerging threats to H. Ackme Oil and Gas Company’s IT (Information Technology) landscape. You will be analyzing and determining the scope of vulnerabilities in hardware and software, and determining how to best defend against these threats.
The Senior Cyber Threat Intelligence Analyst will monitor third party security related websites, forums, and mailing lists for information regarding vulnerabilities and exploits. The Analyst will verify the vulnerabilities; correlate and collate the information; and develop, edit, and deliver security reports to the C-Suite of executives.
The Senior Cyber Threat Intelligence Analyst will identify, monitor, assess, and counter the threat posed by cyber actors against H. Ackme Oil and Gas Company’s information systems. The Analyst will provide strategic assessment, tactical analysis and advice for operations. The successful candidate will also apply his/her technical knowledge to solving complex intelligence problems, produce short-term and long-term written assessments, and brief H. Ackme Oil and Gas Company’s leadership.
The Senior Cyber Threat Intelligence Analyst will represent H. Ackme Oil and Gas Company’s Computer Security Intelligence Center internally. The successful candidate will spearhead efforts to advance threat intelligence collaboration with internal and external H. Ackme Oil and Gas Company’s clients as well as key stakeholders. The Analyst will engage with external threat sharing groups, building trusted relationships for meaningful exchanges on threats to our industry and infrastructure.
Role and Responsibilities
Effectively ascertain and leverage trustworthy open and closed-source cyber threat intelligence data feeds.
Identify emerging and persistent threats to the organization’s networks, systems, and applications.
Provide independent critical thinking to diagnose and analyze threat intelligence data and making decisions on response and remediation.
Develop comprehensive security write-ups which describe security issues, analysis, and remediation techniques to management providing multiple options considering managing risk to the business
Develop internal documentation, such as detailed procedures, playbooks, and operational metrics reports as required
Independently research and comprehensively analyze actionable cyber threat observables pertinent to the organization.
Provide analysis reports in numerous formats based upon cyber threat research.
Perform complex project support for security incident response efforts.
Provide technical guidance pertaining to risks and control measures associated with emerging threats.
Perform advanced threat hunt operations using known adversary tactics, techniques and procedures as well as indicators of attack in order to detect adversaries with persistent access to the enterprise
Drive the technical oversight and guidance required to support junior team members during Intelligence analysis efforts.
Develop reports using data hosted in multiple sources (e.g. spreadsheets, databases) and communicate clearly to management and other team members.
Identify potential security exposures that may currently exist or may pose a potential future threat to Company’s applications. Ensure management is notified when these exposures are identified, as well as a proposed solution for remediation.
Knowledge
(Ideal candidate would have knowledge in all areas, suitable candidate in most)
Knowledge of security architectures, devices, proxies, and firewalls is required
Knowledge of threat response and incident disclosure processes
Background on types of threat indicators and attack types as well as impact
Understanding of applied cryptography, selection of algorithms and protocols for architectural recommendations
Understanding of protocols monitored by organization, HTTP, TLS, IPsec, IPv4, IPv6, DNS, DNSSec, DANE
Firm understanding to apply recommendations on considerations and threats when researching emerging protocols such as DNS over HTTP.
Skills
Previous experience in cyber threat intelligence and Information Security in a senior role
Possession of excellent oral, written, and interpersonal communication skills
Ability to monitor and analyze logs and alerts from a variety of different technologies, including IDS/IPS, firewall, proxies, and anti-virus across multiple platforms
Ability to develop specific expertise, discern patterns of complex threat actor behavior, and communicate an understanding of current and developing cyber threats
Ability to leverage online research tools to identify and navigate online forums, crowdsourcing tools, specialized websites, social media, and traditional sources
Ability to coordinate and respond to events on all of the monitored networks and the systems on those networks
Experience with collecting, analyzing, and interpreting qualitative and quantitative data from multiple sources for the purposes of documenting results and analyzing findings to provide advanced threat intelligence
Strong research, analytical, and problem solving skills
Abilities
Proven ability to communicate and present findings and conclusions clearly and concisely to all levels of staff, management and/or vendors
Provide multiple options for recommendations detailing business impact and likelihood to ascertain risk levels with provided options
Build trust relationships with partner organization’s counterparts and competitors for information sharing on exploits and threats understanding this is not an area of competition
Education and Credentials
BA or BS degree in International Relations, Security Studies, Intelligence Studies, Political Science, Cyber Security, related field, or equivalent experience
2-4 years of experience with all-source cyber intelligence analysis
CISSP, GIAC, or other related Information Security certifications desired
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
