Senior Intelligence Enablement Consultant

Dubai, United Arab Emirates

Applications have closed

Mandiant

Threat Intelligence Solutions. Mandiant is recognized as the leader in threat intelligence with expertise gained on the frontlines of cyber security.

View company page

Company Description

Since 2004, Mandiant has been a trusted partner to security-conscious organizations. Effective security is based on the right combination of expertise, intelligence, and adaptive technology, and the Mandiant Advantage SaaS platform scales decades of frontline experience and industry-leading threat intelligence to deliver a range of dynamic cyber defense solutions. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats.

Job Description

Mandiant's Intelligence Capability Development (ICD) services transform organizations from a “technology-led” mentality to an “intelligence-driven” capability.  ICD services empower and enable clients to proactively leverage and integrate CTI across various cybersecurity functions, as well as laterally across an entire organization. The successful candidate will be responsible for executing the entire CTI Lifecycle, from guiding the organizations strategic direction for CTI, establishing a robust collections and processing framework, organizing analysis best practices, instituting production requirements, and developing dissemination protocols aligned to stakeholder requirements.

What You Will Do:

·         Process, organize, analyze, and assist in contextualization of incident indicators

·         Support CTI collection, processing, and analysis

·         Support Tactical CTI analysis efforts (i.e., log analysis and threat hunting)

·         Provide static and dynamic malware analysis

·         Support customer operational stand-up calls & weekly updates

·         Develop engagement deliverables, support customer briefings

·         Investigate network and host detection and monitoring systems to advise cyber defense teams

·         Develop customers core threat intelligence capabilities and support CTI capability maturation

·         Support CTI stakeholder identification and intelligence requirements gathering

·         Support the creation and tuning of CTI standard operating procedures (SOPs)

·         Integrate CTI workflows into cyber defense functions (i.e., SOC, IR, Hunt, Risk)

·         Develop Cyber Threat Profiles based on industry, geo location, critical assets etc.

·         Map Threat Actor capabilities to organizational defenses

·         Support intelligence training course development and delivery

Qualifications

 

  • 5+ years’ experience in a dedicated intelligence practitioner role; Intel disciplines can vary but must have worked (currently or previously) in a dedicated Intel role to be considered.
  • Functional understanding of CTI methodologies and application concepts within the modern cyber security organization
  • Direct experience in the consumption, processing, and analysis of tactical (technical) CTI within an operational environment, supporting monitoring, detection, and response capabilities
  • Experience in deploying and analyzing data from technical security controls, to include web proxy, firewalls, IPS, IDS, mail content scanning appliances, enterprise antivirus solutions, network analyzers, and other host-based protection solutions
  • Knowledge of and experience with standard network logging formats, network management systems and network security monitoring systems, security information and event management, network packet analysis tools and forensic analysis tools.
  • Strong understanding and experience related to:
    • Threat Intelligence analysis and experience managing and implementing the threat intelligence lifecycle
    • Common malware variants, functionality, and basics of static and dynamic analysis
    • Common threat actor tactics, techniques, and procedures
    • Threat Intelligence Platform (TIP) usage and best practices
    • Cyber Attack Lifecycles and Threat Models
    • Cyber Security-related process development
    • Proven written and oral communication skills and ability to quickly document research and analysis
    • Experience conducting executive debriefs of deliverables and project outcomes
    • Excellent time management skills
    • Research best practices and topic analysis
  • Report writing skills, able to service Strategic, Operational and Tactical audiences

 

Desired Qualifications:

  • Previous experience in a customer facing role and/or consulting expertise
  • Strong understanding of threat intelligence analysis and application, while conveying strategic outcomes to executive audiences
  • Scripting capabilities in Python and/or Bash
  • Knowledge of various operating systems

Additional Information

At Mandiant we are committed to our #OneTeam approach combining diversity, collaboration, and excellence. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Antivirus Bash Cyber defense Firewalls IDS IPS Log analysis Malware Monitoring Network security Python SaaS Scripting SOC Threat intelligence

Region: Middle East
Job stats:  15  1  0
Category: Consulting Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.