Cyber Threat Intelligence Manager

Pune, India

Applications have closed

Company Description

Syngenta Group is one of the world’s leading sustainable agriculture innovation companies, with roots going back more than 250 years. Our 53,000 people across more than 100 countries strive every day to transform agriculture through tailor-made solutions for the benefit of farmers, society and our planet – making us the world’s most local agricultural technology and innovation partner.

Syngenta Group is committed to operating at the highest standards of ethics and integrity. This is a commitment that we are making to investors, customers, society and employees. Syngenta Group is also
Committed to maintaining a workplace environment free from discrimination and harassment.

Job Description

Key Skills for Threat Intelligence Manager

1. Formal degree in a related field A bachelor’s degree is inevitable for entry into cybersecurity in most cases. A degree in computer science, computer engineering, information systems, or another field that substantiates critical thinking, research, and communication is mandatory for this role. A bachelor’s degree in international relations, journalism, law, law enforcement, economics, accounting, military intelligence, or even political science can also help you get into cybersecurity.

2. Experience Potential employers look for candidates with relevant experience of around three to five years in threat analysis and report writing. Additionally, possessing some work experience in information technology (IT), security, data analysis, incident response, vulnerability management, penetration testing, and ethical hacking can benefit a threat intelligence professional. Some employers may also demand experience in strategy, research, and writing and seek candidates with good presentation skills. These Manager are expected to present threat information to a wider audience which includes a mix of seniority levels with different technical expertise.

3. Knowledge in diverse disciplines Threat intelligence Manager are expected to have a fundamental understanding of different operating systems and concepts related to information security. They should have a good understanding of strategic, operational, and tactical threat intelligence. Additionally, Manager should know programming languages, security operations, and SIEM tools. They also need to
be well-versed with various threat intelligence frameworks such as the Diamond Model, MITRE ATT&CK, and Cyber Kill Chain.

4. Technical proficiency A threat intelligence Manager should have a sound understanding of coding, system administration, and intrusion detection and prevention systems. Additionally, they should manage attack methodologies, techniques, and tools. The proper technical know-how of concepts related to network or operating system security, security operations, and incident response can be beneficial. Technical proficiency is also required in areas such as network monitoring, computer forensics, technical executions, and more.

5. Interpersonal communication skills Threat intelligence Manager should balance their technical capabilities with strong communication skills. Security teams prefer professionals who can collaborate with each other, as this can reveal newer threats and address new challenges more effectively. Manager must handle rapid response situations and detail their findings, evaluations, and risk assessments to other teams effectively and clearly. This requires the ability to break down complex technical information and convey it to various stakeholders in a digestible form. This way, each team can be made aware of the security risks, and they can better understand the information being presented.

6. Innovative problem-solving capabilities As cyber threats continue to rise, employers are looking for candidates who can take up complex challenges and provide creative solutions. Handling critical situations with a stable and calm mind is viewed as a soft skill of high importance. With the increased sophistication and continued evolution of cyberattacks, these Manager should provide simple yet innovative solutions for intricate security problems.

7. Strategic, operational, and tactical awareness Knowing the origin of an attack and how it began its journey is crucial. First, you need to identify the emerging threats and then decode their trends and patterns to get to the source. A threat intelligence Manager should have a strong foundation in technology, tools, and the methods various threat actors employ to counter them and prevent their actions from damaging the system. This can be broken down into three main categories: strategic, operational, and tactical acumen. Strategic intelligence offers a holistic view of various threats as it recognizes the purpose and capabilities of the threat. This information is, in turn, used to inform the stakeholders and also provide timely alerts. Operational intelligence is often observed in forensic reporting. It aids in providing appropriate responses or actions against the identified threats. Lastly, tactical intelligence leverages intelligence to provide a network overview, verify events, and track foreign entities entering the security operations center by monitoring IOCs or TTPs used by threat actors.

8. Subject matter expertise To have a successful career as a threat intelligence Manager, at some point in time, one needs to become a subject matter expert, especially for a specific geographic region. The expertise you gain when serving as a regional SME reflects the quality of threat reports you produce. The bare minimum requirement is to stay up to date on the geopolitical issues plaguing your region of expertise. Moreover, the ability to grasp foreign/regional languages can help you scan relevant publications in their original form. Expertise in learning foreign languages enables you to understand the regional sentiments on geopolitical issues, which can complement the news sources you are familiar with.

9. Business skills In addition to technical skills, a threat intelligence Manager should be equipped with essential business skills. The Manager is responsible for managing crises and making critical strategic decisions in collaboration with the stakeholders to help mitigate risks. These Manager should have a curious mind and a strong inclination towards research. They should be persistent in asking tough questions to dig through the information and resolve security matters efficiently. As the subject matter relates to several fields, threat intelligence Manager are required across various business services and tech industries. Thus, threat intelligence Manager play a crucial role in preventing and minimizing the impact of cyberattacks on organizations

Qualifications

A bachelor’s degree is inevitable for entry into cybersecurity in most cases. A degree in computer science, computer engineering, information systems, or another field that substantiates critical thinking, research, and communication is mandatory for this role. A bachelor’s degree in international relations, journalism, law, law enforcement, economics, accounting, military intelligence, or even political science can also help you get into cybersecurity.

Additional Information

Note: Syngenta is an Equal Opportunity Employer and does not discriminate in recruitment, hiring, training, promotion or any other employment practices for reasons of race, color, religion, gender, national origin, age, sexual orientation, gender identity, marital or veteran status, disability, or any other legally protected status. 

Follow us on: Twitter & LinkedIn

https://twitter.com/SyngentaAPAC 

https://www.linkedin.com/company/syngenta/

India page

https://www.linkedin.com/company/70489427/admin/

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Computer Science Cyber Kill Chain Ethical hacking Forensics Incident response Intrusion detection MITRE ATT&CK Monitoring Pentesting Risk assessment SIEM SOC Strategy Threat intelligence TTPs Vulnerability management

Perks/benefits: Team events

Region: Asia/Pacific
Country: India
Job stats:  14  4  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.