Job Description

Position Name: Threat Intelligence Analyst

Experience: 3+ Years

About Company:-

Snowbit is a cybersecurity technology innovator with a vision to empower organizations worldwide to quickly, efficiently, and cost-effectively prepare themselves to address omnipresent cyber risk. Building on years of Israeli cybersecurity experience, Snowbit is looking to offer the broadest managed detection and response offering available today.

Snowbit is part of the Coralogix group, with Coralogix rebuilding the path to observability by offloading the burden of indexing and providing deep insights, at an infinite scale, for less than half the cost.

We are looking for experienced and highly motivated Threat Intelligence Analyst to join our journey and be a part of the Snowbit Team.

Roles and Responsibilities

  • ​​Monitor, and analyze phishing campaigns, domains impersonating company brands, and compromised credentials.
  • Monitor underground forums to identify potential cyber threats, data breaches, leaks, and other malicious activities.
  • Compiling and analyzing cyber threat information and making recommendations based on suspected or known context.
  • Conduct thorough assessments of zero-day vulnerabilities to identify potential risks and impacts on organizational cybersecurity. Utilized advanced techniques and tools to analyze emerging threats and recommended proactive measures for mitigation.
  • Perform Digital Threat Monitoring to scan across the deep and dark web to identify the digital footprints and prepare POC reports using the platform such as: Recorded Future.
  • Hunt for cyber-related threats from various threat intelligence sources Identify, develop, and maintain access to non-standard intel sources (OSINT) Identify and monitor the Tactics, Techniques, and Procedures (TTPs) employed by cyber threat actors
  • Perform security policy management to continuously monitor and enhance technical rules, policies, and configuration in security systems to enhance security protection and coverage of operational end-to-end processes.
  • Maintain weekly active vulnerability trends reports and disseminate findings to the relevant teams.
  • Collaborate with the incident response team to investigate and respond to security incidents, providing detailed insights and analysis.
  • Informing stakeholders of the current trends of the cyber security threat landscape.

Requirements

  • 3+ years of experience in large, complex or security organizations
  • Should Possess high level understanding of IT infrastructure, perimeter devices, network, applications, software,servers and database, together with working knowledge of IT operational processes and procedures.
  • Experience in Managing and securing enterprise IT environments with emphasis on cloud environments (AWS, Azure, GCP).
  • Experience in enterprise security, hands-on experience with attacking or defending enterprise systems.
  • Experience with intelligence frameworks and collaboration platforms such as MISP, Anomali STIX, OpenCTI,Cyberkill chain, TAXII and STIX, URL Haus.
  • An innovative mind with keen attention to detail and the ability to set goals and parameters for success, investigate and implement solutions to catch threats according to defined goals.
  • Strong analytical and problem-solving skills, with attention to detail. Identify and assess adversary’s activities, including attribution, associated malwares, phishing campaigns,tactics, techniques, and procedures (TTPs).