HPposted 4 days ago
Austin, TX
Computer and Electronic Product Manufacturing

About the position

As the world around us becomes more connected and more digital, there are increased opportunities for fraud and disruption due to cybersecurity attacks. The need for companies, products, and services to be secure is more important than ever in this constantly changing landscape. Are you passionate about keeping good people safe from bad actors? We are too! We are HP Cybersecurity and we are tasked with the security of the HP enterprise. As HP continues our digital transformation, the work of the cybersecurity professional is never complete and is always interesting. Come be a part of making a difference with us! The Cybersecurity Threat Intelligence Analyst is charged with advancing our knowledge of adversary intent, opportunity, and capability to cause harm to HP's global business. They are responsible for the collection, analysis, and dissemination of Cyber Threat Intel, enabling both internal Cybersecurity teams to focus prevention and detection efforts as well as enabling the business to better make informed, risk-based decisions.

Responsibilities

  • Develop and refine cyber threat intelligence collection and analysis processes, using technical and non-technical, internal and external, threat intelligence sources
  • Develop and support tools and processes to assist with collection and analysis of intelligence information
  • Develop and refine mechanisms to integrate threat intelligence into other Cybersecurity tools and processes
  • Produce detailed intelligence analysis reports on cyber threats with a potential to impact HP and present relevant findings to both technical and non-technical audiences
  • Issue advisories on critical threats and vulnerabilities
  • Identify gaps in both processes and technology, develop capabilities to enhance existing cyber threat intelligence Functions
  • Support detection and response teams with context and analysis support, provide industry expertise and recommend relevant remediation and countermeasures

Requirements

  • 5 or more years experience in one or more of the following cybersecurity functions: Cyber Threat Intelligence, Intrusion Detection/Prevention Monitoring, Incident Response, Forensics
  • Experience with dark web monitoring
  • Extensive knowledge of standards of intelligence collection and analysis tradecraft, distilling raw information into actionable intelligence
  • Experience tracking and reporting on cyber espionage, cyber crime, and other malicious cyber actors
  • Familiarity with cyber threats, defenses, motivations and techniques
  • Experience with standard signature and information sharing data formats and exchange protocols - e.g., Yara, STIX/TAXII, etc.
  • Understanding of common operating systems and IT Infrastructure such as Windows, Unix/Linux, Active Directory, firewalls, proxies, etc.
  • Familiarity with automation concepts and proficiency in scripting languages such as Python, JavaScript, Powershell, etc.
  • Bachelor's degree (required, preferably in computer science, engineering or related area of study, or equivalent experience)
  • Technical Cyber Security Certification through one of the recognized bodies preferred: SANS, ISACA, (ICS)2, CompTIA, etc.
  • A mindset of continuous growth, curiosity, and asking WHY?
Hard Skills
Active Directory
1
JavaScript
1
Linux
1
Python
1
Unix
1
1jYltZBqD yRpUHbKln
0
6Nc4SuKVlE SxF4PXJBDN SZ2O unc4FvtBK1f
0
9DuhZTz KDamHTtP83
0
CNQOx
0
LemCX6 gSOY0KZ BV1QzcY9l
0
LfAXsE9qM x9Kv7B5t
0
Lza6orgFQ3uKs gnCe2r09J
0
MNk1sj beXtAYG XHOEnTo1L
0
PrgHXGWK25upk UfD1S7K4p
0
QYq0264x SgabBntPL
0
ZuzAK G7rNB3hRZ9p
0
f7ndFC RYh7r14 Q7sFNlgRIT2ME
0
kfZ6XljVOAN BlgErDJPZTG7
0
s1Cq8xIH 8AwouRemq9TEnKy
0
tQZAr ohrdZ7Dq
0
vZjfwi TI3li5Q u7raQwZLVW9gK
0
vya2LS xQi3MZnOK
0
xDmIad72HRXFMs keR89ofsaNT5i42
0
xw94EyuRYDh rG2jZL6FEPd8I
0
Soft Skills
XCeL8pTtdb fARKQ8e
0
Unlock 20 more keywords by signing up for Teal+Sign Up
Build your resume with AI

A Smarter and Faster Way to Build Your Resume

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service