HPposted 4 days ago
Full-time - Mid Level
Spring, TX
Computer and Electronic Product Manufacturing

About the position

As the world around us becomes more connected and more digital, there are increased opportunities for fraud and disruption due to cybersecurity attacks. The need for companies, products, and services to be secure is more important than ever in this constantly changing landscape. Are you passionate about keeping good people safe from bad actors? We are too! We are HP Cybersecurity and we are tasked with the security of the HP enterprise. As HP continues our digital transformation, the work of the cybersecurity professional is never complete and is always interesting. Come be a part of making a difference with us! The Cybersecurity Threat Intelligence Analyst is charged with advancing our knowledge of adversary intent, opportunity, and capability to cause harm to HP's global business. They are responsible for the collection, analysis, and dissemination of Cyber Threat Intel, enabling both internal Cybersecurity teams to focus prevention and detection efforts as well as enabling the business to better make informed, risk-based decisions.

Responsibilities

  • Develop and refine cyber threat intelligence collection and analysis processes, using technical and non-technical, internal and external, threat intelligence sources
  • Develop and support tools and processes to assist with collection and analysis of intelligence information
  • Develop and refine mechanisms to integrate threat intelligence into other Cybersecurity tools and processes
  • Produce detailed intelligence analysis reports on cyber threats with a potential to impact HP and present relevant findings to both technical and non-technical audiences
  • Issue advisories on critical threats and vulnerabilities
  • Identify gaps in both processes and technology, develop capabilities to enhance existing cyber threat intelligence Functions
  • Support detection and response teams with context and analysis support, provide industry expertise and recommend relevant remediation and countermeasures

Requirements

  • 5 or more years experience in one or more of the following cybersecurity functions: Cyber Threat Intelligence, Intrusion Detection/Prevention Monitoring, Incident Response, Forensics
  • Experience with dark web monitoring
  • Extensive knowledge of standards of intelligence collection and analysis tradecraft, distilling raw information into actionable intelligence
  • Experience tracking and reporting on cyber espionage, cyber crime, and other malicious cyber actors
  • Familiarity with cyber threats, defenses, motivations and techniques
  • Experience with standard signature and information sharing data formats and exchange protocols - e.g., Yara, STIX/TAXII, etc.
  • Understanding of common operating systems and IT Infrastructure such as Windows, Unix/Linux, Active Directory, firewalls, proxies, etc.
  • Familiarity with automation concepts and proficiency in scripting languages such as Python, JavaScript, Powershell, etc.
  • Bachelor's degree (required, preferably in computer science, engineering or related area of study, or equivalent experience)

Nice-to-haves

  • Technical Cyber Security Certification through one of the recognized bodies preferred: SANS, ISACA, (ICS)2, CompTIA, etc.
  • A mindset of continuous growth, curiosity, and asking WHY?
Hard Skills
Active Directory
1
JavaScript
1
Linux
1
Python
1
Unix
1
2KTVo
0
5Z7ae4 3HRnmIu oOAIrjHdneDFq
0
7nJXNO0iFMU2d6 9AHTpb4cmoDGiQZ
0
9vAnP IselwzRFfhE
0
C5v2jBnzx lEtSL3D8
0
Cm9nSgjLas8HT K5Hbz2nXo
0
EfrYkCGa rmyJBihukqDsFYW
0
G9YC0l Uoh3GZt RKsLkb4Oh
0
NAvPrEp3h9 GZgn0EOpkb Q7An IHgY49wmjbM
0
TmDF2c 5tVOwl6 XINfoD75p
0
V1Kz74onhqQ yCQ2iaE1pD3We
0
f37cCA0o BOgnGAbH7
0
fUwehoF85ubyD jtCkneAL2
0
gxdtc 3b9E2eNw
0
jVa9HC0 PNQsI3BlEp
0
jhwqlv avPFheAHS
0
l9qu0b TezbtA5 8e1JrCpn02fhA
0
pHIla7iDt 2fYhT3eXb
0
xHmeoEBjGXl QJ2U1T09nrVu
0
Soft Skills
ixpLC0kRNM DMHQrft
0
Unlock 20 more keywords by signing up for Teal+Sign Up
Build your resume with AI

A Smarter and Faster Way to Build Your Resume

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service