Related skills
siem mitre att&ck ueba yara mispπ Description
- Leverage a collection framework to organize threat intel.
- Report potential compromise areas via intel sources.
- Apply indicator lifecycle to incoming indicators.
- Detect intrusion patterns to predict IOCs and actions.
- Use CTI tools to detect trends guiding defenses.
- Report metrics on adversarial behavior for action.
π― Requirements
- Kill Chain and Diamond models merged for CTI.
- Leverage MITRE ATT&CK in CTI reporting.
- Familiar with OSINT/CTI tools: MISP, YARA, DomainTools.
- Understand modern threats, vectors, and exploitation.
- Experience processing indicators to maintain a current threat DB.
- Experience analyzing logs (SIEM/EDR/UEBA) for insider risk.
π Benefits
- Medical, dental, vision, and basic life insurance
- Flexible PTO and holidays
- Retirement programs
- 1% charitable giving program
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Data Jobs. Just set your
preferences and Job Copilot will do the rest β finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!