Cyber Threat Intelligence Analyst

at  Motorola Solutions

30-392 Kraków, województwo małopolskie, Poland -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate19 Jan, 2025Not Specified20 Oct, 20242 year(s) or aboveEnglish,Osi Model,Scripting,Sql,Toefl,Communication Skills,Php,Vulnerability,Threat Intelligence,Cti,Wireshark,Gcih,Powershell,Log Analysis,Coaching,Security,ForensicsNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

COMPANY OVERVIEW

At Motorola Solutions, we’re guided by a shared purpose - helping people be their best in the moments that matter - and we live up to our purpose every day by solving for safer. Because people can only be their best when they not only feel safe, but are safe. We’re solving for safer by building the best possible technologies across every part of our safety and security ecosystem. That’s mission-critical communications devices and networks, AI-powered video security & access control and the ability to unite voice, video and data in a single command center view. We’re solving for safer by connecting public safety agencies and enterprises, enabling the collaboration that’s critical to connect those in need with those who can help. The work we do here matters.

DEPARTMENT OVERVIEW

Our IT organization isn’t just here to support our business. We’re here to reinvent it – by changing how our customers, partners, and employees interact with our company. To do that, we’re looking for people who bring great ideas and improve our partners’ ideas. Intellectually curious advisors (not order takers) who focus on outcomes to creatively solve business problems. People who not only embrace change but who accelerate it.

JOB DESCRIPTION

As a global dynamic technology enterprise, our company presents an attractive target for malicious actors. It faces threats from internal to opportunistic to the most persistent attackers. The Cyber Threat Intelligence (CTI) team is a crucial partner to the Enterprise Information Security (EIS) program. It supports many components—like threat hunting and incident response—in its smooth and timely operations.
The CTI Analyst role is responsible for collecting, analyzing, and disseminating finished intelligence to leadership, security operations, technology stakeholders, and executive decision-makers. The analyst will be a part of a team that primarily focuses on identifying trends, patterns, and emerging threats while providing senior leadership with cyber intelligence that furthers their critical understanding of the cyber threat landscape specific to MSI. This position offers a unique opportunity for you to draw from your knowledge and experience and impact a global enterprise’s security posture and decision-making.

BASIC REQUIREMENTS

Relocation Provided – None
Education Required – Bachelor’s Degree or equivalent work experience
Experience Required – 2+ years of experience with Cyber Threat Intelligence (CTI) or 2+ years experience in other Intelligence Analysis fields.

SKILLS AND ATTRIBUTES FOR SUCCESS:

  • Proven ability to gather, analyze, and interpret threat intelligence data from multiple sources.
  • Ability to prioritize tasks and meet deadlines in a fast-paced environment, including non-standard work hours in response to Information Security incidents.
  • Ability to convey complex information in simple, concise explanations.
  • Self-driven, creative, and can operate independently.

REQUIREMENTS:

  • Must be able to speak/read/write in English with Full Professional Proficiency.
  • Proven ability to gather, analyze, and interpret threat intelligence data from multiple sources.
  • Experience creating actionable threat intelligence reports, threat and vulnerability assessments, and threat actor profiles.
  • Strength in identifying and extracting pertinent Indicators of Compromise (IOCs) from reporting and providing them to operational teams.
  • Understanding of threat actor Tactics, Techniques, and Procedures (TTPs).
  • Knowledge of CTI frameworks (Cyber Kill Chain, Diamond Model, MITRE ATT&CK, etc.)
  • Self-driven, creative, and can operate independently.
  • Experience with OSINT and SOCMINT investigations.
  • Excellent written and verbal communication skills, including presenting technical information to non-technical audiences.
  • Knowledge of cybersecurity and privacy principles, cyber threats, vulnerabilities, exploits, and the Threat Intelligence Cycle.
  • Understanding of computer networking concepts, the OSI model, and underlying network protocols.

TRAVEL REQUIREMENTS

Under 10%

Responsibilities:

  • Monitor and analyze a variety of open-source and proprietary threat intelligence feeds.
  • Develop playbooks for use in our Threat Intelligence Platform (TIP).
  • Prepare and conduct threat briefings for executive-level audiences.
  • Develop and maintain a portfolio of threat profiles, threat activity, trends, and common attack vectors from available sources.
  • Recommend network defense actions to counter adversary activity and respond to and assist the Incident Response (IR) team.
  • Correlate collected intelligence to build upon a tracked threat activity knowledge base.
  • Develop all-source intelligence products for incident response, detection engineering, and threat hunting using analysis tools, technical and non-technical data sets, and aggregators.
  • Perform OSINT and SOCMINT investigations as requested.


REQUIREMENT SUMMARY

Min:2.0Max:7.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Other

Graduate

Proficient

1

30-392 Kraków, Poland