Threat Intelligence Consultant
GuidePoint Security’s Research & Intelligence Team (GRIT) performs the following:
Threat Intelligence as a Service
Threat Intelligence Advisory Services
Exposure Management Services
Malware Analysis
Proactive Threat Discovery and Threat Hunting
CTI Support to GuidePoint’s Digital Forensics and Incident Response (DFIR) Practice
Threat Research
As a GRIT Consultant, you will be a technical resource that leverages your knowledge, skills, and experience to help deliver results to clients in various sectors.
Role Requirements
Your primary responsibilities revolve around solving challenging and complex problems and include helping customers reach their Threat Intelligence goals. GRIT provides managed Threat Intelligence and Exposure Management services, Deep and Dark Web investigations, threat briefings, and advisory consulting in CTI operationalization, maturity, and program development. In each of these services, our goal is to better secure and prepare our clients to build, implement, and improve their security and CTI programs through advisory, instruction, assistance, or direct support.
Additionally, GRIT supports GuidePoint’s DFIR practice, providing Threat Intelligence support to active intrusion investigations and response efforts, or informing DFIR advisory efforts and tabletop exercises. GRIT performs independent threat research into Ransomware and the cybercrime threat landscape, contributing to quarterly and annual reports, as well as Requests For Information (RFIs) and media inquiries.
GuidePoint Security’s GRIT service offerings are perpetually evolving in response to emerging threats and diverse client needs, and your creativity and expertise will assist the GRIT Practice with adapting to this rapidly changing environment. Primary Duties will include:
Operate as a technical resource within the Practice and actively participate in DFIR investigations to provide actionable intelligence
Effective engagement communication, time management, and collaboration with peers and clients
Author comprehensive engagement deliverables that are tailored to both technical and managerial audiences; fully detail the technical findings, recommendations, business impact, and realistic remediation strategies
Foster client relationships by providing support, information, and guidance
Utilize automation, orchestration, and scripting to reduce manual processes, improving overall efficiency while also enabling new capabilities to meet the rapidly changing needs of our clients
Contribute to integration of existing and future open-source and commercial tools to help improve GRIT processes and procedures
Perpetually strengthen relevant skills, knowledge, and abilities to stay at the forefront of the information security industry
Maintain a strong desire to learn, adapt, and improve along with a rapidly-growing company
Education and Experience
Essential Qualifications
Two (2+) years of experience performing Threat Intelligence analysis
Five (5+) combined years of IT and information security experience
Preferred Qualifications
Prior experience in a Consulting Services role
Experience implementing or improving operational processes or procedures in the intelligence analysis lifecycle
Proficiency hunting APT data using open source or commercial cyber threat analytic tools or data repositories such as VirusTotal, Passive Total, Threat Miner, or Maltego
Experience in scoping and conducting threat research centered on cybercrime, ransomware, and/or nation-state cyber operations
Core capabilities include:
Network traffic analysis
Host forensics
Malware handling / triage
Log review
Experience with a variety of industry-related solutions including EDR, SIEM, NDR, FW, NGAV, Velociraptor, OSQuery, and others
Strong ability to correlate data and research using open-source repositories (ex. VirusTotal, Domaintools, Threatminer, etc.)
Intermediate ability to present technical information and analysis to audiences up to 50 persons on a quarterly basis.
Ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, always ask why, defend your analysis, and apply attribution to cyber threat activity.
Ability to make confidence-based assessments for purposes of attribution based on their technical analysis of network traffic, multi-source data, malware and system analysis. Candidate must be able to identify analytic bias
Experience with common programming languages including PowerShell, Python, BASH, Go, or others
Experience with cloud technologies for the enterprise, such as Amazon Web Services, G Suite, Office 365, and Azure.
Awareness of attacker techniques, advanced threat groups, and integration of intelligence into an investigation
Other relevant industry certifications, such as but not limited to CASP+, CySA+, GCIA, GCIH, GDAT, GCFE, GFCA, GREM, PMRP, and Sec+
Threat Intelligence Consultant
GuidePoint Security’s Research & Intelligence Team (GRIT) performs the following:
Threat Intelligence as a Service
Threat Intelligence Advisory Services
Exposure Management Services
Malware Analysis
Proactive Threat Discovery and Threat Hunting
CTI Support to GuidePoint’s Digital Forensics and Incident Response (DFIR) Practice
Threat Research
As a GRIT Consultant, you will be a technical resource that leverages your knowledge, skills, and experience to help deliver results to clients in various sectors.
Role Requirements
Your primary responsibilities revolve around solving challenging and complex problems and include helping customers reach their Threat Intelligence goals. GRIT provides managed Threat Intelligence and Exposure Management services, Deep and Dark Web investigations, threat briefings, and advisory consulting in CTI operationalization, maturity, and program development. In each of these services, our goal is to better secure and prepare our clients to build, implement, and improve their security and CTI programs through advisory, instruction, assistance, or direct support.
Additionally, GRIT supports GuidePoint’s DFIR practice, providing Threat Intelligence support to active intrusion investigations and response efforts, or informing DFIR advisory efforts and tabletop exercises. GRIT performs independent threat research into Ransomware and the cybercrime threat landscape, contributing to quarterly and annual reports, as well as Requests For Information (RFIs) and media inquiries.
GuidePoint Security’s GRIT service offerings are perpetually evolving in response to emerging threats and diverse client needs, and your creativity and expertise will assist the GRIT Practice with adapting to this rapidly changing environment. Primary Duties will include:
Operate as a technical resource within the Practice and actively participate in DFIR investigations to provide actionable intelligence
Effective engagement communication, time management, and collaboration with peers and clients
Author comprehensive engagement deliverables that are tailored to both technical and managerial audiences; fully detail the technical findings, recommendations, business impact, and realistic remediation strategies
Foster client relationships by providing support, information, and guidance
Utilize automation, orchestration, and scripting to reduce manual processes, improving overall efficiency while also enabling new capabilities to meet the rapidly changing needs of our clients
Contribute to integration of existing and future open-source and commercial tools to help improve GRIT processes and procedures
Perpetually strengthen relevant skills, knowledge, and abilities to stay at the forefront of the information security industry
Maintain a strong desire to learn, adapt, and improve along with a rapidly-growing company
Education and Experience
Essential Qualifications
Two (2+) years of experience performing Threat Intelligence analysis
Five (5+) combined years of IT and information security experience
Preferred Qualifications
Prior experience in a Consulting Services role
Experience implementing or improving operational processes or procedures in the intelligence analysis lifecycle
Proficiency hunting APT data using open source or commercial cyber threat analytic tools or data repositories such as VirusTotal, Passive Total, Threat Miner, or Maltego
Experience in scoping and conducting threat research centered on cybercrime, ransomware, and/or nation-state cyber operations
Core capabilities include:
Network traffic analysis
Host forensics
Malware handling / triage
Log review
Experience with a variety of industry-related solutions including EDR, SIEM, NDR, FW, NGAV, Velociraptor, OSQuery, and others
Strong ability to correlate data and research using open-source repositories (ex. VirusTotal, Domaintools, Threatminer, etc.)
Intermediate ability to present technical information and analysis to audiences up to 50 persons on a quarterly basis.
Ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, always ask why, defend your analysis, and apply attribution to cyber threat activity.
Ability to make confidence-based assessments for purposes of attribution based on their technical analysis of network traffic, multi-source data, malware and system analysis. Candidate must be able to identify analytic bias
Experience with common programming languages including PowerShell, Python, BASH, Go, or others
Experience with cloud technologies for the enterprise, such as Amazon Web Services, G Suite, Office 365, and Azure.
Awareness of attacker techniques, advanced threat groups, and integration of intelligence into an investigation
Other relevant industry certifications, such as but not limited to CASP+, CySA+, GCIA, GCIH, GDAT, GCFE, GFCA, GREM, PMRP, and Sec+