Cyber Intelligence Resume Samples

4.9 (113 votes) for Cyber Intelligence Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the cyber intelligence job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
ZH
Z Hane
Zula
Hane
295 Johanna Drive
Detroit
MI
+1 (555) 361 4681
295 Johanna Drive
Detroit
MI
Phone
p +1 (555) 361 4681
Experience Experience
Dallas, TX
Mgr, Cyber Intelligence & Incident Response
Dallas, TX
Rogahn, Gerhold and Trantow
Dallas, TX
Mgr, Cyber Intelligence & Incident Response
  • Protects computer assets by developing security strategies; directing system control development and access management, monitoring, control, and evaluation
  • Deep working knowledge of networking concepts: TCP/IP, HTTP, HTTPS, FTP, IRC, RPC, DNS etc
  • Working knowledge of databases such as Postgres or MySQL
  • Manage multiple projects, providing timeline, budget and estimates for work, tracking and escalating issues, defining risks and ensuring integration between various systems
  • Advises senior management by identifying critical security issues; recommending risk-reduction solutions
  • Manage critical incidents involving slow moving or persistent threats across the infrastructure
  • Manage team priorities and delivery of Security initiatives including the planning and implementing of internal and client information systems, including structure, process, and audit controls
Detroit, MI
Cyber Intelligence Digital Brand Protection Services Program Manager
Detroit, MI
Smitham-Keebler
Detroit, MI
Cyber Intelligence Digital Brand Protection Services Program Manager
  • Develop and manage processes to track identified incidents to resolution
  • Manage a team of analyst(s)
  • Build and maintain relationships with members of legal, global public affairs, corporate social media and compliance
  • Create and maintain daily, weekly, monthly, quarterly and year end metrics
  • Work with auditors and regulators at a global level
  • Actively monitor and research cyber threats with a direct or indirect impact to the Citi brand
  • Prepare written reports and give presentations to internal senior level managers and outside clients
present
Boston, MA
VP, Cyber Intelligence
Boston, MA
Ferry, Wolff and Dietrich
present
Boston, MA
VP, Cyber Intelligence
present
  • Work with Thomson Reuters legal teams create and maintain standard methodologies and policy for cyber intelligence management
  • Partner with security operations teams to provide best-in-class monitoring, response, and reporting for network and computer incidents
  • Develop critical intelligence partnerships to develop and curate high quality threat analysis and indicators
  • Conduct briefings on sensitive intelligence and threats to a broad spectrum of audiences, ranging from Senior Executive management to IT Leadership
  • Develop in-house cyber threat assessment team to quantify and remediate internal and external weaknesses
  • Mentors other managers, engineers & investigators in intelligence handling and collection
  • Awareness of industry trends and developments
Education Education
Bachelor’s Degree in Professionalism
Bachelor’s Degree in Professionalism
Clark Atlanta University
Bachelor’s Degree in Professionalism
Skills Skills
  • Strong verbal and written communications skills; strong presentation and marketing skills
  • Strong capability and experience with meeting timelines
  • Technical capability or knowledge, specifically Network and application security
  • Highly adaptable to a constantly changing business and technology environment
  • Ability to plan and prioritize workload
  • Provide quality security intelligence reporting as appropriate
  • Strong interpersonal skills to interact with teams and multiple departments to achieve team objectives
  • Assist the effort to ensure consistent MI is available
  • Ability to assess, identify risk early in the intelligence process, including the proper allocation and management of alerts
  • Strong organizational, communication and planning skills
Create a Resume in Minutes

15 Cyber Intelligence resume templates

1

Senior Cyber Intelligence Threat Analyst Resume Examples & Samples

  • 5+ years working in a threat intelligence job function
  • 1+ years leading a cyber threat analysis related function
  • Can apply a variety of structured analytic techniques to generate and test a hypothesis, create scenarios, assess cause and effect, challenge analysis, and support decision making. Examples of these techniques include, but are not limited to: o Red Team Analysis o Structured Brainstorming o Key Assumption Check o Analysis of Competing Hypotheses o Devil's Advocacy o Alternative Futures Analysis o Strengths-Weaknesses-Opportunities-Threats (SWOT) Analysis o Lockheed Martin Kill Chain
  • Should be a subject matter expert in one or more of the following areas o Cyber crime o Extremist Groups and Cyber Terrorists o Hacktivism o Distributed Denial of Service attacks o Fraud o Advanced Persistent Threat o Malware o Mobile Threats o Emerging Threats o Social Engineering o Insider Threats o Third Party Risks/Threats o Data Leakage Threats
  • Must be a self-starter, self-motivated and able to work independently with little oversight
2

Cyber Intelligence Center Threat Analyst Resume Examples & Samples

  • Conduct research using multiple data sources, evaluate collection requirements, performs analysis and disseminates findings to consumers with an emphasis on identifying and analysing cyber threats associated with Advanced Persistent Threat (aka APT) actors
  • Analyse cyber threat data and synthesize the analysis with cyber threats impacting the Citi franchise; identify, escalate, and fill intelligence gaps
  • Approximately 30% of the cyber threat analytic work will be in direct support to Citi’s Cyber Security Fusion Center (CSFC) located in Warren, NJ in the form of daily tactical cyber threat briefings, assist in formulating immediate collection requirements, and in some instances, collaborate on CSFC products
  • Leverage the CIC Intelligence Request process to task third party intelligence service providers to fill intelligence gaps according to the CIC intelligence collection plans
  • Lead and manage regular conference calls with third party intelligence providers to review cyber threat deliverables, intelligence gap support, quality, and implement intelligence delivery improvements
  • This position will report to the CIC Intelligence Analysis Manager
  • The CIC Intelligence AnalysisManger to the Cyber Intelligence Center (CIC) Director
  • Structured Brainstorming
  • Key Assumption Check
  • Analysis of Competing Hypotheses
  • Alternative Analysis
  • Strengths-Weaknesses-Opportunities-Threats (SWOT) Analysis
  • Kill Chain Methodology
  • Should have considerable working knowledge in one or more of the following areas
  • Advanced Persistent Threat
  • Distributed Denial of Service attacks
  • Ability to effectively communicate with all levels of senior management
  • Ability to work within cross-functional and cross-business teams
3

Lead Consultant, Cyber Intelligence Resume Examples & Samples

  • Multiple platforms e.g. Windows, Internet, Client/Server, Unix
  • RBC HR philosophy, principles, direction, policies & guidelines
  • Talent management process (recruitment/selection, performance management, performance development/coaching, reward/ recognition)
4

Cyber Intelligence Center Threat Intelligence Analyst Resume Examples & Samples

  • Perform cyber threat analysis, alerting and reporting based on intelligence gathered from both internal and external sources
  • Conduct research using multiple data sources, evaluates collection, performs analysis and disseminates findings to consumers
  • Analyse cyber threat data and synthesize the analysis with cyber threats impacting the Citi franchise; identify, escalate and fill intelligence gaps
  • Interact daily with the Cyber Intelligence Center and collaborate with Citi’s Cyber Security Fusion Center staff members in support of ongoing threat intelligence analysis and collection plans
  • Lead and manage regular conference calls with third party intelligence providers to review cyber threat deliverables, intelligence gap support, quality and implement intelligence delivery improvements
  • Triage, process, analyze and disseminate CIC alerts, reports and briefings
  • Can apply a variety of structured analytic techniques to generate and test a hypothesis, create scenarios, assess cause and effect, challenge analysis and support decision making; examples of these techniques include, but are not limited to
  • Strong written and verbal communication and presentation skills
  • 5+ years of working in a threat intelligence job function
  • 1+ years of leading a cyber threat analysis related function
5

Cyber Intelligence Technical Sales Professional Resume Examples & Samples

  • Define and execute a business and solution strategy based on a demonstrated understanding of the Cyber Intelligence market and customer needs
  • Support sales opportunities through business proposals/business cases to related to Cyber Intelligence products
  • Define market requirements and detailed solution requirements which you work with the engineering team
  • Develop positioning, value propositions benefit statements, solution and marketing messages for Cyber Intelligence offerings for your market
  • Work closely with a cross functional matrix team of marketing, sales, services, engineering, to ensure business and product strategy execution is tightly coordinated to support Cyber Intelligence offerings in your market
  • Understand other IBM solutions, such as, IBM Security, IBM Watson and IBM Information Management to leverage industry leading IBM capabilities to strengthen Cyber Intelligence solutions
  • Be the AP subject matter expert for all audiences (internal and external) around cyber issues, cyber solutions, cyber industry trends, and competition
  • Ability to understand different data sources and concepts used by cyber analysts
  • Familiarity with security disciplines, including forensic and incident response
  • Ability to model and analyze cyber attacks, and be able to correlate data from cyber and other domains to analyze, extract insight and draw conclusions
  • Able to work with large data sets, and transform them in ways that are better suited for analysis, and to extract meaningful information
  • Experience with i2 analysis tools
  • Experience with QRadar, ArcSight, or Splunk SIEM systems
  • Enable security defends to hunt for malicious behavior and to come up with ways to detect, deter and prevent attacks
  • Able to do threat modeling and conduct cyber investigations / have a investigative mindset
  • Understand cyber related standards (STIX, OpenIOC) and how they can be used to share threat intelligence
  • Demonstrated product and/or business management experience of Cyber Intelligence software solutions (5+ years)
  • Demonstrated industry knowledge of Cyber intelligence, Cyber security, Intelligence analysis in government and/or commercial sectors. Knowledge of the market including market lifecycle, how the market buys and their buying criteria and sales challenges, how customers are organized and how this affects purchasing decisions
  • Demonstrated written and oral communication skills with an ability to express complex business and technical concepts in simple forms of value proposition to clients
  • Ability to translate high level market requirements into detailed solution requirements which drive a development stream of work to deliver on a product roadmap that is meeting market and customer needs
  • Data and analysis skills to drive pricing proposals and do customer trend analysis
  • Ability to translate technical value into business value
  • Familiarity with enterprise software systems and their deployment
  • The successful candidate will have a demonstrated balance of business strategy and vision combined with attention to detail in execution
  • Comfortable in undefined environments where you set the direction and leading teams that are matrixed and not in a direct reporting line
  • Demonstrated presence and credibility in Cyber intelligence domain
  • At least 3 years experience in Cyber intelligence
6

Team Lead & Senior Cyber Intelligence Threat Analyst Resume Examples & Samples

  • As the CIC’s North American (NAM) Team lead, you will be responsible for setting priorities for intelligence production and support, establish and maintain a 90 day finished intelligence production schedule, and de-conflict production plans and priorities with other teams within and external to the Cyber Intelligence Center
  • Recognized as a subject matter expert for cyber threats potentially impacting regional and global financial institutions and actively monitor and research cyber threats with a direct or indirect impact to the Citi brand, region business operations, technology infrastructure and client trust
  • Actively engage in liaison activities with law enforcement, industry partners, peer financial institutions, and information sharing communities
  • Understand the importance of mentoring assigned junior analysts, including receiving and providing analytic and writing related feedback and demonstrate the importance of daily interaction with CIC staff members
  • Leverage the CIC intelligence request process to request additional information from third party intelligence service providers and ensure all assigned analysts are familiar with those processes
  • Ensure work-centers which engage in malware analysis and reverse engineering are receiving adequate intelligence to analyze binaries, files, and other malicious attack artifacts
  • Ensure assigned analysts are triaging, processing, analyzing, and disseminating CIC alerts, reports, and briefings
  • Perform post mortem analysis on logs, traffic flows, and other activities to identify malicious activity
  • Execute tasks or lead small projects as needed
  • The CIC Intelligence Analysis Manger to the Cyber Intelligence Center (CIC) Director. · The CIC Program Director reports to the Global Head of Information Security
  • Possess the ability to establish cyber intelligence priorities for collection and production for all assigned analysts
  • Can apply a variety of structured analytic techniques to generate and test a hypothesis, assess cause and effect, challenge analysis, and support decision making. Examples of these techniques include, but are not limited to
7

Cyber Intelligence Specialist Resume Examples & Samples

  • 1)Delivering expert cyber intelligence services and material to information technology and business leaders. Prepare appropriate threat intelligence content for customer and executive presentations
  • Privacy/Protection: Proved the necessary subject matter expertise and assist in the implementation of the information security architecture, risk management standards, best practices and systems/processes to ensure information privacy/protection
  • Monitoring of security procedures and practices: Review on a timely basis the various reports and logs available. Investigate, report on and make recommendations for noted irregularities
  • Security policies for the bank: Be aware of and review the security features of new information security practices, systems and business services to ensure that they meet the security requirements of the existing policies. Propose changes to existing policy as external emerging issues and conditions warrant
  • Maintain adequate documentation and reporting of team procedures and key performance indicators. Submit timely reports to senior-level Department management
  • Supervise/direct assigned personnel, providing performance evaluations and recommending promotions, transfers and terminations within established policies and guidelines
  • Plans and develop team budgets in accordance with established guidelines; administer compliance to meet budgetary goals and negotiates changes as required
  • Maintain awareness of changes in industry: Attend classes and seminars as required to maintain a high level of proficiency in the fields of information security and business resumption. Network with other information security professionals. Read about and be aware of the trends regarding BRP and Security in the industry
  • Bachelor's degree in computer science, business, or related discipline or equivalent education and related training
  • Five years experience in IS/IT, with some supervisory experience
  • Must demonstrate SME level knowledge in one of the following areas: Firewall Administration, Intrusion Detection, Communications, Incident Response, RACF, Encryption, Access Control, Threat Management, or any other security-related field
  • Familiarity with multi-platform environments and their operational/security risk considerations
  • Strong verbal and written communications skills; strong presentation and marketing skills
  • Highly adaptable to a constantly changing business and technology environment
  • Foundational knowledge of multiple areas of cyber security operations, such as attack surface management, SOC operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), SIEM use, threats (including APT, insider, etc.), vulnerabilities, and exploits; incident response, investigations and remediation
8

Cyber Intelligence Threat Analyst Resume Examples & Samples

  • Using multiple internal and external data sources to conduct cyber threat analysis in support of CIC intelligence priorities associated with Citi’s Cyber Security Fusion Center (CSFC). These duties may include providing briefings, short analytic summaries, and/or duties as defined by the Intelligence Support Team Chief for the CSFC
  • Triage multiple data sources daily to process and report information which will be disseminated via CIC tactical alerts to multiple work centers, lines of business and individual as required
  • Conduct research using multiple data sources with an emphasis on rapidly identifying, analyzing, and reporting cyber threats associated with malicious cyber actors who attempt to defraud, disrupt, illicitly collect information, or otherwise attempt to damage the reputation of Citi or our ability to support our lines of businesses and our customers
  • Work daily with the CIC Intelligence Collection team on intelligence collection tasking in support of ongoing threat collection plans and requirements for the CSFC
  • Perform daily searches in multiple third party cyber intelligence providers’ portals to support CIC and CSFC information needs and intelligence priorities
  • This position will report to the Cyber Intelligence Center (CIC) Intelligence Support Team Chief for the Cyber Security Fusion Center (CSFC)
  • The CIC Intelligence Support Team Chief reports to the CIC Intelligence Manager
  • 2+ years working in a threat intelligence job function
9

Senior Cyber Intelligence Threat Analyst Resume Examples & Samples

  • Using multiple internal and external data sources to conduct cyber threat analysis in support of CIC intelligence product development for a wide array of customers
  • Work daily with the CIC Intelligence Collection team on intelligence collection tasking in support of ongoing threat collection plans
  • Actively monitor and research cyber threats with a direct or indirect impact to the Citi brand, regional business operations, technology infrastructure and client trust
  • Apply expertise to conduct intrusion analysis following the Kill Chain methodology to ascertain the impact of an attack and develop threat trends to develop mitigation techniques and countermeasures that can prevent future attacks
  • This position will report to the CIC Analysis Latin American Team Chief
  • 3+ years working in a threat intelligence job function
  • Can apply a variety of structured analytic techniques to generate and test a hypothesis, , assess cause and effect, challenge analysis, and support decision making. Examples of these techniques include, but are not limited to
10

Cyber Intelligence Coordinator Resume Examples & Samples

  • Day-to-day vendor management responsibilities and substantive interaction with existing and prospective vendors to include: participation in conference calls with third party intelligence providers to review cyber threat deliverables; intelligence request support; and the facilitation of topic nominations and analytical discussions covered during the vendor calls
  • Regular meetings with internal Citi CIC clients based on the client interaction model schedule; gather/refine intelligence support requirements, review intelligence feeds, update intelligence requests, and collect feedback on quality of deliverables
  • Support development and documentation of the client Interaction model with CIC clients
  • Above-average Microsoft Excel and Access skills
  • This position will report to a Cyber Intelligence Center (CIC) Senior Client Manager
  • The CIC Senior Client Manager reports to the CIC Collection and Client Relationship Manager
  • The CIC Collection and Client Relationship Manager report to the CIC Director
  • The CIC Program Director reports to the Global Head of Information Security
11

Cyber Intelligence Senior Threat Analyst Resume Examples & Samples

  • Analyse cyber threat data and correlate with existing understanding of cyber threats
  • Conduct research and write papers based on the identification of trends
  • Should possess a basic understanding of the cyber threat Kill Chain methodology to ascertain the impact of an attack and develop threat trends to assist the mitigation work centers and personnel in developing mitigation techniques and countermeasures which can prevent or lessen the effects of future cyber-attacks
  • Develops, fosters, and furthers relationships with personnel at other financial institutions, government agencies, and other appropriate organizations
  • Cyber crime
  • Extremist Groups and Cyber Terroris
  • Hacktivism
  • Fraud
  • Social Engineering
  • Insider Threats
12

Cyber Intelligence Center Special Projects Lead-senior VP-warren Cfsc Resume Examples & Samples

  • Lead intelligence production by researching, drafting, and managing dissemination of the CIC’s standard product lines and ad hoc pieces requested by senior management
  • Monitor vendor intelligence and open source reporting on major developments in the cyber security landscape in the areas of Nation State / Terrorism, Cyber Crime / Hacktivism, Tools Techniques and Exploits, and Information Security
  • Liaise with CIC management and related internal groups for editorial review, production, and dissemination of CIC pieces, anticipating and responding to client feedback
  • Manage production of the CIC’s Monthly Threat Briefing by tracking topics for incorporation, managing the briefing template, holding topic selection and review calls with contributors from within the CIC team, Citi internal staff, and external partners, and publishing the final product to clients
  • Work with senior Citi staff to produce strategic cyber threat intelligence products and threat forecasts
  • Leverage external intelligence vendor relationships to review intelligence, discuss intelligence requirements, provide operational feedback, and share information
  • Facilitate ongoing collaboration and information sharing between the CIC and internal client groups focused on security, investigative, international, and training/awareness issues
  • Manage multiple external relationships for the CIC
  • Advanced degree with academic background in writing, communications, security, or international affairs or equivalent work experience
  • Strong analytic writing and verbal communication skills with demonstrated history of briefing senior management and large audiences
  • 5+ years experience working in the financial services industry and/or in cyber security
  • 5+ years serving in an intelligence-related or information security related role
  • Experience teaching at the undergraduate level strongly preferred
  • Self motivator with the ability to navigate the enterprise to identify opportunities, articulate them and execute changes into the operating environment
  • Ability to create effective cross-functional and cross-business teams
13

Cfsc Cyber Intelligence Threat Analyst Resume Examples & Samples

  • Analyze cyber threat data and correlate with existing understanding of cyber threats impacting the Citi franchise
  • Interact daily with the Citi CIC and Cyber Security Fusion Center staff members
  • 4+ years working in a threat intelligence job function
14

Lead of Cyber Intelligence Resume Examples & Samples

  • You will work in tactical/strategic role cultivating intelligence sources, analyzing information, creating intelligence, and hunting for exposures or related incidents
  • You will manage and lead the EMEA Cyber Intelligence team
  • You will be involved in researching current and emerging threats, malware analysis, campaign assessment, data collection and analysis, network and host based forensics
  • You will collect, assess, and catalogue threat indicators and be responsible for adding context to threat indicators to convey urgency, severity, and credibility
  • You will research threat actors and cultivate and assess new sources of threat information and intelligence
  • You will maintain knowledge of threat landscape by monitoring OSINT and related sources
  • You will perform malware reverse engineering and behavioral analysis
  • The ability to perform incident response and network security monitoring using IDS, SIEM, and related tools
  • Critical thinking and the ability to anticipate issues and solve problems
  • The ability to analyze large data sets to detect underlying patterns
  • Knowledge of computer security incident investigation and response
  • Experience analyzing common types of attacks
  • Knowledge of intrusion analysis, network and host forensics
  • Malware analysis/Malicious code analysis experience
  • Ability to develop and maintain professional contacts in the security community
  • Knowledge of Network Protocols
  • Proficient experience in all phases of the intelligence lifecycle
  • Knowledge of application vulnerabilities
  • Experience performing packet-level analysis using appropriate tools
  • Experience with managing small teams
15

Cyber Intelligence Manager Resume Examples & Samples

  • Strong team management, leadership and team building skills, specifically management of a global team
  • Demonstrated Expert understanding of intelligence sourcing, evaluation and source management
  • Demonstrated experience developing and managing a cyber-intelligence portfolio that maintains relevancy
  • Demonstrated experience managing the production of contextual intelligence products
  • Demonstrated experience in intelligence analytics and investigations
  • An interest in business and current affairs, including cyber security and cyber intelligence
  • Good organizational skills ideally with project management experience
  • Proven written and verbal communication skills and attention to detail
  • Ability to develop subject matter expertise in complex areas
  • Resourceful, creative and inquisitive approach to highly complex tasks
  • The ability to quickly identify solutions to complex problems
  • Highly motivated, entrepreneurial and autonomous (robust, accountable and independent)
16

Cyber Intelligence Resume Examples & Samples

  • Key accountabilities of the operational and delivery is conducting active intelligence gathering, analysis of multiple data feeds and engagements to provide actionable intelligence, consultancy and reporting to defence and fraud teams at BARCLAYS
  • To provide operational support and analysis associated with the gathering of actionable intelligence into the activities where Barclays customers' PII is the target
  • Aid in the delivery of tailored targeting strategies unique to the client directed areas of interest (AOI)
  • Establish points-of-presence within client designated areas of interest
  • Provide post-machine editing and copy editing translation tasks
  • Work with internal stakeholders (including those based overseas) and external stakeholders (including law enforcement) to provide enhanced capabilities in the analysis of data exfiltration techniques and cybercriminal trends and activities
  • Work with the Card and PII team to provide actionable intelligence to business units and fraud teams to better implement mitigation strategies and develop new controls thereby improving the customer experience
  • Liaise with the wider GIS Intelligence and GIS functions to ensure robust engagement to ensure Card PII is represented in the wider GIS Strategic Threat Assessments, engagements and strategy
  • Prior experience with “Carding Forums” and the “DarkWeb”
  • Investment banking industry experience
  • Linguist (Russian, German, Romanian)
  • Experience of big data and technical analytical tools and capabilities used for Cyber intelligence
  • Knowledge of credit card fraud mitigation architectures and technology
  • Exposure to the production of technical reports for non-technical audience
17

Cyber Intelligence, VP Resume Examples & Samples

  • Establish Critical Information Requirements in coordination with the Deputy CISO and appropriate stakeholders in the Global CSO organization
  • Develop and execute the EFX intelligence collection plan, ensuring geographic focus areas
  • Assist the Deputy CISO in the education of company staff on security risks, cyber threats, vulnerabilities, and future threat actor techniques, tactics, and procedures
  • Heavily influence the security program capability and maturity future roadmap
  • Maintain pipeline of talent and pre-attrition hiring strategies
  • Intelligence Program Management
  • Bachelor’s Degree in Political Science, Intelligence, or related field, or equivalent experience
  • 10+ years combined experience in the US and/or FVEY Intelligence Community (IC)
  • 5+ years experience in a senior leadership role with global accountability
  • 5+ years experience in roles that include financial/budget management and resource management
  • 5+ years experience working with global security and intelligence issues, such as privacy and country specifics risks on intellectual privacy
  • Experience with contract and vendor negotiations
  • Experience developing and implementing global intelligence policies and procedures, in addition to successfully executing programs that meet the objectives of excellence in a dynamic IT environment
  • Professional intelligence and/or language management certification preferred
  • Active (or ability to be read-on) Security Clearance: Top Secret-SCI with CI Polygraph
  • US Government IC or US Military experience
  • Must be a critical thinker, with strong problem-solving skills
18

Cyber Intelligence & Operations Analyst Resume Examples & Samples

  • 10+ years of experience in Cyberspace or information operations at a senior level
  • Experience with Special Access Required (SAR) or Special Access Programs (SAP) and associated planning processes within the past year
  • Experience with Microsoft Office tools, including Word, Excel, and PowerPoint
  • Knowledge of current or projected adversary TTP
  • Ability to conduct data gathering, parse relevant data, and apply analytic techniques to develop executable client courses of action and consistently prepare clear, concise, and visually enticing communication documents for senior leaders
  • Ability to develop unit training programs and the associated instructional system
  • Ability to develop future system or functional requirements based on expertise in the DoD acquisition community and develop system Key Performance Parameters (KPPs)
  • Ability to develop high fidelity and realistic exercise scenarios and associated Master Scenario Event List (MSEL) injects based on the unit's Annual Plan of Instruction (APOI) and function as an exercise control cell member
  • 3 years of experience in an operations center or on an Air Force staff
  • Experience in an Air and Space Operations Center (AOC)
  • Experience as a MAJCOM or Headquarters Air Force staff member, including branch chief or higher preferred
  • Experience as an executive officer, public affairs, or protocol officer
  • BA or BS degree in Intelligence or related field preferred; MA or MS degree in Business, Public Administration, or Organizational Change Management a plus
  • DoD 8570 Management level Certification, including CISM and CISSP
  • Project Management Professional (PMP) Certification with an emphasis on Agile and Change Management methodologies
19

Lead Cyber Intelligence Engineer / SME Resume Examples & Samples

  • Serve as a subject matter expert in the area of Intelligence
  • Help shape the scope, scale, use cases, and requirements of a new IC wide platform
  • Broad knowledge of the Intelligence Community and each agency's roles and authorities
  • Working knowledge of the challenges of identity intelligence
  • Ability to work closely with, and help facilitate consensus across, a wide range of leaders at the GS-15 and SES levels from over twenty agencies, each with their own particular culture. Multi-agency background or interagency experience a plus
  • Preference will be given to candidates with cyber domain knowledge and an understanding of the national cyber landscape
20

Cyber Intelligence Center Resume Examples & Samples

  • Responsible for prompt and secure collection and dissemination of intelligence to clients from a variety of internal and external intelligence sources
  • Day-to-day interaction with the Citi Information Security Officer (ISO) community, including feedback/awareness/coordination efforts with same
  • Regular meetings with internal CIC clients to gather/refine intelligence support requirements, review intelligence feeds, update intelligence requests, and collect feedback on quality of deliverables
  • Support development and documentation of the client interaction model with CIC clients. Identify client feedback opportunities, then develop and implement processes to support client feedback
  • Assist with duties/requirements associated with the CIC Third Party Risk Intelligence program
  • Identify and integrate data exchanges between CIC and its clients
  • Day-to-day management of CIC subscription and feedback mechanisms
  • 2+ years working in a similar job function
  • Experience working in the financial services industry and/or government/military/intelligence communities
  • Ability to effectively communicate with technical and non-technical audiences and to all levels of senior management
  • Vendor management experience preferred but not required
  • Must be a self-starter, self-motivated, and able to work independently with little oversight
  • Strong project management and critical thinking skills
  • This position will report to a Cyber Intelligence Center (CIC) Collection and Client Relationship Manager
  • The CIC Collection and Client Relationship Manager reports to the CIC Director
  • The CIC Director reports to the Global Head of Cyber Security
21

Cyber Intelligence Center Director Resume Examples & Samples

  • 15 years or more experience leading intelligence, analytic, or investigative teams; at least 5 years of cyber security related leadership experience preferred
  • Proven ability to successfully drive and develop teams that work remotely and across multiple geographic time zones
  • Experience in taking intelligence related requirements and turning them into final products or presentations on time and on point
  • Strong knowledge of cyber security threat actors particularly their tactics, techniques, procedures, tradecraft, and noteworthy attacks
  • Exceptional communications skills (oral and written) with a history of successfully engaging with groups such as Boards of Directors, executive management teams, and senior business leaders both internally and externally
  • Ability to provide the strategic direction for the production of intelligence products while successfully overseeing the creation, review, and presentation of analytic findings
  • Understanding of technology systems such as networks, applications, servers, cloud, authentication, and emerging technologies
  • Experience working with information security teams such as fusion centers, security operations centers, vulnerability assessment, vulnerability threat management, security incident management, cyber “hunt,” and big data analysis
  • Managed or worked closely with public and private sector intelligence organizations with a strong understanding of their roles, responsibilities, and capabilities
  • Significant experience working in or with financial services companies at the most senior levels
  • Able to develop and stay with a substantial financial budget
  • Bachelor’s Degree required, Master’s degree preferred
22

Senior Manager Cyber Intelligence Resume Examples & Samples

  • Seek and identify commercial streaming video providers offering infringing content to consumers
  • Gather intelligence on black-market streaming video providers, and online piracy applications, and identify countermeasures and/or legal action that can be taken against them
  • Seek and identify third-party IPTV set-top boxes that are used to access black-market streaming services
  • Analyze IPTV set-top box hardware to determine capabilities, limitations, and vulnerabilities. Identify countermeasures targeting boxes that can be used over the Rogers-owned network
  • Seek and identify techniques to block and impede access to infringing servers on the internet
  • Attend in court to provide expert testimony where required
  • Bachelor’s degree in IT, Computer Science, Engineering or a related field (Post graduate degree preferred)
  • Minimum of 5-7 years experience in IT, Computer Science, Engineering, or related field
  • Ability to build strong relationships across departments
  • Can articulate and present complex information to a large audience in a way that is easy to interpret and understand
  • Strong organizational skills with a proven ability to prioritize
  • Demonstrated business professionalism, respect for confidentiality and appropriate handling of sensitive information
  • Fluency in programming and scripting languages
  • Knowledge of cyberlockers, linking sites, online plug-ins, peer to peer networks, content delivery networks and geolocation tools and techniques
  • Ability to reverse engineer and explain operational aspects of online piracy applications to a legal audience
  • Ability to perform and interpret real-time analyses of piracy usage patterns; ability to identify command and control servers hosting content online
  • Ability to propose and execute effective countermeasures to combat online piracy
23

Mgr, Cyber Intelligence & Incident Response Resume Examples & Samples

  • Create and grow a team of focused cyber investigators highly experienced in advanced threat detection, analytics, anomaly detection and forensic science
  • Manage leading edge malware research, analysis (data-mining), and generate content for use in our products
  • Analyze and Enhance CDK’s security content infrastructure, process workflow, and the malware intelligence and response
  • Apply leadership focus and experience in Threat Intelligence and Incident response context
  • Manage critical incidents involving slow moving or persistent threats across the infrastructure
  • Manage multiple projects, providing timeline, budget and estimates for work, tracking and escalating issues, defining risks and ensuring integration between various systems
  • Maintain expertise to function as subject matter expert in multiple security disciplines; serve as security consultant for projects and troubleshooting efforts
  • Have an excellent understanding and proven leadership capability in designing and selecting measured incident response processes in retail, e-commerce, manufacturing and corporate environments
  • Have a strong affinity with international Cyber Threat Intelligence and Forensic investigations
  • Manage team priorities and delivery of Security initiatives including the planning and implementing of internal and client information systems, including structure, process, and audit controls
  • Evaluate and/or Implement IS solutions and controls to ensure data security and integrity for CDK as well as clients
  • Protects computer assets by developing security strategies; directing system control development and access management, monitoring, control, and evaluation
  • Advises senior management by identifying critical security issues; recommending risk-reduction solutions
  • Manage associates responsible for identifying, containing and eradicating cyber security incidents
  • Provides other ad hoc support and duties as assigned
  • Experience with reviewing raw log files, data correlation, and analysis (i.e. firewall, network flow, IDS, system logs)
  • Experience conducting Incident Response and traffic capture and analysis
  • Working knowledge of databases such as Postgres or MySQL
  • Deep working knowledge of networking concepts: TCP/IP, HTTP, HTTPS, FTP, IRC, RPC, DNS etc
  • Host based IDS/IPS knowledge and experience a definite plus
  • Excellent management, inter-personal, and teamwork skills
  • Bachelor's degree required in Management Information Systems, Computer Science, or Computer Engineering or similar experience
  • Minimum 7 years of business experience in the areas of Information Security
  • 3 years’ experience leading resources in the TI/CSIRT function
  • Demonstrated expertise related to security concerns in areas such as servers, mid-range, mainframes, network topology and access controls, physical security, change and problem management, code promotion, privileged access needs, and effective monitoring
  • Certified Information Systems Security Professionals (CISSP), (CISM), (SANS), or (CPP)
24

Cyber Intelligence Osint Analyst Resume Examples & Samples

  • Identification, collection, assessment, development and dissemination of Internet based open source intelligence within surface, dark and deep web in support of the protection of the businesses physical and IT infrastructure as well as staff and clients
  • Effectively managing, analysing, extrapolating and visualising salient data identified from multiple work streams and data sources including Internet based open source intelligence research and bilateral investigations using relevant tools and methodology to produce high quality analytical reporting
  • Providing actionable intelligence and operational support in the form of detailed high quality Internet based open source intelligence reporting in support of the businesses physical and IT infrastructure as well as staff and clients
  • Working with internal and external stakeholders (including law enforcement) to provide enhanced capabilities for the proactive identification and attribution of threats, activities and threat actors, including cyber criminal actors
  • Liaising with the wider GCSO functions to ensure robust engagement
  • Regularly communicating analysis in respect to physical and cyber threat campaigns, threat actors and threat evolution placing into context the resulting current and future threat to Barclays
  • Developing additional and innovative skills and capability to deliver team objectives
  • Contributing to the growth of the team’s operational capability and delivery by utilising (self-learning if necessary) suitable tools and analysis
  • Managing and responding to stakeholder intelligence requirements, producing appropriate output for a range of audiences from Board level through to frontline staff
  • Developing and maintaining relationships with a wide range of internal stakeholders and external partners, officials and peers
  • Able to demonstrate a firm understanding of the wider threat landscape, including the cyber threat landscape, in respect to Barclays including the identification of relevant threats and vulnerabilities
  • Able to demonstrate practicable experience of working in an investigative environment
  • Able to demonstrate a sound knowledge of established procedures, policies and legal constraints concerning Internet based open source intelligence
  • Able to demonstrate a sound knowledge and practicable experience of established methodologies for the identification, collection and development of Internet based open source intelligence as well as effective reporting of findings from surface, deep and dark web environments
  • Able to demonstrate practicable experience of a wide range of tools for the purpose of conducting effective Internet based open source intelligence identification, collection and reporting
  • Able to demonstrate strong knowledge and practicable experience in the identification, analysis, extrapolation and visualisation of data from multiple sources and using established tools and methodologies
  • Able to demonstrate formal training in recognised analytical tools such as Maltego, i2 Notebook, iBase and Analysis Training
  • Able to demonstrate practicable experience of complex internal and external stakeholder engagement
  • Able to demonstrate an ability to communicate effectively, both orally and in writing, with clients, customers and colleagues
  • Able to demonstrate a proven ability to produce high quality and detailed written reporting reflecting investigative findings accurately
  • Able to demonstrate an ability to effectively and successfully manage individual workload and prioritise tasks
  • Able to demonstrate an ability to maintain effective and accurate record keeping
  • Able to demonstrate an ability to work successfully as part of a team, or where appropriate, on your own initiative independently from others
  • You are content to operate outside of an office environment or normal business hours, if required
  • Able to demonstrate high standards of personal integrity, professional conduct and ethics
25

Cyber Intelligence Center Resume Examples & Samples

  • Design, build, and maintain centralized storage repositories for archiving, querying and data mining of compromised account data
  • Develop normalization scripts per a multitude of diverse data sources, each requiring customization to fit into established standardized templates
  • Implement mechanisms to feed data sources into repositories from multiple sources
  • Integrate other internal system data sets into compromised account scrubbing processes to derive valuable intelligence
  • Identify opportunities within operations for automation and implement solutions to increase efficiency
  • Triage, process, analyse, and disseminate CIC alerts, reports, and briefings
  • Help analyze cyber threat data and correlate with existing understanding of cyber threats impacting the Citi franchise
  • Interact daily with the Citi CIC staff members and partner organizations
  • A bachelor's degree in Information Systems, Computer Science, or a related discipline
  • 2+ years working in an Information Security, Cyber, or Intelligence job function
  • Proficient in programming in VB, VBA, VBS, PHP, Python or Perl languages, and the creation of Shell Scripts
  • Ability to convert scripts to different languages
  • Working knowledge of web development with poplar language such as Django or PHP
  • Working knowledge of javescript/jquery, good exposure on AJAX
  • Extensive knowledge of Microsoft Office products with focus in Excel, Access, and Visio; SharePoint experience a plus
  • Experience in designing, testing, and maintaining database repositories or similar solutions fed by multiple work streams and scrubbing processes
  • Advanced understanding of security aspects of multiple platforms, OS’s, software, communications and network protocols, or an equivalent combination of education and work experience
  • Familiarity with the IBM/i2 product suite
  • Ability to design ad-hoc automation solutions
  • Strong and flexible programming background
  • Previous Intelligence background(s) is a plus
26

Cyber Intelligence Centre Engineer Resume Examples & Samples

  • Bachelor’s Degree or Higher National Diploma in Computer Science/Engineering or related course with a minimum of 2.1/Upper Credit
  • Certification in at least one of the following certificates: CISSP, CISM, GCIH, GSEC, CCNA, CEH, CCNA (Security), CCNP, CCNP (Security) etc
  • Preferred vendor/product certifications such as ArcSight ESM Administrator, Splunk Architect etc
  • Total Experience Required: 6-8 years
  • Minimum of 3 years’ security experience, with emphasis on security operations, incident management, intrusion detection, security analytics and security tool deployment
  • Experience with intelligence analysis processes, including Open Source Intelligence (OSINT) and closed source intelligence gathering, source verification, data fusion, link analysis, and threat actor
  • Ability to research and characterize security threats to include identification and classification of threat indicators
  • Prior experience working in a Security Operations Centre (SOC) or Computer Emergency Response Team (CERT/CIRT)
  • Experience with the following security technologies including
27

Cyber Intelligence Specialist Resume Examples & Samples

  • Production of a wide variety of intelligence analysis using both written and verbal material from a range of existing and emerging sources
  • Conducting trend analysis to identify potential risks, issues and threats to Citizens Bank while partnering with several other areas of our corporate security division and the financial services industry as a whole
  • Responding to intelligence inquiries from law enforcement and various relevant agencies
  • 3 or more years of relevant security analysis experience or equivalent
  • Technical capability or knowledge, specifically Network and application security
  • Ability to assess, identify risk early in the intelligence process, including the proper allocation and management of alerts
  • Strong organizational, communication and planning skills
  • Strong interpersonal skills to interact with teams and multiple departments to achieve team objectives
  • Strong capability and experience with meeting timelines
  • Strong MS Office skills including MS Word, MS Power Point, MS SharePoint and MS Excel
  • Ability to work under pressure with efficiency and accuracy
  • Ability to plan and prioritize workload
  • Provide quality security intelligence reporting as appropriate
  • Assist the effort to ensure consistency in incident reporting/escalation
  • Assist the effort to ensure consistent MI is available
  • Working knowledge of Intelligence gathering and assessment process
  • Prior financial services or U.S. Military or other government agency work experience
28

Cyber Intelligence Collection / RFI Manager Resume Examples & Samples

  • 10+ years of experience in Air Force intelligence and AF intelligence organization and processes
  • Experience with COLISEUM
  • Experience with Microsoft SharePoint
  • Ability to undertake courses of study in any field of Cyber, including Network+, Security+, or equivalent
  • Security+ or Network+ Certifications
29

Cyber Intelligence Manager, VP Resume Examples & Samples

  • Physical Security
  • Group Intelligence
  • Investigation
  • Resilience
  • US Cyber Intelligence Manager are managing a team of analysts to prioritise, collect, analyse and provide world-class intelligence from and to US based partners (including government, law enforcement, public and private partners) and Barclays entities
  • Conducting active intelligence gathering, analysis of multiple data feeds and engagements to provide actionable intelligence, consultancy and reporting to cyber defence and fraud teams at Barclays
  • 5+ years of experience within Information Security field and with strong understanding of Cyber Response, Cyber Intelligence, and/or identifying and analysing of technical indicators
  • 5+ years of experience working in cyber-intelligence functions with strong analytical skills in both written and verbal communication
  • 7+ years of experience managing team analytical projects, building relationships, and engaging stakeholders
  • 5 + of experience working across cyber-intelligence function including security, audit and control issues
  • Bachelor degree in Computer Science, Engineering or related discipline or 4 years experience in IT / Identity Management and/or analytical or research-based subject, or relevant experience
  • Strong understanding of cyber security / cyber crime prevention
  • Experience with Security Risk Assessments production and associated documentation and reports
  • Experience in writing, delivering and/or presenting high quality analysis across a wide range of problem types, for technical and non-technical audiences
  • Experience working in a large organisation with a wide or multiple attack surface(s) and/or organisations with highly regulated environments
  • An ability to contribute to the development of intelligence capability (e.g. coaching and mentoring) within the organisation, and proven experience and /or leadership in previous roles
  • Experience with analytical tools like Maltego and/or i2
30

VP, Cyber Intelligence Resume Examples & Samples

  • Lead Thomson Reuters newly formed Cyber Intelligence Unit
  • Serve as the principle point of contact for cyber intelligence intake, liasing across Thomson Reuters Legal, IT, Communications and Security teams
  • Coordinate intelligence processing activities with the International community, along with U.S. Federal, State & local LEO and government agencies
  • Experience with local and multiple country regulations governing cyber intelligence processing and handling of sensitive data
  • Lead the cyber intelligence team according to best practices, maintaining a standard of the highest quality & confidentiality
  • Mentors other managers, engineers & investigators in intelligence handling and collection
  • Coordinate critical, sensitive investigations, assessments & audits spanning multiple geographies
  • Conduct briefings on sensitive intelligence and threats to a broad spectrum of audiences, ranging from Senior Executive management to IT Leadership
  • Work with Thomson Reuters legal teams create and maintain standard methodologies and policy for cyber intelligence management
  • Develop critical intelligence partnerships to develop and curate high quality threat analysis and indicators
  • Partner with security operations teams to provide best-in-class monitoring, response, and reporting for network and computer incidents
  • Develop in-house cyber threat assessment team to quantify and remediate internal and external weaknesses
  • Bachelor's degree in Computer Science, other technical field
  • Strong critical thinking and group facilitation skills, specifically in large or complex problem settings
  • 5+ years of experience in the security operations, intelligence or incident response area
  • Industry or sector leadership in designing and improving the field of cyber intelligence
  • Awareness of industry trends and developments
  • Hands-on experience developing intelligence processing, indicator curation & threat modeling
  • Change agent with ability to drive accountability & outcomes across a diverse threat landscape
  • Solid technical background in computer systems and networks
  • Strong business acumen & successful track record in aligning with customers
  • A strong cross-functional team player with ability to lead and coach others in a matrix structure, across time zone and national boundaries
  • Experience conducting or leading intelligence & threat analysis
  • Able to successfully pass requirements for Top Secret (TS) level clearance
31

Cyber Intelligence & Operations Specialist Resume Examples & Samples

  • Serve as a key contributor to Team CACI by providing all-source analysis and targeting support to identify entities of interest, determine life style patterns, and provide detailed background information for entities of interest
  • Analyze cyber patterns and profiles by combining technical and analytical expertise, fusing cyber information from all available sources to understanding TTPs and associations of interest
  • Respond to requests for information (RFIs) from mission partners by providing oral, written, or visual briefings or reports
  • Assist in creating requirements for analytic tool development that will automate the process of analysis of bulk data, enhance cyber tradecraft, and decrease analytical production cycles
  • Research, identify, and develop leads for new partnerships and projects based on mission partner priorities by analyzing various datasets, working group meetings, external resources, or other sources
  • Prepare, coordinate, research and analyze a variety of reported information from multiple sources and types
  • Develop analytic methods and techniques to verify entities and reveal those entities using various data sources; Standardize analytical methods to establish predictable and repeatable processes for reliable assessments and training of future analysts/targeters
  • Minimum Four (4) years of experience in a cyber intelligence analysis, technical analysis, or cyber operations role
  • Experience researching and analyzing entities of interest related to cyberspace networks and cyberspace tactics, techniques, and procedures
  • Experience conducting internet-based research, social network analysis, and/or business intelligence
  • Experience using official message systems and writing/publishing finished intelligence products
  • Language proficiency at a 2/2 DLPT (or equivalent) in Mandarin, Russian, Korean, Arabic, or Farsi
  • Experience utilizing link analysis or geospatial analysis software suites
32

Cyber Intelligence Manager Resume Examples & Samples

  • Oversee the continued build out of the CTI Team as well as the day-to-day operations of the CTI team
  • Provide quality control over team products; assist with drafting, editing, critiquing, and proofreading threat intelligence estimates, briefs, assessments, and memorandums
  • Experience with digital forensics, reverse malware engineering and malware analysis
  • Experience with vulnerability exposure analysis
  • Conduct analytic reviews to foster analytic quality
  • Manage and update Threat Intelligence Standard Operating Procedures as needed
  • Establish a threat modeling methodology to identify, classify, prioritize and report on cyber threats using a structured approach
  • Develops a portfolio of historical threat activity, trends and common attack vectors to predict future incidents
  • Provide awareness to internal teams and leadership on changes to the cyber threat landscape through various products
  • Collect information on threats to the organization through communication with other partner institutions, mailing lists, open source news, and industry partnerships
  • Establish relationships, if applicable, between the CTI team and other groups, both internal (e.g., legal department, fraud) and external (e.g., law enforcement agencies, vendors, and public relations professionals)
  • Present relevant Cyber Intel findings to variety of audiences (Sr Leadership, IT Teams, User communities, etc)
  • 8+ years of experience with conducting all-source intelligence
  • Intimate knowledge of the Cyber Kill Chain, Diamond Model of Intrusion Analysis, or other relevant network defense and intelligence frameworks
  • Experience with collecting, analyzing, and interpreting data from multiple sources, documenting the results and providing meaningful analysis products
  • Knowledge of the intelligence community, US government, and federal Cyber centers
33

Cyber Intelligence Manager Resume Examples & Samples

  • Bachelor's Degree and 3+ years of experience in intelligence analysis, cyber analysis, intelligence production, intelligence operations, intelligence planning, and/or language analysis (Four years additional xperience may be considered in lieu of degree)
  • Experience leading analytical teams supporting the intelligence production cycle specifically for the Department of Defense or Intelligence Community
  • Proven leadership skills and the ability to work effectively in a team environment
  • Active Top Secret clearance with Sensitive Compartmented Information (SCI) and have or be able to obtain and maintain a Polygraph
  • Bachelor’s Degree or above in a relevant technical or management specialty
  • PMI PMP Certification
34

Cyber Intelligence Digital Brand Protection Services Program Manager Resume Examples & Samples

  • Manage a team of analyst(s)
  • Communicate with senior level managers in revenue generating lines of business
  • Build and maintain relationships with members of legal, global public affairs, corporate social media and compliance
  • Create and maintain daily, weekly, monthly, quarterly and year end metrics
  • Work with auditors and regulators at a global level
  • Actively monitor and research cyber threats with a direct or indirect impact to the Citi brand
  • Prepare written reports and give presentations to internal senior level managers and outside clients
  • Actively engage in liaison activities with intelligence communities, Law Enforcement, Industry Associations, peer institutions, and information sharing communities
  • Continuously guide and influence key decision makers around social media threats
  • Manage third party vendors to ensure proper delivery of services
  • Triage information received from vendors and process that information through previously defined internal workflows
  • Manage meetings with internal stakeholders such as Business Information Security Officers, Citi's Mobile Architecture Review Team, business owners, developers, Mortgage Fraud and Risk teams, and others to address open issues and identify process improvements
  • Develop and manage processes to track identified incidents to resolution
  • 5+ years in Information Security, IT Risk or Fraud
  • Experienced in dealing with vendor management, negotiations, procurement and legal
  • Strong project management & analytical skills
  • Proficiency in the Microsoft Office Suite specifically Word, Power Point, and Excel
  • Experienced user of Smart phones, Mobile applications, and Social Media
  • Strong communication and diplomacy skills with all levels of management
  • Should have a strong working knowledge in many or all the following areas