This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Citi Cyber Intelligence Center (CIC) is part of the Chief Information Security Office (CISO) and is responsible for analyzing cyber threat information designed to increase Citi's cyber threat awareness and protection levels by providing awareness, indications, warnings, and operational readiness. The CIC protects the Citi brand, global business operations, technology infrastructure, and client trust against cyber threats worldwide. In support to this mission, the CIC Analysis Team is responsible for providing various cyber threat alerts, reports, briefings, and other products and services for Citi stakeholders.
Job Responsibility:
Actively monitor and research cyber threats with a direct or indirect impact to Citi and examine associated tools, techniques, and procedures (TTP) to reconstruct attacker workflows
Produce quality, timely, and actionable alerts that drive decision making across the firm
Extensive knowledge of Indicators of Compromise (IOCs) and ability to conduct pivots via paid and open-source tooling
Map threats to the MITRE ATT&CK framework and communicate effective mitigation procedures where appropriate
Expand research and information scope using common enrichment platforms, including creating YARA rules for indicator pivoting and hunting
Produce actionable cyber threat intelligence products using a variety of internal and external sources that describe trends and shifts in the cyber threat landscape
Support CIC requests and investigations and interact with global Citi CIC and Citi Cyber Security Fusion Center staff members in a Follow-the-Sun model
Regularly provide intelligence briefs to technical, non-technical, and senior-level audiences
Requirements:
Broad experience working in a technical analysis function including but not limited to threat hunting, malware analysis, forensics, or incident response
Maintains technical proficiency in the use of tools, techniques, and countermeasures
Ability to discern patterns of threat actor behavior at the technical level
Deep understanding of threat actor capabilities, motivations, and tool sets to assess risk
Experience with threat intelligence vendors and platforms
Maintains an understanding of the threat intelligence lifecycle
Must possess strong writing, and critical thinking/analysis skills
Must be a self-starter, self-motivated and able to work independently with little oversight in a fast-paced, operationally focused environment
Bachelor’s degree/University degree or equivalent experience, preferably in one of the following areas: cybersecurity / information security / information technology / computer science
Nice to have:
Has a minimum of 3 years of experience working in a cyber threat intelligence related function (defense/law enforcement/private sector)
Certifications, including CISSP, GIAC’s GREM, GCFA and/or GCTI
Graduate degree in one of the following areas: cybersecurity / information security / information technology / computer science
Previous work in financial industry
Basic knowledge of financial payment systems (example: SWIFT)
What we offer:
Competitive base salary (which is annually reviewed)
Benefits that support you (and your family) to be well, live well and save well
Business casual workplace
Hybrid working model (up to 2 days working at home per week)
Welcome to CrawlJobs.com – Your Global Job Discovery Platform
At CrawlJobs.com, we simplify finding your next career opportunity by bringing job listings directly to you from all corners of the web. Using cutting-edge AI and web-crawling technologies, we gather and curate job offers from various sources across the globe, ensuring you have access to the most up-to-date job listings in one place.
We use cookies to enhance your experience, analyze traffic, and serve personalized content. By clicking “Accept”, you agree to the use of cookies.