This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Security Threat Intelligence and Hunting Analyst role at NTT DATA involves analyzing and detecting cyber threats, investigating attacks, and advising on security measures. A Security Threat Intelligence and Hunting Analyst is a seasoned subject matter expert, responsible for analyzing and detecting cyber threats and malware impacting the company. The main responsibility of this role is to investigate the level of threat posed by an attack and consequently enable the organization to take informed cybersecurity-based business decisions. This role plays a key role in gathering, analyzing and synthesizing information about current and potential threats to inform the organization’s security strategy.
Job Responsibility:
Reads reports, makes risk assessments, works to detect the source of attacks and tests current defenses against threats
Advises on analysis enabling organization to make decisions on how to improve security measures and respond to attacks
Monitors security alerts and maintains awareness of new threats and vulnerabilities in order to identify potential risks
Analyses data from various sources, including network traffic, email logs, malware files, web server logs, DNS records, etc. to identify cybersecurity risks
Develops and maintains threat intelligence databases containing information about cybercrime tactics, techniques, and procedures (TTPs) used by hackers or other actors targeting the organization’s assets
Participates in Incident Response activities as necessary to identify and contain new threats
Conducts investigations into potential threats by collecting data from multiple sources and analyzing it to identify patterns or other significant pieces of information that indicate a specific threat may be occurring or has occurred previously
Communicates with senior leaders and also executives and other stakeholders on security matters to raise awareness of potential risks and recommend solutions
Conducts regular audits of security measures to identify vulnerabilities that could be exploited by unauthorized users
Reviews security policies to ensure compliance with industry regulations and best practices
Creates reports about potential threats for internal use by management or external use by customers or other stakeholders
Performs any other related task as required
Requirements:
Bachelor’s degree or equivalent in computer science, information technology or security or related field
Relevant security certification(s) such as GIAC Certified Forensic Analyst (GCFA), GIAC Certified Forensic Examiner (GCFE), and GIAC Certified Forensic Analyst (GCFACTIA, CompTIA Cybersecurity Analyst (CySA+), GCTI, FOR508 preferred
Seasoned demonstrated experience in a similar role
Seasoned demonstrated experience gained within a global technology organization
Ability to apply critical thinking skills to a situation and make a decision based on the information to hand
Good understanding of computer systems, software and technology in general
Excellent written and verbal communication
Ability to research topics and find information relevant to their work
Ability to interpret large amounts of data and identify important details to identify potential threats and vulnerabilities
Seasoned proficiency in threat hunting methodologies, including familiarity with tools and techniques for proactive detection of threats
Seasoned knowledge of data analysis, log analysis, and behavioral analytics to identify anomalous activities and indicators of compromise (IOCs)
Ability to contribute to investigations, perform post-incident analysis, and identify threat actor tactics, techniques, and procedures (TTPs)
Seasoned proficiency in threat intelligence analysis, including the ability to collect, correlate, and interpret large volumes of data from multiple sources
Strong analytical and critical thinking skills are required to identify patterns, trends, and potential risks
Seasoned knowledge of cybersecurity principles, attack vectors, and defensive strategies is essential
Seasoned familiarity with various security technologies, threat intelligence platforms, and data analysis tools is also necessary