Threat Intelligence Analyst - Systems Engineer II
The Information Security Engineer works as a member of the Gap Cyber Defense Center. The GCDC team is part of Gap’s Information Security organization (InfoSec), working closely with infrastructure, application, and managed service provider teams to ensure the security posture of Gap’s global enterprise is maintained, including endpoint, network, server, and border security.
The Threat Intelligence Analyst will serve as a Subject Matter Expert (SME) for InfoSec’s Threat Intelligence operations and technology. The Analyst will also provide research, expert advice, and direction on tool configuration and implementation.
The Threat Intelligence Analyst has direct responsibility for working with all GapTech teams in delivering subject matter expertise for threat intelligence and threat remediation.
- Differentiate, collect, and evaluate technical and open source data to produce threat intelligence products;
- Identify credible, new intelligence and subject matter resources relative to current/emerging threats;
- Analyze reports to understand threat campaign techniques and lateral movements and extract indicators of compromise (IOCs).
- Manage and maintain threat intelligence platforms and feeds
- Conduct research on emerging products, services, protocols, and standards relative to the information security arena
- 4-6 year’s experience performing threat i management operational activities, including threat intelligence gathering and analysis, and threat metrics development and reporting
- Experience working with large/multi-national organizations
- Demonstrated use of analytic tools and platforms
- In-depth knowledge of information security threats Windows and Unix/Linux platforms
- The demonstrated ability to work effectively in a collaborative team environment as an individual contributor.
- The ability to provide support after normal business hours, as needed.
- Direct experience with Threat intelligence Platform tools
- Experience with developing threat intelligence briefings
Back to top