Questionaire for MSS Threat Intelligence Analyst/Specialist Please answer both pages so that your application is considered. Help AG is looking for a talented and enthusiastic individual to join our Cyber Security Operations Centre (CSOC) team for our Managed Security Services (MSS) unit. If you have a strong knowledge and interest in cyber security, this position might be the right one for you.The RoleThe Level two (2) MSS Threat Intelligence Analyst/Specialist will be responsible for analyzing, curating and publishing threat intelligence. The Threat Intelligence Analyst is also responsible for handling and optimizing one or more Threat Intelligence Platforms (TIPs), as well as the integrations between the TIPs and other security technologies/systems - ultimately to detect, prioritize and mitigate the risk of Cyber Security related incidents.The Threat Intelligence Analyst/Specialist will be responsible for: Maintain a high degree of awareness of current threat landscape, especially as it pertains to the the UAE Identify, assess, monitor and manage intelligence hosted by one or more TIPs Create and Follow detailed operational process and procedures to appropriately analyze, escalate and drive dissemination of threat intelligence Tune and Optimize TIPs as required or requested Correlate and analyse Intelligence using the TIP and other Systems to prioritize and increase relevance of Threat Intelligence to MSS Clients Manage the life-cycle of Threat Intelligence within Help AG Act as SME within Help AG for Threat Intelligence Skills & Requirements: A Degree in Computer Science, Information Systems, Electrical Engineering or a closely related degree An active, demonstrable interest in Cyber Security, Cyber Threat Detection and Cyber Threat Intelligence Demonstrable experience analysing and interpreting threat intelligence indicators, TTPs and threat actors A solid understanding of IT systems and network security concepts A sound knowledge of IT security best practices, common attack types and detection / prevention methods. Demonstrable experience of analysing and interpreting system, security and application logs Knowledge of the type of events that both Firewalls, IDS/IPS and other security related devices produce Experience in using SIEM tools such as ArcSight, Envison, Splunk, NitroSecurity TCP/IP knowledge, networking and security product experience Possible attack activities, such as scans, man in the middle, sniffing, DoS, DDoS, etc and possible abnormal activities, such as worms, Trojans, viruses, etc CCNA, CISSP, GCA, GCIA, GCIH, CEH certification would be preferable Outstanding Organizational Skills Exclusive focus and vast experience in IT, specializing in Cyber Security and recent experience in Threat Intelligence Strong analytical and problem-solving skills A motivated, self-managed, individual who can demonstrate above average analytical skills and work professionally with peers and customers even under pressure. Strong written and verbal skills Strong interpersonal skills with the ability to collaborate well with others Ability to speak and write in English is required; Ability to speak and write in both English and Arabic is preferred Additional Responsibilities: Respond to inbound requests via phone and other electronic means for technical assistance with threat intelligence-related queries/tasks Respond in a timely manner (as per and within documented SLA) to support, incident and other tickets/cases Document actions to effectively communicate information internally and to customers Resolve problems independently and understand Help AG escalation procedures Question Title * 1. Enter your name. Question Title * 2. Enter your e-mail address. Question Title * 3. Enter your mobile phone number. Question Title * 4. How did you hear about this position? Bayt.com Monstergulf.com www.helpag.com Linkedin Facebook Word of mouth Other (please specify) Question Title * 5. Number of years of Experience as a Threat Intelligence Analyst, Specialist or Similar role? Less than 1 year 1-2 3-5 6-8 9 or more Question Title * 6. Are you willing to work in a 24 X 7 Environment? Yes No Question Title * 7. Which Threat Intelligence solutions have you worked with so far? Anomali ThreatQuotient (ThreatQ) Symantec DeepSight iSIGHT (FireEye/Mandiant) CrowdStrike MISP Recorded Future ThreatStream IBM X-Force Other (please specify) Question Title * 8. What is your level of Expertise in analyzing and handling Threat Intelligence? Beginner Intermediate Advanced Expert Question Title * 9. Which of the following certifications do you currently have? GIAC Certified Incident Handler (GCIH) GIAC Certified Intrusion Analyst (GCIA) Cisco Certified Network Administrator (CCNA - Security Or Equivalent) GIAC Certified Threat Intelligence Analyst (GCTI) Certified Cyber Intelligence Professional (CCIP) Certified Threat Intelligence Analyst (CTIA) CEH - Certified Ethical Hacker CISSP - Certified Information Systems Security Professional Others (please specify) Question Title * 10. What is your current knowledge of MISP (www.misp-project.org)? I have never used this Beginner Intermediate Advanced Expert Question Title * 11. What is your current Knowledge of ThreatQuotient (ThreatQ)? I have never used this Beginner Intermediate Advanced Expert Question Title * 12. Please describe how you would implement Threat Intelligence Life-cycle Management Question Title * 13. Please describe how you currently maintain your own knowledge of the current Cyber Threat Intelligence Landscape Next