What does a successful Strategic Cyber Threat Intelligence Analyst do?
You will serve as a Subject Matter Expert in cyber threats within Fiserv and focus on threat actors’ tactics, techniques, and procedures (TTPs), their motivation, intent, capability, and how threats or threat actors may target Fiserv. You will correlate tactical and strategic intelligence to produce actionable intelligence products that are relevant and play a crucial role in the implementation and application of the Intel lifecycle, relying heavily on the Threat Intelligence Platform (TIP) and supporting toolsets to validate collections, perform fusion analysis, and produce coordinated Intel products.
What you will do:
- Manage intelligence-driven projects and initiatives that enhance cybersecurity capabilities and reduce long-term risk.
- Collect, process, analyze, and disseminate strategic intelligence throughout the organization and produce finished intelligence products by correlating tactical and strategic intelligence to amplify the context and relevance of threats.
- Analyze global and regional conflicts, political and social unrest, organized crime, terrorism, non-state actors, rule of law, and economic stability and translate complex and evolving threat activities into business questions and structured analytical solutions.
- Develop, maintain, and execute threat and risk communication processes to advise key stakeholders and decision-makers and employ predictive analytic methods to assess adversary capabilities, motivations, and intent, providing recommendations to mitigate risk.
- Provide direct analytic support to business operations teams and risk analysts, offering context to active risks/threats and support risk teams' operations by aligning cyber threats with organizational impact.
- Create and present custom threat briefing materials for executive audiences.
What you will need to have:
- 7+ years of experience as a threat intelligence analyst in payments, fintech, or finance organizations using threat intelligence to reduce risk and exposure.
- 3+ years of experience as an intelligence analyst in the US Government focused on network defense.
- Experience with the Intelligence Cycle, Cyber Kill Chain, and MITRE ATT&CK frameworks and strong foundation in network security, cyber threats, and technical aspects of threat analysis.
- Understanding of vulnerability and exploitation concepts and extensive experience with CTI platforms such as Google Threat Intelligence, SecOps, and Anomali.
- Experience collaborating with cybersecurity operations teams like IR, SOC, VM, Insider Threat, and external teams.
- Experience with security vendors, including feature requests, product evaluations, and security functionality analysis.
- Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field and/or equivalent military experience.
What would be great to have:
- Relevant certifications such as Security+, GCTI, CISSP, CISM, or GSEC.
R-10363014