Company Overview
Founded by experts with more than 70 years of collective experience in the staffing solutions industry TASQ understands the unique challenges in the talent acquisition space and is committed to being the trusted partner of companies in their pursuit of hiring the best people to fill their manpower needs.
Composed of highly skilled team members who have worked with organizations ranging from smalltomedium entities to largescale enterprises (including Fortune 500 companies) TASQ is fully capable of meeting staffing demands at all levels and across different industries.
Specific Duties and Responsibilities:
- Create Analysts Notes for entities tracking Red and Orange in the Clients threat views that currently do not have them or they are out of date
- Assist in the generation of other analysts notes currently produced by notes writers and other long term projects
- Conduct background research on threat actors
- Collaborate with Data Science to curate entities that need to be tagged in notes Identify TTPs IOCs and Associated Malware
- Familiar with MITRE ATTACK Framework and Common Vulnerability Databases like CVE
- Adhere to and implement InfinitOs quality and information security policies and carry out its processes and procedures accordingly.
- Protect clientsupplied and generated for client information from unauthorized access disclosure modification destruction or interference (see also Table of Offenses).
- Carry out tasks as assigned and are aligned with particular process or activity related to information security.
- Report any potential or committed nonconformity observation and/or security event or risks to immediate superior
Qualifications:
- Two years professional experience
- B.S. equivalent in computer science information systems or cyber intelligence
- Adeptness in Cybersecurity and Data Protection
- Technical Proficiency in Cyber Threat Intelligence and Threat Intelligence Platforms
- Excellent written communication in English
- Disciplined time management
- Desired proficiency in at least cyber security and threat actors
- Regularly Updated in recent cyber trends and events