Duration: 12 Months extension possible based on needs and performance
2 Professional references required
Remote: Monday- Friday 9-5
Job Description
- The resource will directly contribute to the Cyber Threat Intelligence (CTI) initiatives including enhancing prevention detection response and recovery efforts through various technical and operational methods; to reduce the mean time to detection and response of cybersecurity events experienced in municipal networks while improving process efficiencies.
- The resource will work with cyber professionals and information sharing partners to build tools and integrations that enable threat analysts and incident responders to more efficiently respond to various cyber security events.
- Without this resource CTI will be unable to onboard any additional intelligence sources into its internal threat intelligence platform (ODIN) and should existing connectors require updates will be unable to continue using these parsers / connectors.
- As a result CTI will be unable to meet certain BAU requirements and OOMs.
Scope Of Services Tasks:
- CTI currently leverages contract engineers to develop and update custom parsers / connectors for the Operational Defense Intelligence Network (ODIN) CTIs primary threat intelligence platform and workbench.
- These parsers / connectors are used to automate the importation of data and reports into ODIN from our internal and external intelligence and data sources which are critical to core CTI functions and workflows including disseminating intelligence to its stakeholder-facing finished intelligence (FINTEL) platform Threat Observables and Reports (ThOR). CTI requires development of several additional parsers / connectors to meet organizational requirements and support periodic updates and tuning of existing parsers / connectors.
The access to shared threat intelligence and models enabled by these parsers / connectors provides a wider view into the network threat spectrum as provided by multiple threat models vendors and industry partners.
- Design and implement solutions that enhances the security posture of tools across multiple platforms.
- Develop security content for tools and technologies that the Threat Management team relies on to ensure business as usual functioning.
- Integrate innovative and custom technology to improve accuracy of alerts and notifications received by teams within Threat Management.
- Create well documented and clearly articulated code process and services documentation.
- Understanding REST and SOAP API usage and implementing solutions utilizing APIs from Cyber Command utilized solutions that enhance detection and response capabilities of the Threat Management.
- Handle special projects and initiatives as assigned.
Mandatory Skills/Experience
- At least 4 years of experience in Cyber Threat Intelligence initiatives including enhancing prevention detection response and recovery efforts through various technical and operational methods.
- Proficient in Python.
- Ability to leverage REST APIs to build tool and platform integration.
- Proficient in git version control and git life-cycle development.
- Excellent verbal and written communication skills are required.
- Basic understanding of Agile development model.
Desirable Skills/Experience:
- Experience working with OpenCTI.
- Experience developing parsers for text-based resources.
- Understanding of public cloud platforms and experience with utilizing platforms such as Azure AWS or Google Cloud.
- Experience working in a security environment and/or supporting security teams from a technical standpoint.
- Familiarity with using version control source-code repositories.
Skills:
- Cyber Threat Intelligence
- Python
- REST APIs
- GIT
- Agile
- OpenCTI
- public cloud platforms
- Azure AWS or Google Cloud
- security