Role Background
MID MNL identifies and reports on malicious infrastructure within the cybercrime landscape. As a Junior Malicious Infrastructure Analyst you will work closely with senior MID analysts to learn the process of transforming research leads into succinct customer-ready technical intelligence reports known as Insikt addition to gaining context on malware families and victim data a Junior Malicious Infrastructure Analyst must be able to clearly communicate infrastructure structures and maintain a steady weekly intelligence production cadence.
Specific Duties and Responsibilities
Intelligence Reporting and Support: Collaborate with senior analysts to transform generated leads and research findings into Insikt Research Lead (IRL) notes. This role requires synthesizing information regarding technical pivots C2 infrastructure and backend administration into a succinct customer-ready format.
Research Support: Provide supplementary background information on malware families and victims identified by team leads to add context to reporting.
Cadence: Write 12 IRL notes per week detailing identified infrastructure and threat actor activity
Information Security: Adhere to and implement Infinit-Os quality and information security policies and carry out its processes and procedures accordingly. Protect client-supplied and generated-for-client information from unauthorized access disclosure modification destruction or interference (see also Table of Offenses)
Carry out tasks as assigned and aligned with particular processes or activities related to information security.
Report any potential or committed non-conformity observation and/or security event or risks to the immediate superior.
Required Skills
Strong written communication in English
Demonstrable experience writing reports on technical subject matter (e.g. malware infrastructure or cyber threats) in a clear concise and logical format. Self-starting and self-motivated with disciplined time management and the ability to thrive in a collaborative globally distributed environment.
Ability to receive and apply constructive feedback from peers and leadership Minimum Qualifications
B.S. equivalent in computer science information systems or cyber intelligence At least six (6) months of professional experience
Technical proficiency in Cyber Threat Intelligence and Threat Intelligence Platforms
Experience working with open-source intelligence (OSINT) and/or large data sets Familiarity with the MITRE ATT&CK Framework including the ability to map reported activity to ATT&CK tactics and techniques
Familiarity with interpreting and mapping cyberattacks to the Diamond Model of Intrusion Analysis
Adeptness in cybersecurity and data protection
Preferred Qualifications
Proficiency in scripting in Python
Experience creating JSON and YAML data structures
Required Skills:
Minimum Qualifications B.S. equivalent in computer science information systems or cyber intelligence At least six (6) months of professional experience Demonstrable experience writing reports on technical subject matter (e.g. malware infrastructure or cyber threats) in a clear concise and logical format. Technical proficiency in Cyber Threat Intelligence and Threat Intelligence Platforms Experience working with open-source intelligence (OSINT) and/or large data sets Familiarity with the MITRE ATT&CK Framework including the ability to map reported activity to ATT&CK tactics and techniques Familiarity with interpreting and mapping cyberattacks to the Diamond Model of Intrusion Analysis Adeptness in cybersecurity and data protection Strong written communication in English Preferred Qualifications Proficiency in scripting in Python Experience creating JSON and YAML data structures Understanding of TCP/IP and network traffic analysis techniques
IT Services and IT Consulting