Cursos
Value: 2180 €
Timetable:
Monday, Wendsday and Thrusday from 18:00 H to 22:00 H
Format: Online
N. Hours: 30 H
During: 4 weeks
- Alternative Title(s)
- Cyber Intelligence Analyst
- Cyber Threat Modelle
- Summary Statement
Collect, process, analyse data and information to produce actionable intelligence reports and disseminate them to target stakeholders.
- Mission
Manages cyber threat intelligence life cycle including cyber threat information collection, analysis and production of actionable intelligence and dissemination to security stakeholders and the CTI community, at a tactical, operational and strategic level. Identifies and monitors the Tactics, Techniques and Procedures (TTPs) used by cyber threat actors and their trends, track threat actors’ activities and observe how non-cyber events can influence cyber-related actions.
- Deliverable(s)
- Cyber Threat Intelligence Manual
- Cyber Threat Report
- Main Task(s)
- Develop, implement and manage the organisation’s cyber threat intelligence strategy
- Develop plans and procedures to manage threat intelligence
- Translate business requirements into Intelligence Requirements
- Implement threat intelligence collection, analysis and production of actionable intelligence and dissemination to security stakeholders
- Identify and assess cyber threat actors targeting the organisation
- Identify, monitor and assess the Tactics, Techniques and Procedures (TTPs) used by cyber threat actors by analysing open-source and proprietary data, information and intelligence
- Produce actionable reports based on threat intelligence data
- Elaborate and advise on mitigation plans at the tactical, operational and strategic level
- Coordinate with stakeholders to share and consume intelligence on relevant cyber threats
- Leverage intelligence data to support and assist with threat modelling, recommendations for Risk Mitigation and cyber threat hunting
- Articulate and communicate intelligence openly and publicly at all levels
- Convey the proper security severity by explaining the risk exposure and its consequences to non-technical stakeholders
- Key Skill(s)
- Collaborate with other team members and colleagues
- Collect, analyse and correlate cyber threat information originating from multiple sources
- Identify threat actors TTPs and campaigns
- Automate threat intelligence management procedures
- Conduct technical analysis and reporting
- Identify non-cyber events with implications on cyber-related activities
- Model threats, actors and TTPs
- Communicate, coordinate and cooperate with internal and external stakeholders
- Communicate, present and report to relevant stakeholders
- Use and apply CTI platforms and tools
- Key Knowledge
- Operating systems security
- Computer networks security
- Cybersecurity controls and solutions
- Computer programming
- Cyber Threat Intelligence (CTI) sharing standards, methodologies and frameworks
- Responsible information disclosure procedures
- Cross-domain and border-domain knowledge related to cybersecurity
- Cyber threats
- Cyber threat actors
- Cybersecurity attack procedures
- Advanced and persistent cyber threats (APT)
- Threat actors Tactics, Techniques and Procedures (TTPs)
- Cybersecurity-related certifications
- e-Competences (from e-CF)
B.5. Documentation Production (Level 3)
D.7. Data Science and Analytics (Level 4)
D.10. Information and Knowledge Management (Level 4)
E.4. Relationship Management (Level 3)
E.8. Information Security Management (Level 4)