In this position, the Cyber Threat Intelligence Associate is expected to:
Support GCTI leads in developing a strong understanding of Nomura's threat landscape, understand how the threats are evolving and support the development of measures to protect against them.
Collect, process, and analyse data points to produce internal intelligence reports.
Manage intelligence alerts and work closely with security teams to triage alerts.
Support and maintain relationships with global information security teams, brand, legal, communications, IT, Risk, Finance, Control and HR groups.
Provide subject matter expertise on cyber threats to support current analytic operations and initiatives.
Liaise with Internal security teams such as SOC, Vulnerability Management, Digital Risk, Threat Hunting and others.
Contribute to strategic intelligence initiatives that develop the GCTI team, including mentoring and training analysts and graduates on the team.
Create initiatives to develop the GCTI team.
Develop metrics and reporting programs for senior leadership.
Project management of Intelligence Lifecycle, including documentation.
Support the EMEA IT security team with queries around threat intelligence.
Support the EMEA IT security risk and governance efforts.
Occasional off-hours and weekend work required.
Must have a proven track record in a government intelligence or public sector intelligence environment, cyber threat intelligence and security operations, or cyber investigations and incident response.
Essential skills required:
Knowledge, understanding and demonstrable background of applying the intelligence cycle to cyber threat intelligence or similar work.
Must be proficient with OSINT gathering techniques and dark web monitoring concepts.
Strong verbal and written communication skills, interpersonal collaborative skills, and the ability to communicate security and risk-related concepts to technical and non-technical audiences.
Proven track record of tracking and understanding threats from: Nation State Threat Actors, Cyber Crime, Extremist Groups and Cyber Terrorists, Hacktivism, Malware, Vulnerabilities, Fraud and Social Engineering Techniques.
Solid understanding of geopolitics and how this affects nation state cyber activity.
Analysis of threat actor tactics, techniques and procedures.
Must possess the ability to multitask, prioritise, and manage time effectively
Must have strong attention to detail.
Must be able to produce concise and timely intelligence reports
Analysis of malware, hacking tools, and advanced threat actor tactics, techniques and procedures.
Understanding of and a background with modern technical security controls and technologies, such as TIP's, SOAR's firewalls, SIEMs, IPS, HIPS, web proxies, etc.