Description:
We are looking for a Lead Threat Intelligence Analyst. In this role, you'll be at the forefront of our defense, leading efforts to identify, analyze, and counter emerging security threats. You'll work closely with various security & technology teams to strengthen our defenses and provide actionable intelligence to protect our organization. Your expertise will directly contribute to safeguarding Take-Two and its labels systems, networks, and data.
You will work with Take-Two's Information Security teams, reporting to the Director of Security Operations Engineering.
What You’ll Take On
- Lead Threat Intelligence Operations: Lead the design, development, and continuous improvement of the organization’s cyber threat intelligence (CTI) program, ensuring alignment with business objectives and risk tolerance.
- Conduct In-Depth Analysis: Perform deep-dives into cyber threats, including analyzing malware, understanding adversary tactics, techniques, and procedures (TTPs), and tracking threat actor groups.
- Develop and Maintain Threat Models: Create and refine threat models and frameworks to predict and prepare for potential attacks, focusing on threats relevant to our industry and infrastructure.
- Enhance Our Security Posture: Work with our Global Security Operations Center (GSOC), Detection Engineering, Automation Engineers and Incident Response teams to integrate threat intelligence into our detection and prevention systems, improving our ability to identify and respond to threats.
- Produce Actionable Reporting: Generate timely and high-quality intelligence/Threat Landscape reports, risk forecasts and alerts for technical and executive audiences, translating complex threat information into clear, actionable insights.
- Automation: Promote automation of indicator ingestion, correlation, and dissemination across GSOC, Automation and IR platforms.
- KPI’s: Define and track key performance indicators (KPIs) for the threat intelligence program (e.g., intelligence-to-action rate, time to disseminate).
- Maturity Assessment: Conduct periodic maturity assessments of the threat intelligence function, recommending improvements in processes, skills, and tools.
- Mentor and Guide: Provide guidance and mentorship to junior analysts, helping them grow their skills and contribute effectively to the team's mission.
What You Bring
- Experience: At least 5-7 years of experience in cybersecurity, with a minimum of 3 years in a dedicated threat intelligence role.
- Technical Expertise: A strong understanding of the cyber threat landscape, including knowledge of threat actor groups, common attack vectors, and malware families. Insider threat knowledge is a plus.
- Analytical Skills: Proven ability to analyze complex data from various sources (e.g., open-source intelligence, dark web forums, technical reports) to form a cohesive threat picture.
- Intelligence Framework Knowledge: Familiarity with common threat intelligence frameworks like MITRE ATT&CK, the Cyber Kill Chain, and Diamond Model.
- Communication Skills: Excellent written and verbal communication skills, with the ability to present technical information clearly to both technical and non-technical audiences.
- Tool Proficiency: Experience with threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and forensic tools.