Lead impactful cyber intelligence initiatives in a global organization. Collaborate with experts to mitigate risks and enhance security. Drive innovation in cybersecurity intelligence and strategic decision-making.
Vice President, Threat Intelligence – Cyber Security Assurance And Defense
in Information Technology PermanentJob Detail
Job Description
Overview
- Lead cyber threat intelligence analysis to protect organizational assets and mitigate risks.
- Collaborate with cybersecurity teams to develop strategies against emerging threats.
- Conduct research on geopolitical and cyber threat issues impacting operations.
- Provide insights on threat actor tactics, techniques, and procedures.
- Deliver high-quality intelligence products and briefings for stakeholders.
- Analyze trends in cyber threat activity to identify patterns and impacts.
- Support the organization's digital transformation securely and effectively.
- Maintain expertise in cyber intelligence frameworks and analytic tools.
Key Responsibilities & Duties
- Conduct detailed analysis of cyber threats and geopolitical intelligence.
- Develop evidence-based assessments and contextualize regulatory impacts.
- Perform trend analysis to identify changes in threat vectors.
- Evaluate information sources for accuracy and reliability.
- Produce clear and concise intelligence reports adhering to standards.
- Brief internal and external stakeholders on technical matters.
- Collaborate with teams to implement strategies mitigating cyber risks.
- Maintain subject matter expertise in assigned areas of responsibility.
Job Requirements
- Bachelor’s degree in Computer Science, Information Security, or related field; Master’s preferred.
- 8-10 years of experience in intelligence analysis; expertise in geopolitical and cyber threats.
- Proficiency in analytic tools and cyber intelligence frameworks.
- Strong written and verbal communication and presentation skills.
- Relevant certifications like GCTI or CISSP are advantageous.
- Ability to work independently and collaboratively in a dynamic environment.
- Familiarity with open-source intelligence research and methodologies.
- Solid understanding of cybersecurity practices and risk management processes.
- ShareAustin: