Empleos actuales relacionados con Cyber Threat Intelligence Analyst - Ciudad de México - Siemens

  • Intelligence Analyst Lead

    hace 4 semanas


    Ciudad de México Citi A tiempo completo

    The Citi Cyber Intelligence Center (CIC) is part of the Global Information Security organization and is responsible for analyzing cyber threat information designed to increase Citi's cyber threat awareness and protection levels. By providing awareness, indications, warnings, and operational readiness, the CIC protects the Citi brand, global business...

  • Cyber Threat Analyst

    hace 6 días


    Ciudad de México, Ciudad de México Level Blue A tiempo completo

    About LevelBlue (including Trustwave): LevelBlue reduces risk and builds lasting resilience so organizations can innovate and advance their mission with confidence. As the world's most analyst-recognized and largest pure-play managed security services provider, LevelBlue elevates client outcomes that matter: stronger defense, faster response, and sustained...


  • Ciudad de México Kroll A tiempo completo

    In a world of disruption and increasingly complex business challenges, our professionals bring truth into focus with the Kroll Lens. Our sharp analytical skills, paired with the latest technology, allow us to give our clients clarity—not just answers—in all areas of business. We embrace diverse backgrounds and global perspectives, and we cultivate...


  • Ciudad de México Ford de México A tiempo completo

    Our goal is to protect information assets, identify security risks, leverage and share industry best practices. The Insider Threat Program is responsible to detect, analyze, mitigate, & respond to insider threats. This is a highly visible and collaborative position working with cross-functional senior leadership & internal teams. At Ford Motor Company, we...


  • Ciudad de México Citi A tiempo completo

    The Intelligence Lead Analyst is a senior level professional responsible for driving efforts to prevent, monitor and respond to information/data breaches and cyber-attacks. The overall objective of this role is to ensure the execution of Information Security directives and activities in alignment with Citi's data security policy.**Responsibilities**:-...


  • Ciudad de México Citi A tiempo completo

    The CSIS Open Source Intelligence Lead Analyst position is a regional program role requiring advanced expertise in open source intelligence, threat intelligence, and digital executive protection. We are looking for high performers with experience in:- Open Source Intelligence, including experience collecting and analyzing publicly available information-...

  • Cyber Security Analyst L1

    hace 3 semanas


    Ciudad de México TD SYNNEX A tiempo completo

    **Job Description**:**Overview**Nearly every aspect of TD SYNNEX business is driven by Information Technology from inventory planning, logistics, order management, configuration, shipping, invoicing and settlement. Our systems are a high transactional volume environment with a significant amount of our revenue derived through our eBusiness services.**Working...

  • Analista Csirt

    hace 7 días


    Ciudad de México, CDMX TUTUM TECH CYBER INTELLIGENCE, S.A. DE C.V A tiempo completo

    Somos una empresa dinámica, innovadora y 100% mexicana; con 8 años de experiência dedicada a brindar servicios de consultoría tecnológica y soluciones integrales de TI. Tenemos experiência en los sectores de Salud, Gestión Hospitalaria, Seguridad Nacional, Finanzas, Infraestructura e Industrial. Para brindar un alcance y soporte a nível nacional,...

  • Banamex Tactical

    hace 2 semanas


    Ciudad de México Citi A tiempo completo

    The Intelligence Lead Analyst is a senior level professional responsible for driving efforts to prevent, monitor and respond to information/data breaches and cyber-attacks. The overall objective of this role is to ensure the execution of Information Security directives and activities in alignment with Citi's data security policy. **Responsibilities**: -...


  • Colonia Bosques de las Lomas, México Unilever A tiempo completo

    **Location**: Bosques, Mexico City**Terms & Conditions**: Full time position. Currently live in Mexico City. Have an advanced level of English.**ABOUT UNILEVER**Unilever is the place where you can bring your purpose to life with the work that you do - creating a better business and a better world. You will work on brands that are loved and improve the lives...

Cyber Threat Intelligence Analyst

hace 3 horas


Ciudad de México Siemens A tiempo completo

**Looking for a chance to create a positive impact on our society?**

Siemens Cybersecurity Defense is a global organization within Siemens consisting of regionally aligned teams across Germany, Portugal, Spain, United States, Mexico, and China. The mission of the organization is to proactively identify anomalies, respond and remediate Cybersecurity issues related to IT infrastructure, Operational Technology (OT), and products of Siemens.

**As Senior Cyber Threat Intelligence Expert (f/m/d) you will**:

- Provide intelligence to support decision making process concerning emergent and current threats targeting Siemens by developing processes and procedures to gather, identify, analyze, and distribute tailored intelligence products.
- Collaborate with Incident Response team, translating raw sensor data, reports, and other intelligence feeds into actionable intelligence to drive proactive measures and appropriately prioritize response activities.
- IT security incidents in a geographically distributed environment, orchestrating the interaction among all relevant technical and non-technical stakeholders during all phases of the incident.
- Help improving Siemens CERT internal playbooks and toolset by contributing with improvement ideas about processes, functionalities, and new features.
- Collect, organize, analyze, and refine information about known and emerging cyber security threats, including novel tactics, techniques, and procedures (TTPs) used by attackers to potentially target Siemens’ business or customers.
- Support the awareness activities by monitoring for and reporting relevant news in the cyber security space in the form of news articles on the Siemens CERT News Portal, for which you will also provide a Siemens-tailored risk assessment.
- Research on the latest trends in malware and advanced attacks.
- Leverage internal and external resources to enrich relevant information to deliver contextualized intel to acting teams in a timely manner.
- Contribute to every step of the IoC lifecycle within the Siemens CERT Threat Intelligence Platform (e.g. organizing input sources and feeds, manually crafting new indicators, tuning the strategies in place to label and organize relevant intel, etc.)
- Monitor Siemens’ public exposure to detect signs of sensitive disclosure, exposed credentials, and targeted hacker groups activities
- Provide tailored intelligence briefings to Cybersecurity colleagues and to other Security and IT areas.

**To make a difference, you must have**:

- Significant technical system expertise (e.g. gathered from being an IT Administrator) with relevant exposure and expertise in IT Security, in several of the following technologies: Linux and Windows operating systems, web-technologies (encryption, HTTP, REST), networking, cloud environments
- Expert knowledge of fundamental Threat Intelligence concepts (terminology, tools, processes, etc.). Experience with formal aspects of Threat Intelligence (e.g. ACH, analytical biases, etc.) is a plus.
- Experience with common threat intelligence models, tools, sources, and feeds.
- Strong analytical skills with the ability to collect, organize, analyze, and disseminate significant amounts of information with attention to detail and accuracy.
- Significant experience conducting intelligence analysis, including social network analysis, targeting, technical analysis, attribution etc.
- Knowledge of cyber threats and vulnerabilities: how to properly identify, triage, and remediate threats based on threat intelligence as well as on analysis of security events, log data and network traffic.
- Understanding of technical and human aspects of cyber threats and security.
- Deep and current knowledge of most common OSINT tools and techniques, including social network monitoring and dark web networks (TOR, I2P, etc.).
- Experience tracking threat actors or comparable types of cyber investigations.
- Basic knowledge of relevant laws, regulations, policies, and ethics related to cybersecurity and privacy topics. Advanced knowledge of regional (e.g. GDPR) or sector-specific (e.g. HIPAA) laws and regulations is a plus.
- Models to describe and document cyber-attacks (e.g., reconnaissance, scanning, enumeration, persistency, lateral movement, exfiltration) such as Cyber Kill Chain, Diamond model or MITRE ATT&CK.
- Familiarity with Incident Handling-related topics.
- Application Security Risks (e.g., OWASP Top 10 list).
- Experience with Malware analysis, sandboxes, and reverse engineering tools.
- Experience with scripting languages (e.g., Python, Bash or PowerShell) and using REST API, as well as data processing, regular expressions, and console-based text processing tools (e.g., sed, awk, jq).
- Bachelor degree in STEM studies (required). A Master degree (or higher academic title) in computer science or cyber security topics is highly desirable but might be traded-off for relevant experience.
- At least 5 years of relevant work experience in at least one of