Fortinet is hiring Cyber Threat Intelligence Analyst

About Fortinet

Fortinet is a worldwide provider of network security appliances and the market leader in unified threat management (UTM).Our products and subscription services provide broad, integrated and high performance protection against dynamic security threats while simplifying the IT security infrastructure.We develop and sell cybersecurity solutions, such as physical firewalls, antivirus software, intrusion prevention systems and endpoint security components.

Fortinet is headquartered in Sunnyvale, California, founded in 2000, with offices across the globe.

If you are looking for a fast paced , challenging and rewarding environment,then Fortinet is the place for you.We are an equal opportunity employer offering exciting work, competitive compensation and benefits.

Position Overview

As an Intelligence Analyst at Fortinet , you will join Cyber Threat Intelligence (CTI) Collections /Analysis team: a group of highly skilled analysts, collectors, and specialists who dedicate themselves to protecting customers and their assets from external threats. With our proprietary hybrid intelligence platforms and methodologies, you will utilize your writing and editing skills to support the production of actionable intelligence for our customer base. Threat intelligence activities include assessing current and emerging threats covering cyber-crime and various forms of malicious exploitation.

Responsibilities:

Monitoring and Analysis of cybersecurity events, incidents, vulnerability reports from multiple sources
Review and analyze data from various sources such as OSINT/Darknet/TECHINT
Work closely with Internal Research team to identify customer-specific threats.
Create customer-specific analytical reports based upon identified findings.
Create regular Security Trend reporting utilising information from Internal threat repository.
Work with customer POC to understand customer threat landscape and tailor customised delivery.
Monitor analyze and report cybersecurity events.
Analyze information regarding intrusion events, Security incidents and other threat indications and early-warning functions.
Follow best practices of operational security to safeguard sources and methods.
Qualifications:

Strong Information Security fundamentals
Good Understanding of Cyber Threat Intelligence
Able to create high-quality Security Analysis reports
Ability to understand and analyze various threat vectors effectively.
Should have knowledge of cyber threats, malware, APTs, exploits etc
Familiarity with the DarkNet, DeepWeb, open-source, social media and other sources of cyber-criminal activity.
People skills, strong English communications with ability to communicate effectively with various clients with the ability to explain and elaborate on technical details.
Must be interested to learn new technologies and skills.
Ability to adapt and innovate
Experience in SOC environment will be a plus
Any experience in Cyber Crime Research will be a plus
Certification of CEH, OSCP, and other cybersecurity is plus but not necessary.
Programming/scripting knowledge would be add-on
Ability to maintain the highest levels of discretion and confidentiality
Language Proficiency: English/Hindi/any Other international language such as Arabic, Russian, Japanese, Chinese, German, Italian is plus;

Desired Experience: 2-4yrs