Company Overview Founded by experts with more than 70 years of collective experience in the staffing solutions industry, TASQ understands the unique challenges in the talent acquisition space and is committed to being the trusted partner of companies in their pursuit of hiring the best people to fill their manpower needs. Composed of highly skilled team members who have worked with organizations ranging from small-to-medium entities to large-scale enterprises (including Fortune 500 companies), TASQ is fully capable of meeting staffing demands at all levels and across different industries. Specific Duties and Responsibilities: Create Analysts Notes for entities tracking Red and Orange in the Clients threat views that currently do not have them or they are out of date Assist in the generation of other analysts notes currently produced by notes writers and other long term projects Conduct background research on threat actors Collaborate with Data Science to curate entities that need to be tagged in notes Identify TTPs, IOCs, and Associated Malware Familiar with MITRE ATTACK Framework and Common Vulnerability Databases like CVE Adhere to and implement Infinit-O's quality and information security policies and carry out its processes and procedures accordingly. Protect client-supplied and generated for client information from unauthorized access, disclosure, modification, destruction or interference (see also Table of Offenses). Carry out tasks as assigned and are aligned with particular process or activity related to information security. Report any potential or committed non-conformity, observation and/or security event or risks to immediate superior Qualifications: Two years professional experience B.S. equivalent in computer science, information systems, or cyber intelligence Adeptness in Cybersecurity and Data Protection Technical Proficiency in Cyber Threat Intelligence and Threat Intelligence Platforms Familiarity in OSINT Excellent written communication in English Disciplined time management Desired proficiency in at least cyber security and threat actors Regularly Updated in recent cyber trends and events