Qualifications: College Graduate; Preferred, not a priority - BS equivalent in computer science, information systems, or cyber intelligence6 months to 1 year experience in Technical Writing, Threat Analysis, and Threat LandscapeMust have a familiarity with MITRE ATT&CK framework; is able to associate MITRE IDs relevant to a cyber eventMust have a familiarity with OSINT research (Open-Source Intelligence)Preferred, not a priority - familiar with using JIRAPreferably with Scripting knowledgeAdeptness in cybersecurity and data protectionTechnical proficiency in cyber threat intelligence and threat Intelligence platformsExcellent English language skills, both in writing and communicationIs able to thrive in a collaborative, fast-paced environmentIs significantly keen on detailsExcellent reading comprehension skillsIndependent and has a curious approach to researchPossesses sufficient or advanced knowledge about cyber threats (malware, phishing, trojans, botnets, etc.) and the cyber threat landscape (e.g. a ransomware attack targeted a specific company)Possess sufficient knowledge about software vulnerabilities (CVEs) and associated threats (zero-day exploits, malicious exploitation, proof-of-concept exploit codes)Possesses sufficient or advanced knowledge about cybersecurity and protecting against cyber threatsProficiency with Google Docs and Google SheetsHas strong analytical skills; can accurately interpret raw data and put that into technical writingRegularly updated about recent cyber trends and eventsAmenable to work on a Mid Shift schedule (Possible Weekend Coverage)Amenable to work on a hybrid setup (2-4x RTO/month) in MOA, Pasay Specific Duties and Responsibilities: Conduct thorough research on cyber threat events found in open-source intelligence (OSINT) or through the client's tool to be covered in the production Validated Intelligence Event (VIEs) notes. Research should cover trending cyberattacks and specific topics within the cyber threat landscape (such as ransomware, phishing attacks, exploitation of software vulnerabilities, etc.)Produce VIE notes, referencing and/or analyzing content found from research conducted through OSINT.Implement technical writing style during the creation of VIE notes, ensuring that the information conveyed adheres to our target audience (professionals, executives, fairly technical readers)Identify the primary elements involved in relevant cyber events, such as the threat actor, malware, indicators of compromise (IOCs), and tactics, techniques, and procedures (TTPs)Map the appropriate MITRE ATT&CK identifiers associated with the topics covered as part of VIE note productionCollaborate with peer Threat Intelligence Analysts (TIAs) in the Philippines and Boston team as part of the overall process of producing, analyzing, and publishing VIE notesPublish VIE notes to the client's tool, and map the necessary entities (e.g. malware, threat actors, TTPs, MITRE ATT&CK IDs, etc.)Collaborate with Data Science to curate new entities (such as malware, threat actor/s, CVEs, etc.) for added intelligence on the client's tool