Qualifications: College Graduate; Preferred, not a priority - BS equivalent in computer science, information systems, or cyber intelligence6 months to 1 year experience in Technical Writing, Threat Analysis, and Threat LandscapeMust have a familiarity with MITRE ATT&CK framework; is able to associate MITRE IDs relevant to a cyber eventMust have a familiarity with OSINT research (Open-Source Intelligence)Preferred, not a priority - familiar with using JIRAPreferably with Scripting knowledgeExcellent English language skills, both in writing and communicationIs significantly keen on detailsProficiency with Google Docs and Google SheetsHas strong analytical skills; can accurately interpret raw data and put that into technical writingPossesses sufficient or advanced knowledge about cyber threats (malware, phishing, trojans, botnets, etc.) and the cyber threat landscape (e.g. a ransomware attack targeted a specific company)Possess sufficient knowledge about software vulnerabilities (CVEs) and associated threats (zero-day exploits, malicious exploitation, proof-of-concept exploit codes)Possesses sufficient or advanced knowledge about cybersecurity and protecting against cyber threatsIs able to create logical assessments, on-point recommendations, and a thorough outlook about a cyber event (e.g. able to identify or describe the so what is related to the event)Is able to thrive in a collaborative environmentIndependent and has a curious approach to researchStrong discipline with time managementPreferred, not a priority - experience with generative artificial intelligenceAdaptive, open to changeCan handle tight deadlines in terms of report deliveryAmenable to work on a Mid Shift schedule (Possible Weekend Coverage)Amenable to work on a hybrid setup (2-4x RTO/month) in MOA, Pasay About the Role Basic Function: This position is responsible for the creation of finished intelligence reports and analyst notes. Specific Duties and Responsibilities: Prepare weekly, monthly, and quarterly client-specific finished intelligence reportsAnalyze client-specific data to determine potential threats to a client or client infrastructureSummarize findings from client-specific data to clearly and concisely communicate a level of threat to a client or client infrastructureIdentify open-source information and data relevant to a client's priority intelligence requirements, and summarize the information and data for inclusion in a client reportDiscover cyber threat events/ stories to be covered in the Weekly Threat Landscape, and monitor existing suggestions to track which industries need additional researchUse the client's tool to validate information based on what was identified through open-source research; accurately interpret the results and create logical assessments or an outlook of the incidentConduct research cyber threat events/stories, including open source research as well as research using the client's tool dataset, to provide actionable and relevant intelligence to clients to help them better protect themselves against cyber threatsCreate Analyst Notes from previously published Weekly Threat Landscape storiesCollaborate with the Data Science team to curate entities that are referenced in reportsMonitor and remain up-to-date about recent cyber trends and events