Latest Job Opportunities in India
Discover top job listings and career opportunities across India. Stay updated with the latest openings in IT, government, and more.
Check Out Jobs!Read More
Information Technology Adviser (threat intelligence analyst)
Information Technology Adviser (threat intelligence analyst)
Number of positions: 1
Job Site: Vancouver
Employment type: permanent
Working hours: full time (37.5 hours/week)
Flexible work role: hybrid
Annual salary: 107,000.00 dollars – 135300.00
What will you do?
As a member of the threat and weakness management team, you will play an important role in protecting the organization’s digital infrastructure. While your primary focus will be at the intelligence of the threat, the nature of our team requires a strong understanding of weakness as well. You will be responsible for identifying, analyzing and spreading the intelligence of the severe high threat-especially the weaknesses on the zero day in light of the active exploitation and activity related to the actors in the threat-to advance treatment efforts in a timely manner and inform the implementation or enhancement of security controls. This is a dynamic multi -functional role that requires cooperation with asset owners, technical teams and leadership to ensure pre -emptive cybersecurity and risk security.
Main responsibilities
Threat Intelligence: – Monitoring and analyzing the threat intelligence sources to remain at the forefront of emerging threats. -It publishes critical and severe threat alerts, focusing on weaknesses and activity on the zero day of highly influential threat actors. – Track and evaluate the campaigns of the representative of the threat and TTPS using structured frameworks to inform the defensive strategies. -Applying the principles of tactical, operational and strategic intelligence to support daily security and long -term planning to reduce risk. – Maintaining the organization’s threat file and developing it, including the representative of the threat and evaluating the landscape of the sector’s threats. – Cooperation with SOC, respond to accidents, and manage weakness to ensure that the intelligence of the threat is implemented and operated. Providing context and enrichment to threaten intelligence to sharpen its importance to the organization. – Supporting the development and maintenance of the threats and reports information boards for both technical and reproductive masses. Contribute to the continuous improvement to verify the validity of intelligence, publishing, and escalation.
Weak management: – Determining and evaluating weaknesses through institutions systems in both IT and OT environments. – Supervising the scanning of weakness and ensuring that the results are shared with the responsible teams. Give priority to treatment by linking the intelligence of the threat to internal weaknesses. – Cooperating with technical support teams for patching, while ensuring asset owners remain responsible. – Efforts for tracking and supporting risk -based priority. Contribute to the informed correction strategies to the threat based on the exploitation trends in the real world. – Enhancing and maintaining regular weakness management reports and driving information, highlighting trends, treatment, and risk situation. – Create, documenting and improving continuous management processes, standards and policies that are in line with the best practices in the industry (for example, NST, NERC CIP, CIS). Evaluating the weaknesses associated with third -party sellers and cloud services for external risk management.
What you are attending
– At least 5 years experience in cybersecurity, with a focus on analyzing the intelligence of threats or relevant disciplines. – Written and strong communication skills, with the ability to transfer complex information clearly to both artistic and non -technical audiences. A strong understanding of the frameworks of intelligence, cybersecurity and methodologies. – The familiarity with the full spectrum of the intelligence of threat- costs, operational and strategy- and how they support different layers of defense and decision-making. Experience with tools and operations of scanning, surveying and management. – Experience in using the threat intelligence platform to manage the threat data, enrich and operate it. – Experiment to creating and providing Hunt to support the discovery of proactive threats and enlightened threat defense. Experience in operational technology (OT), industrial control systems (ICS), or operational operations, including technologies such as Scada, PLCS, or DC in industrial or critical infrastructure environments. – The ability to cooperate effectively through information technology, security and business teams in a multi -function environment has been proven. Strong skills to solve problems and critical thinking, with a proactive and analytical mentality. Technical knowledge and practical experience in the following areas:
o Treating and infrastructure
o Evaluation of threats and risks
Q light and management
O Basics of Horization Test o Network and Security Engineering
o Managing and analyzing the registry
o Security audit and compliance
o Training and asset management
Favorite education and certificates: – Bachelor’s degree in cybersecurity, information technology, or a related field. – At least one of the following areas, it is considered assets: o CISSP security security security officer o
What we offer – A comprehensive benefits package – At least 15 days of paid vacation – Life Pension – Flexible Business Model, depending on your role type – Training and development courses for more information about the benefits we provide, prefer to visit Bchydro.com/benefits.
Location: Vancouver, BC, V6B 5R3 Canada
What should you know?
Don’t forget to update your nominated profile with your current CV and copy your certificates. If possible, include your trading qualifications. This will ensure that we have all the information needed to evaluate your request without any delay.
https://www.bctechnology.com/job.cfm?id=156206&r=1&keyword=&searchin=jobdesc



