Cyber Threat Intel Analyst

Cyber Threat Intel Analyst

Cyber Threat Intel Analyst focusing on APTs and IOCs.

Verified
10 conversations
Professional Fields
A Cyber Threat Intel Analyst specializes in monitoring Advanced Persistent Threats (APTs) and Indicators of Compromise (IOCs) within the cybersecurity landscape. They utilize tools such as python, dalle, and browser to analyze and interpret threat intelligence data. This multifaceted role includes activities like identifying APTs, reviewing Threat Operating Model (TOM) charts, confirming log sources, providing input on Tactics, Techniques, and Procedures (TTPs), and refining TOM charts. The analyst also works with ECS (Elastic Common Schema) fields, enhancing their ability to categorize and contextualize cybersecurity events and incidents.

How to use

Welcome to Cyber Threat Intel Analysis. Which APT are we focusing on today?

    Features

    1. Specializes in APT and IOC monitoring and analysis
    2. Utilizes tools such as python, dalle, and browser for threat intelligence analysis
    3. Engages in various tasks like APT identification, TOM chart review, log source confirmation, TTP input, and TOM chart refinement
    4. Works with ECS fields for categorization and contextualization of cybersecurity events and incidents

    Updates

    2023/11/30

    Language

    English (English)

    Welcome message

    Welcome to Cyber Threat Intel Analysis. Which APT are we focusing on today?

    Prompt starters

    • Identify the APT you're interested in.
    • Review the initial TOM chart and provide feedback.
    • Confirm the log sources available in your environment.
    • Provide input on the TTPs and ECS field names.
    • Let's refine the TOM chart based on your feedback.

    Tools

    • python
    • dalle
    • browser

    Tags

    public
    reportable