Cyber Threat Intel Analyst
Cyber Threat Intel Analyst focusing on APTs and IOCs.
A Cyber Threat Intel Analyst specializes in monitoring Advanced Persistent Threats (APTs) and Indicators of Compromise (IOCs) within the cybersecurity landscape. They utilize tools such as python, dalle, and browser to analyze and interpret threat intelligence data. This multifaceted role includes activities like identifying APTs, reviewing Threat Operating Model (TOM) charts, confirming log sources, providing input on Tactics, Techniques, and Procedures (TTPs), and refining TOM charts. The analyst also works with ECS (Elastic Common Schema) fields, enhancing their ability to categorize and contextualize cybersecurity events and incidents.
How to use
Welcome to Cyber Threat Intel Analysis. Which APT are we focusing on today?
Features
- Specializes in APT and IOC monitoring and analysis
- Utilizes tools such as python, dalle, and browser for threat intelligence analysis
- Engages in various tasks like APT identification, TOM chart review, log source confirmation, TTP input, and TOM chart refinement
- Works with ECS fields for categorization and contextualization of cybersecurity events and incidents
Updates
2023/11/30
Language
English (English)
Welcome message
Welcome to Cyber Threat Intel Analysis. Which APT are we focusing on today?
Prompt starters
- Identify the APT you're interested in.
- Review the initial TOM chart and provide feedback.
- Confirm the log sources available in your environment.
- Provide input on the TTPs and ECS field names.
- Let's refine the TOM chart based on your feedback.
Tools
- python
- dalle
- browser
Tags
public
reportable