Philips Intelligence Analyst in Shanghai, China
The Intelligence Analyst’s primary objective is providing relevant threat information to the security operations team to defend the Philips enterprise. To defend the enterprise, the threat team creates and maintains a database of relevant threat information gathered from multiple sources through manual and automated collection processes. This team is also responsible for sharing threat information with external entities, and represents network security operations in activities regarding information sharing. This specific position within the team will concentrate on collecting and analyzing threat information in Asia with a significant focus on the Greater China market. There are many threats in this region which require local expertise to fully understand and properly mitigate. To be successful in meeting this challenge the position requires skills in the collection, normalization and enrichment of region specific threat information in order to articulate all relevant use cases involving risks to the business.
The Intelligence Analyst is a key member of the Threat Intelligence team and has the primary responsibility for operational and tactical information collection. The analyst brings together information from multiple sources to derive actionable threat information for use by other security operations teams. A significant amount of time will be spent searching local news and researching forums for threat information. From a strategic level the information collected will provide an overall understanding of the cyber threat environment in Greater China and provide an alternate understanding of the global cyber threat environment. From a tactical level the information collected will provide an understanding of the latest tactics and malware used by threat actors with a strong focus on Asian threat actors.
A snapshot of your responsibilities includes:
Identification of emerging threats;
Real-time monitoring of third party security feeds, forums, and mailing lists to gather information on vulnerabilities and exploits relevant to Philips;
Assessing external events based on factual information and wider contextual information available;
Producing outputs to provide an accurate depiction of the current threat landscape and associated risk through the use of supplier, community, and open source reporting;
Produce actionable information for delivery to security operations, executive management and customers in the form of technical reports, briefings, and data feeds;
Share threat information locally with approved third parties.
To be a successful Analyst, you need:
Deep interest in open source research;
Ability to read and speak Chinese and an understanding of Chinese culture;
Interest and experience in HW & SW vulnerabilities, research & testing;
Investigative and analytical problem solving skills;
Critical thinking and contextual analysis abilities;
Effective writing and speaking skills in English;
An understanding of the current vulnerabilities, response, and mitigation strategies used in cyber security;
Experience with analysis processes, including open source and closed source information gathering, source verification, data fusion, link analysis, and threat actor tracking;
Ability to research and characterize security threats to include identification and classification of threat indicators.
The Threat Intelligence team works diligently with the Security Operations teams within Philips IT to provide reliable and secure services across the global enterprise.
We welcome you to a challenging, innovative environment with great opportunities for you to explore.
Our benefits are very competitive and designed around your preferences:
Depending on experience, a year salary (fulltime)- (including personal benefits package);
A variable bonus based on both Philips results and personal performance;
Extensive set of tools to drive your career, such as a personal development budget, free training and coaching;
Opportunity to buy Philips shares and products with discount;
Healthy work-life balance.
We are looking for
We are looking for candidates who have an intelligence analysis or research background.
We also expect you to have:
Certifications such as CISSP, GSEC an advantage;
Bachelor degree or equivalent combination of education and (work) experience;
Good networking skills;
1 + years’ experience in a technical or intelligence Information Security role;
Ability to work as part of a distributed virtual analysis team with limited supervision;
Experience refining source information and raw data into intelligence products;
Solid understanding of security when conducting cyber threat research online;
Experience in link, pattern and trend analytical techniques and analytical platform;
Available to work non-conventional hours in order to collaborate with various global corporate offices;