Accenture is a global professional services company, a leader in digital, cloud, and security capabilities.
Combining unparalleled experience and specialized skills in over 40 industries, we provide services in Strategy and Consulting, Technology, Operations, and Accenture Song driven by the world's largest network of advanced technology and intelligent operations centers.
Our 721,000 professionals deliver on the promise of technology and human ingenuity every day, serving clients in more than 120 countries. We harness the power of change to create value and shared success for our clients, professionals, shareholders, partners, and society. www.accenture.com
#GoSecurity
As a Threat Intelligence Manager, you will report to the ACI EMEA (Europe, Middle East, and Africa) Consulting Lead. You will be responsible for delivery of the existing and prospective ACI consulting portfolio, such as threat assessments, attack surface assessments, industry threat landscape reports, and social media brand monitoring.
Timely delivery of the ACI consulting portfolio adhering to the highest standard of quality.
Collaborative production of threat assessment reports considering a company's cyber threat landscape and its digital footprint.
Production of ad-hoc cyber threat intelligence alerts and reports aimed at meeting client requirements.
Deep dive analysis of threats facing Accenture clients.
Contribution to the team's overall delivery effectiveness and efficiency, such as by contributing to analyst workflow automation, trialing new tools, and improving existing delivery methodologies.
Supporting the EMEA ACI Research team, which specialises in tracking threat actor activity and conducting technical research.
Support team leads to manage projects and conduct quality assurance of reports.
Engage with clients to understand their requirements and debrief them on business impact and recommendations following threat assessment reports.
Basic Qualifications
5+ years of experience in threat intelligence, SOC operations, or incident response.
Expertise in either threat hunting, incident response, or vulnerability management.
Advanced knowledge of the MITRE ATT&CK framework, threat actor profiles, and TTPs.
Proven experience in conducting advanced threat investigations and producing intelligence reports.
Ability to work collaboratively across teams including SOC, Incident Response, Threat Hunting and Vulnerability Management.
Hands-on experience with SIGMA, YARA, or CAR rules
Proficiency in one of the scripting languages such as Python, PowerShell, or Bash for automation and investigation tasks.
Understanding of how malware works, including basic static and dynamic analysis techniques for malware investigation.
Valuable Experience:
Experience developing client-specific PIRs and operationalizing threat intelligence based on business models.
Required Skills
Bachelor's degree in computer science, cybersecurity, or a related field.
Relevant certifications such as Certified Threat Intelligence Analyst (CTIA), GIAC Cyber Threat Intelligence (GCTI), or equivalent.
Extensive knowledge of cybersecurity frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain) and threat intelligence platforms.
Any vendor-specific CTI certifications
Desired Skills
Advanced threat detection, analysis, and response capabilities.
Ability to create strategic intelligence reports and guide operational decisions.
Proficiency in the use of threat intelligence tools and frameworks.
Strong collaboration and leadership skills, with the ability to mentor and support junior analysts.
Proactive, with a forward thinking approach to threat detection and incident response
#J-18808-Ljbffr