POur world has never been more alive with opportunities and, at Kyndryl, we’re ready to seize them. We design, build, manage, and modernize the mission-critical technology systems that the world depends on every day. Kyndryl is at the heart of progress — dedicated to helping companies and people grow strong. Our people are actively discovering, co-creating, and strengthening. We push ourselves and each other to seek better, to go further, and we carry this energy to our customers. At Kyndryl, we want you to keep growing, and we’ll provide plenty of opportunities to make that happen. /p h3Your Role and Responsibilities /h3 pKyndryl Italia is looking for a bSenior SOC Threat Intelligence Analyst /b to join our team and accelerate the development of our Managed Security Services and SOC capabilities. /p pAs a bSenior SOC Threat Intelligence Analyst /b, you will lead Threat Intelligence activities, focusing on capabilities development and main analyst activities, such as: /p ul liCollection, analysis, and production of finished Threat Intelligence. /li liAnalyze malware, infrastructure, and other malicious artifacts related to threat actor activity to extract indicators and tradecraft. /li liUnderstand how to monitor targeted campaigns and threat actors, identify relevant TTPs, and support recommendations and remediation advice to reduce risks. /li liDevelop hypotheses based on threat intelligence to guide threat hunting and vulnerability management activities. /li liProduce quality intelligence reports for both executive and technical audiences. /li liCollaborate with other Security Team members on initiatives, projects, investigations, and tasks. /li liConduct Security Monitoring activities to provide visibility into potential threats. /li liDrive skill development of junior colleagues. /li /ul h3Required Technical and Professional Expertise /h3 ul li5+ years of experience in SOC and Threat Intelligence activities, malware analysis, and remediation planning. /li li8+ years of experience in Cyber Security services. /li liExperience with TIP or TI solutions (e.g., MISP, Recorded Future, Anomali). /li liExperience in threat intelligence, research, or incident response involving threat actor tracking. /li liFamiliarity with techniques used by malware and threat actors, and industry lexicons like MITRE ATTCK. /li liUnderstanding of networking, internet protocols, and information security. /li liKnowledge of MITRE ATTCK Framework, Kill Chain, and Diamond Intrusion model. /li /ul h3Preferred Technical and Professional Experience /h3 ul liBachelor's degree in engineering, business, or related field; MBA is a plus. /li liMotivated self-starter in complex, evolving security environments. /li liStrong analytical and project management skills. /li liCertifications such as CTIA, GCTI, CCTIM, CRTIA, GOSI. /li /ul h3Required Education /h3 pbBachelor's Degree /b /p h3Preferred Education /h3 pbMaster's Degree /b /p pKyndryl is committed to diversity and is an equal opportunity employer. All qualified applicants will receive consideration without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, pregnancy, disability, age, veteran status, or other characteristics. /p h3Other things to know /h3 ul liPrimary Job Category: bTechnical Specialist /b /li liRole (Job Role): bSecurity Specialist /b /li liEmployment Type: bFull-Time /b /li liContract Type: bRegular /b /li liPosition Type: bProfessional /b /li liTravel Required: Up to 100% or 5 days a week (home on weekends, based on project requirements) /li /ul #J-18808-Ljbffr