91% say women are treated fairly and equally to men
93% would recommend this company to other women
92% say the CEO supports gender diversity
Ratings are based on anonymous reviews by Fairygodboss members.
Position summary
We are seeking a skilled cybersecurity professional to develop frameworks and automate processes related to threat intelligence. The role involves reviewing documentation, developing plans, cataloging processes, communicating with stakeholders, and improving security operations.
Ideal candidates will be experts in application development, API integration, automation, and familiar with the Threat Intelligence Lifecycle and threat products. Experience with structured and unstructured data, and collaboration with security teams to enhance threat intelligence, is essential.
Interested? Apply now!
About ADP
We are a global leader in HR technology, leveraging AI and machine learning to enhance payroll, tax, HR, benefits, and more. We foster an inclusive culture that values diversity, innovation, and belonging. Recognized as a top employer for women, LGBTQ+, and multicultural talent, ADP is committed to diversity, equity, and inclusion. Learn more :
Responsibilities
- Develop Indicator Enhancement / Enrichment Playbook for the Threat Intelligence Platform (TIP).
- Ingest data from various sources into the TIP.
- Create systems integrations between threat source APIs and the TIP.
- Design threat intelligence dashboards with tagging and severity levels.
- Maintain API connections with security solutions.
- Manage API for system integration between Apache Nifi and the indicators database.
- Gather IOC data from external threat feeds.
- Analyze internal, open-source, and dark web datasets.
- Apply current cyber threat knowledge and frameworks.
- Maintain VPN and email infrastructure.
- Provide analysis and reports on cyber threats to leadership.
- Build relationships with cybersecurity teams and stakeholders.
- Develop scripts and processes to automate and improve security operations.
- Analyze threat actors, campaigns, TTPs, IOAs, IOCs.
- Conduct technical analysis using industry standards.
- Create visual research presentations for senior management.
- Support the Critical Incident Response Center with intelligence activities.
Qualifications
Excellent communication and report-writing skills.Understanding of SDLC processes.Knowledge of programming languages : Python, Perl, PHP, Java, .NET, C.Experience with database management : PostgreSQL, MySQL, NoSQL databases.Familiarity with STIX / TAXII formats and security integrations.8+ years in cybersecurity or related fields.Understanding of network security, threat analysis, and intrusion detection.Experience configuring Windows and Linux networks.Background as a threat intelligence SME preferred.Knowledge of cyber threats, attack vectors, and frameworks like Cyber Kill Chain, ATT&CK.Experience with threat detection tools and platforms.Ability to automate and manipulate data using programming.Note : A college degree is not mandatory; skills and experience are paramount.
What you'll do
Work in agile sprints, handle diverse tasks from migrations to feature development, and innovate with new technologies. Self-motivation and problem-solving are key.
Preferred skills
Deep knowledge of cyber threats, threat vectors, and attacker methodologies.Experience with threat detection, cloud infrastructure, and threat intelligence tools.Developing automation tools and threat intelligence capabilities.Security operations experience, especially in finance.Familiarity with Snowflake, MongoDB, Redis, and message queuing systems.Discover why people choose ADP :
Our commitment to diversity and ethics is unwavering. Learn more about our culture and values at
#J-18808-Ljbffr