Why it’s worth it:
Are you interested in producing operational and strategic intelligence products that draw on primary-source information to provide actionable insights into adversary tactics and techniques, malware, and threat campaigns in the Mandarin-language cybersphere? Joining ReliaQuest’s Cyber Threat Intelligence team, you will be an integral part of intelligence operations. This is a great opportunity to put your Mandarin-language skills to use while conducting cutting-edge threat research, seeking and interpreting restricted intelligence, and delivering intelligence products to a varied audience. If you have a keen interest in broadening your skills, knowledge, and experience within an intelligence environment, this role might be for you.
The everyday hustle:
1. Conduct investigations on the clear, deep, and dark web, identifying Mandarin Chinese-language primary- and/or restricted-access intelligence to support the entire range of the team’s deliverables
2. Write timely, accurate, and relevant actionable intelligence deliverables in a variety of formats—including short, fast-turnaround updates and longer-form reports—covering threat actors, vulnerabilities, malware, and cybercriminal locations
3. Research, write, contribute to, and coordinate external-facing papers, blogs, webinars, and podcasts
4. Propose and carry out extended research projects to gather actionable intelligence on the Mandarin-language cyber threat landscape
5. Follow trends, dynamics, and developments in the Mandarin-language cyber threat landscape
6. Identify new threat actors or locations and assess their credibility, motivations, and threat level
7. Conduct investigations to support customer Requests for Intelligence (RFIs) and produce written deliverables according to agreed parameters
8. Liaise with other teams within the Threat Research umbrella to deliver primary-source intelligence to enrich internal telemetry efforts investigating credible threats
9. Support Threat Research Team Leadership in ensuring team goals are met
10. Meet deadlines and achieve expectations
Do you have what it takes?
11. Credible experience of working in cyber security and/or cyber threat intelligence
12. Professional-level Mandarin-language skills (able to read and write)
13. Existing knowledge of or deep interest in cyber security
14. Experience working in online intelligence investigations and analysis, including good OSINT skills
15. Demonstrates a sense of urgency, understands customer needs (internal and external), and is solution-focused
16. Strong analytical skills and a demonstrated writing ability
17. Understands channels of communication, delivery of information, tone, and attitude in messaging; has an awareness of cultural differences, inclusiveness, and communication barriers
18. Can adapt to a fast-moving environment to deliver high-quality intelligence content in a short timeframe
19. Comfortable working in cross-functional intelligence teams across different time zones
20. A relevant university degree (e.g., Languages, Computer Science, Cybersecurity, International Relations, Political Science), equivalent education, or appropriate professional experience
What makes you uncommon?
21. Experience of tactical investigations into threat actor TTPs, malware, and vulnerabilities
22. Good understanding of the cyber threat landscape, including threat actor attack methodologies, security postures, and appropriate analytical frameworks (including Cyber Kill Chain, Diamond Model, MITRE ATT&CK)
23. Experience of non-standard Mandarin-language vocabulary, e.g., slang and technical jargon
24. Familiarity with Mandarin-language clear, deep, and dark web cybercriminal marketplaces and forums
25. Experience of online HUMINT operations and/or social engineering techniques
26. A comfortable public speaker, confident to share ideas and insights both internally and externally
27. Awareness of a wide variety of security technologies (e.g., SIEM, EDR)
28. Technical understanding/skills, particularly of cyber security offensive and defensive practices
29. Knowledge of cyber threat actors and adversary tactics, techniques, and procedures (TTPs)
30. Familiarity with structured analytic techniques for intelligence analysis