A passion for wellness, community, sustainable design and smiles.
Why do we do what we do? We respect that you, like us, believe that travel can serve a purpose. You want us to be honest and keep it real, with genuine actions that merge the two platforms of wellness and sustainability to promote personal health, and the health of our planet. Experience some...
Read more about this company
A well-established business is seeking to appoint Open Source Intelligence Specialist
Direct the gathering of information open-source material using specialized technology from various sources including the internet, dark web, deep web, social media platforms and any other place.
QUALIFICATION & EXPERIENCE
Relevant University Degree and working towards Postgraduate.
At least 6 (six) years' experience in a relevant field
Computer literacy at advanced level.
Completed internal training on systems, policies, procedures, etc.
Proven ability to understand and explain the behaviours of different types of complex organisations, from criminal syndicates to financial enterprises
Proven ability to translate complex information sets into specific recommendations that can be actioned by customers to enhance their financial intelligence operations.
Familiarity with cyber threats, defences, motivations and techniques.
Must have advanced skills to deploy Open-Source technology
Experience with intelligence analysis tools, methods and the intelligence life cycle
Experience distilling raw information into actionable financial intelligence
Ability to maintain or develop professional contacts in the cyber security community and in industries including finance, law enforcement and government,
Cyber Security - Understand different operating systems and network security concepts
Internet capabilities - Understand Domain Name Services (DNS), Transmission
Control Protocols over the Internet Protocol (TCP/IP), Small Mail Transfer
Protocol (SMTP), IMAP, Secure Shell (SSH), Hyper Text Transfer Protocol Secure (HTTPS) and Secure Sockets Layer (SSL).
Working knowledge of how malicious code operates and technical vulnerabilities are exploited.
Understand the tactics, tools and procedures used by cyber criminals, especially the dark web and The Union Ring network
Produces timely written recommendations and assessments