Job Details | |||
Job Title | Officer Cyber Intelligence | Job Grade | UCC8 |
Department | Information Technology and Research | Division/Section | Information Security |
Reports To | Senior Officer Cyber Intelligence | Supervises | None |
Location | UCC Head Office | ||
Job Purpose: |
Support all investigations, operations and management of the cyber intelligence unit / electronic content monitoring unit |
Primary Tasks/Responsibilities |
1. Gather, synthesize, and analyze open-source intelligence information in support of investigations related to cybercrime
2. Create intelligence and investigative reports that represent the steps taken, the data sources reviewed and the conclusions drawn from the evaluation of the open source information. 3. Track and respond to all Requests for Information (RFI) from other departments, and law enforcement agencies MORE JOBS ( October 2024)
4. Test, evaluate and validate potential open source technologies for operational use 5. Monitor risk across the widest range of data sources within the open, deep and dark web to protect UCC infrastructure, brand and reputation 6. Regularly produce Intelligence Reports, providing detailed analysis on social media platforms, including relevant industry, political and geopolitical variables. 7. To support the Computer Emergency Response Team unit processes and activities.
|
Education and Professional qualifications |
1. A Bachelor’s degree in Computer Science or related IT, IS, or Computing, communication fields;
2. Professional certification in any related field such as ICT security, CISSP/ GCIA/ GCFA/ CHFI/CEH/ CISA/ CISM is required 3. Certifications in data visualization, mining and analytics is an added advantage |
Working Experience |
2-3 years of professional experience in carrying out online investigations, /data analytics, statistical analysis, information security, predictive modeling, or segmentation experience setting. |
Skills, Knowledge and Abilities |
· Experience in online investigations across different social media platforms using proprietary and open source tools · Experience with Security information and event management systems (SEIM) or logging technologies like Splunk, Logstash, etc. · Experience in data visualization and analytical tools. · Ability to understand business/technical requirements for analysis/reporting purposes, interpret data and generate reports with clear actionable recommendations · Highly organized with ability to manage time, priorities and multiple deadlines in a fast-paced environment · Strong organizational and time management skills · Strong partnership and collaboration skills; must have experience influencing cross-functional leaders at varying levels of the organization. · Strong written and verbal communication skills |