Mandiant is a corporations whose enterprise facilities round digital forensics and incident response in addition to cyber risk intelligence. The corporate not too long ago launched a CTI analyst core competencies framework to reply a query they usually get from their prospects: What’s the optimum staff composition for beginning and maturing a CTI functionality inside their company surroundings?
Mandiant’s framework teams competencies into 4 foundational pillars (Determine A). These can be utilized to determine weaknesses in an already constructed CTI staff, determine areas for staff or particular person progress or decide an environment friendly roadmap in your cybersecurity staff.
Determine A
Pillar 1: Downside fixing
Essential pondering
In CTI, crucial pondering is important to deal with data to conceptualize, determine, consider and synthesize it. As soon as finished, the analyst ought to be capable of formulate unbiased judgements, analytic traces and related suggestions for each case.
SEE: Cell machine safety coverage (TechRepublic Premium)
Essential pondering can also be about pondering out of the field, particularly for pattern forecasting and innovation.
Analysis and evaluation
Analysis is about prioritizing information units and instruments utilization to research technical and non-technical information sources, and it’s concerning the capacity to seize stakeholders wants within the type of intelligence necessities. Analysis helps uncover new leads and attain clear analytic conclusions. The evaluation half right here is about deciphering and producing good synthesis of the analysis outcomes.
It includes figuring out all forms of indicators of compromise, their use, their limitations and how one can enrich information. It’s also about analyzing community site visitors, malware and usually finishing digital forensics and incident response.
Analysis and evaluation is commonly boosted by programming data, particularly scripting. Python and SQL are very helpful right here.
Investigative mindset
Understanding advanced challenges and creating options to resolve them is essential to CTI. The investigative mindset wants skilled understanding of cyber risk actors’ TTP (ways, strategies and procedures) in addition to CTI instruments, frameworks and IT programs. It’s also about figuring out small alerts in big information noise and creating instinct.
Pillar 2: Skilled effectiveness
Communication
Communication with varied audiences is important for CTI. The flexibility to jot down analytic conclusions, analysis and methodologies utilizing completely different instruments and codecs (slide decks, emails, Phrase paperwork, briefings, and many others.) is obligatory.
Mandiant additionally highlights the truth that “it is very important have the flexibility to obviously convey judgements utilizing probabilistic language so judgements will be uncoupled from info and direct observations. Of associated significance is the flexibility to make use of exact language to make sure the meant message is correctly conveyed and doesn’t immediate pointless alarm.”
It’s essential to know the alternative ways of sharing data between machines but additionally with particular data sharing teams and private-public data sharing and evaluation facilities and organizations (ISACs and ISAOs).
Lastly, familiarity with cyber coverage and legislation enforcement mechanisms is required, serving to to counter cyber actions like takedowns, sanctions and public consciousness messages.
Teamwork and emotional intelligence
People’ distinctive traits assist present peer mentoring and convey alternatives in filling data and gaps whereas constructing cohesion and belief as groups work collectively.
With the ability to work with stakeholders to gather details about their enterprise operations also can assist risk intelligence.
The core expertise of emotional intelligence are self-awareness, self-control, social consciousness and relationship administration.
Enterprise acumen
The flexibility to grasp an organization’s surroundings, mission, imaginative and prescient and objectives can affect the group’s cyber threat publicity. A CTI analyst may be required to offer an evaluation on potential threat publicity change, or consider outcomes from risk intelligence.
Pillar 3: Technical literacy
Enterprise IT networks
It’s essential to grasp working programs and networks rules in any respect ranges: File storage, entry administration, log recordsdata insurance policies, safety insurance policies, protocols used to share data between computer systems, et cetera.
Cybersecurity ecosystem
The core ideas, parts and conventions related to cyberdefense and cybersecurity must be recognized, and a powerful data of trade greatest practices and frameworks is obligatory. One other core tenet is how defensive approaches and expertise align to at the very least one of many 5 cyber protection phases: Establish, shield, detect, reply and get well.
Key ideas to know listed here are identification and entry administration and management, community segmentation, cryptography use instances, firewalls, endpoint detection and response. signature and habits primarily based detections, risk looking and incident response, and pink and purple groups.
One ought to develop a enterprise continuity plan, catastrophe restoration plan and incident response plan.
Organizational cybersecurity roles and tasks
This half is all about understanding the function and tasks of everybody concerned: Reverse engineers, safety operation heart analysts, safety architects, IT assist and helpdesk members, pink/blue/purple groups, chief privateness officers and extra.
Pillar 4: Cyber risk proficiency
Drivers of offensive operations
Offensive operations should be primarily based on finite sources to outsource components of the cyber program to buy operational instruments, enlist contractor assist or buy felony capabilities. Organizational composition and constituent job capabilities additionally should be outlined clearly.
The secondary tenet of this competency is to determine the motivations behind the risk actor.
Mandiant stories that “a eager understanding of acceptable operations undertaken throughout peacetime and the way this shifts throughout a wartime is crucial.”
Risk ideas and frameworks
Establish and apply acceptable CTI phrases and frameworks to trace and talk adversary capabilities or actions. This competency is all about risk actor capabilities: Understanding vulnerabilities and exploits, malware, infrastructure, attribution/intrusion set clustering and naming conventions.
It’s also about figuring out CTI frameworks just like the Cyber Kill Chain from Lockheed Martin, or MITRE’s ATT&CK framework, for instance.
Risk actors and TTPs
Risk actor data implies figuring out risk actor naming conventions, and their TTPs. Figuring out key indicators throughout a cyber kill chain to find out adversary operational workflows and habits is crucial right here.
Disclosure: I work for Pattern Micro, however the views expressed on this article are mine.