Identify, analyze, and track threat actor TTPs and IOCs using threat prioritization frameworks and threat landscape monitoring.
Investigate complex threat data to provide situational awareness, quantify trends, support ongoing investigations, and strengthen detection and response capabilities.
Conduct in-depth technical analysis (searching, pivoting, enrichment) to support Threat Hunting and identify potential intrusions in Bosch networks and systems.
Collaborate closely with cross-functional teams including Incident Response and Detection Engineering to integrate intelligence into detection and response workflows.
Produce and deliver high-quality intelligence reports, briefings, and presentations tailored to technical, business, and executive audiences.
Respond to Requests for Information (RFIs) and brief stakeholders on emerging campaigns and significant incidents.
Develop and improve internal tools for threat analysis and monitoring (using Python, REST APIs, Git, Docker).