Summary
Building practical skills on CTI processes is what makes a CTI analyst valuable. A CTI analyst should be able to use manual methods as well as tools to answer CTI questions. The best way to build skills is through exercises, training, and researching about threat intelligence. This chapter has looked at developing and sharing IOCs, demonstrating how to create YARA rules for security enhancement, and sharing intelligence using platforms such as Anomali STAXX and AlienVault OTX. It has also illustrated methods to build threat activity groups, track campaigns, and attribute cyber activities to state-sponsored (nation-state) and non-state-sponsored threat actors. As a CTI analyst, you have also become familiar with analyzing competing hypotheses.
CTI is the piece of the puzzle that makes protection against cyber threats effective. At the center of the security functions, it powers SOCs and changes them from known traditional SOCs to intelligence-driven SOCs. Security teams...