Cyber Threat Assessment & Intelligence Analyst (TAI)

Share:

Cyber Threat Assessment & Intelligence Analyst (TAI): Applicants for the Operations Center (CyOC) Cyber Threat Assessment & Intelligence Analyst must be an information security professional with background knowledge in network-based adversary TTPs, network protocols, and network traffic analysis. The TAI should provide expert level technical research combined with sophisticated information analysis to produce intelligence reports and estimates that will make predictions and communicate results to consumers. TAI will work with other teammates to deliver products, recommendations, guidance, and estimates to senior leadership within IronNet as well as to third-party stakeholders.

Core Competencies: - Possess masterful skills in critical thinking and adversary mindset and tactics, techniques, and procedures - Experience with Intrusion Detection Systems, Intrusion Prevention Systems, and Incident Response methodologies - Deep understanding of the cyber attack methodologies to apply to information analysis and intelligence production - Deep understanding of network defense methodologies - Excellent oral and written communication skills, with extensive ability for report production and documentation for sharing threat information. - Deep understanding of attack methods and recognition of behaviors within a network

Duties: - Ability to collaborate and coordinate on the assessment of risk across the company - Maintain current knowledge of one or more regions, countries, non-state entities, and or technologies in your analysis techniques. - Directly engage with company incident response activity to assist in support of the Operations Center to determine courses of action and conduct assessments for current and anticipated conditions of the network/company. - Use archived and current information from anomalous network activity to develop trends and trend analysis for anomalous and identified adversary behaviors. - Directly support Operations in all matters concerning threat behaviors, threat identification, and emerging or changing tactics, techniques and procedures for responding to threat activity. - In conjunction with other members in the CyOC, conduct a network damage assessment with routine updates within the CyOC and to senior leadership teams as necessary. - Using pertinent legal guidelines and/or policies; determine which portions of information should be shared outside of the CyOC, with stakeholders, and with partners/customers/media. - Actively conduct open source research in support of operations, threat hunting, analytic development, threat emulations, and sales and marketing. - Assist the malware analysis team as needed - Contribute to the company blog and other forums, with periodic bulletins or articles concerning threat intelligence/the IronNet tool/ etc.

Desired Qualifications/Experience: - Bachelor's Degree in Computer Science or like degree [preferred but not required.] - Minimum of 3-5 years total experience in one or more of the following areas: (a) threat intelligence/research, (b) incident response, (c) red team/pentesting, (d) and/or intrusion analysis. Preferably within a community that employed threat intelligence competencies - GIAC (Global Information Assurance Certification) - ISSEP (Information Systems Security Engineering Professional) - Intelligence Community experience is highly beneficial

OR
 
 
By clicking the button, I agree to the GetHired Terms of Service and Privacy Policy
GetHired.com member? Login to Apply
 
Powered by GetHired.com | Terms of Service | Privacy Policy