Cyber Threat Intelligence Analyst

Arnold & Associates Inc.

  • Hawaii
  • Permanent
  • Full-time
  • 2 months ago
  • Apply easily
Position Description: The candidate will be responsible for providing analysis on relevant threats to the customer environment in support of the overall defensive effort. They will be a key component in providing additional tactical context surrounding adversarial TTPs and support to the Network Security Monitoring and Incident Response teams. The primary responsibility of the candidate is to analyze various sources of threat related data using standard toolsets and methodologies and providing risk related recommendations for action.

Clearance Required: Minimum of a Secret Clearance, with ability to obtain TS/SCI.

  • Mid-Level: 3 - 5 Years’ experience in Cybersecurity Service Provider (CSSP) environment or similar area
  • Senior Level: 5+ Years’ experience in CSSP environment or similar area
Recommended Education:
  • Bachelor’s degree or higher from accredited university/technical college
  • 8570 Classification IAT –II & CSSP Certification
Required Skills:
  • Ability to write finished products based off of highly technical subject matter and analysis for dissemination to a less technical or non-technical audience
  • Experience with collecting, analyzing, and interpreting qualitative and quantitative data for the purposed of documenting results and analyzing finding to provide meaningful products
  • Experience with Cyber, defensive or offensive Cyber operations, information operations or information warfare, or topical Cyber expertise
  • Ability to develop specific expertise, discerns patterns of complex threat actor behavior, and communicates a comprehension of current and developing Cyber threats
  • Ability to leverage online research tools to identify and navigate online forums, specialized websites, social media, and traditional sources
  • Knowledge of TCP/IP network communication protocols
  • Self-motivated and passionate
  • Possess excellent oral and written communication skills, including briefing to senior leadership and agency groups on a regular basis
Highly Desired
  • Experience with analytic tool, including Augury, Splunk, TAC, Palantir, Shodan, Analyst Notebook or other threat intelligence platform preferred
  • Experience collaborating and coordinating with intelligence community partners on Cyber issues and topics
  • Perform daily review of cyber threat warnings, bulletins, alerts, and incident reporting documentation
  • Conduct research on emerging security threats and provide correlation and trending of cyber incident activity
  • Maintain knowledge of adversary activities, including intrusion set tactics, techniques and procedures (TTPs)
  • Communicate events to agencies regarding intrusions and compromises to network infrastructure, applications and operating systems
  • Provide cyber threat assessments based on threat analysis, coordinate cyber threat tracking with other organizations and the government
  • Compile detailed investigation and analysis reports
  • Compile and maintain internal standard operating procedure (SOP) documentation
  • Ensure associated documentation and capabilities remain compliant with CJCSM 6510.01b and other applicable policy directives
  • Participates in program reviews, product evaluations, and onsite certification evaluations
Additional Information:
  • Authorized to update signatures and view alerts of IDS/ IPS
  • Authorized to view audit records on Central Log Server
  • Authorized to modify auditable events on Central Log Server
  • Overtime may be required as needed to support incident response actions (Surge)
  • Possible Travel 15%
Powered by JazzHR