Cyber Threat Intelligence / Digital Computer Forensics

$135,000 - $160,000

Full Time

  • Work from home


Threat HuntingThreat Intelligencesecurity incident responseQualys

Job Description

Associate Principal, Threat Intelligence

3 days in office, 2 days remote

SELLING POINTS: cyber threat analysis, digital computer forensics, incident response, application security, operating systems security, cryptographic controls, networking incident response large enterprise environment prefer financial aws siem Qualys Nessus Nmap ldap

The Associate Principal, Threat Intelligence will help in the analysis and remediation of security threats to the enterprise, vulnerabilities in the environment, and how to improve defense itself against identified threats. This position will require initiative to remediate identified security threats, incidents, and compliance issues when tasked.  The role will be involved in the documenting, execution, and testing of regulatory compliance to all required security regulations.

Intelligence Analysis:

  • Identify enhancements of current threat and situational intelligence sources leveraging proprietary enterprise data, as well as a variety of external sources and open source data.
  • Actively monitor and research cyber threats with a direct or indirect impact to the brand, business operations, or technology infrastructure. 
  • Develop and support briefings to Security management on security threats.
  • Create and conduct presentations on current threats and related IT Security topics.

Threat Hunting:

  • Develop and report threat hunting hypotheses based on applicable security threats to the organization.
  • Execute threat hunting operations based on hypotheses reports across varied environments.
  • Report observations found during threat hunting in detail to support development of organization’s security posture.

Proficiency in:

  • Intelligence analysis
  • Adversary TTP analysis in network and host-based attacks
  • Vulnerability assessment tools (Qualys, Nessus, nmap, etc.)
  • Incident Response activities
  • Log analysis technologies (SIEM, network sniffers, etc.)
  • Other Security preventative and detective technologies (EDR, network-based analysis, etc.)
  • Standard technical writing tools including MS Word, Excel, Project and Visio

Familiarity with:

  • Directory services, LDAP, and their inherent security (Active Directory, CA Directory).
  • Proxy and caching services.
  • Client/server platforms including Sun Solaris, Windows, Linux.
  • Operating system hardening procedures (Solaris, Linux, Windows, etc.)
  • LAN/WAN routing and high availability (OSPF, BGP4/iBGP, EIGRP and NSRP).
  • Web Application Firewalls.
  • Cloud based security tools and techniques (AWS, Azure, Google Cloud Platform, etc.)
  • Security Orchestration and Automated Response tools and concepts.
  • Encryption technologies (PGP, PKI and X.509)

Some experience:

  • Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices
  • Bachelor’s degree in Computer Science, Engineering, or another related field.
  • 3-5 years of information security experience, preferably in the financial services industry.
  • Minimum one year hands-on security operations experience including interdisciplinary experience with four or more of the following: Cyber Threat Analysis, Digital Computer Forensics, Incident Response, Application Security, Operating Systems Security, Cryptographic Controls, Networking, Programming languages, Incident Response
  • Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure.
  • Industry knowledge of leading-edge security technologies and methods
  • Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities
  • Strongly prefer at least one of the following certifications: CISSP, GCTI, GCIA, GCIH, GCFA, CHFI, CCE, CFE