Cyber Threat Analyst I

Overview

Remote
Depends on Experience
Full Time

Skills

FISMA
FedRAMP
Threat Intelligence
TCP / IP
threat hunting
IOC
Microsoft SQL
system administration
time management
verbal communication
DNS
Attention to Detail

Job Details

Job Summary: The Cyber Threat Analyst I will be responsible for Deep/Dark Web monitoring, threat hunting, and vulnerability data analysis to protect and maintaining the overall security of the enterprise. Additionally, the Cyber Threat Analyst I will help identify and report all security issues, prioritizing threats, and confirming threats have been mitigated in accordance with company standards and work with the internal and external entities to present cyber threats and reports to the security team.


Key Responsibilities:

  • Protect enterprise systems and information by promptly responding to security threats and incidents, acting individually and as part of a team to resolve issues pertaining to emerging cyber threats for both our customers and our company
  • Proactively hunt for threats and enacting identification, containment, and eradication measures while supporting recovery efforts.
  • Provide insight and guidance to colleagues engaging in prevention measures and provide IOC s (Indicators of Compromise) for platform and reporting enhancements.
  • Analyze cyber security incidents to solve issues and improve incident handling procedures
  • Receive Tier 1/2 incident escalation of detections from operations and assist with real-time, continuous (24x7) security event monitoring, response, and reporting

Work Experience / Knowledge:

  • Knowledge of one or more of the following Database Environments: Microsoft SQL Server, Oracle, Sybase, DB2 and MySQL.
  • Knowledge of Industry Standards, e.g., ISO 17799/27001, FISMA/FedRAMP, NIST Publications and other Industry Related Security Standards.
  • Must have an educational understanding of computer intrusion activities, incident response techniques, tools, and procedures
  • Knowledge of digital forensics methodology as well as security architecture, system administration, and networking (including TCP/IP, DNS, HTTP, SMTP)
  • Knowledge of operating systems including Linux/Unix and Windows
  • Some experiences in attaining and automating Cyber Threat Intelligence feeds and automation skills in integrating them into security tools

Special Requirements:

  • Develop, implement, and maintain Standard Operating Procedures (SOPs)
  • Excellent written and verbal communication skills
  • Excellent organization, time management, and attention to detail
  • Must be action-oriented and have a proactive approach to solving issues
  • Sitting for long periods of time
  • Ability to lift 50 pounds
  • Perform other duties as assigned

Equal Opportunity Employer. M/F/D/V