Senior Cyber Threat Intelligence Analyst

Overview

Remote
On Site
Contract - W2

Skills

CISSP

Job Details

Cerebra Consulting Inc is a System Integrator and IT Services Solution provider with a focus on Big Data, Business Analytics, Cloud Solutions, Amazon Web Services, Salesforce, Oracle EBS, Peoplesoft, Hyperion, Oracle Configurator, Oracle CPQ, Oracle PLM and Custom Application Development. Utilizing solid business experience, industry-specific expertise, and proven methodologies, we consistently deliver measurable results for our customers. Cerebra has partnered with leading enterprise software companies and cloud providers such as Oracle, Salesforce, Amazon and able to leverage these partner relationships to deliver high-quality, end-to-end customer solutions that are targeted to the needs of each customer.

Hello,

Hope you are doing well!!

We at Cerebra Consulting, Inc., have an exciting job opening with one of our clients. Please review the job description below, and if you are interested, share your updated resume with contact details.

Job Title: Senior Cyber Threat Intelligence Analyst

Client: ADM - Cincinnati

Location: locals in Cincinnati, OH

W2

Position Summary:

SCTIAs, under general supervision, provides support to leaders and cyber security analysts by consuming, analyzing, and reporting tactical, operational, and strategic threat intelligence. The SCTIAs focus their efforts on processing indicators of compromise from known attacks, emerging cyber threats, current events and their potential cyber impacts, threat actors, threat actor tools and techniques, motivations of threat actors, and malware, etc. The SCTIA will need to use intelligence processes and tools to work all of this threat information to develop intelligence products that are useful to leadership and cyber security analysts in the security operations center, incident responders, hunt teams, vulnerability management, etc.?

The SCTIA will need to build and maintain a deep understanding of business operations and environment in order to determine the relevance of the threat information, and well as the vectors adversaries may use to attack. The SCTIA will provide direct support and assist in investigations conducted by cyber incident responders, physical security, security operations center, hunt teams, insider threat, legal, etc.?

Responsibilities include, but are not limited to:

Demonstrate and apply subject matter expertise in a variety of information security disciplines, both technical and non-technical

Responsible for the collection, processing, analysis, and production of tactical, operational, and strategic intelligence throughout the organization

Prioritize work, collate information from various sources, and move swiftly toward strong analytical conclusions

Help develop and maintain CTI processes, procedures, playbooks, etc.

Develop, maintain, and execute the threat communication / product distribution processes

Author professional looking reports that can be clearly understood by technical, non-technical, and executive consumers based on the audience

Accept and incorporate intelligence product feedback from consumers and stakeholders

Accept editorial input from the CTI Manager and higher

Readiness to defend analysis in the face of opposing opinions

Employ predictive analytic methods to determine changes in adversary's capabilities, motivations, and intent, while providing recommendations to reduce risk before exposure to threats occur

Use intelligence tools to hunt large sets of data to find threat activity and analyze it.

Provide direct analytic support to the security operations teams providing context to active risks and threats using intelligence

Work individually, with a team, and in a hybrid managing services environment utilization various partners in dynamic ways

Help prioritize and lead cases, investigations, daily work tasks, and projects with management guidance

Mentor junior analysts

Requirements

7+ years' experience in an intelligence role with 3+ years in cyber threat intelligence role

Bachelor's Degree in computer science, engineering, computer information systems, or 5+ years of experience in an information security-related field

Security certifications such as CISSP or SANS preferred

Strong verbal and written communication and presentation skills

In-depth knowledge of IT

Expertise in understanding and applying the intelligence lifecycle

Intelligence analysis tradecraft skills

Strong experience in vulnerability, exploitation, penetration testing concepts

Strong experience with information security, host- and network-based forensics, monitoring, detection, and incident response best practices

Strong experience in computer intrusions, malicious code, and technical aspects of associated threat vectors, adversarial TTPs, and their relation to the cyber kill chain

In-depth knowledge of the general cyber threat landscape coupled with the ability to quickly determine how threats can or will affect an organization, based on factors such as confidence, likelihood, impact, and probability.

Understanding the MITRE attack framework.

Working knowledge of intelligence analysis applications, tools, and systems and the ability to use them on datasets to analyze threats Ability to lift 25 lbs. and detect color coded events

?Desired Skills and Experience

Five or more years of direct experience actively managing/using threat intelligence to reduce risk and threat exposure

Exposure to assessing technical intelligence collection and analytic products, including behavioral analysis and reverse engineering outputs from researcher teams or automated sandbox testing

Familiarity with various technologies such as SIEM, IDS/IPS, Proxy, endpoint and enterprise incident management systems, as well as applications such as Microsoft Office, ServiceNow, or comparable products

Knowledge of the cyber threat landscape for manufacturing, brokerage services, business operation, research, supply chain, transportation, etc. on a global scale

Familiarity with world events, geo-politics, etc. and how they often influence the cyber threat.

Familiarity with insider threat investigations and programs.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.