Overview
On Site
Contract - W2
Contract - Independent
Skills
IT Service Management
Recruiting
Project Management
Application Development
Cyber Security
Advanced Analytics
Agile
Distribution
Editorial
Security Operations
Mentorship
Computer Science
Information Systems
CISSP
SANS
Communication
Presentations
Penetration Testing
Information Security
Network
Forensics
Probability
Intelligence Analysis
Management
Threat Analysis
Intelligence Collection
Analytical Skill
Reverse Engineering
Testing
SIEM
IDS
IPS
Proxies
Incident Management
Microsoft Office
ServiceNow
Manufacturing
Brokerage
Research
Supply Chain Management
Job Details
Title: Senior Cyber Threat Intelligence Analyst (SCTIA)
ALTA is supporting a 6-month contract opportunity working onsite in Erlanger, Kentucky.
ALTA IT Services is a wholly owned subsidiary of System One, a leading provider of specialized workforce solutions and integrated services. ALTA is an established leader in IT Staffing and Services, for both government and commercial enterprises across the United States, specializing in Program & Project Management, Application Development, Cybersecurity, Data & Advanced Analytics, and Agile Transformation Services.
Responsibilities include, but are not limited to:
Requirements:
Desired Skills and Experience:
Ref: #860-IT Cincinnati
ALTA is supporting a 6-month contract opportunity working onsite in Erlanger, Kentucky.
ALTA IT Services is a wholly owned subsidiary of System One, a leading provider of specialized workforce solutions and integrated services. ALTA is an established leader in IT Staffing and Services, for both government and commercial enterprises across the United States, specializing in Program & Project Management, Application Development, Cybersecurity, Data & Advanced Analytics, and Agile Transformation Services.
Responsibilities include, but are not limited to:
- Demonstrate and apply subject matter expertise in a variety of information security disciplines, both technical and non-technical
- Responsible for the collection, processing, analysis, and production of tactical, operational, and strategic intelligence throughout the organization
- Prioritize work, collate information from various sources, and move swiftly toward strong analytical conclusions
- Help develop and maintain CTI processes, procedures, playbooks, etc.
- Develop, maintain, and execute the threat communication / product distribution processes
- Author professional looking reports that can be clearly understood by technical, non-technical, and executive consumers based on the audience
- Accept and incorporate intelligence product feedback from consumers and stakeholders
- Accept editorial input from the CTI Manager and higher
- Readiness to defend analysis in the face of opposing opinions
- Employ predictive analytic methods to determine changes in adversary's capabilities, motivations, and intent, while providing recommendations to reduce risk before exposure to threats occur
- Use intelligence tools to hunt large sets of data to find threat activity and analyze it.
- Provide direct analytic support to the security operations teams providing context to active risks and threats using intelligence
- Work individually, with a team, and in a hybrid managing services environment utilization various partners in dynamic ways
- Help prioritize and lead cases, investigations, daily work tasks, and projects with management guidance
- Mentor junior analysts
Requirements:
- 7+ years' experience in an intelligence role with 3+ years in cyber threat intelligence role
- Bachelor's Degree in computer science, engineering, computer information systems, or 5+ years of experience in an information security-related field
- Security certifications such as CISSP or SANS preferred
- Strong verbal and written communication and presentation skills
- In-depth knowledge of IT
- Expertise in understanding and applying the intelligence lifecycle
- Intelligence analysis tradecraft skills
- Strong experience in vulnerability, exploitation, penetration testing concepts
- Strong experience with information security, host- and network-based forensics, monitoring, detection, and incident response best practices
- Strong experience in computer intrusions, malicious code, and technical aspects of associated threat vectors, adversarial TTPs, and their relation to the cyber kill chain
- In-depth knowledge of the general cyber threat landscape coupled with the ability to quickly determine how threats can or will affect an organization, based on factors such as confidence, likelihood, impact, and probability.
- Understanding the MITRE attack framework.
- Working knowledge of intelligence analysis applications, tools, and systems and the ability to use them on datasets to analyze threats
- Ability to lift 25 lbs. and detect color coded events
Desired Skills and Experience:
- Five or more years of direct experience actively managing/using threat intelligence to reduce risk and threat exposure
- Exposure to assessing technical intelligence collection and analytic products, including behavioral analysis and reverse engineering outputs from researcher teams or automated sandbox testing
- Familiarity with various technologies such as SIEM, IDS/IPS, Proxy, endpoint and enterprise incident management systems, as well as applications such as Microsoft Office, ServiceNow, or comparable products
- Knowledge of the cyber threat landscape for manufacturing, brokerage services, business operation, research, supply chain, transportation, etc on a global scale
- Familiarity with world events, geo-politics, etc. and how they often influence the cyber threat.
- Familiarity with insider threat investigations and programs.
Ref: #860-IT Cincinnati
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.