Threat Intelligence Analyst III

security engineer, threat detection, penetration testing, information security
Full Time
$105,000 - $120,000
Work from home available

Job Description

THIS ROLE IS 100% REMOTE.

Responsible for protecting the company from dynamic and evolving threats. Monitors and researches emerging and advanced information security threats, as well as assesses customer data, investigating repeating trends, attacks, malicious intellectual properties, and other abnormalities. Minimizes data exposure risks by meeting all company and regulatory requirements while developing and implementing business solutions.

GENERAL DUTIES & RESPONSIBILITIES
 

  • Detects and analyzes threat activity for the identification of advanced persistent threats and malware in real-time while also researching emerging threats.

  • Investigates and analyzes events possible incidents that target the company and pose an imminent risk to the company, its employees and customers.

  • Plans, directs and facilitates response and recovery activities in response to a threat.

  • Provides operational briefings and threat intelligence reports that provide a complete interpretation of the risk to the company and clients.

  • Conducts scan reviews and provides recommendations to management regarding filters, blocking, vulnerability remediation, etc.

  • Research hackers and hacker techniques and provide detailed briefings and intelligence reports to management.

  • Conduct analysis of intelligence data as it pertains to the security of the Client.

  • Collaborate with intrusion analysts to identify, report on, and coordinate remediation of threats to the company and its clients.

  •  

    Conducts Security vulnerability assessments of Web, Desktop Applications, and Web Services.

  • Performs other related duties as assigned.

EDUCATIONAL GUIDELINES
Bachelor’s Degree in Computer Science, Information Systems, Computer Engineering or the equivalent combination of education, training, or work experience. Professional certification such as CISSP, GXPN, GWAPT, GPEN, GWEB, GSSP, or CEH is preferred.

GENERAL KNOWLEDGE, SKILLS & ABILITIES
 

  • Ability to evaluate information security risk implications 

  • Knowledge of relevant legal and regulatory requirements

  • Knowledge of common information security management frameworks

  • Experience working with a diverse range of data sources/streams and managing these effectively

  • Excellent analytical, decision-making and problem-solving skills with proficiency in project management

  • Strong understanding of developing and deploying analytical tools and technologies to cybersecurity challenges

  • Ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, defend the analysis, and apply attribution to cyber threat activity

  • Knowledge of hacker methodologies and tactics, system vulnerabilities and key indicators of attacks and exploits

  • Knowledge of common application vulnerabilities (OWASP Top 10)

  • Ability to build intrusion-related data visualizations and perform analysis

  • Knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch, open source information collection, etc.)

  • Ability to develop partnership-oriented relationships with business executives and functional leaders

  • Strong background in security operations, process, solutions and technologies

  • Strong knowledge in Secure Software Development and Secure Coding best practices

  • Strong understanding of policy, compliance, and best practice security principles

  • Working knowledge of Linux, Windows, and Network Operating Systems

  • Experience with current cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks  

  • Experience with network intrusion detection and response operations

  • Knowledge of infrastructure, key processes, and technology-oriented risk issues, specifically around security and privacy 

  • Experience with enterprise risk assessment methodologies

  • Must be able to multitask in a fast-paced environment with focus on timeliness, documentation, and communications with peers and business users alike

  • Ability to communicate well both verbally and in writing to technical and non-technical audiences of various levels within Black Knight or outside the organization (executives, regulators, clients, etc.)

  • Results oriented, business focused, and successful at interfacing across multiple organizational units

Threat Intelligence Analyst III

Advanced professional role. Performs work that is moderate to highly complex and varied in nature. Develops integrated solutions to resolve technical and business issues. Provides direction, guidance and integration of services. May lead multiple IT security projects or participate as a team member. Works on small to large, moderately complex security issues or projects that require expertise in multiple IT functional areas. Requires significant knowledge of security issues, techniques and implications across all existing computer platforms. May serve as a project leader for IT security projects or the security components of multi-discipline projects. Must have significant knowledge in networking, databases, systems and/or Web operations. May coach and guide more junior staff. Typically requires six (6) or more years of combined IT and security work experience with extensive exposure conducting network security vulnerability assessments, penetration testing, or other related experience using advanced networking tools and security solutions as well as non-traditional techniques and methodologies and at least four (4) or more years of experience intelligence collection, analysis, and reporting process/procedures.

Dice Id : TRIADTOR
Position Id : 7205417
Originally Posted : 2 months ago
Have a Job? Post it