Threat Intelligence Analyst (Sr., Jr. Multiple Roles)

  • Full-time

Company Description

Regardless of the size of your HR staff, it always feels like you’re spending too much time searching for qualified candidates and reviewing resumes. We meet our clients’ IT staffing challenges by leveraging the collective experience and expertise of our recruitment team and consultant base.


Job Description

Description:

The ideal candidate for this job will be an experienced information security practitioner who is goal-oriented and strives to exceed expectations.

Salary based on the candidate’s qualifications as they relate to the skills, experience and responsibility requirements for the position.

What you’ll be responsible for:

-Develops models for identifying incident-type activity, of malware or bad actors, using statistical analysis

- Reviews incident logs/records mining for patterns

- Researches Internet sources and threat intelligence feeds and try to find evidence in customer logs

- Explores patterns in network and system activity through log correlation using Splunk and other tools

- Investigates evidence of threats against Windows, Linux, Database, Applications, web servers, firewalls or other relevant technologies

- Tests models by injecting indicators

-Share IOC models with trusted parties for validation and collaboration.

- Guide junior threat analysts.

- Support shift work (1st, 2nd, or 3rd shift) as assigned

What’s Required:

- Must be eligible to obtain a sensitive clearance – Position of Public Trust – and may be required to obtain a higher security clearance

- 6+ years of relevant work experience for an E04

- 8+ years of relevant work experience for an E05

- Statistical modeling and analysis experience to infer possible cybersecurity threats

- Experience in analysis in investigations, such as in IT, law enforcement, military intelligence, or business analytics

-Knowledge of networking protocols

- Interest in learning about Windows, Linux, Database, Application, Web server, firewall, SIEM etc. log analysis

- Verbal/written communication and interpersonal skills to effectively communicate with team-members

- Must be highly motivated with the ability to self-start, prioritize, multi-task and work in a team setting

- Digital analysis and forensics experience using Encase, Palantir, i2 Analyst’s Notebook, FTK or similar tools or extensive statistical analysis tool experience (including extensive use of MS Excel)

What you’ll need:

- Demonstrable interest in learning SQL and shell scripting

- Demonstrable interest in learning some programming skills

- Familiarity with common network vulnerability/penetration testing

- Experience with testing automation suites such as Selenium

- Experience evaluating systems and network devices and enterprise networks for IA vulnerabilities

- Experience evaluating enterprise networks for IA/security vulnerabilities

- Splunk query-development expertise

- Experience on an Incident Response team performing Tier I/II initial incident triage.

- Excellent writing skills


Qualifications

Required Education:

Bachelor of Science Degree with a major in Computer Science/Computer Engineering, Engineering, Science or a related field. Two years of related work experience may be substituted for each year of degree-level education.

Desired Certifications:

DODI 8570.1-M Compliance at IAT Level II;CISSP Preferred

Certified Ethical Hacker (C EH), SFCP, GCIA

Clearance Type Required:

Public Trust Current

Expertise:

Cyber Jobs

Information and Knowledge Systems

Additional Information

All your information will be kept confidential according to EEO guidelines.