Cyber Threat Intelligence Analyst, Mid
Booz Allen
Engineering & Technology
Job Summary
As a cyber threat intelligence analyst on our team, you’ll be trusted to collect, document, assess, and analyze raw cyber threat information using tools, technologies, and industry standards like threat intel platforms, intelligence collection platforms, and MITRE ATT&CK; Framework to enrich intelligence. You’ll help conduct strategic assessments on systems and networks and provide tactical analyses and influential recommendations for network operation. You’ll be the key to discovering and correlating timely threat intel and deciphering what represents a real risk, and you’ll play an active role in incident analysis, adversarial research, packet analysis, dynamic malware analysis, and finished intelligence products to inform policymakers, cyber operators, and mission area leadership.
- Minimum Qualification: Degree
- Experience Level: Mid level
- Experience Length: 2 years
Job Description/Requirements
Basic Qualifications:
- 2+ years of experience in cyber threat intelligence, intelligence analysis, or data science and analysis
- Experience collaborating with multiple internal and external stakeholders to gather data and intelligence, analyze, vet, and enrich the intelligence, create joint reports, and share with entities
- Experience with Threat Intel Platforms (TIP), including threat data repositories such as MISP
- Knowledge of cyber threats, open-source research, and nation state actors
- Ability to write succinct briefings, presentations, and reports to convey analysis, threat trends, threat actor profiles, indicator bulletins, vulnerability details, and defensive strategies
- TS/SCI clearance
- Bachelor’s degree
Nice If You Have:
- Experience supporting a Security Fusion Center or Cyber Fusion Center (SFC/CFC), or Security Operations Center (SOC) operations
- Experience working in a fast-paced, cyber threat or analysis center, promptly responding to critical mission needs as needed
- Knowledge of threat intelligence research and data enrichment, including performing WhoIs or DNS lookups and querying existing threat repositories and new sources for additional data correlation
- Knowledge of current and emerging cyber adversaries and their TTPs
- Knowledge of threat modeling and adversary tactics and techniques frameworks such as MITRE ATT&CK matrices, Cyber Kill Chain, STRIDE, and PASTA
- Ability to adopt adversary perspective, analyzing targeted cyberspace to predict adversary courses of action in support of tactical to operational planning efforts
- GCTI, GSEC, SEC+, or CEH Cybersecurity Certifications
Important Safety Tips
- Do not make any payment without confirming with the Jobberman Customer Support Team.
- If you think this advert is not genuine, please report it via the Report Job link below.