Our client is an innovator of disruptive cybersecurity solutions. Their managed service operationalizes billions of threat indicators in real-time to prevent over 90% of known threats against enterprise networks. Reducing their customer's cybersecurity risks and enabling their security operations to be more proactive, focused, and efficient.
Become part of a rapidly growing and successful organization focused on today's emerging cyber security threats. You are an independent, solution-oriented analyst skilled in using data to solve analytical problems and adept in satisfying intelligence requirements under tight deadlines. You have a strong analytical background, and practical experience in cyber intelligence reporting, and want to be at the forefront of threat intelligence.
Responsibilities:
· Perform daily analytical activities including threat hunting within a SIEM for malicious activities, knowledge of current cyber-attack campaigns, as well as frequency and trending analysis
· Technically review information into objective facts and supportable conclusions
· Evaluate information collections for viable threat intelligence
· Convey both verbally and in writing the importance and relevance of findings
· Secure additional sources of threat intelligence as needed
Requirements:
· Bachelor’s degree with an emphasis on analytical/quantitative work, or equivalent experience
· Ability to deliver fact-based communications, both verbally and in writing
· Ability to successfully interface and establish rapport with internal operations personnel
· Knowledgeable in the following areas: information security, information assurance, incident response, proactive services, and remediation
· Solid understanding of current information security challenges and solutions
· Familiarity with information security, risk management and information assurance
· Ability to perform analysis based on gathered internal sources and open-source collections
Additional Qualifications:
· Technical background in incident response, information technologies or network defense techniques
· Familiarity with evaluating large data for patterns and anomalies