Sr. Cyber Threat Intelligence Analyst

Remote: 
Full Remote
Contract: 
Work from: 

Offer summary

Qualifications:

8 years of experience in cyber threat analysis, including malware and phishing campaigns., Proficient in collecting and aggregating threat intelligence from various sources, including OSINT and dark web., Strong written and oral communication skills for producing reports and presentations., Bachelor’s degree in Cybersecurity preferred, with Security+ certification required..

Key responsabilities:

  • Identify emerging cyber threats and vulnerabilities from various intelligence sources.
  • Conduct in-depth analysis of threat intelligence data to detect patterns and indicators of compromise.
  • Produce reports and briefings to communicate findings and recommendations to stakeholders.
  • Collaborate with teams to enhance cyber threat intelligence capabilities and respond to potential security incidents.

cFocus Software Incorporated logo
cFocus Software Incorporated Information Technology & Services SME https://cfocussoftware.com/
11 - 50 Employees
See all jobs

Job description

cFocus Software seeks a Senior Cyber Threat Intelligence Analyst to join our program supporting AOUSC. This position is fully remote. This position requires active Public Trust clearance.

Qualifications:
  • 8 years’ experience in conducting in-depth analysis of cyber threats, including malware, phishing campaigns, and other attack vectors. This involves identifying patterns, trends, and indicators of compromise (IOCs) to understand threat actor tactics, techniques, and procedures (TTPs).
  • 8 years’ experience in collecting and aggregating threat intelligence from various sources, such as opensource intelligence (OSINT), dark web forums, and commercial threat intelligence feeds. This includes evaluating the credibility and relevance of intelligence sources and identifying actionable intelligence for the organization.
  • 8 years’ experience in producing high-quality written and oral reports, briefings, and presentations to communicate threat intelligence findings, assessments, and recommendations to stakeholders at all levels of the organization.
  • 5 years working in an office environment with technical IT personnel.
  • 5 years of experience with Microsoft Office Tools such as Word, PowerPoint, Excel, and OneNote
  • 5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools.
  • Bachelor’s degree in Cybersecurity preferred
  • Security + is required and Network + or equivalent is preferred


Duties:
 
  • Identify emerging cyber threats, vulnerabilities, and attack trends based on information from various sources, including open-source research, dark web forums, and threat intelligence feeds.
  • Conduct in-depth analysis of cyber threat intelligence data to identify patterns, trends, and indicators of compromise (IOCs) associated with potential cyber-attacks. This includes analyzing malware samples, phishing emails, and other threat artifacts to understand threat actor TTPs.
  • Produce high-quality written and oral reports, briefings, and presentations to communicate cyber threat intelligence findings, assessments, and recommendations to senior leadership, stakeholders, and technical teams in a clear and actionable manner.
  • Proactively search for signs of malicious activity within the organization's network and systems utilizing threat intelligence to identify and investigate potential security incidents or anomalies.
  • Enhance the organization's cyber threat intelligence capabilities and methodologies in accordance with the latest cybersecurity threats, trends, and technologies.
  • Contribute to the development of cybersecurity strategies, policies, and procedures based on threat intelligence insights and analysis, helping to prioritize security investments and initiatives to mitigate emerging threats effectively.
  • Provide mentorship, guidance, and training to other contractor’s employees, including sharing knowledge and best practices to build a skilled and cohesive cyber threat intelligence team.
  • Participate in information sharing initiatives and collaborate with industry peers, government agencies, and cybersecurity communities to exchange threat intelligence and enhance collective cyber defense capabilities.
  • Collaborate with vulnerability management teams to prioritize and assess the severity of vulnerabilities based on threat intelligence data, enabling informed decisions on patching and remediation efforts.
  • Provide written recommendations on Government drafts of executive summaries and briefings.
  • Provide recommendations and input on other content and presentations.
  • Incorporate data from Mandiant, federal partners, and other vendors to expand threat awareness and bolster proactive defense strategies.
  • Examine malware samples from diverse sources using reverse engineering techniques to uncover capabilities, origins, and threat actor methodologies.
  • Detect and study emerging vulnerabilities, attack trends, and threat patterns through internal data, open-source intelligence, and integrated feeds from trusted platforms.
  • Use Splunk and other tools to identify unusual activities, create actionable alerts, and monitor potential security incidents in real time.

Required profile

Experience

Industry :
Information Technology & Services
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Microsoft Office
  • Collaboration
  • Communication
  • Problem Solving

Cyber Threat Intelligence Analyst Related jobs