Finding the best job has never been easier
Share
Regular or Temporary:
English (Required)
1st shift (United States of America)
Essential Duties and Responsibilities
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
Build and maintain threat profile library based on accepted intelligence requirements, threat models, and available Cyber Defense controls
Collect, Analyze intelligence using variety of sources and platforms
Track how threat intelligence is applied by teams responsible for each domain of Cyber Defense to reduce risk
Build and execute workflows that enable Collection, Analysis and disposition of Threat Intelligence into Threat Management
Participate in a rotation to conduct stakeholder briefings, gather feedback and new requirements for continuous improvement
Collaborate on intelligence team products and responding to stakeholder RFIs
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Bachelor’s degree in Computer Science or related field or equivalent education and related training
Five years of experience in Cybersecurity or related work
Broad knowledge of general IT with mastery of one or more of the following areas: operating systems, networking, computer programing, web development or database administration
Demonstrated advanced knowledge of cyber security operations with mastery of one or more of the following: attack surface management, Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider), vulnerabilities, and exploits; incident response, investigations and remediation
Experience with systems for automated threat intelligence sharing using industry standard protocols, such as Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indication Information (TAXII) Advanced knowledge of processes, procedures and methods to research, analyze and disseminate threat intelligence information
Ability to lead and persuade individuals and large teams on ideas, concepts and opportunities
Preferred Qualifications:
2-3 years of experience in mid-level Cyber Operations role at a US critical infrastructure and/or regulated private entity preferred (specializing in Threat intelligence, or threat hunting, etc.)
Industry certifications in cyber security, such as GIAC Cyber Threat Intelligence (GCTI), Certified Information Systems Security Professional (CISSP), GIAC Certified Intrusion Analyst (GCIA), and other related credentials
Information Technology certifications and/or experience with technology development or operations
Demonstrated experience with self-management of project deliverables to multiple stakeholders, collaborating with offensive security, threat detection, threat response and other operational security teams.
These jobs might be a good fit