All-In-One Scriptless Test Automation Solution!
Location:
Duration: 12 months contract with possible extension
Job Description
Pay Range: $60/hr – $67/hr. The pay rate may differ depending on your skills, education, experience, and other qualifications.
Featured Benefits:
- Medical Insurance in compliance with the ACA.
- 401(k).
- Sick leave in compliance with applicable state, federal, and local laws.
Responsibilities include:
- Develop and maintain priority intelligence requirements.
- Collect and maintain intelligence data.
- Analyze threat data and assess threat/risks to state and local government, and other partners.
- Identify tactics, techniques, and procedures (TTPs) used by threat actors.
- Use and maintain CTI tools and platforms.
- Collect and disseminate CTI, compile reports, and translate content into actionable activities for SOC analysts, threat hunters, IT staff, leadership, and other stakeholders. Coordinate and communicate CTI with external partners.
- Demonstrated technical knowledge of threat actor motives, targets, and tactics, and how to investigate, mitigate, and defend against them.
Candidate Requirements:
- Strong problem solving and critical thinking skills.
- Five years’ experience with threat intelligence and analytics techniques.
- Must be an individual of high integrity.
- Strong understanding of cyber security technologies and strategies, including MITRE ATT&ACK framework, attack surface management, security processes, best-practice logging/monitoring, OSINT, and incident response.
- Ability to work effectively with customers to solve business challenges while maintaining confidentiality, integrity, and availability.
- Understanding of common and emerging attack vectors, penetration methods, and countermeasures.
- Ability to work independently and as part of a multidisciplinary team.
- Takes initiative to develop threat intel products that align with the organization’s intel requirements.
- Ability to solve complex problems and convey instructions clearly while managing multiple tasks.
- Excellent communication and presentation skills for both technical and non-technical audiences.
- Ability to document and explain technical details concisely.
- Certified Information Systems Security Professional (CISSP), Certified Information Security Auditor (CISA), GIAC Security Essentials (GSEC), or other information security certification is preferred.