Threat Intelligence Analyst (Sr., Jr. Multiple Roles)
We meet our clients’ IT staffing challenges by leveraging the collective experience and expertise of our recruitment team and consultant base.
Description:
The ideal candidate will be an experienced information security practitioner who is goal-oriented and strives to exceed expectations.
Salary will be based on the candidate’s qualifications, skills, experience, and responsibility requirements.
Responsibilities:
- Develop models for identifying incident-type activity, malware, or bad actors using statistical analysis.
- Review incident logs and records to identify patterns.
- Research Internet sources and threat intelligence feeds to find evidence in customer logs.
- Explore patterns in network and system activity through log correlation using Splunk and other tools.
- Investigate threats against Windows, Linux, databases, applications, web servers, firewalls, or other relevant technologies.
- Test models by injecting indicators.
- Share IOC models with trusted parties for validation and collaboration.
- Guide junior threat analysts.
- Support shift work (1st, 2nd, or 3rd shift) as assigned.
Requirements:
- Eligibility to obtain a sensitive clearance – Position of Public Trust – and possibly higher security clearances.
- 6+ years of relevant experience for an E04; 8+ years for an E05.
- Experience in statistical modeling and analysis related to cybersecurity threats.
- Experience in investigations within IT, law enforcement, military intelligence, or business analytics.
- Knowledge of networking protocols.
- Interest in learning about Windows, Linux, Database, Application, Web server, firewall, SIEM log analysis.
- Effective verbal and written communication skills.
- Highly motivated with the ability to self-start, prioritize, multitask, and work in a team.
- Experience with digital analysis and forensics tools like Encase, Palantir, i2 Analyst’s Notebook, FTK, or similar, or extensive statistical analysis tools (including MS Excel).
Additional Skills:
- Interest in learning SQL and shell scripting.
- Interest in learning programming skills.
- Familiarity with network vulnerability and penetration testing.
- Experience with automation testing suites like Selenium.
- Experience evaluating systems and networks for vulnerabilities.
- Experience on an Incident Response team performing Tier I/II incident triage.
- Excellent writing skills.
Education:
Bachelor’s degree in Computer Science, Engineering, Science, or related fields. Two years of related experience may substitute each year of education.
Certifications:
- DODI 8570.1-M Compliance at IAT Level II; CISSP preferred.
- Certified Ethical Hacker (CEH), SFCP, GCIA.
Clearance:
Public Trust current.
All information will be kept confidential according to EEO guidelines.