Search jobs > Washington, DC > Cyber threat analyst

Sr. Cyber Threat Intelligence Analyst

Trustwave
Washington, District of Columbia, US
Full-time

Trustwave is a leading cybersecurity and managed security services provider focused on threat detection and response. We uncover threats that others can’t and respond quicker than others can to protect against the devastating impacts of cyberattacks.

We’re a world-class team of cyber consultants, threat hunters and researchers serving clients in 96 countries. At Trustwave, you can learn alongside the best, make a personal impact on a global scale, and solve new challenges every day.

Learn more about us at Trustwave.

A Cyber Threat Intelligence Analyst is a member of the TDR SpiderLabs Applied Intelligence (SLAI) team within Trustwave Managed Security Services (MSS).

The mission of this MSS team is to collect, curate and operationalize cyber threat intelligence (CTI) for internal security operations services teams.

This team will provide advisory support to internal Trustwave stakeholders and lead the MSS organization active response and emerging threat functions as it relates to newly discovered incidents, threat campaigns, recently discovered 0-days, and geo-political events that may have significant impact to Trustwave MSS clients.

Responsibilities include but not limited to :

  • Source and execute an intel curation methodology to identify, classify and prioritize threats from internal sources, 3rd-party, OSINT, DarkINT, social, etc.
  • Maintain the MSS Threat Intelligence Platform.
  • Provide advisory support and reporting on threat actors, groups and campaigns to internal teams.
  • Manage and respond to emerging threat activity for MSS.
  • Develop actionable threat intelligence; both tactical and operational.
  • Execute proactive threat actor tracking and build a portfolio of threat profiles and trends from MSS activity.
  • Apply intelligence through collaboration with peers to create use cases and detection rules for MSS.
  • Perform periodic cyber advisory presentations for Trustwave teams.

Key Qualifications :

  • Complex critical thinking and security analysis skills.
  • Advanced written and verbal communication skills for a wide array of audiences.
  • Ability to communicate technical risk details into easy-to-understand language.
  • Knowledge of intelligence lifecycle.
  • Solid understanding of MITRE ATT&CK, Diamond model, NIST and other relevant frameworks.
  • Ability to prioritize and execute tasks in a high-pressure environment.
  • Experience working in a team-oriented and collaborative environment including cross-functional collaboration.

Skills & Knowledge Requirements :

Maximise your chances of a successful application to this job by ensuring your CV and skills are a good match.

Must have intermediate skills / knowledge in some of the following :

  • 1 2 years’ experience using and maintaining MISP or similar TIP solutions.
  • Minimum of 2-years’ experience producing threat intelligence, tracking cyber threats, incident response and / or threat hunting with a focus on attacker TTPs and attribution.
  • Understanding of STIX / TAXII.
  • Scripting, Python, and API experience.
  • 1-3 years of SIEM experience with Microsoft Sentinel, Splunk, IBM Qradar or other platforms.
  • 1-3 years of EDR experience with solutions from Microsoft, Palo Alto Networks, Sentinel One, Trellix, Crowdstrike or other platforms.
  • Unix / Linux and Windows system administration.
  • Excellent analytical thinking and problem-solving skills.
  • Superb incident management and incident response skills.
  • Strong oral and written communication skills.
  • Self-managed and team oriented.
  • Deadline and detail oriented.
  • Highly motivated with excellent teaming and customer service skills.

Preferred :

  • Intermediate to advanced experience in Information Security related areas like CTI, SIEM, EDR, or DFIR.
  • Certified in Security related Industry, Vendor or Professional Certification- Certified Threat Intelligence Analyst, GCTI, Security+, etc.

Education :

  • A high school diploma or equivalent is required; a college or university degree is a plus.
  • This is a remote opportunity open to anyone legally authorized to work in the United States. Guided by our flexible workplace philosophy, 'Moments That Matter', people gather in the office when in-person interaction is most impactful;

full-time remote employees may be asked to travel occasionally based on the needs of the team and the business.

Per Federal government contracting requirements, candidate must be a US citizen, as well as potentially pass and maintain a National Agency Check with Local Agency and Credit Checks (NACLC).

Trustwave is an Equal Opportunity Employer. We're committed to treating everyone with respect, one of our core TRUST Values, and strive to create a culture that empowers all Trustees to be their best, most authentic selves.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.

To All Agencies :

Please, no phone calls or emails to any employee of Trustwave outside of the Talent Acquisition team. Trustwave’s policy is to only accept resumes from agencies via the Trustwave Agency Portal.

Agencies must have a valid fee agreement in place and they must have been assigned the specific requisition to which they submit resumes, by the Talent Acquisition team.

Any resume submitted outside of this process will be deemed the sole property of Trustwave and in the event a candidate is submitted outside of this policy is hired, no fee or payment of any kind will be paid.

J-18808-Ljbffr

9 days ago
Related jobs
Promoted
VirtualVocations
Washington, District of Columbia

A company is looking for a Senior Intelligence Analyst - Cyber Security. ...

Promoted
Booz Allen Hamilton
Washington, District of Columbia

Processes and analyzes cyber threat intelligence data relating to the Defense Industrial Base (DIB), and compiles standard and ad-hoc reports as needed. Leverages expertise of cyber data and information, analyzes and identifies data requirements, uses specialized tools and services, and develops int...

Promoted
VirtualVocations
Washington, District of Columbia

A company is looking for a Cyber Security Threat Intelligence Specialist. ...

Promoted
Booz Allen Hamilton
Washington, District of Columbia

Cyber All-Source Intelligence Analyst, Mid. Join our team as a cyber all-source intelligence analyst. Our clients need skilled analysts to turn reams of data into actionable intelligence for our government and military every day. If you have strong analytical skills and a problem-solving mindset, ar...

Promoted
VirtualVocations
Washington, District of Columbia

A company is looking for a Principal Threat Intelligence Analyst to oversee security incidents and enhance security measures. ...

Promoted
American Bureau of Shipping
Washington, District of Columbia

The Threat Analysis team combines threat information with vulnerability and consequence information to develop stand-alone risk assessments and/or those which support broader supply chain related assessment and risk reduction activity. ABS Group is currently searching for enthusiastic, highly motiva...

Booz Allen Hamilton
Washington, District of Columbia

Work as a member of a threat intelligence team responsible for understanding how emerging cyber threats impact the client organization while conducting highly detail-oriented security threat analysis and working with clients to validate and characterize threats. Cyber Threat Intelligence Analyst. Kn...

JPMorgan Chase & Co.
Washington, District of Columbia

As a Threat Intelligence Analyst at JPMorgan Chase within the Cybersecurity Technology and Controls, Cybersecurity Intelligence Group, you play an essential role in defending the firm against sophisticated cyber threats. The Cybersecurity Intelligence Group (CIG) holds the global mandate for JPMC’s ...

Syntelligent Analytic Solutions
Washington, District of Columbia

Possess subject matter expertise in cyber threat actor tactics, techniques, and procedures as well as cybersecurity in order to research, analyze, and draft all-source intelligence assessments and briefings. Tasks will include supporting the Cyber Mission Center by providing:. Intelligence analysis ...

Cyber Crime
Washington, District of Columbia

Incorporate agile, threat intelligence-driven or hypothesis-based threat hunting, and the MITRE ATT&CK framework to identify and prioritize development of missing or ineffective detection capabilities to detect, prevent, and respond to cyber events originating from threat actors. Perform Hypothe...