Job Description
Job Description
Position Description :
The Cybersecurity Threat Intelligence (CTI) Analyst will possess an understanding of cyber threats from espionage, hacktivism, cybercrime, malware, social engineering, geo-political influence, nation state and non-state actors, established and emerging intrusion sets and their relevance to an entity with a global footprint.
The Analyst will produce a variety of threat intelligence reporting for stakeholders ranging from the C-Level to technical Incident Response Analysts.
As a Cybersecurity Threat Intelligence Analyst, you will :
- Leverage the threat intelligence lifecycle and priority intelligence requirements to track threat actors, research cyber threats, conduct analysis and create threat intelligence reporting to support Cyber Intelligence Centre's internal customers
- Produce a variety of intelligence reporting from technical audiences to the executive level
- Analyze external technical and non-technical data from various intelligence sources (paid, open and closed) to build threat actor profiles and track threat actor activities both externally and internally
- Research new and emerging vulnerabilities, threat actor's tactics, techniques, and procedures, and conduct threat hunting within the company’s environment for the presence of related activity
- Collaborate with members of the Threat Intelligence team on emerging threats, cyber threat actor's activities, targeting and operational tempo
- Prepare and deliver intelligence briefs to a variety of audiences
Qualifications : Required :
Required :
- Minimum of 5 years’ experience in cyber threat intelligence or a related field
- Bachelor’s degree in a related field such as cybersecurity, computer science, information systems, communications, or a Bachelor’s in an unrelated field with relevant work experience
- Certifications such as CompTIA certifications and GIAC certifications are a plus
- Mature understanding of the threat landscape as it pertains to the energy industry
- Previous use of structured analytic techniques such as, but not limited to, analysis of competing hypothesis
- Experience providing support to incident response, vulnerability management, and risk management teams
- Skilled in critical thinking and reasoning to take multiple sources of information and come to conclusions
- Strong oral and written communication skills - quick turnaround of concise, well-reasoned material
- Ability to research using Kusto Query Language, Splunk indexes, and / or similar tools
- Ability to start and bring projects to completion
- Ability to apply artificial intelligence tools, such as Microsoft CoPilot, to your work
Employee Benefits :
- Competitive salary for well qualified applicants
- 401(k) plan
- Annual performance bonus
- Certification and advanced degree attainment bonuses
- Student Loan / Tuition reimbursement
- Health Care Insurance (medical, dental, vision)
- Up to four weeks of paid vacation
- 11 Federal Holidays, and 3 Floating Holidays
- Team bonding events
Location :
This position offers a hybrid work schedule (two days per week in the office) and every other Friday off.
RedTrace Technology is an EOE employer.
Powered by JazzHR
PtHnagBbXv