Principal Cybersecurity Engineer – Advanced Cyber Threat Team - Threat Hunter/Intel
By Liberty Mutual At , Remote $144,900 - $189,600 a year
Experience with using a Security Information Event Management (SIEM) platform.
Coach and mentor junior team members to enhance and mature capabilities and team processes.
Serve as a Lead Responder on a global cybersecurity incident response team with a periodic on-call requirement.
Minimum 8+ years of recent experience working as a cybersecurity professional.
Active Cybersecurity certifications are desirable (but not required) such as GCIH, GREM, GCFA, GCTI, OSCP etc. (see list below).
Previous experience working in a Cyber Security Operations Center or similar function is desirable.
Cyber Threat Analyst, Mandiant
By Google At , New York, Ny
Experience in stakeholder management (i.e., presenting, reporting) to internal audiences.
1 year of experience in a Cyber Threat Intelligence (CTI) role in a customer-facing environment.
Experience with CTI methodologies and applications in one of the functional areas (e.g., Identify, Protect, Respond, and Recover).
Experience in managing and executing variable term projects for customers.
Perform strategic, tactical, and operational research and analysis of adversarial cyber threats.
Correlate intelligence, to develop understanding of tracked threat activity.
Cyberware Engineers | Cyber Threat Hunters
By Praxis Engineering At , Melbourne, Fl
Some exposure/experience with hardware breakdown, soldering, board analysis, or a strong desire to learn.
Attractive total compensation package to include competitive salary and medical benefits with an option for FREE employee HSA medical plan!
Training & Certifications: Splunk, AWS, Big Data/Cloudera, VMWare, Scrum Master...the list of certifications goes on and on!
Praxis University: Cyber Research, Data Analytics, IoT, AWS and RedHat course offerings and hands-on training.
Vaccination requirements will depend on the status of the federal contractor mandate and customer site
Embedded software developer proficient in C, C++, and comfortable reading/writing assembler, particularly but not limited to, x86, ARM.
Cyber Threat Analyst, Mandiant
By Google At New York, NY, United States
Experience in stakeholder management (i.e., presenting, reporting) to internal audiences.
1 year of experience in a Cyber Threat Intelligence (CTI) role in a customer-facing environment.
Experience with CTI methodologies and applications in one of the functional areas (e.g., Identify, Protect, Respond, and Recover).
Experience in managing and executing variable term projects for customers.
Perform strategic, tactical, and operational research and analysis of adversarial cyber threats.
Correlate intelligence, to develop understanding of tracked threat activity.
Security Engineer (Threat Detection)
By SpaceX At , Redmond, 98052, Wa $120,000 - $145,000 a year
Experience with modern security information and event management (SIEM) systems.
Research emerging adversary techniques and tooling, using the knowledge gained to build novel detections.
Experience with one or more of the following programming languages: Python, PowerShell, Go, C/C++, Rust.
Experience with operating system internals for Windows, Linux, and/or macOS.
Experience with offensive security frameworks and tooling.
Knowledge of cloud infrastructure and security implications of hybrid environments.
Cyber Threat Specialist Jobs
By Booz Allen Hamilton At El Segundo, CA, United States
Experience collaborating with multiple internal and external stakeholders to gather and analyze data and information
Knowledge of open-source research techniques and threat research resources
Experience working on major DoD space programs
If this position is listed as remote or hybrid, you’ll periodically work from a Booz Allen or client site facility.
Ability to obtain a security clearance
Scheduled to obtain a Bachelor's degree by Spring 2023
Cyber Threat Analyst Jobs
By Booz Allen Hamilton At , Alexandria, Va $58,400 - $133,000 a year
Knowledge of Information Systems Security or Cybersecurity
Knowledge of analytic threat models, including MITRE ATT&CK, Pyramid of Pain, Diamond Model, or Cyber Kill Chain
Knowledge of Advanced Persistent Threats (APTs)
IAT or IAM Level II Certification
Experience with the IC and its products, procedures, and computer networks
Experience with Packet analysis tools, including tcpdump, Wireshark, and ngrep
Cyber Threat Analyst Jobs
By Chainlink Labs At , Remote
Maintaining a working knowledge of adversarial tactics and techniques, and how they are being used to achieve current objectives
At least two years of experience in cyber threat analysis or threat investigations
Have a working knowledge of common cyber threat analysis frameworks
Prior experience using automated malware sandboxes, as well as interpreting their results to drive detection opportunities
Excellent verbal and written communication skills
Excellent overall computer skills, including the use of command line tools.
Threat Analyst, Cybercrime Jobs
By Tesla At Fremont, CA, United States
BS/MS in Computer Science, Information Systems, Electrical Engineering, or the equivalent in experience and evidence of exceptional ability
Knowledge of security systems and deep understanding the life cycle of network attacks, threats, attack vectors, and methods of exploitation
Experience with manual analysis of malware, phishing kits, network captures, exploits etc.
Experience writing rules and signatures using frameworks such as YARA, Snort, and Sigma Experience using platforms like ELK or Splunk
Family-building, fertility, adoption and surrogacy benefits
401(k) with employer match, Employee Stock Purchase Plans, and other financial benefits
Cyber Threat Intel Analyst
By Google At Virginia, United States
Experience with information security, cyber security and IT threats, attacks, and vulnerabilities
2 years of experience in an analytical role (network analyst, intelligence threat analyst, or security engineer/consulting)
Experience managing and executing on short-term and long-term projects
Experience working with commercial data sources (internet scan data, passive DNS, domain registry, malware repositories)
Experience with Incident Response, Enterprise security controls, and Intrusion Operations
Working knowledge of security solutions and technologies including Linux, Network architecture/implementation/configuration
Cyber Threat Intelligence Engineer
By Veeva Systems At United States
Author intelligence reports that address specific intelligence requirements and emerging threats
Collaborate across other Veeva teams on relevant intelligence of emerging vulnerabilities to prioritize and drive remediation efforts
Experience in delivering adversary-based metrics or authoring/contributing to threat intelligence reports
Strong experience in organizing, processing, analyzing, and vetting indicators using sorting/processing tools to maintain a current, relevant threat database
Experience in enriching data of the four atomic indicators (domains, strings, IP addresses, accounts) to deliver additional context to incident responders
Strong experience in leveraging existing threat intelligence to augment investigations during incident response
Cyber Threat Analyst Jobs
By IGA Talent Solutions At Washington DC-Baltimore Area, United States
To be considered you will need the following skills and experience:
Strong working knowledge of Splunk
Previous cybersecurity domain knowledge (cyber threat landscape, an understanding of network reconnaissance TTPs, malware, phishing, lateral movement, and data exfiltration)
Understanding of the cyber security threat landscape (reconnaissance, exploitation, malware, phishing, lateral movement, and data exfiltration),
Cyber Threat Analyst - $100-$140k
Cyber Security Threat Analyst
By BMC Software At ,
Coordinate and monitor, management of vulnerabilities reported by third-party pen-tests, third-party monitoring tools, and internal audits.
Bachelor’s/equivalent degree or higher in IT, CS, IS, with a focus in cybersecurity. Certifications a plus.
2+ years of experience in cybersecurity or information technology security role, with specialization in cyber threat intelligence.
Strong written, communication, and presentation skills along with the ability to work in a highly collaborative environment.
Understanding of the OWASP Top 10 vulnerabilities. Familiarity with 3rd party libraries and remediations.
Good deductive reasoning skills, creative thinker.
Threat Systems Engineer Jobs
By Gov Solutions Group At Huntsville, AL, United States
Analyze intelligence-based threat system performance to translate threat capabilities into written requirements for target vehicles.
Ability to generate and deliver briefings to external teams and management effectively.
Work within the Target Requirements Team and stakeholders to develop clear, concise, and unambiguous target requirements.
Analyze referent data to aid in requirements definition and compliance assessment.
Develop briefings suitable for explaining requirements, derivation decisions and calculations to external teams and internal leadership.
Brief internal leadership on requirements development, mission and trajectory analysis, and RCS and IR signatures.
Threat Analyst, Mandiant Jobs
By Google At United States
2 years of experience leading investigations into and generating novel leads on espionage activity.
Experience with writing and presenting on various topics and assessments for an audience with mixed backgrounds.
Experience correlating and attributing malicious activity based on technical and geopolitical factors.
Experience tracking adversaries via network infrastructure and malicious artifacts.
Experience developing tools to uncover targeted activity leveraging large data sets.
Experience identifying and prioritizing cyber threats for investigation.

Are you looking for a challenging and rewarding career in cyber security? Join our team as a Cyber Threat Analyst Engineer and help protect our organization from malicious cyber threats! As a Cyber Threat Analyst Engineer, you will be responsible for monitoring and analyzing cyber threats, developing security strategies, and implementing security solutions to protect our organization. If you have a passion for cyber security and a desire to make a difference, this is the job for you!

Overview A Cyber Threat Analyst Engineer is a professional who is responsible for identifying, analyzing, and responding to cyber threats. They use a variety of tools and techniques to detect, investigate, and mitigate cyber threats. They also develop and implement security policies and procedures to protect an organization’s network and data. Detailed Job Description A Cyber Threat Analyst Engineer is responsible for monitoring and analyzing network traffic for malicious activity, researching and responding to cyber threats, and developing and implementing security policies and procedures. They must have a deep understanding of cyber security principles and technologies, and be able to identify and respond to cyber threats quickly and effectively. They must also be able to communicate effectively with other members of the security team and other stakeholders. Job Skills Required
• Knowledge of cyber security principles and technologies
• Knowledge of network security protocols and tools
• Knowledge of malware analysis and reverse engineering
• Knowledge of security incident response processes
• Ability to identify and respond to cyber threats quickly and effectively
• Ability to communicate effectively with other members of the security team and other stakeholders
• Ability to work independently and as part of a team
• Ability to work under pressure and meet deadlines
Job Qualifications
• Bachelor’s degree in computer science, information security, or a related field
• Relevant certifications such as CISSP, CISM, or CEH
• At least 5 years of experience in cyber security
• Experience with network security protocols and tools
• Experience with malware analysis and reverse engineering
• Experience with security incident response processes
Job Knowledge
• Knowledge of cyber security principles and technologies
• Knowledge of network security protocols and tools
• Knowledge of malware analysis and reverse engineering
• Knowledge of security incident response processes
Job Experience
• At least 5 years of experience in cyber security
• Experience with network security protocols and tools
• Experience with malware analysis and reverse engineering
• Experience with security incident response processes
Job Responsibilities
• Monitor and analyze network traffic for malicious activity
• Research and respond to cyber threats
• Develop and implement security policies and procedures
• Identify and respond to cyber threats quickly and effectively
• Communicate effectively with other members of the security team and other stakeholders
• Work independently and as part of a team
• Work under pressure and meet deadlines