Specialist, Cyber Intelligence Jobs
By CAE At Edwards, CA, United States
Develop system documentation for information system authorization, security management, and continuous monitoring of both networked and standalone information systems.
Experience successfully interfacing with internal/external customers (DCSA, AO/DAO, GCAs, IT, Program Managers, Program Engineering, Cyber Architects/Engineers, etc.)
Graduate Degree and a minimum of 6 years of prior related experience.
Bachelor’s Degree in discipline (STEM) and minimum 8 years of prior relevant experience or,
2 years post-Secondary/Associates Degree and a minimum of 10 years of prior related experience
Experience with the authorization and approval (A&A) of classified information systems
Cyber Threat Intelligence Analyst
By Pillar Systems Corporation At Washington DC-Baltimore Area, United States
Certification in at least one of the following (or recognized equivalents):
·GIAC (Global Information Assurance Certification)
: Currently possess a valid/active National Security Top Secret/SCI level clearance.
·Master’s or Bachelor’s degree in:
oStrategic Intelligence or International Securities Studies,
·Demonstrates ability to work independently with minimal oversight and direction
Cyber Threat Intelligence Analyst (Spanish, English)
By Google At Colorado, United States
Experience utilizing a threat monitoring platform in support of intelligence/security requirements (e.g., commercial or government intelligence collection tools).
5 years of experience in intelligence roles requiring analytic processes and conducting cyber threat research.
Experience in managing stakeholders and customer relationships.
Experience conducting structured research and interpreting data, especially incorporating PAI/metadata.
Functional understanding of CTI roles and concepts, with knowledge of the cyber threat landscape (threat actors, targets, TTPs).
Develop relationships with clients, and provide research and analysis expertise and support regarding product capabilities, use cases, and threats.
Cyber And Intelligence Specialist
By SMA, Inc. At , Dallas $113 an hour
When making a tough call, does your gut win over your head and heart?
When you open the newspaper, do you immediately go for the crossword?
Do you prefer the unexpected over routine?
The Job: Cyber and Intelligence Specialist
You are relentless in solving problems, work well in teams, and enjoy a challenge
You are looking for adventure!
Associate Cyber Intelligence Analyst
By ZeroFOX At ,
Proactive professional development through company trainings, industry certifications, and seeking new opportunities to maintain and grow relevant knowledge and skill sets.
Support collection enhancement with ongoing and proactive collaboration with Collection Management.
Strong written and oral communication skills; comfortable with providing briefings and presentations.
Experience producing short and long form reports, applying BLUF or similar models.
Experience with some of the following: Social Media Platforms, blogs, IRC, Deep/Darkweb and message boards.
Public or private sector experience as an analyst, researcher, investigator or consultant supporting a security, risk or due diligence function.
Cyber Threat Intelligence Analyst / Threat Hunter
By Cyberjin At Austin, TX, United States
Experience in working with a geographically diverse team in multiple time zones around the globe.
Broad experience managing complex projects, particularly projects requiring support and partnership outside your immediate team.
Expert communication skills including technical writing (documenting processes and procedures); presenting to technical peers; and communicating to executive leadership.
Expert level understanding of common and emerging security threats and vulnerabilities
Industry security certifications such as CISSP and relevant GIAC certification. LOCATION: Austin, TX
Escalation point for a global 24x7x365 SOC.
Specialist- Cyber Threat Intelligence Analyst
By Southern Company At , Atlanta, 30309, Ga
Extensive relevant professional security experience in similar job responsibilities
Advanced knowledge of security principles is desired through achievement of security certifications such as CISSP, GSEC, GCTI, GCIH, OSCP
Work with the intel analysts to understand their requirements, modeling of cyber threats, operationalize the model and correlate to existing data
Provide subject matter mentoring to less experienced team members and provide oversight of the technical deliverables of the team
Extensive experience leveraging security event information from existing sources to answer intelligence questions
Experience implementing platform automations through scripting or other code development
Cyber Threat Intelligence Lead, Vp
By BlackRock At New York, NY, United States
Experience developing collection requirements and prioritizing resources to address those requirements
Work with business partners to identify intelligence and reporting requirements and regularly assess whether this reporting is meeting the customers' needs
Detailed understanding of and experience using the intelligence cycle
Experience producing and delivering written and verbal intelligence products to an executive audience
Possess intimate knowledge of MITER, Cyber Kill Chain, Diamond Model of Intrusion Analysis, and/or other relevant network defense and intelligence frameworks.
Intermediate knowledge in system security architecture and security solutions – IDS, Splunk, data loss prevention, next generation anti-malware, etc.
Cyber Threat Hunter Jobs
By Cyberjin At Washington, DC, United States
Must have excellent communication skills and be able to convey technical details to audiences of differing technical aptitude
Candidates with previous experience supporting cybersecurity operations within a cyber fusion center are desired
Prior experience within security operations, cyber threat hunting, or content detection development is required
Experience using Endpoint Detection and Response platforms and other cyber threat hunt tooling is also desired but not required
Must be fully vaccinated against Covid-19 Education:
Create detection content to support the automated identification of threats across the environment
Cyber Threat Hunter Jobs
By Cyberjin At San Jose, CA, United States
Must have excellent communication skills and be able to convey technical details to audiences of differing technical aptitude
Candidates with previous experience supporting cybersecurity operations within a cyber fusion center are desired
Prior experience within security operations, cyber threat hunting, or content detection development is required
Experience using Endpoint Detection and Response platforms and other cyber threat hunt tooling is also desired but not required
Must be fully vaccinated against Covid-19 Education:
Create detection content to support the automated identification of threats across the environment
Specialist, Cyber Intelligence Jobs
By CAE At Eglin Air Force Base, FL, United States
Develop system documentation for information system authorization, security management, and continuous monitoring of both networked and standalone information systems.
Experience successfully interfacing with internal/external customers (DCSA, AO/DAO, GCAs, IT, Program Managers, Program Engineering, Cyber Architects/Engineers, etc.)
Comprehensive and competitive benefits package and flexibility that promotes work-life balance
Graduate Degree and a minimum of 6 years of prior related experience.
Bachelor’s Degree in discipline (STEM) and minimum 8 years of prior relevant experience or,
2 years post-Secondary/Associates Degree and a minimum of 10 years of prior related experience
Cyber Intelligence Threat Analyst
By Pinnacle Group, Inc. At New York, NY, United States
• Apply in-depth disciplinary knowledge to triage, process, analyze, intelligence alerts, reports, and briefings
Role: Cyber Intelligence Threat Analyst
Location: NYC, NY or Irving, TX (Hybrid)
Duration: 12 Month Contract (Possible extension or hire )
W2 Employment only - No Option for C2C
• Monitor and research cyber threats with a direct or indirect impact to the client brand
Intelligence Analyst - Cyber
By Alexander Lyons Solutions At Dallas, TX, United States
*Excellent Spanish speaking and writing skills are a must for this position.
Don’t miss out - Apply now!
Then read on, as this is the role for you!!!
What will I need to be successful?
Min 1-2 years in intelligence analysis processes. e.g Open-Source Intelligence (OSINT) and Web Intelligence (WEBINT)
You will also have the opportunity to work in a friendly and supportive environment.
Security Engineer, Threat Intelligence
By OpenAI At San Francisco, CA, United States
Experience in Security or a Security-adjacent field
Experience with Microsoft Azure and/or cloud infrastructure platforms
Knowledge of modern adversary tactics, techniques, and procedures.
Ability to empathize and collaborate with colleagues, independently manage and run projects, and prioritize efforts for risk reduction.
Drive projects in threat intelligence, detection engineering and incident response
Maintain relationships in and outside of OpenAI for information sharing
Threat Response Engineer Jobs
By DoorDash At San Francisco, CA, United States
Exceptional analytical and investigative abilities with hands-on experience leading root-cause analysis.
Expertise with cloud infrastructure and management in AWS, GCP, or Azure.
We are leaders - Leadership is not limited to our management team. It's something everyone at DoorDash embraces and embodies.
We offer great compensation packages and comprehensive health benefits.
5+ years of combined experience as an incident commander, infrastructure engineer, or system administrator in an information security discipline.
Experience with a broad range of technologies including endpoint detection, network technologies, and SIEM.
Threat Detection Engineer Jobs
By Motion Recruitment At Los Angeles, CA, United States
Experience with security tools and technologies, including SIEM platforms, IDS/IPS systems, firewall management, and endpoint protection solutions.
Provide technical guidance and support to other members of the security operations team and assist in their skill development.
Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience).
Previous experience working in a threat detection or security operations role, preferably in a large enterprise environment.
Strong knowledge of networking protocols, operating systems, and security technologies.
Knowledge of cloud computing platforms (e.g., AWS, Azure) and associated security controls is a plus.
Cyber Intelligence Analyst Jobs
By General Motors At Austin, TX, United States
At least 2 years overall experience in cyber threat intelligence, vulnerability management, security engineering, incident response or offensive security
Conceptual and technical knowledge of modern IT environments to include server configuration/architecture, cloud, database management/configuration, networking protocols/designs and access management/access controls
Experience in open source collection, use of online tools, experience querying internal databases of information in support of investigative efforts
Experience documenting cyber threat intelligence in a consumable manner that non-IT professionals can easily understand
Demonstrated interpersonal skills and ability to work effectively and collaboratively with a wide range of stakeholders
Demonstrated executive-level verbal and written communication skills
Cyber Threat Intelligence Analyst
By Office of the Director of National Intelligence At McLean, VA, United States

[email protected], by unclassified email at DNI

Cyber Intelligence Analyst Jobs
By KACE Company At Arlington, VA, United States
A competitive benefits package, and fosters a highly skilled, energized, and empowered workforce.
Primary experience in blockchain analysis required.
Experience with open-source (OSINT) and working with current dark web and general web research methodologies.
Preferred experience with identifying and analyzing Virtual Currency or Cryptocurrency transactions through dark web sources.
Experience producing detailed intelligence and analytical reports supporting findings.
Perform special research tasks designed to utilize and enhance knowledge of work processes and techniques.
Threat Intelligence Analyst Jobs
By Cyabra At New York City Metropolitan Area, United States
+2 years experience working in an intelligence, security, online safety, and/or brand management/ marketing analytics environment
Monitor data management processes to ensure data quality and consistency
Knowledge and experience using, monitoring, or moderating multiple social platforms such as Twitter, Reddit, Facebook (among others)
Strong critical thinking skills and attention to detail
Excellent analytical and organizational skills, and capacity to easily grasp new software applications
Strong written and oral communication skills and be able to work effectively with customers at all levels of personnel