Researcher - Threat Intelligence
By Control Risks At Washington, DC, United States
Control Risks offers a competitively positioned compensation and benefits package that is transparent and summarised in the full job offer.
Research new sources of information and develop capabilities to collect and analyse information in support of the team’s mission.
Practical knowledge of open-source intelligence collection and threat analysis.
Experience in directing, collecting and analyzing information, including following leads, in order to produce timely and actionable intelligence.
When tasked, conduct research on specific topics to contribute to bespoke threat assessments.
Deliver clear and concise written analysis to contribute to the production of high-quality bespoke threat assessments.
Specialist, Cyber Intelligence Jobs
By CAE At Edwards, CA, United States
Develop system documentation for information system authorization, security management, and continuous monitoring of both networked and standalone information systems.
Experience successfully interfacing with internal/external customers (DCSA, AO/DAO, GCAs, IT, Program Managers, Program Engineering, Cyber Architects/Engineers, etc.)
Graduate Degree and a minimum of 6 years of prior related experience.
Bachelor’s Degree in discipline (STEM) and minimum 8 years of prior relevant experience or,
2 years post-Secondary/Associates Degree and a minimum of 10 years of prior related experience
Experience with the authorization and approval (A&A) of classified information systems
Cyber Threat Intelligence Analyst
By Pillar Systems Corporation At Washington DC-Baltimore Area, United States
Certification in at least one of the following (or recognized equivalents):
·GIAC (Global Information Assurance Certification)
: Currently possess a valid/active National Security Top Secret/SCI level clearance.
·Master’s or Bachelor’s degree in:
oStrategic Intelligence or International Securities Studies,
·Demonstrates ability to work independently with minimal oversight and direction
Cyber Threat Intelligence Analyst (Spanish, English)
By Google At Colorado, United States
Experience utilizing a threat monitoring platform in support of intelligence/security requirements (e.g., commercial or government intelligence collection tools).
5 years of experience in intelligence roles requiring analytic processes and conducting cyber threat research.
Experience in managing stakeholders and customer relationships.
Experience conducting structured research and interpreting data, especially incorporating PAI/metadata.
Functional understanding of CTI roles and concepts, with knowledge of the cyber threat landscape (threat actors, targets, TTPs).
Develop relationships with clients, and provide research and analysis expertise and support regarding product capabilities, use cases, and threats.
Threat Intelligence Analyst, Sear
By Apple At , Seattle
Proven history of successfully working on solo and group projects (experience with virtual/remote collaboration is a plus).
Minimum of 5 years experience conducting threat research.
Experience in analyzing highly-complex threat actor campaigns, including infrastructure, malware, and victim endpoints.
Ability to distill complex problems into manageable tasks and then drive those tasks to completion.
Some knowledge of macOS and iOS internals.
Excellent communications skills (verbal and written).
Threat Intelligence Analyst Jobs
By Rubrik Job Board At , Palo Alto $168,000 - $252,000 a year
Minimum of 5 years of experience working in Information Security performing incident response,threat intelligence, forensics, or offensive security.
Experience in conducting investigations into advanced persistent threats.
Strong knowledge of enterprise detection technologies and processes (Advanced Threat Detection Tools, IDS/IPS, Network Packet Analysis, Endpoint Protection).
Experience working with Threat Intelligence subscriptions and threat feeds.
Experience contributing to Threat Intelligence or other SOC related program development.
Job Responsibilities include but may not be limited to:
Threat Intelligence Analyst Jobs
By UpGuard At , Sydney
Identify and evaluate inefficiencies in customer vendor/security management process/practises/system functionality
Formulate product requirements based on user feedback
Manage and organise large amounts of data gathered from multiple sources and analyse it for risks posed to our customers
Strong understanding of concepts in information security and knowledge of issues in cloud computer security
Experience identifying and analyzing data exposures with an awareness of rules for responsible disclosure
Excellent written and spoken communication skills and have the ability to translate highly technical subjects in layman’s terms
Threat Intelligence Analyst Jobs
By PRI Global At Weldon Spring, MO, United States
Must have strong time management and organization skills combined with attention to detail.
Security related certification, such as CISSP, or equivalent breadth and depth of technical knowledge.
Ability to be flexible and adaptable to changing requirements and responsibilities and deliver high quality results.
Demonstrable aptitude for leadership, collaboration, and relationship management.
3+ years of related experience; can include any combination of experience in Information Technology and Information Security.
3+ years of experience in Information Security.
Cyber Threat Defender Jobs
By Broward County Public Schools At , Sunrise, 33351

To review the complete job description for this position, access the following website: https://www.browardschools.com/Page/36072 and search by Job Code. The Job Code for this position is: RR-104.

Cyber And Intelligence Specialist
By SMA, Inc. At , Dallas $113 an hour
When making a tough call, does your gut win over your head and heart?
When you open the newspaper, do you immediately go for the crossword?
Do you prefer the unexpected over routine?
The Job: Cyber and Intelligence Specialist
You are relentless in solving problems, work well in teams, and enjoy a challenge
You are looking for adventure!
Associate Cyber Intelligence Analyst
By ZeroFOX At ,
Proactive professional development through company trainings, industry certifications, and seeking new opportunities to maintain and grow relevant knowledge and skill sets.
Support collection enhancement with ongoing and proactive collaboration with Collection Management.
Strong written and oral communication skills; comfortable with providing briefings and presentations.
Experience producing short and long form reports, applying BLUF or similar models.
Experience with some of the following: Social Media Platforms, blogs, IRC, Deep/Darkweb and message boards.
Public or private sector experience as an analyst, researcher, investigator or consultant supporting a security, risk or due diligence function.
Cyber Threat Intelligence Analyst / Threat Hunter
By Cyberjin At Austin, TX, United States
Experience in working with a geographically diverse team in multiple time zones around the globe.
Broad experience managing complex projects, particularly projects requiring support and partnership outside your immediate team.
Expert communication skills including technical writing (documenting processes and procedures); presenting to technical peers; and communicating to executive leadership.
Expert level understanding of common and emerging security threats and vulnerabilities
Industry security certifications such as CISSP and relevant GIAC certification. LOCATION: Austin, TX
Escalation point for a global 24x7x365 SOC.
Specialist- Cyber Threat Intelligence Analyst
By Southern Company At , Atlanta, 30309, Ga
Extensive relevant professional security experience in similar job responsibilities
Advanced knowledge of security principles is desired through achievement of security certifications such as CISSP, GSEC, GCTI, GCIH, OSCP
Work with the intel analysts to understand their requirements, modeling of cyber threats, operationalize the model and correlate to existing data
Provide subject matter mentoring to less experienced team members and provide oversight of the technical deliverables of the team
Extensive experience leveraging security event information from existing sources to answer intelligence questions
Experience implementing platform automations through scripting or other code development
Cyber Threat Intelligence Lead, Vp
By BlackRock At New York, NY, United States
Experience developing collection requirements and prioritizing resources to address those requirements
Work with business partners to identify intelligence and reporting requirements and regularly assess whether this reporting is meeting the customers' needs
Detailed understanding of and experience using the intelligence cycle
Experience producing and delivering written and verbal intelligence products to an executive audience
Possess intimate knowledge of MITER, Cyber Kill Chain, Diamond Model of Intrusion Analysis, and/or other relevant network defense and intelligence frameworks.
Intermediate knowledge in system security architecture and security solutions – IDS, Splunk, data loss prevention, next generation anti-malware, etc.
Cyber Threat Hunter Jobs
By Cyberjin At Washington, DC, United States
Must have excellent communication skills and be able to convey technical details to audiences of differing technical aptitude
Candidates with previous experience supporting cybersecurity operations within a cyber fusion center are desired
Prior experience within security operations, cyber threat hunting, or content detection development is required
Experience using Endpoint Detection and Response platforms and other cyber threat hunt tooling is also desired but not required
Must be fully vaccinated against Covid-19 Education:
Create detection content to support the automated identification of threats across the environment
Cyber Threat Hunter Jobs
By Cyberjin At San Jose, CA, United States
Must have excellent communication skills and be able to convey technical details to audiences of differing technical aptitude
Candidates with previous experience supporting cybersecurity operations within a cyber fusion center are desired
Prior experience within security operations, cyber threat hunting, or content detection development is required
Experience using Endpoint Detection and Response platforms and other cyber threat hunt tooling is also desired but not required
Must be fully vaccinated against Covid-19 Education:
Create detection content to support the automated identification of threats across the environment
Specialist, Cyber Intelligence Jobs
By CAE At Eglin Air Force Base, FL, United States
Develop system documentation for information system authorization, security management, and continuous monitoring of both networked and standalone information systems.
Experience successfully interfacing with internal/external customers (DCSA, AO/DAO, GCAs, IT, Program Managers, Program Engineering, Cyber Architects/Engineers, etc.)
Comprehensive and competitive benefits package and flexibility that promotes work-life balance
Graduate Degree and a minimum of 6 years of prior related experience.
Bachelor’s Degree in discipline (STEM) and minimum 8 years of prior relevant experience or,
2 years post-Secondary/Associates Degree and a minimum of 10 years of prior related experience
Cyber Intelligence Threat Analyst
By Pinnacle Group, Inc. At New York, NY, United States
• Apply in-depth disciplinary knowledge to triage, process, analyze, intelligence alerts, reports, and briefings
Role: Cyber Intelligence Threat Analyst
Location: NYC, NY or Irving, TX (Hybrid)
Duration: 12 Month Contract (Possible extension or hire )
W2 Employment only - No Option for C2C
• Monitor and research cyber threats with a direct or indirect impact to the client brand
Intelligence Analyst - Cyber
By Alexander Lyons Solutions At Dallas, TX, United States
*Excellent Spanish speaking and writing skills are a must for this position.
Don’t miss out - Apply now!
Then read on, as this is the role for you!!!
What will I need to be successful?
Min 1-2 years in intelligence analysis processes. e.g Open-Source Intelligence (OSINT) and Web Intelligence (WEBINT)
You will also have the opportunity to work in a friendly and supportive environment.
Security Engineer, Threat Intelligence
By OpenAI At San Francisco, CA, United States
Experience in Security or a Security-adjacent field
Experience with Microsoft Azure and/or cloud infrastructure platforms
Knowledge of modern adversary tactics, techniques, and procedures.
Ability to empathize and collaborate with colleagues, independently manage and run projects, and prioritize efforts for risk reduction.
Drive projects in threat intelligence, detection engineering and incident response
Maintain relationships in and outside of OpenAI for information sharing