Principal Business Intelligence Analyst
By Johnson & Johnson At Danvers, MA, United States
Ad-hoc analysis as required to aid management decision making and business planning.
Model database needs based on project requirements and maintain data dictionaries and documentation associated with these data models.
8 years of work experience in business analytics or directly related field, ideally with operations and/or supply chain data.
Design, develop, deploy, and train on analytics tools for the Operations organization, primarily Supply Chain.
Harness the data at ABIOMED to build models that influence critical decision making.
Utilize multiple data sources such as SAP, Salesforce, PowerBI, Tableau and Excel to harmonize data and drive strategy and execution.
Researcher - Threat Intelligence
By Control Risks At Washington, DC, United States
Control Risks offers a competitively positioned compensation and benefits package that is transparent and summarised in the full job offer.
Research new sources of information and develop capabilities to collect and analyse information in support of the team’s mission.
Practical knowledge of open-source intelligence collection and threat analysis.
Experience in directing, collecting and analyzing information, including following leads, in order to produce timely and actionable intelligence.
When tasked, conduct research on specific topics to contribute to bespoke threat assessments.
Deliver clear and concise written analysis to contribute to the production of high-quality bespoke threat assessments.
Threat Intelligence Analyst, Sear
By Apple At , Seattle
Proven history of successfully working on solo and group projects (experience with virtual/remote collaboration is a plus).
Minimum of 5 years experience conducting threat research.
Experience in analyzing highly-complex threat actor campaigns, including infrastructure, malware, and victim endpoints.
Ability to distill complex problems into manageable tasks and then drive those tasks to completion.
Some knowledge of macOS and iOS internals.
Excellent communications skills (verbal and written).
Threat Intelligence Analyst Jobs
By Rubrik Job Board At , Palo Alto $168,000 - $252,000 a year
Minimum of 5 years of experience working in Information Security performing incident response,threat intelligence, forensics, or offensive security.
Experience in conducting investigations into advanced persistent threats.
Strong knowledge of enterprise detection technologies and processes (Advanced Threat Detection Tools, IDS/IPS, Network Packet Analysis, Endpoint Protection).
Experience working with Threat Intelligence subscriptions and threat feeds.
Experience contributing to Threat Intelligence or other SOC related program development.
Job Responsibilities include but may not be limited to:
Threat Intelligence Analyst Jobs
By UpGuard At , Sydney
Identify and evaluate inefficiencies in customer vendor/security management process/practises/system functionality
Formulate product requirements based on user feedback
Manage and organise large amounts of data gathered from multiple sources and analyse it for risks posed to our customers
Strong understanding of concepts in information security and knowledge of issues in cloud computer security
Experience identifying and analyzing data exposures with an awareness of rules for responsible disclosure
Excellent written and spoken communication skills and have the ability to translate highly technical subjects in layman’s terms
Threat Intelligence Analyst Jobs
By PRI Global At Weldon Spring, MO, United States
Must have strong time management and organization skills combined with attention to detail.
Security related certification, such as CISSP, or equivalent breadth and depth of technical knowledge.
Ability to be flexible and adaptable to changing requirements and responsibilities and deliver high quality results.
Demonstrable aptitude for leadership, collaboration, and relationship management.
3+ years of related experience; can include any combination of experience in Information Technology and Information Security.
3+ years of experience in Information Security.
Principal- Business Intelligence Engineer
By Kraft Heinz Company At , Chicago $68,960 a year
Bachelors- Masters or doctorate in computer science- software engineering- applied mathematics or similar disciplines- or equivalent professional experience
10+ years of experience with the implementation and delivery of large-scale enterprise data tools and related systems
Demonstrated experience with customer-centric agile methods
Be the subject matter expert for Business Intelligence and Power BI.
Lead and be accountable for the design and development of the state-of-the art pipelines and visualizations
Co-develop and follow enterprise wide standards
Threat Intelligence Analyst || Remote
By Dice At United States
Experience with incident response, security operations or vulnerability management
Manage threat intelligence platforms and monitor feed sources for efficacy
Develop, manage, optimize and continuously improve processes to enhance the overall cyber threat intelligence function
Bachelor’s degree in computer science/related field or equivalent experience
Three+ years of previous experience in a threat intelligence, cyber security, incident response or malware analysis role
Information Systems Security Professional (CISSP) certification
Staff Threat Intelligence Analyst
By Google At United States
8 years of experience in program management (leading cross-functional projects/programs).
Bachelor's degree in a technical field, or equivalent practical experience.
Experience with cyber threat intelligence.
Excellent investigative and problem-solving skills.
Master's degree in Computer Science, Information Technology, or a related field.
Understanding of cloud-based threats and their implications.
Security Engineer, Threat Intelligence
By OpenAI At San Francisco, CA, United States
Experience in Security or a Security-adjacent field
Experience with Microsoft Azure and/or cloud infrastructure platforms
Knowledge of modern adversary tactics, techniques, and procedures.
Ability to empathize and collaborate with colleagues, independently manage and run projects, and prioritize efforts for risk reduction.
Drive projects in threat intelligence, detection engineering and incident response
Maintain relationships in and outside of OpenAI for information sharing
Cybersecurity Threat Intelligence Analyst (Junior Level)
By TDI (Tetrad Digital Integrity) At Washington, DC, United States
Develop and maintain analytical procedures to meet changing requirements and ensure maximum operations.
In-depth knowledge of security systems and understands the life cycle of network threats, attacks, attack vectors, and methods of exploitation.
Knowledge of threat intelligence platforms
Experience with scripting languages (bash, Python etc.)
Participates in the development of technical security standards to support policies including monitoring standards and risk analysis procedures.
Responds to intel requests from Members, Committees and House support offices
Principal Business Intelligence Analyst
By Grindr At Chicago, IL, United States
Queer-Inclusive Benefits: Industry-leading gender-affirming offerings with up to 90% cost coverage, access to Included Health, monthly stipends for HRT, and more
At least 8 years of post-collegiate experience with 3 years in subscription/freemium services.
Significant experience with data modeling tools such as Looker or Tableau.
Experience working with relational databases and advanced SQL transforming datasets to meet business needs.
Experience working with cross-functional teams in a fast-paced environment
Additional Benefits: Flexible vacation policy, monthly stipends for cell phone, internet, wellness, and food, one-time home-office setup stipend, and company-sponsored events
Threat Intelligence Analyst Jobs
By Cyabra At New York City Metropolitan Area, United States
+2 years experience working in an intelligence, security, online safety, and/or brand management/ marketing analytics environment
Monitor data management processes to ensure data quality and consistency
Knowledge and experience using, monitoring, or moderating multiple social platforms such as Twitter, Reddit, Facebook (among others)
Strong critical thinking skills and attention to detail
Excellent analytical and organizational skills, and capacity to easily grasp new software applications
Strong written and oral communication skills and be able to work effectively with customers at all levels of personnel
Threat Intelligence Analyst Jobs
By Team Cymru At Orlando, FL, United States

Team Cymru Inc Team Cymru offers the following benefits for U.S. employees: A remote-first organization: work where you are comfortable 100% employer-funded health, dental, and vision benefits for you ...

Threat Intelligence Analyst Jobs
By Alexander Lyons Solutions At United States

*Excellent Spanish speaking and writing skills are an essential requirement for this position.

Don’t miss out - Apply now!

Manager Threat Operations Jobs
By McDonald's At Chicago, IL, United States
Experienced in cybersecurity principles and organizational requirements, including threat detection, incident response, and security operations methodologies.
Strong analytical skills and cross-functional knowledge across multiple security disciplines
Bachelor's degree or equivalent OTJ experience.
5+ years of experience in a role that required daily interaction with Cyber Security personnel, tools, and processes.
6+ years experience working in a focused Intelligence role.
2+ years experience with internal and external threat reconnaissance.
Principal Threat Researcher Jobs
By Binary Defense At Stow, OH, United States
Other Knowledge, Skills And Abilities
Other projects and responsibilities, as assigned by the direct manager
Proactively research new malware using hunting capabilities on malware repository services such as VirusTotal.
Minimum 10 years experience in Threat Hunting, Security Research, or Incident Response.
Experience reverse-engineering malware (can be professional or student experience)
Programming and scripting experience to develop internal tools
Threat Intelligence Analyst Jobs
By Cyabra At New York, NY, United States
+2 years experience working in an intelligence, security, online safety, and/or brand management/ marketing analytics environment
Monitor data management processes to ensure data quality and consistency
Knowledge and experience using, monitoring, or moderating multiple social platforms such as Twitter, Reddit, Facebook (among others)
Strong critical thinking skills and attention to detail
Excellent analytical and organizational skills, and capacity to easily grasp new software applications
Strong written and oral communication skills and be able to work effectively with customers at all levels of personnel
Manager, Threat Intelligence Jobs
By DNSFilter At United States
4+ years experience in People Management
Be a people manager with a team of 3-5 highly skilled threat and domain intelligence experts
Be working with our various departments to help enable them end-to-end in project management
Set team direction, manage workloads, and help form strategic direction in the threat and domain intelligence space
Demonstrated expertise in protective DNS, domain intelligence, and/or threat intelligence cyber security experience
Full medical, dental, and vision benefits for US Based Employees
Principal Security Engineer - Threat Detection And Response
By Cisco Systems At , Annapolis Junction, Md
Experience with various Security frameworks, models, and formats. For example: MITRE ATT&CK, Diamond Model, IOC, STIX/TAXII
Experience working with operations, development, or testing of SaaS based architectures
Deep knowledge of relational databases, No-SQL solutions, message queuing, object storage, and/or map-reduce to solve large problems
Experience with a security role such as Incident Responder, Threat Hunter, Digital Forensics Examiner, etc.
Experience across multiple security domains e.g. endpoint, network, email, identity
Competitor assessments of XDR solutions

Are you passionate about protecting organizations from cyber threats? Join our team as a Principal Threat Intelligence Analyst and help us stay ahead of the ever-evolving cyber security landscape. You will be responsible for researching and analyzing the latest threats, developing threat intelligence strategies, and providing actionable insights to our clients. If you have a knack for uncovering hidden threats and a desire to stay ahead of the curve, this is the perfect role for you!

Overview Principal Threat Intelligence is a senior-level position responsible for leading the development and implementation of threat intelligence strategies and initiatives. The role requires a deep understanding of the threat landscape, the ability to identify and assess threats, and the ability to develop and implement strategies to mitigate those threats. Detailed Job Description The Principal Threat Intelligence is responsible for leading the development and implementation of threat intelligence strategies and initiatives. This includes developing and maintaining threat intelligence capabilities, identifying and assessing threats, and developing and implementing strategies to mitigate those threats. The role requires a deep understanding of the threat landscape, the ability to identify and assess threats, and the ability to develop and implement strategies to mitigate those threats. The Principal Threat Intelligence will also be responsible for developing and maintaining relationships with external partners, such as law enforcement, intelligence agencies, and other organizations, in order to ensure the most up-to-date threat intelligence is available. Job Skills Required
• Expert knowledge of the threat landscape
• Ability to identify and assess threats
• Ability to develop and implement threat intelligence strategies
• Ability to develop and maintain relationships with external partners
• Excellent communication and interpersonal skills
• Ability to work independently and as part of a team
• Strong organizational and problem-solving skills
• Ability to work in a fast-paced environment
Job Qualifications
• Bachelor’s degree in computer science, information security, or a related field
• 5+ years of experience in threat intelligence or a related field
• Expert knowledge of the threat landscape
• Experience with threat intelligence tools and technologies
• Experience with security operations and incident response
• Experience with security architecture and design
Job Knowledge
• Expert knowledge of the threat landscape
• Knowledge of threat intelligence tools and technologies
• Knowledge of security operations and incident response
• Knowledge of security architecture and design
Job Experience
• 5+ years of experience in threat intelligence or a related field
• Experience with threat intelligence tools and technologies
• Experience with security operations and incident response
• Experience with security architecture and design
Job Responsibilities
• Develop and maintain threat intelligence capabilities
• Identify and assess threats
• Develop and implement strategies to mitigate threats
• Develop and maintain relationships with external partners
• Monitor the threat landscape for emerging threats
• Analyze threat intelligence data and develop actionable intelligence
• Provide guidance and support to other teams on threat intelligence
• Develop and maintain threat intelligence policies