Threat Analyst Jobs
By Google At Virginia, United States
2 years of experience leading investigations into and generating novel leads on espionage activity.
Experience writing and presenting on various topics and assessments for an audience with mixed backgrounds.
Experience correlating and attributing malicious activity based on technical and geopolitical factors.
Experience tracking adversaries via network infrastructure and malicious artifacts.
Experience identifying and prioritizing cyber threats for investigation.
Experience mentoring and supervising analysts.
Insider Threat Analyst Jobs
By USAJOBS At Washington, DC, United States
DHS does not offer any additional benefits beyond that which the Federal employee is already receiving.
Must be a current permanent Federal employee
Must have supervisory approval to apply to the Joint Duty Assignment. DHS 250-2 Application Form under "required documents" section.
Must NOT have any pending/outstanding disciplinary actions
Must have achieved a minimum of "meet expectations/proficiency" on latest performance appraisal/evaluation
Must be currently at the grade level of the detail. *No Temporary Promotion Opportunity*
Threat Analyst (Us Remote)
By Sophos At ,
Experience with enterprise information security data management - SIEM experience
Programming and scripting skills - proficient knowledge of Powershell
Acknowledge and satisfy inbound customer requests and interact with customers through various mediums
Actively research emerging Indicators of Compromise/Attack, exploits and vulnerabilities with the intent of operationalizing findings to better protect our customers
Excellent troubleshooting and analytical skills, with proven ability to think outside the box
Customer service-oriented with strong written and verbal communication skills
Threat Monitoring Analyst Jobs
By Verizon At , Temple Terrace $77,000 - $143,000 a year
Experience with network, TCP/IP and endpoint skills.
Coordinating with Senior Analysts and/or Duty Manager for high priority incidents.
Associate's degree or two or more years of work experience.
Three or more years of relevant work experience.
Two or more years of experience with security incident monitoring and threat investigations.
SANS or other Security industry certifications such as GCIA, GCIH, GREM, or GPEN ITIL Foundations training / certification.
Threat Analyst 1 Jobs
By Aperio Global, LLC At Fort Meade, MD, United States
Stay up to date with emerging threat trends and technological advancements to enhance threat assessment capabilities
Conduct in-depth research and analysis of adversarial threats targeting various systems, technologies, operations, or missions
Utilize diverse intelligence sources to gather relevant threat data and contribute to comprehensive threat profiles
Collaborate with multidisciplinary teams to assess the likelihood of potential threats and their potential impacts
Assist in the development of threat assessment reports and contribute insights for informed decision-making
Threat Analyst - Trust & Safety
By TikTok At New York, United States

Responsibilities TikTok is the leading destination for short-form mobile video. Our mission is to inspire creativity and bring joy. TikTok has global offices including Los Angeles, New York, ...

Threat Intel Specialist (Remote)
By Cyware At United States
The candidate should have experience with the management of information security tools such as Threat Intel Platform, Threat Intel Feeds, etc.
Good understanding of SOC / Security Management Workflows in enterprise environments
Ability to translate technical information for diverse audiences including C-suite and technical management team members
Provide Cyber Threat Intelligence and related integration knowledge to internal stakeholders.
Expertise in Threat hunting tools and capabilities
Quickly obtain knowledge of our current existing process, and identify success factors, strengths, weaknesses, and opportunities.
Threat Response Analyst (Remote)
By CrowdStrike At , Remote $90,000 - $150,000 a year
Two (2) or more years of significant client-facing experience
Managed or enterprise information security services
Bonus points for experience with big-data processing tools such as Splunk, Humio, Logstash, Kibana, etc.
Strong written and verbal communication skills
Strong understanding of MITRE ATT&CK techniques / sub-techniques and ability to articulate TTPs to customers of varying technical abilities
Comprehensive and inclusive health benefits
Consultant, Threat Analyst Jobs
By Crisis24 At Boca Raton, FL, United States
Time management skills, including the ability to keep to tight deadlines
Delivery of support to Crisis24 Management for the provision of Crisis Response and Security Risk Management services
A strong understanding on Security and Risk Management principles based on best practise standards
Work to the Operations Manager to coordinate activities between the Operational Support Team
International Relations (or similar) at a master’s level qualification is preferable
3+ years relevant industry specific experience
Threat Analyst (Us Remote)
By Sophos At United States
Experience with enterprise information security data management - SIEM experience
Programming and scripting skills - proficient knowledge of Powershell
Acknowledge and satisfy inbound customer requests and interact with customers through various mediums
Actively research emerging Indicators of Compromise/Attack, exploits and vulnerabilities with the intent of operationalizing findings to better protect our customers
Excellent troubleshooting and analytical skills, with proven ability to think outside the box
Customer service-oriented with strong written and verbal communication skills
Insider Threat Analyst Jobs
By Akraya, Inc. At San Jose, CA, United States
Bachelor's degree or equivalent experience
Excellent written and oral communication skills
Conduct tactical analysis of information streams to detect potential indications of insider threats for referral to appropriate investigators.
Develop and execute effective and efficient workflows to review the information for leads.
Conduct statistical analysis of alerts to identify patterns and develop mitigation strategies.
Prepare and deliver briefings to stakeholders about insider events and trends.
All-Source Threat Analyst Jobs
By Take2 Consulting, LLC At Chantilly, VA, United States

Preferred: Experience/knowledge with crypto currency, SIGNT, and HUMINT.

Top Secret Clearance Require with the ability to obtain a CI Poly

Insider Threat Analyst Jobs
By General Motors At Roswell, GA, United States
Knowledge of industry best practices and standards related to insider threat management.
Experience in analyzing and investigating insider threat incidents, identifying vulnerabilities, and recommending security measures.
Document and develop requirements for onboarding of use cases, log data sources and detections
At least 3-5 years of experience working in cybersecurity, with a focus on insider threat detection and mitigation.
Identify , Deter, Detect, & Mitigate actions by employees who may represent a threat or risk to GM
Apply lessons learned methodologies from previous cases to new detection methods
Threat Analyst Jobs
By Tesla At Fremont, CA, United States
BS/MS in Computer Science, Information Systems, Electrical Engineering, or the equivalent in experience and evidence of exceptional ability
Knowledge of security systems and deep understanding the life cycle of network attacks, threats, attack vectors, and methods of exploitation
Experience with manual analysis of malware, phishing kits, network captures, exploits etc.
Experience writing rules and signatures using frameworks such as YARA, Snort, and Sigma Experience using platforms like ELK or Splunk
Family-building, fertility, adoption and surrogacy benefits
401(k) with employer match, Employee Stock Purchase Plans, and other financial benefits
Threat Intelligence Analyst Jobs
By Team Cymru At Orlando, FL, United States

Team Cymru Inc Team Cymru offers the following benefits for U.S. employees: A remote-first organization: work where you are comfortable 100% employer-funded health, dental, and vision benefits for you ...

Threat Investigation Analyst Jobs
By Sentinel At Downers Grove, IL, United States
3+ years of experience in cybersecurity required
Experience in performing queries on a Splunk platform and the ability to analyze the data
Understanding of complex Enterprise networks (EDR, routing, switching, firewalls, proxies, etc.) including previous MSSP experience.
Demonstrated knowledge of common/emerging attack techniques
Craft, maintain, and document detection opportunities within our proprietary security platform
Perform necessary correlation and research to create useful, compelling, and context-rich alerts for our customers
Manager Threat Operations Jobs
By McDonald's At Chicago, IL, United States
Experienced in cybersecurity principles and organizational requirements, including threat detection, incident response, and security operations methodologies.
Strong analytical skills and cross-functional knowledge across multiple security disciplines
Bachelor's degree or equivalent OTJ experience.
5+ years of experience in a role that required daily interaction with Cyber Security personnel, tools, and processes.
6+ years experience working in a focused Intelligence role.
2+ years experience with internal and external threat reconnaissance.
Security Analyst (Threat Hunter)
By Motion Recruitment At Phoenix, AZ, United States
3+ years of managed detection and response experience in a security-focused role
Experience with scripting or automation in at least one common language
Bachelor’s degree in Information Security, a related field, or equivalent work experience
Prior expertise threat hunting with an EDR tool
Ability to work with clients and present results in a consultative, professional manner
401(k) {including match- if applicable}
Threat Researcher (Public Facing) Talos
By Cisco At United States
Manage reporting and dissemination of security intelligence and research efforts
5+ years direct and tightly integrated experience in security software or research industry
In depth understanding and knowledge of security
Strong written and oral communication skills
Ability to track and manage numerous parallel activities
Ability to work on a remote team
Principal Threat Researcher Jobs
By Binary Defense At Stow, OH, United States
Other Knowledge, Skills And Abilities
Other projects and responsibilities, as assigned by the direct manager
Proactively research new malware using hunting capabilities on malware repository services such as VirusTotal.
Minimum 10 years experience in Threat Hunting, Security Research, or Incident Response.
Experience reverse-engineering malware (can be professional or student experience)
Programming and scripting experience to develop internal tools

Are you looking for an exciting opportunity to use your skills to protect against cyber threats? We are looking for a Threat Analyst to join our team and help us protect our organization from malicious actors. You will be responsible for monitoring and analyzing security events, identifying potential threats, and developing strategies to mitigate risks. If you have a passion for security and a desire to make a difference, this is the job for you!

Overview A Threat Analyst is a security professional who is responsible for identifying, analyzing, and responding to potential threats to an organization’s information systems. They use a variety of tools and techniques to detect, investigate, and mitigate threats. Detailed Job Description Threat Analysts are responsible for monitoring and analyzing security threats to an organization’s networks, systems, and data. They use a variety of tools and techniques to detect, investigate, and mitigate threats. They must be able to identify potential threats and vulnerabilities, and develop strategies to address them. They must also be able to analyze data from various sources to identify patterns and trends. They must be able to communicate their findings to stakeholders and recommend appropriate actions. Job Skills Required
• Knowledge of security principles, protocols, and technologies
• Knowledge of network security and data protection
• Knowledge of threat analysis and mitigation techniques
• Ability to analyze data and identify patterns and trends
• Ability to communicate effectively with stakeholders
• Ability to work independently and as part of a team
• Ability to work under pressure and meet deadlines
Job Qualifications
• Bachelor’s degree in Computer Science, Information Security, or related field
• Relevant certifications such as CISSP, CISM, or CISA
• 5+ years of experience in information security
Job Knowledge
• Knowledge of security principles, protocols, and technologies
• Knowledge of network security and data protection
• Knowledge of threat analysis and mitigation techniques
• Knowledge of security tools and technologies
Job Experience
• 5+ years of experience in information security
• Experience with security tools and technologies
• Experience with threat analysis and mitigation techniques
• Experience with network security and data protection
Job Responsibilities
• Monitor and analyze security threats to an organization’s networks, systems, and data
• Identify potential threats and vulnerabilities
• Develop strategies to address threats and vulnerabilities
• Analyze data from various sources to identify patterns and trends
• Communicate findings to stakeholders and recommend appropriate actions
• Implement security measures to protect networks, systems, and data
• Monitor security systems and respond to alerts
• Stay up-to-date with the latest security trends and technologies