Cyber Threat Intelligence Analyst
Richmond, Virginia
Full Time Entry-level / Junior Clearance required USD 120K - 202K
State Street
State Street provides investment servicing, investment management, investment research and trading services to institutional investors worldwide.State Street is seeking an experienced tactical cyber threat intelligence analyst to conduct cyber threat intelligence analysis and reporting operations within the Tactical Cyber Threat Intelligence (CTI) team. The ideal candidate will exhibit an innovative mindset and proven capacity for identifying and analyzing cyber threats. The candidate will also need to possess and maintain an active Top Secret/Sensitive Compartmented Information (TS/SCI) clearance and reside in the Washington DC area. In this role, the candidate will use their understanding of threat actors and their tactics, techniques, and procedures to track relevant adversary activity and provide direct support to intelligence customers. We are looking for creative thinkers and self-starters who possess the skills and experience to work alone or with teams to develop new capabilities and support fusion operations.
Who are we looking for:
A Tactical CTI Analyst who will be responsible for analyzing and responding to threats confronting State Street and the financial sector. CTI staff analyzes cyber threats targeting the financial sector and uses this analysis to inform SOC operations, threat hunting, incident response, vulnerability management, and risk management while ensuring that senior leaders are advised of current and ongoing threats.
This will be a remote role based out of the Washington DC area.
What will you be responsible for:
- Lead State Street’s Washington DC based collaboration with public and private sector partners to jointly analyze and respond to threats to State Street, peers, and broader US critical infrastructure.
- Utilizing requirements from stakeholders to conduct research and analysis to provide timely and actionable intelligence that drives security operations.
- Analyzing and understanding nation state and criminal threat actors tactics, techniques, and procedures to inform security operations.
- Possessing and maintaining an active TS/SCI clearance.
- Building relationships with public and private sector partners.
- Processing and analyzing event logs and other data to better understand threat actor activity, including activity targeting the network.
- Working side by side with internal network defenders to provide intel-driven insights into existing and emerging threats.
- Operationalize intelligence by delivering timely, relevant, and actionable support in the form of technical assistance, reports, briefings, and collaborative working group participation.
What we value:
- Incredible attention to detail.
- Effective communication and presentation skills, both orally and written.
- Ability to work well with others and under pressure.
- Genuine passion for finding, understanding, and mitigation of cyber threats.
- Working knowledge of threat intelligence cycles and analytic tradecraft.
- Experience tracking cyber threat actors and unattributed activity, including regular use of indicators of compromise, event logs, and other data.
- Experience in analytic roles.
- Experience collaborating with network defense teams (e.g. SOC, threat hunt, vulnerability management).
- Knowledge of current cyber threats.
- Expert knowledge of the MITRE ATT&CK Framework, Diamond Model of Intrusion Analysis, and other operationally relevant cyber threat concepts.
- Knowledge of IT architecture and operations concepts (computing, network, storage & cloud)
- Ability to work in an environment with a geographically dispersed team.
Education & Preferred Qualifications
- 4+ years working in cyber threat intelligence, SOC, incident response, threat hunting, forensics, or similar security roles supporting large organizations required, cyber threat intelligence preferred.
- BS in a cybersecurity related field such as Information Systems, Information Technology, or Computer Science preferred, but not required.
- Security certifications a plus but not required: GCTI, GCIA, GMON, GCIH, GREM, CTIA, GSOC
- Prior experience in a cleared CTI analyst position
- Successful completion of public sector intelligence analysis courses/program preferred, but not required
Additional Requirements
- On call rotation
- 24x7 support
Salary Range:
$120,000 - $202,500 AnnualThe range quoted above applies to the role in the primary location specified. If the candidate would ultimately work outside of the primary location above, the applicable range could differ.
Job Application Disclosure:
It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
Tags: Clearance Cloud Computer Science Forensics GCIA GCIH GCTI GREM Incident response MITRE ATT&CK Risk management SOC Threat intelligence Top Secret TS/SCI Vulnerability management
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.