Senior Cyber Threat Intelligence Analyst

Washington, DC, USA

SiloSmashers

From day 1, SiloSmashers set out to change how government agencies and corporations manage programs — and smash silo operations.

View all jobs at SiloSmashers

Apply now Apply later

Senior Cyber Threat Intelligence Analyst

Ultimately bolstering the judiciary's cybersecurity posture and resilience against sophisticated adversaries. ITSO's TITET proactively identifies and analyzes cyber threats. Employees shall leverage advanced knowledge of cyber threat actors, tactics, techniques, and procedures (TTPs); they shall assist the Government Lead in collecting, assessing, and disseminating actionable intelligence on emerging and evolving threats. The employee shall conduct in-depth research and analysis of threat indicators, including malware, phishing campaigns, and infrastructure, to uncover patterns and trends indicative of potential cyber-attacks. Additionally, senior analysts shall collaborate closely with internal teams and external partners to enhance threat detection capabilities, develop threat hunting strategies, and optimize security controls. By providing timely and accurate cyber threat intelligence, senior analysts will bolster the judiciary's cybersecurity posture and resilience against sophisticated adversaries.

The employee shall perform the following:

  • Identify emerging cyber threats, vulnerabilities, and attack trends based on information from various sources, including open-source research, dark web forums, and threat intelligence feeds.
  • Conduct in-depth analysis of cyber threat intelligence data to identify patterns, trends, and indicators of compromise (IOCs) associated with potential cyber-attacks. This includes analyzing malware samples, phishing emails, and other threat artifacts to understand threat actor TTPs.
  • Produce high-quality written and oral reports, briefings, and presentations to communicate cyber threat intelligence findings, assessments, and recommendations to senior leadership, stakeholders, and technical teams in a clear and actionable manner.
  • Proactively search for signs of malicious activity within the organization's network and systems utilizing threat intelligence to identify and investigate potential security incidents or anomalies.
  • Enhance the organization's cyber threat intelligence capabilities and methodologies in accordance with the latest cybersecurity threats, trends, and technologies.
  • Contribute to the development of cybersecurity strategies, policies, and procedures based on threat intelligence insights and analysis, helping to prioritize security investments and initiatives to mitigate emerging threats effectively.
  • Provide mentorship, guidance, and training to other employee's employees, including sharing knowledge and best practices to build a skilled and cohesive cyber threat intelligence team.
  • Participate in information sharing initiatives and collaborate with industry peers, government agencies, and cybersecurity communities to exchange threat intelligence and enhance collective cyber defense capabilities.
  • Collaborate with vulnerability management teams to prioritize and assess the severity of vulnerabilities based on threat intelligence data, enabling informed decisions on patching and remediation efforts.
  • Provide written recommendations on Government drafts of executive summaries and briefings.
  • Provide recommendations and input on other content and presentations.
  • Incorporate data from Mandiant, federal partners, and other vendors to expand threat awareness and bolster proactive defense strategies.
  • Examine malware samples from diverse sources using reverse engineering techniques to uncover capabilities, origins, and threat actor methodologies.
  • Detect and study emerging vulnerabilities, attack trends, and threat patterns through internal data, open-source intelligence, and integrated feeds from trusted platforms.
  • Use Splunk and other tools to identify unusual activities, create actionable alerts, and monitor potential security incidents in real time.

Qualifications

  • 10 years' experience in conducting in-depth analysis of cyber threats, including malware, phishing campaigns, and other attack vectors. This involves identifying patterns, trends, and indicators of compromise (IOCs) to understand threat actor tactics, techniques, and procedures (TTPs).
  • 10 years' experience in collecting and aggregating threat intelligence from various sources, such as opensource intelligence (OSINT), dark web forums, and commercial threat intelligence feeds. This includes evaluating the credibility and relevance of intelligence sources and identifying actionable intelligence for the organization.
  • 10 years' experience in producing written and oral reports, briefings, and presentations to communicate threat intelligence findings, assessments, and recommendations to stakeholders at all levels of the organization.
  • 5 years working in an office environment with technical IT personnel.
  • 5 years of experience with Microsoft Office Tools such as Word, PowerPoint, Excel, and OneNote
  • 5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools.
  • Bachelors degree in Cybersecurity preferred
  • Security + is required and Network + or equivalent is preferred
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Cyber defense Malware OSINT Reverse engineering SIEM Splunk Threat detection Threat intelligence TTPs Vulnerabilities Vulnerability management

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.