Threat Intelligence Analyst / Security Analyst Tier II
Los Angeles, California, United States
WaveStrong
Founded in 2001, WaveStrong is an industry leader in enterprise and cloud information security. A data privacy consulting company providing a complete cyber security program trusted for over 18 years.Exciting Threat Intelligence Analyst / Security Analyst Tier II, 6 months, contract opportunity in Los Angeles, CA.
Requirements
- 2 plus years of experience in tactical intelligence or intelligence analysis, or a related area.
- 3 plus years of experience in cyber security or related discipline.
- Understands the following concepts: confidence intervals, MITRE, kill chain, C2, passive DNS, traffic light protocol, and collections bias. Cyber Threat Intelligence Analyst will focus on technical analysis of threats in order to drive the collection, creation, and dissemination of indicators of compromise and indicators of attack.
- Ability to conduct open-source intelligence collection and analysis.
- Ability to produce intelligence products at the tactical, operational, and strategic levels.
- Familiarity with multiple threat intelligence types, sources, and methods of gathering/ obtaining information and data.
- Basic knowledge of open-source tools, such as Shodan, Maltego, PassiveTotal, and Virus Total.
- Good understanding of the intelligence lifecycle and associated analytic methodologies (Cyber Kill Chain, Diamond Model, ATT&CK, etc.).
- Triaging tactical reporting to focus on serious threats and/or those likely to be perceived as such
- Nice to have: GCTI: Cyber Threat Intelligence, CCTA: Certified Cyber Threat Analyst, CCIP: Certified Cyber Intelligence Professional
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
6
0
0
Categories:
Analyst Jobs
Threat Intel Jobs
Tags: Cyber Kill Chain DNS GCTI SHODAN Threat intelligence
Region:
North America
Country:
United States
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Product Security Engineer jobsSecurity Operations Engineer jobsSenior Security Analyst jobsSystems Administrator jobsSenior Cybersecurity Engineer jobsSenior Information Security Analyst jobsCybersecurity Editor jobsCybersecurity Content Editor jobsCyber Security Specialist jobsInformation Security Manager jobsIT Security Analyst jobsSenior Network Security Engineer jobsSenior Information Security Engineer jobsSenior Product Security Engineer jobsInformation System Security Officer (ISSO) jobsSecurity Consultant jobsChief Information Security Officer jobsIT Security Engineer jobsInformation Systems Security Engineer jobsSecurity Specialist jobsSenior Cyber Security Engineer jobsCyber Threat Intelligence Analyst jobsSenior Software Engineer jobsCybersecurity Specialist jobsSenior IT Auditor jobs
EDR jobsTS/SCI jobsJava jobsEncryption jobsCEH jobsSplunk jobsTop Secret jobsSDLC jobsIDS jobsThreat detection jobsTerraform jobsIPS jobsMalware jobsFinance jobsRMF jobsSQL jobsDocker jobsForensics jobsSOC 2 jobsActive Directory jobsIntrusion detection jobsCompTIA jobsOWASP jobsITIL jobsTCP/IP jobs
HIPAA jobsCRISC jobsGIAC jobsAnsible jobsClearance Required jobsVPN jobsDoDD 8570 jobsMITRE ATT&CK jobsIT infrastructure jobsOSCP jobsJira jobsData Analytics jobsSOAR jobsDNS jobsSOX jobsJavaScript jobsBanking jobsUNIX jobsCCSP jobsIndustrial jobsZero Trust jobsCISO jobsGCIH jobsArtificial Intelligence jobsSANS jobs