Threat Intelligence Analyst / Security Analyst Tier II
Los Angeles, California, United States
WaveStrong
Founded in 2001, WaveStrong is an industry leader in enterprise and cloud information security. A data privacy consulting company providing a complete cyber security program trusted for over 18 years.Exciting Threat Intelligence Analyst / Security Analyst Tier II, 6 months, contract opportunity in Los Angeles, CA.
Requirements
- 2 plus years of experience in tactical intelligence or intelligence analysis, or a related area.
- 3 plus years of experience in cyber security or related discipline.
- Understands the following concepts: confidence intervals, MITRE, kill chain, C2, passive DNS, traffic light protocol, and collections bias. Cyber Threat Intelligence Analyst will focus on technical analysis of threats in order to drive the collection, creation, and dissemination of indicators of compromise and indicators of attack.
- Ability to conduct open-source intelligence collection and analysis.
- Ability to produce intelligence products at the tactical, operational, and strategic levels.
- Familiarity with multiple threat intelligence types, sources, and methods of gathering/ obtaining information and data.
- Basic knowledge of open-source tools, such as Shodan, Maltego, PassiveTotal, and Virus Total.
- Good understanding of the intelligence lifecycle and associated analytic methodologies (Cyber Kill Chain, Diamond Model, ATT&CK, etc.).
- Triaging tactical reporting to focus on serious threats and/or those likely to be perceived as such
- Nice to have: GCTI: Cyber Threat Intelligence, CCTA: Certified Cyber Threat Analyst, CCIP: Certified Cyber Intelligence Professional
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
0
0
0
Categories:
Analyst Jobs
Threat Intel Jobs
Tags: Cyber Kill Chain DNS GCTI SHODAN Threat intelligence
Region:
North America
Country:
United States
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Product Security Engineer jobsInformation Security Specialist jobsSenior Security Analyst jobsSenior Cloud Security Engineer jobsSystems Engineer jobsSenior Cybersecurity Engineer jobsSystems Administrator jobsSenior Information Security Analyst jobsSenior Network Security Engineer jobsInformation Security Manager jobsCyber Security Specialist jobsIT Security Analyst jobsIT Security Engineer jobsChief Information Security Officer jobsSecurity Consultant jobsSecurity Specialist jobsInformation System Security Officer (ISSO) jobsInformation Systems Security Engineer jobsSenior Information Security Engineer jobsSenior Cyber Security Engineer jobsSenior Product Security Engineer jobsCyber Threat Intelligence Analyst jobsCyber Security Architect jobsSecurity Operations Analyst jobsCybersecurity Specialist jobs
TS/SCI jobsEDR jobsEncryption jobsJava jobsBash jobsThreat detection jobsSplunk jobsTerraform jobsTop Secret jobsIDS jobsMalware jobsRMF jobsSDLC jobsIPS jobsSQL jobsSOC 2 jobsForensics jobsFinance jobsDocker jobsGIAC jobsCompTIA jobsActive Directory jobsIntrusion detection jobsOWASP jobsITIL jobs
VPN jobsHIPAA jobsAnsible jobsDoDD 8570 jobsIT infrastructure jobsTCP/IP jobsOSCP jobsCRISC jobsData Analytics jobsClearance Required jobsMITRE ATT&CK jobsCCSP jobsNIST 800-53 jobsBanking jobsZero Trust jobsSOAR jobsDNS jobsEndpoint security jobsUNIX jobsIndustrial jobsSAP jobsSOX jobsJira jobsMachine Learning jobsJavaScript jobs