Threat Intelligence Analyst / Security Analyst Tier II
Los Angeles, California, United States
WaveStrong
Founded in 2001, WaveStrong is an industry leader in enterprise and cloud information security. A data privacy consulting company providing a complete cyber security program trusted for over 18 years.Exciting Threat Intelligence Analyst / Security Analyst Tier II, 6 months, contract opportunity in Los Angeles, CA.
Requirements
- 2 plus years of experience in tactical intelligence or intelligence analysis, or a related area.
- 3 plus years of experience in cyber security or related discipline.
- Understands the following concepts: confidence intervals, MITRE, kill chain, C2, passive DNS, traffic light protocol, and collections bias. Cyber Threat Intelligence Analyst will focus on technical analysis of threats in order to drive the collection, creation, and dissemination of indicators of compromise and indicators of attack.
- Ability to conduct open-source intelligence collection and analysis.
- Ability to produce intelligence products at the tactical, operational, and strategic levels.
- Familiarity with multiple threat intelligence types, sources, and methods of gathering/ obtaining information and data.
- Basic knowledge of open-source tools, such as Shodan, Maltego, PassiveTotal, and Virus Total.
- Good understanding of the intelligence lifecycle and associated analytic methodologies (Cyber Kill Chain, Diamond Model, ATT&CK, etc.).
- Triaging tactical reporting to focus on serious threats and/or those likely to be perceived as such
- Nice to have: GCTI: Cyber Threat Intelligence, CCTA: Certified Cyber Threat Analyst, CCIP: Certified Cyber Intelligence Professional
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
3
0
0
Categories:
Analyst Jobs
Threat Intel Jobs
Tags: Cyber Kill Chain DNS GCTI SHODAN Threat intelligence
Region:
North America
Country:
United States
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Security Operations Engineer jobsSystems Engineer jobsProduct Security Engineer jobsSystems Administrator jobsSenior Security Analyst jobsCybersecurity Editor jobsCybersecurity Content Editor jobsSenior Information Security Analyst jobsInformation Security Manager jobsCyber Security Specialist jobsSenior Network Security Engineer jobsIT Security Analyst jobsChief Information Security Officer jobsSenior Information Security Engineer jobsSecurity Consultant jobsInformation System Security Officer (ISSO) jobsSecurity Specialist jobsIT Security Engineer jobsSenior Product Security Engineer jobsInformation Systems Security Engineer jobsCyber Threat Intelligence Analyst jobsSenior Cyber Security Engineer jobsSenior Software Engineer jobsSecurity Operations Analyst jobsCyber Security Architect jobs
Encryption jobsBash jobsJava jobsCEH jobsTS/SCI jobsThreat detection jobsSplunk jobsSDLC jobsTerraform jobsTop Secret jobsSQL jobsSOC 2 jobsMalware jobsIDS jobsRMF jobsIPS jobsFinance jobsForensics jobsDocker jobsCompTIA jobsActive Directory jobsITIL jobsOWASP jobsIntrusion detection jobsVPN jobs
Ansible jobsHIPAA jobsGIAC jobsCRISC jobsIT infrastructure jobsTCP/IP jobsOSCP jobsClearance Required jobsDoDD 8570 jobsCCSP jobsZero Trust jobsDNS jobsMITRE ATT&CK jobsData Analytics jobsSOX jobsSOAR jobsIndustrial jobsArtificial Intelligence jobsJira jobsMachine Learning jobsJavaScript jobsBanking jobsNIST 800-53 jobsCISO jobsUNIX jobs