Cyber Threat Intelligence Analyst
Huntsville, AL, United States
ASM Research
The CTI Team is Responsible for monitoring and analyzing external cyber threat data to provide insights and actionable intelligence about potential cyber threats. They shall triage information collected from different threat intelligence sources, including internal sources, and study the pattern of attacks, their methodology, motive, severity, and threat landscape applicable to the organizations systems. They shall support enhancing the overall cybersecurity posture of an organization by delivering timely, relevant, information to stakeholders.
Job Responsibilities:
- Monitor open-source websites for hostile content directed towards organizational or partner interests.
- Analyze collected data to identify potential threats, vulnerabilities, and emerging trends.
- Provide tactical intelligence that helps the SOC understand the specifics of current threats, including indicators of compromise (IOCs), tac?cs, techniques, and procedures (TTPs) used by attackers.
- Assist the SOC during ongoing incidents by providing real-?me intelligence updates, context, and guidance to help investigate, contain, and remedy threats.
- Provide information on known vulnerabilities and potential zero-day threats to help the SOC prioritize and patch systems accordingly.
- Educate SOC analysts and other relevant teams on the latest threats, attack techniques, and defensive strategies to enhance the overall cybersecurity awareness within the organizati
- Mentor and train junior analysts, fostering a culture of continuous improvement and knowledge sharing within the CTI team.
Minimum Qualifications
- Bachelor’s Degree in Computer Science or a related field or equivalent experience.
- 5+ years of experience in systems security.
- Top Secret with SCI Eligibility
Other Job Specific Skills
- Knowledge and experience Splunk Enterprise Security
- Knowledge and experience of Microsoft Sentinel
- Possess proficiency in performing threat factor analysis.
- Through understanding incident response processes, methodologies, and best practices, contributing to effective threat mitigati
- Experience in established cyber threat intelligence frameworks, such as MITRE ATT&CK, to inform security strategies and enhance threat analysis.
- Possess an understanding of incident response processes, methodologies, and best practices, contributing to effective threat mitigati
- Understand the operational capabilities and limitations of security technologies utilized within the SOC, ensuring effective threat response.
- Familiarity with threat intelligence sharing platforms and collaborative frameworks, such as Information Sharing and Analysis Centers (ISACs).
- Proficiency in using threat intelligence platforms and tools for effective data aggregation and analysis.
- Exceptional analytical skills to evaluate and synthesize threat data from diverse sources, identifying complex attack patterns and trends.
Experience with conducting threat hunting activities to proactively identify and mitigate potential threats within the environment.
QualificationsCompensation Ranges
Compensation ranges for ASM Research positions vary depending on multiple factors; including but not limited to, location, skill set, level of education, certifications, client requirements, contract-specific affordability, government clearance and investigation level, and years of experience. The compensation displayed for this role is a general guideline based on these factors and is unique to each role. Monetary compensation is one component of ASM's overall compensation and benefits package for employees.
EEO Requirements
It is the policy of ASM that an individual's race, color, religion, sex, disability, age, sexual orientation or national origin are not and will not be considered in any personnel or management decisions. We affirm our commitment to these fundamental policies.
All recruiting, hiring, training, and promoting for all job classifications is done without regard to race, color, religion, sex, disability, or age. All decisions on employment are made to abide by the principle of equal employment.
Physical Requirements
The physical requirements described in "Knowledge, Skills and Abilities" above are representative of those which must be met by an employee to successfully perform the primary functions of this job. (For example, "light office duties' or "lifting up to 50 pounds" or "some travel" required.) Reasonable accommodations may be made to enable individuals with qualifying disabilities, who are otherwise qualified, to perform the primary functions.
Disclaimer
The preceding job description has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications required of employees assigned to this job.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: ASM Clearance Computer Science Incident response MITRE ATT&CK Monitoring Sentinel SOC Splunk Threat intelligence Top Secret TTPs Vulnerabilities Zero-day
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.