Threat Intel Analyst
Location: San Jose, CA 95110/Remote Work
Duration: 12+ Months
Compile cyber threat data gathered through independent research and analysis along with Security Operations Center activity, and look at emerging technology, techniques and adversarial capabilities and tactics.
Analyze cyber threat Indications & Warning and fuse unclassified/open source cyber threat information correlating internal activity to external indicators across numerous boundaries. The correlation provides insight into every stage of a potential intruder's cyber kill chain as well as other activities in the wild.
Leverage relationships with various intelligence organizations to gain and share intelligence data.
Advise on countermeasures and defensive techniques based on intelligence gathered.
3+ years’ experience with cyber intelligence monitoring, analysis, and/or
3+ indicator lifecycle management
Solid understanding of cyber intelligence support activities provided to a security operation center or similar capability.
Self-motivated individual who can work remotely and keep up with a dynamic, fast-paced environment meeting deliverable and operational requirements
1+ years supporting a Security Operation Center as an analyst or
1+ Incident Responder
Hands-on experience in countermeasure implementation through creation of detection rules.
Relationships in security communities that facilitate indicator sharing.
Familiarity with link-analysis methods and software (Maltego) Ability to quickly develop effective solutions to unique problems using a combination of existing tools and custom code/scripts.
Bachelor's Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience. Experience in Cyber Intelligence concepts and implementation, and cyber intrusion kill chain concepts and implementation.
Experience / Knowledge in:
SIEM (Splunk ES)
Threat Intel Platforms (Threat-Q)
ASK Staffing, Inc. | Global Delivery Center
Main: 678-250-9900 Ext 2631