Threat Intelligence Analyst / Security Analyst Tier II

AI overview

Focus on technical analysis of threats to drive the collection, creation, and dissemination of critical indicators of compromise.

Exciting Threat Intelligence Analyst / Security Analyst Tier II, 6 months, contract opportunity in Los Angeles, CA.

Requirements

  • 2 plus years of experience in tactical intelligence or intelligence analysis, or a related area.
  • 3 plus years of experience in cyber security or related discipline.
  • Understands the following concepts: confidence intervals, MITRE, kill chain, C2, passive DNS, traffic light protocol, and collections bias. Cyber Threat Intelligence Analyst will focus on technical analysis of threats in order to drive the collection, creation, and dissemination of indicators of compromise and indicators of attack.
  • Ability to conduct open-source intelligence collection and analysis.
  • Ability to produce intelligence products at the tactical, operational, and strategic levels.
  • Familiarity with multiple threat intelligence types, sources, and methods of gathering/ obtaining information and data.
  • Basic knowledge of open-source tools, such as Shodan, Maltego, PassiveTotal, and Virus Total.
  • Good understanding of the intelligence lifecycle and associated analytic methodologies (Cyber Kill Chain, Diamond Model, ATT&CK, etc.).
  • Triaging tactical reporting to focus on serious threats and/or those likely to be perceived as such
  • Nice to have: GCTI: Cyber Threat Intelligence, CCTA: Certified Cyber Threat Analyst, CCIP: Certified Cyber Intelligence Professional

Founded in 2001, WaveStrong is an industry leader in enterprise and cloud information security consulting services. We pride ourselves on our best of breed security solutions and services that span a myriad of government, education and business verticals. Our staff is comprised of both certified technical and business professionals who can help you successfully navigate complexities of planning, design, implementation and management of securing data. Our approach is vendor agnostic giving our customers the freedom to choose the best customized security model for their business.

View all jobs
Get hired quicker

Be the first to apply. Receive an email whenever similar jobs are posted.

Ace your job interview

Understand the required skills and qualifications, anticipate the questions you may be asked, and study well-prepared answers using our sample responses.

Security Analyst Q&A's
Report this job
Apply for this job